Method and system for resource management and evaluation

ABSTRACT

A system and method for using RFID technology to track resource performance and task completion is disclosed. In one exemplary embodiment, a system for facilitating a transaction comprising a transponder, an RF reader, a transaction completion system, and a resource engine. In another exemplary embodiment, the transponder system is configured to provide an account number in ISO/IEC 7816 magnetic stripe Track 1/Track 2 format. In accordance with another aspect the transponder may transmit to the RFID reader information identifying the resource&#39;s performance tracking account to which the transponder is associated. The RFID reader may receive and forward the information to facilitate performance tracking.

CROSS REFERENCE TO RELATED APPLICATIONS

This invention is a continuation in part of U.S. Ser. No. 10/708,597filed on Mar. 12, 2004 and entitled METHOD AND SYSTEM FOR TRACKING USERPERFORMANCE (the '597 application itself claims priority to U.S. Ser.No. 10/340,352 filed on Jan. 10, 2003 and entitled SYSTEM AND METHOD FORINCENTING PAYMENT USING RADIO FREQUENCY IDENTIFICATION IN CONTACT ANDCONTACTLESS TRANSACTIONS. The '352 application itself claims priority toU.S. patent application Ser. No. 10/192,488, entitled “SYSTEM AND METHODFOR PAYMENT USING RADIO FREQUENCY IDENTIFICATION IN CONTACT ANDCONTACTLESS TRANSACTIONS,” filed on Jul. 9, 2002 (which itself claimspriority to U.S. Provisional No. 60/304,216 filed on Jul. 10, 2001));U.S. patent application Ser. No. 10/318,432, entitled “SYSTEM AND METHODFOR SELECTING LOAD OPTIONS FOR USE IN RADIO FREQUENCY IDENTIFICATION INCONTACT AND CONTACTLESS TRANSACTIONS,” filed Dec. 13, 2002; U.S. patentapplication Ser. No. 10/318,480, entitled “SYSTEM AND METHOD FOR PAYMENTUSING RADIO FREQUENCY IDENTIFICATION IN CONTACT AND CONTACTLESSTRANSACTIONS,” filed Dec. 13, 2002; and, U.S. Provisional PatentApplication No. 60/396,577 filed Jul. 16, 2002, all of which are herebyincorporated by reference.

FIELD OF INVENTION

This invention generally relates to systems and methods for facilitatinga shopping experience, and more particularly, to tracking theperformance of shopping resources using Radio Frequency Identification(RFID) in contact and contactless environments.

BACKGROUND OF THE INVENTION

A variety of difficulties, inconveniences, and/or inefficiencies may beencountered in conjunction with the distribution of goods and servicesfrom suppliers to consumers. For example, it can be cumbersome and timeconsuming for the consumer to locate the section of the store (e.g., thedairy aisle, the dry cereal aisle) where the items the consumer desires(e.g., milk, oatmeal) are located, to find the most efficient pathbetween each of those locations, and to transport all of the collecteditems to a checkout line. From the perspective of the merchant, it maybe desirable to make the task of shopping more efficient, convenient,and satisfying for the consumer. It may also be desirable to increasesales by presenting individuals with an increased number of choices inspecific areas, by increasing the effectiveness of incentive offerings,and by reducing the impact and/or occurrence of undesirable events.

Similarly, from a supplier's perspective, it may also be desirable toimprove the consumer's shopping experience and to increase the volume ofsales in many of the same ways as the merchant, but it may also bedesirable to acquire information about consumer behavior and theiractions in response to specific stimuli. For example, suppliers of goodsmay wish to test the effectiveness of specific targeted offers, whichmay be tailored to individual consumers and/or identifiableenvironmental conditions. In addition, it may be desirable to improvethe ability of suppliers and other participants in the supply chain(e.g., raw material suppliers, manufacturers, producers, wholesalers,distributors, truckers, financiers, investors) to easily and quicklycollect and access information regarding the flow of goods and servicesto consumers. Such information may be useful to effectively test variousmarketing and/or distribution tactics and may also be useful ineffectively managing production and distribution to reduce necessaryinventories.

Although it may be a goal of most or all participants in the supplychain to improve the consumer's shopping experience, several aspects ofthe traditional shopping process may detract from this goal. Forexample, once a consumer has traveled to the merchant's facility,located and collected all of the desired goods, and transported them toa checkout, the consumer typically then waits in a line before theconsumer's selections may be inventoried and his/her purchase completed.At this checkout phase of the merchandizing process, delays may beencountered due to the volume of items being purchased by other patrons,the number of other patrons in line in front of the consumer, orinefficiencies in conducting the checkout by the other consumers and/orthe clerk.

In terms of automation, companies are increasingly embodying RFID dataacquisition technology in a fob, token or tag for use in completingtransactions. A typical fob includes a transponder and is ordinarily aself-contained device which may be contained on any portable formfactor. In some instances, a battery may be included with the fob topower the transponder. In which case the internal circuitry of the fob(including the transponder) may draw its operating power from thebattery power source. Alternatively, the fob may exist independent of aninternal power source. In this instance the internal circuitry of thefob (including the transponder) may gain its operating power directlyfrom an RF interrogation signal. U.S. Pat. No. 5,053,774 issued toSchuermann describes a typical transponder RF interrogation system whichmay be found in the prior art. The Schuermann patent describes ingeneral the powering technology surrounding conventional transponderstructures. U.S. Pat. No. 4,739,328 discusses a method by which aconventional transponder may respond to a RF interrogation signal. Othertypical modulation techniques which may be used include, for example,ISO/IEC 14443 and the like.

One of the more visible uses of the RFID technology is found in theintroduction of Exxon/Mobil's Speedpass® and Shell's EasyPay® products.These products use transponders placed in a fob or tag which enablesautomatic identification of the resource when the fob is presented at aPoint of Sale (POS) device. Fob identification data is typically passedto a third party server database, where the identification data isreferenced to a resource (e.g., resource) credit or debit account. In anexemplary processing method, the server seeks authorization for thetransaction by passing the transaction and account data to anauthorizing entity. Once authorization is received by the server,clearance is sent to the point of sale device for completion of thetransaction. In this way, the conventional transaction processing methodinvolves an indirect path which causes undue overhead due to the use ofthe third-party server. As such, a RFID system for facilitating atransaction between a merchant and a consumer wherein improvements instore layout, offers presented, pricing, inventory management, andpayment reconciliation is desired.

SUMMARY OF THE INVENTION

The present invention provides a system and method for facilitating ashopping experience using a transponder-reader system. Thetransponder-reader system described herein may include a RFID readeroperable to provide a RF interrogation signal for powering a transpondersystem, receiving a transponder system RF signal, and providingtransponder system account data relative to the transponder system RFsignal. The transponder-reader system may include a RFIDprotocol/sequence controller in electrical communication with one ormore interrogators for providing an interrogation signal to atransponder, a RFID authentication circuit for authenticating the signalreceived from the transponder, a serial or parallel interface forinterfacing with a point of interaction (POI) terminal, and an USB orserial interface for use in personalizing the RFID reader and/or thetransponder. The transponder-reader system may further include a fobincluding one or more transponders (e.g., modules) responsive to one ormore interrogation signals and for providing an authentication signalfor verifying that the transponder and/or the RFID reader are authorizedto operate within the transponder-reader system. In this way, the fobmay be responsive to multiple interrogation signals provided atdifferent frequencies. Further, the fob may include a USB or serialinterface for use with a computer network or with the RFID reader.

The RFID system and method according to the present invention mayinclude a transponder which may be embodied in a fob, tag, card or anyother form factor (e.g., wristwatch, keychain, cell phone, etc.), whichmay be capable of being presented for interrogation. In that regard,although the transponder is described herein as embodied in a fob, theinvention is not so limited.

The system may further include a RFID reader configured to send astanding RFID recognition signal which may be transmitted from the RFIDreader via radio frequency (or electromagnetic) propagation. The fob maybe placed within proximity to the RFID reader such that the RFID signalmay interrogate the fob and initialize fob identification procedures.

In one exemplary embodiment, as a part of the identification process,the fob and the RFID reader may engage in mutual authentication. TheRFID reader may identify the fob as including an authorized systemtransponder for receiving encrypted information and storing theinformation on the fob memory. Similarly, the fob, upon interrogation bythe RFID reader, may identify the RFID reader as authorized to receivethe encrypted and stored information. Where the RFID reader and the fobsuccessfully mutually authenticate, the fob may transmit to the RFIDreader certain information identifying the resource's performancetracking account or accounts to which the fob is associated. The RFIDreader may receive the information and forward the information tofacilitate performance tracking. In one exemplary embodiment, the RFIDreader may forward the information to a point of interaction terminal(e.g., POI or computer interface) for transaction completion.

In another exemplary embodiment, the fob completes tasks via a computerinterface. The fob may be connected to the computer using a USB orserial interface fob account information may be transferred to thecomputer for use in tracking a resource's performance via a network(e.g., the Internet).

In still another exemplary embodiment of the invention, a methodincludes the steps of providing a consumer interface configured to emita consumer identity RF signal configured to identify a consumer,receiving said consumer identity signal, receiving an amount owingsignal indicative of an amount owing from said consumer; andfacilitating one or more payments between an account of the merchant andan account of the consumer.

These features and other advantages of the system and method, as well asthe structure and operation of various exemplary embodiments of thesystem and method, are described below.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, wherein like numerals depict like elements,illustrate exemplary embodiments of the present invention, and togetherwith the description, serve to explain the principles of the invention.In the drawings:

FIG. 1A illustrates an exemplary RFID-based system in accordance withthe present invention, wherein exemplary components used for fobperformance tracking are depicted;

FIG. 1B illustrates an exemplary personalization system in accordancewith the present invention;

FIG. 2 is a schematic illustration of an exemplary fob in accordancewith the present invention;

FIG. 3 is a schematic illustration of an exemplary RFID reader inaccordance with the present invention;

FIG. 4 is an exemplary flow diagram of an exemplary authenticationprocess in accordance with the present invention;

FIG. 5 is an exemplary flow diagram of an exemplary decision process fora protocol/sequence controller in accordance with the present invention;

FIGS. 6A-B are an exemplary flow diagram of a fob personalizationprocess in accordance with the present invention;

FIGS. 7A-B are an exemplary flow diagram of a RFID readerpersonalization process in accordance with the present invention;

FIG. 8 is a flow diagram of an exemplary performance tracking process inaccordance with the present invention;

FIG. 9 is another schematic illustration of an exemplary fob configuredto facilitate biometric security devices in accordance with the presentinvention;

FIG. 10 includes a flowchart illustrating an exemplary resource enginesystem configured to facilitate tracking of resource performance;

FIG. 11 includes an exemplary block diagram illustrating additionaldetails of the resource engine component of the present invention;

FIG. 12 includes a flowchart illustrating an exemplary method forassigning tasks in accordance with the present invention;

FIG. 13 includes an exemplary screen shot of a software program used tofacilitate tracking of resource performance in accordance with thepresent invention;

FIG. 14 includes an exemplary flowchart illustrating an assignment of anIMR;

FIG. 15 illustrates an exemplary external flow of informationsurrounding an exemplary system for facilitating a transaction between aconsumer and a merchant;

FIG. 16 illustrates an exemplary method for facilitating a transactionbetween a consumer and a merchant;

FIG. 17 is an exemplary layout of the data stored in track 2 format; and

FIG. 18 is an example of a conventional magnetic stripe track 2 layoutfor MasterCard.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

The detailed description of exemplary embodiments of the inventionherein makes reference to the accompanying block diagrams andflowcharts, which show the exemplary embodiment by way of illustrationand its best mode. While these exemplary embodiments are described insufficient detail to enable those skilled in the art to practice theinvention, it should be understood that other embodiments may berealized and that logical and mechanical changes may be made withoutdeparting from the spirit and scope of the invention. Thus, the detaileddescription herein is presented for purposes of illustration only andnot of limitation. For example, the steps recited in any of the methodor process descriptions may be executed in any order and are not limitedto the order presented.

Moreover, it should be appreciated that the particular implementationsshown and described herein are illustrative of the invention and itsbest mode and are not intended to otherwise limit the scope of thepresent invention in any way. Indeed, for the sake of brevity, certainsub-components of the individual operating components, conventional datanetworking, application development and other functional aspects of thesystems may not be described in detail herein. Furthermore, theconnecting lines shown in the various figures contained herein areintended to represent exemplary functional relationships and/or physicalcouplings between the various elements. It should be noted that manyalternative or additional functional relationships or physicalconnections may be present in a practical system.

The present invention may be described herein in terms of blockdiagrams, screen shots and flowcharts, optional selections and variousprocessing steps. Such functional blocks may be realized by any numberof hardware and/or software components configured to perform tospecified functions. For example, the present invention may employvarious integrated circuit components (e.g., memory elements, processingelements, logic elements, look-up tables, and the like), which may carryout a variety of functions under the control of one or moremicroprocessors or other control devices. Similarly, the softwareelements of the present invention may be implemented with anyprogramming or scripting language such as C, C++, Java, COBOL,assembler, PERL, extensible markup language (XML), smart cardtechnologies with the various algorithms being implemented with anycombination of data structures, objects, processes, routines or otherprogramming elements. Further, it should be noted that the presentinvention may employ any number of conventional techniques for datatransmission, signaling, data processing, network control, and the like.

In addition, many applications of the present invention could beformulated. The exemplary network disclosed herein may include anysystem for exchanging data or tracking resource performance, such as adistributed system, a thin cable network, an Ethernet, a token ringnetwork, the internet, an intranet, an extranet, wide area network(WAN), local area network (LAN), satellite communications, and/or thelike. It is noted that the network may be implemented as other types ofnetworks, such as an interactive television network (ITN).

The system user/resource may interact with the system via any inputdevice such as, a keypad, keyboard, mouse, kiosk, personal digitalassistant, handheld computer (e.g., Palm Pilot®, Blueberry®), cellularphone and/or the like. Similarly, the invention could be used inconjunction with any type of personal computer, network computer, workstation, minicomputer, mainframe, or the like running any operatingsystem such as any version of Windows, Windows NT, Windows 2000, Windows98, Windows 95, MacOS, OS/2, BeOS, Linux, UNIX, Solaris or the like.Moreover, although the invention may frequently be described as beingimplemented with TCP/IP communications protocol, it should be understoodthat the invention could also be implemented using SNA, IPX, Appletalk,IPte, NetBIOS, OSI or any number of communications protocols. Moreover,the system contemplates, the use, sale, or distribution of any goods,services or information over any network having similar functionalitydescribed herein.

FIG. 1A illustrates an exemplary RFID performance tracking transactionsystem 100A in accordance with the present invention, wherein exemplarycomponents for use in completing a fob transaction are depicted. Ingeneral, the operation of system 100A may begin when a fob 102 ispresented for tracking a resource's performance, and is interrogated byan RFID reader 104 or, alternatively, a computer interface (e.g., userinterface) 134. Fob 102 and RFID reader 104 may then engage in mutualauthentication after which the transponder 114 may provide thetransponder identification and/or account identifier to RFID reader 104which may further provide the information to a resource engine 130 via apoint of interaction terminal 110. For further information related totracking and optimizing resources, see, for example, U.S. patentapplication Ser. No. 10/770,684 filed Feb. 3, 2004, and entitled SYSTEMAND METHOD FOR RESOURCE OPTIMIZATION, which is hereby incorporated byreference.

As used herein, a resource may include any user, person, shopper,product, employee, employer officer, entity, manager, business, client,corporation, customer, contractor, administrator, operator, equipment,supply, package, machinery, hardware and/or software. Employer, as usedherein, may include any performance tracking entity, manager,controller, auditor, administrator, operator and/or company.

The term tracking as used herein, may include any management,assignment, grading, pricing, checking-out, inventorying, stocking,shipping, scoring, manipulation, tracking, control, allocation, and/orany other modification to application information, resource information,skills information, and/or task information. Tasks may includeshipments, assignments, problem tickets, enhancements, analyses, builds,designs, components, assemblies, and/or any other projects. For example,by grading a resource, a resource may be priced, check-out, inventoriedand/or tracked in any other form.

Resource engine 130 may be a stand-alone system or incorporated into anypre-existing network or metrics system via any software and/or hardwarecustomization or upgrades. Resource engine 130 may include any hardwareand/or software discussed herein. Resource engine 130 may include a hostserver or other computing systems including a processor for processingdigital data, a memory coupled to said processor for storing digitaldata, an input digitizer coupled to the processor for inputting digitaldata, an application program stored in said memory and accessible bysaid processor for directing processing of digital data by saidprocessor, a display coupled to the processor and memory for displayinginformation derived from digital data processed by said processor and aplurality of databases, said databases including resource data,application data, skill data, category data and/or like data that couldbe used in association with the present invention. As those skilled inthe art will appreciate, resource engine 130 computer will typicallyinclude an operating system (e.g., Windows NT, 95/98/2000, Linux,Solaris, etc.) as well as various conventional support software anddrivers typically associated with computers.

Resource engine 130 may also be used in conjunction with any monitoringsystem, hardware or software, configured to monitor, manage and tracksystems within resource engine 130. One example of such monitoringsystem is an off-the-shelf program such as IBM's Tivoli NetView®, whichautomatically detects problems and responds to those problems at a locallevel. For example, NetView may detect a problem with an application andgenerate an information management record (IMR) in conjunction with thatproblem. The IMR from the monitoring system may then be transmitted toresource engine 130 through any of the communications networks describedherein.

Similarly, resource engine 130 may include, or be used in conjunctionwith, any type of personal computer, network computer, workstation,minicomputer, mainframe, or the like running any operating system suchas any version of Windows, Windows NT, Windows2000, Windows 98, Windows95, MacOS, OS/2, BeOS, Linux, UNIX, Solaris or the like. Moreover, theinvention may be implemented using TCP/IP communications protocols, IPX,Appletalk, IP-6, NetBIOS, OSI or any number of existing or futureprotocols. Resource engine 130 will be discussed in greater detailherein.

System 100A may include fob 102 having a transponder 114 and RFID reader104 in RF communication with fob 102. Although the present invention isdescribed with respect to fob 102, the invention is not to be solimited. Indeed, system 100A may include any device having a transponderwhich is configured to communicate with RFID reader 104 via RFcommunication. Typical devices may include, for example, a key ring,tag, card, cell phone, wristwatch or any such form capable of beingpresented for interrogation.

RFID reader 104 may be configured to communicate using an RFID internalantenna 106. Alternatively, RFID reader 104 may include an externalantenna 108 for communications with fob 102, where the external antennamay be made remote to RFID reader 104 using a suitable cable and/or datalink 120. RFID reader 104 may be further in communication with resourceengine 130 via a data link 122. System 100A may include a transactioncompletion system including a point of interaction device such as, forexample, shopper point of interaction terminal 110 or computer 134. Inone exemplary embodiment the transaction completion system may includeresource engine 130 and/or point of interaction terminal 110 incommunication with RFID reader 104 (via data link 122). As describedmore fully below, the transaction completion system may include computer134 connected to a network 136 and to transponder 114 via a USBconnector 132.

Although the point of interaction (POI) is described herein with respectto a resource POI terminal, the invention is not to be so limited.Indeed, a POI terminal is used herein by way of example, and the POI maybe any device capable of receiving fob account data. In this regard, thePOI may be any point of interaction device and/or terminal enabling theresource to complete a performance tracking transaction using fob 102.POI terminal 110 may be in further communication with a user interface118 (via data link 128) for providing a resource and/or manager accessto resource engine 130 information. In addition, POI terminal 110 may bein communication with a shopper host network 112 (via data link 124) forprocessing any tracking request. In this arrangement, informationprovided by RFID reader 104 is provided to POI terminal 110 of resourceengine 130 via data link 122. POI terminal 110 may receive theinformation (and alternatively may receive any identity verifyinginformation from user interface 118 via data link 128) and provide theinformation to host network 112 for processing.

A variety of conventional communications media and protocols may be usedfor data links 120, 122, 124, and 128 as well as for any othercommunication links mentioned herein. For example, data links 120, 122,124, and 128 may be an Internet Service Provider (ISP) configured tofacilitate communications over a local loop as is typically used inconnection with standard modem communication, cable modem, dishnetworks, ISDN, Digital Subscriber Lines (DSL), or any wirelesscommunication media. In addition, resource engine 130, including POIterminal 110 and host network 112, may reside on a local area networkwhich interfaces to a remote network (not shown) for remoteauthorization of an intended performance tracking transaction. Hostnetwork 112 may be an employer network, such as an employer LAN, WANand/or intranet. Resource engine 130 may communicate with the remotenetwork via a leased line, such as a T1, D3 line, or the like. Suchcommunications lines are described in a variety of texts, such as,“Understanding Data Communications,” by Gilbert Held, which isincorporated herein by reference.

A transponder and/or account identifier, as used herein, may include anynumber or identifier for an account (e.g., any device, code, or otheridentifier/indicia suitably configured to allow a resource to interactor communicate with system 100A, such as, for example,authorization/access code, personal identification number (PIN),Internet code, digital certificate, biometric data, and/or otheridentification indicia). A transponder identifier may be furthercoordinated with fob 102 as well as a resource identifier. For example,a resource may have a resource account identifier associated with him.The resource may also carry fob 102, which can only be used by thatspecific resource. Fob 102, in turn has a unique transponder identifiersuch that the transponder identifier may be associated with both thespecific fob 102 and the resource holding fob 102.

Resource engine 130 may also have one or more employer accountidentifiers associated with it. An employer account identifier may beused by an employer to associate a resource and/or fob 102 with aspecific employer account. For example, the employer account identifiersmay be used to track a resource's performance on different tasksassociated with the employer accounts.

The transponder identifier may be maintained by a performance trackingprovider (e.g., employer) and which may be used to track a resource'sperformance. A typical transponder identifier (e.g., account data) maybe correlated to a resource number, identifier, etc. For ease inunderstanding, the present invention may be described with respect to aresource ID. However, it should be noted that the invention is not solimited and other accounts permitting an exchange of information for anaccount data value is contemplated to be within the scope of the presentinvention.

The transponder identifier may be distributed and stored in any form ofplastic, electronic, magnetic, and/or optical device capable oftransmitting or downloading data to a second device. A resource accountidentifier may be, for example, a resource's ten-digit social securitynumber. The resource account identifier may also be, for example, thenumber of the resource's company credit card. In one exemplaryembodiment, the transponder and/or resource account identifier mayinclude a unique fob serial number and resource identification number,as well as specific application applets. The transponder and/or resourceaccount identifiers may be stored in fob 102 inside a database 214, asdescribed more fully below. Database 214 may be configured to storemultiple account identifiers issued to fob 102 resources by the same ordifferent account providing institutions.

FIG. 2 illustrates the many functions of exemplary fob 102 in accordancewith the present invention. Fob 102 may be an RFID fob which may bepresented by the resource to facilitate an exchange of information, fortracking a resource's performance on one or more tasks. As describedherein, by way of example, fob 102 may be an RFID fob which may bepresented for facilitating tracking resource performance.

Fob 102 may include an antenna 202 for receiving an interrogation signalfrom RFID reader 104 via antenna 106 (or alternatively, via externalantenna 108). Fob antenna 202 may be in communication with transponder114. In one exemplary embodiment, transponder 114 may be a 13.56 MHztransponder compliant with the ISO/IEC 14443 standard, and antenna 202may be of the 13 MHz variety. The transponder 114 may be incommunication with a transponder compatible modulator/demodulator 206configured to receive the signal from transponder 114 and configured tomodulate the signal into a format readable by any later connectedcircuitry. Further, modulator/demodulator 206 may be configured toformat (e.g., demodulate) a signal received from the later connectedcircuitry in a format compatible with transponder 114 for transmittingto RFID reader 104 via antenna 202. For example, where transponder 114is of the 13.56 MHz variety, modulator/demodulator 206 may be ISO/IEC14443-2 compliant.

Modulator/demodulator 206 may be coupled to a protocol/sequencecontroller 208 for facilitating control of the authentication of thesignal provided by RFID reader 104, and for facilitating control of thesending of fob 102 transponder identifier. In this regard,protocol/sequence controller 208 may be any suitable digital or logicdriven circuitry capable of facilitating determination of the sequenceof operation for fob 102 inner-circuitry. For example, protocol/sequencecontroller 208 may be configured to determine whether the signalprovided by RFID reader 104 is authenticated, and thereby providing toRFID reader 104 the account identifier stored on fob 102.

Protocol/sequence controller 208 may be further in communication withauthentication circuitry 210 for facilitating authentication of thesignal provided by RFID reader 104. Authentication circuitry may befurther in communication with a non-volatile secure memory database 212.Secure memory database 212 may be any suitable elementary file systemsuch as that defined by ISO/IEC 7816-4 or any other elementary filesystem allowing a lookup of data to be interpreted by the application onthe chip.

The data may be used by protocol/sequence controller 208 for dataanalysis and used for management and control purposes, as well assecurity purposes. Authentication circuitry may authenticate the signalprovided by RFID reader 104 by association of the RFID signal toauthentication keys stored on database 212. Encryption circuitry may usekeys stored on database 212 to perform encryption and/or decryption ofsignals sent to or from RFID reader 104. For a basic introduction oncryptography, review a text written by Bruce Schneier entitled “AppliedCryptography: Protocols, Algorithms, and Source Code in C,” published byJohn Wiley & Sons (second edition, 1996), herein incorporated byreference.

In addition, protocol/sequence controller 208 may be in communicationwith a database 214 for storing at least fob 102 transponder accountdata, and a unique fob 102 identification code. Protocol/sequencecontroller 208 may be configured to retrieve the account identifier fromdatabase 214 as desired. Database 214 may be of the same configurationas database 212 described above. The fob transponder account data and/orunique fob identification code stored on database 214 may be encryptedprior to storage. Thus, where protocol/sequence controller 208 retrievesthe account data, and or unique fob identification code from database214, the transponder account identifier may be encrypted when beingprovided to RFID reader 104. Further, the data stored on database 214may include, for example, an unencrypted unique fob 102 identificationcode, a resource identification, Track 1 and Track 2 data, as well asspecific application applets.

For example, in accordance with another exemplary embodiment, theaccount number may be stored in magnetic stripe format. That is, wherethe account number may be in magnetic stripe format, the account numberportions are governed by the International Standards OrganizationISO/IEC 7811, et al. standard, which are hereby incorporated byreference. The standard requires the magnetic stripe information to beencoded in three “tracks” (i.e., track 1, track 2, and track 3).

Data stored in track 1 may be typically used to verify the user'sidentity. Track 1 may be reserved for encoding the transaction accountidentifier, the name of the accountholder, and at least the expirationdate of the transaction account or the transaction device. Theinformation encoded in track 1 may be alpha-numeric and may be encodedat about 7 Bits/Character. In an exemplary layout of the data stored intrack 1, track 1 may be segmented into several distinct predeterminedportions (e.g., “fields”) for encoding the various account identifyinginformation. The following table may be useful for determining the fielddefinitions of the information provided.

TABLE 1 Table of Field Codes for Track 1 SS = Start Sentinel “%” FC =Format Code PAN = Primary Acct. # (19 digits max) FS = Field Separator“{circumflex over ( )}” Name = 26 alphanumeric characters max.Additional Data = Expiration Date, offset, encrypted PIN, etc. ES = EndSentinel “?” LRC = Longitudinal Redundancy Check

Track 2 may be the track most commonly used by the American BankingAssociation associated banking institutions. Track 2 may be typicallyreserved for a duplicate version of the transaction account identifierand the expiration date of the transaction account or the transactiondevice stored in track 1. In addition, track 2 may include an encryptedPersonal Identification Code, and other discretionary data. However, thedata in track 2 may be encoded at a lower Bit per Character density thanthe data encoded in track 1. The data in track 2 may be numeric only andmay be encoded at about 5 Bits/Character. The lower density ratio intrack 2 may be designed to ensure compatibility with older technologyreaders and to provide redundancy when reading with newer technologyreaders. FIG. 17 illustrates an exemplary layout of the data stored intrack 2, wherein track 2 may be segmented into several distinctpredetermined portions for encoding the various account identifyinginformation. As shown, the following table may be useful for determiningthe definitions of the information provided.

TABLE 2 Table of Field Codes for Track 2 SS = Start Sentinel “%” SS =Start Sentinel “;” PAN = Primary Acct. # (19 digits max) FS = FieldSeparator ”=” Additional Data = Expiration Date, offset, encrypted PIN,etc. ES = End Sentinel “?” LRC = Longitudinal Redundancy Check

Track 3 may be of similar description as Track 2. With the InternationalStandards Organization adoption of standard ISO/IEC 4909, track 3 of themagnetic stripe format was no longer used by the banking industry.However, other transaction devices including a magnetic stripe, such asdrivers licenses, use track 3, which may include both numeric only andalpha numeric characters. Track 3 may be unique in that track 3 wasintended to have data read and WRITTEN on it. Cardholders would haveaccount information UPDATED right on the magnetic stripe. The presentinvention anticipates that a fob user's travel-related informationprofile and/or account information may be updated using track 3.Unfortunately, track 3 may be almost an orphaned standard, since mostreaders currently in operation are not configured to write data onto amagnetic stripe. The original design of track 3 was to control off-lineATM transactions by recording transaction data for later reference bythe banking institution. But since ATMs are now on-line, the usage oftrack 3 has been drastically reduced.

The most common technique used to encode data in magnetic stripe formatmay be known as Aiken Biphase, or ‘two-frequency coherent-phaseencoding.’ The American National Standards Institute (ANSI) and theInternational Standards Organization (ISO) have chosen two standards toguide the encoding process. The ISO encoding protocol specifies thateach of tracks 1, 2 and 3 must begin and end with a length of all Zerobits, called CLOCKING BITS. These are used to synch the self-clockingfeature of bi-phase decoding. In addition, most transaction deviceswhich use magnetic stripe encoding protocol use either the ANSI/ISOALPHA Data format or the ANSI/ISO BCD Data format. For example, track 1may be typically encoded in ANSI/ISO ALPHA Data format which may be a 7bit, 6 data bits+1 parity bit (odd) format, where the data may be readleast significant bit first. The ANSI/ISO ALPHA format character setcontains 64 characters, 43 alphanumeric, 3 framing/field characters and18 control/special characters. On the other hand, tracks 2 and 3 aretypically encoded in ANSI/ISO BCD Data format, which may be a 5 bit, 4data bits+1 parity bit (odd) format. The character set for the ANSI/ISOBCD Data format character set contains 16 characters, 10 alphanumeric, 3framing/field characters and 3 control/special characters.

Ordinarily, a proxy account number (e.g., a portion of the transactionaccount number) includes essential identifying information, such as, forexample, any information that may be common to the account provider. Thecommon information (also called “common character,” herein) may includethe account provider routing number, or common source indicator such asthe character spaces reserved to indicate the identification of theissuing bank. Thus, where the proxy transaction account identifiercorresponds to an American Express account, the proxy transactionaccount identifier may include the common character number 3, encodedthe field location where such common character may be ordinarily encodedin traditional magnetic stripe format.

FIG. 18 illustrates the encoding of which would ordinarily be done by anentity, such as, for example, MasterCard in track 2 format. FIG. 15shows the encoding of a MasterCard account number 3111 2222 3333 4444with expiration date 12/99 in traditional track 1 format. SinceMasterCard uses the number 3 to identify its transaction accounts, theproxy account identifier will also use the number 3 so that thereceiving system (e.g., reader 104 or merchant system 130, or accountprovider) further recognizes that the proxy account identifier may befrom a MasterCard transaction device. It should be noted that in thisexample, the “3” and the “101” may be common characters to allMasterCard transaction accounts. For a more detailed explanation ofmagnetic stripe format data exchange, see U.S. patent application Ser.No. 10/810,473 filed on Mar. 26, 2004, entitled SYSTEM AND METHOD FORENCODING INFORMATION IN MAGNETIC STRIPE FORMAT FOR USE IN RADIOFREQUENCY IDENTIFICATION TRANSACTIONS, incorporated herein by reference.

Fob 102 may be configured to respond to multiple interrogation frequencytransmissions provided by RFID reader 104. That is, as described morefully below, RFID reader 104 may provide more than one RF interrogationsignal. In this case, fob 102 may be configured to respond to themultiple frequencies by including in fob 102 one or more additional RFsignal receiving/transmitting units 226. RF signalreceiving/transmitting unit 226 may include an antenna 218 andtransponder 220 where the antenna 218 and transponder 220 are compatiblewith at least one of the additional RF signals provided by RFID reader104. For example, in one exemplary embodiment, fob 102 may include a 134KHz antenna 218 configured to communicate with a 134 KHz transponder220. In this exemplary configuration, an ISO/IEC 14443-2 compliantmodulator/demodulator may not be required. Instead, the 134 KHztransponder may be configured to communicate directly with theprotocol/sequence controller 208 for transmission and receipt ofauthentication and account number signals as described above.

Database 212 and any other database discussed herein may be any type ofdatabase, such as relational, hierarchical, graphical, object-oriented,and/or other database configurations. Common database products that maybe used to implement the databases include DB2 by IBM (White Plains,N.Y.), various database products available from Oracle Corporation(Redwood Shores, Calif.), Microsoft Access or Microsoft SQL Server byMicrosoft Corporation (Redmond, Wash.), or any other suitable databaseproduct. Moreover, the databases may be organized in any suitablemanner, for example, as data tables or lookup tables. Each record may bea single file, a series of files, a linked series of data fields or anyother data structure. Association of certain data may be accomplishedthrough any desired data association technique such as those known orpracticed in the art. For example, the association may be accomplishedeither manually or automatically. Automatic association techniques mayinclude, for example, a database search, a database merge, GREP, AGREP,SQL, and/or the like. The association step may be accomplished by adatabase merge function, for example, using a “key field” inpre-selected databases or data sectors.

More particularly, a “key field” partitions the database according tothe high-level class of objects defined by the key field. For example,certain types of data may be designated as a key field in a plurality ofrelated data tables and the data tables may then be linked on the basisof the type of data in the key field. In this regard, the datacorresponding to the key field in each of the linked data tables may bepreferably the same or of the same type. However, data tables havingsimilar, though not identical, data in the key fields may also be linkedby using AGREP, for example. In accordance with one aspect of thepresent invention, any suitable data storage technique may be utilizedto store data without a standard format. Data sets may be stored usingany suitable technique, for example, storing individual files using anISO/IEC 7816-4 file structure; implementing a domain whereby a dedicatedfile may be selected that exposes one or more elementary filescontaining one or more data sets; using data sets stored in individualfiles using a hierarchical filing system; data sets stored as records ina single file (for example, compression, SQL accessible, hashed via oneor more keys, numeric, alphabetical by first tuple, etc.); block ofbinary (BLOB); stored as ungrouped data elements encoded using ISO/IEC7816-6 data elements; stored as ungrouped data elements encoded usingISO/IEC Abstract Syntax Notation (ASN.1) as in ISO/IEC 8824 and 8825;and/or other proprietary techniques that may include fractal compressionmethods, image compression methods, etc.

In one exemplary embodiment, the ability to store a wide variety ofinformation in different formats may be facilitated by storing theinformation as a Block of Binary (BLOB). Thus, any binary informationmay be stored in a storage space associated with a data set. The BLOBmethod may store data sets as ungrouped data elements formatted as ablock of binary via a fixed memory offset using either fixed storageallocation, circular queue techniques, or best practices with respect tomemory management (e.g., paged memory, least recently used, etc.). Byusing BLOB methods, the ability to store various data sets that havedifferent formats facilitates the storage of data associated with a widevariety of system components by multiple and unrelated owners of thedata sets. For example, a first data set which may be stored may beprovided by a first issuer, a second data set which may be stored may beprovided by an unrelated second issuer, and yet a third data set whichmay be stored, may be provided by a third issuer unrelated to the firstand second issuer. Each of these three exemplary data sets may containdifferent information that may be stored using different data storageformats and/or techniques. Further, each data set may contain subsets ofdata which also may be distinct from other subsets.

As stated above, in various embodiments of the present invention, thedata may be stored without regard to a common format. However, in oneexemplary embodiment of the present invention, the data set (e.g., BLOB)may be annotated in a standard manner when provided for manipulating thedata onto the network. The annotation may comprise a short header,trailer, or other appropriate indicator related to each data set thatmay be configured to convey information useful in managing the variousdata sets. For example, the annotation may be called a “conditionheader,” “header,” “trailer,” or “status,” herein, and may comprise anindication of the status of the data set or may include an identifiercorrelated to a specific issuer or owner of the data. In one example,the first three bytes of each data set BLOB may be configured orconfigurable to indicate the status of that particular data set (e.g.,LOADED, INITIALIZED, READY, BLOCKED, REMOVABLE, or DELETED). Subsequentbytes of data may be used to indicate for example, the identity of theresource, user, account identifier or the like. Each of these conditionannotations are further discussed herein.

With reference again to the exemplary block diagrams illustrated inFIGS. 1 and 2, fob 102 may be configured to respond to multipleinterrogation frequency transmissions provided by RFID reader 104. Thatis, as described more fully below, RFID reader 104 may provide more thanone RF interrogation signal. In this case, fob 102 may be configured torespond to the multiple frequencies by including in fob 102 one or moreadditional RF signal receiving/transmitting units 226. RF signalreceiving/transmitting unit 226 may include an antenna 218 andtransponder 220 where antenna 218 and transponder 220 are compatiblewith at least one of the additional RF signals provided by RFID reader104. For example, in one exemplary embodiment, fob 102 may include a 134KHz antenna 218 configured to communicate with a 134 KHz transponder220. In this exemplary configuration, an ISO/IEC 14443-2 compliantmodulator/demodulator may not be required. Instead, the 134 KHztransponder may be configured to communicate directly with theprotocol/sequence controller 208 for transmission and receipt ofauthentication and account identifier signals as described above.

In another embodiment, fob 102 may further include a universal serialbus (USB) connector 132 for interfacing fob 102 to user interface 134.User interface 134 may be further in communication with POI terminal 110via a network 136. Network 136 may be the Internet, an intranet, or thelike as is described above with respect to network 112. Further, userinterface 134 may be similar in construction to any conventional inputdevices and/or computing systems aforementioned for permitting aresource to interact with network 136 and/or resource engine 130 throughuser interface 134. In one exemplary embodiment, fob 102 may beconfigured to facilitate online performance tracking. A USB converter222 may be in communication with a USB connector 232 for facilitatingthe transfer of information between the modulator/demodulator 206 andUSB connector 132. Alternatively, USB converter 222 may be incommunication with protocol/sequence controller 208 to facilitate thetransfer of information between protocol/sequence controller 208 and USBconnector 132.

Where fob 102 includes USB connector 132, fob 102 may be incommunication with, for example, a USB port on user interface 134. Theinformation retrieved from fob 102 may be compatible with employee badgeand/or smart card technology enabling usage of interactive applicationson the Internet. No RFID reader may be required in this embodiment sincethe connection to POI terminal 110 may be made using a USB port on userinterface 134 and network 136.

Fob 102 may include means for enabling activation of the fob by theresource. In one exemplary embodiment, a switch 230 which may beoperated by the user/resource of fob 102. Switch 230 on fob 102 may beused to selectively or inclusively activate fob 102 for particular uses.In this context, the term “selectively” may mean that switch 230 enablesthe resource to place fob 102 in a particular operational mode. Forexample, the resource may place fob 102 in a mode for enabling trackingthe resource's performance of a specific task using a selected tasknumber. Alternatively, the fob may be placed in a mode as such that thefob account identifier is provided by USB port 132 (or serial port) onlyand fob transponder 114 is disabled.

In addition, the term “inclusively” may mean that fob 102 is placed inan operational mode permitting fob 102 to be responsive to the RFinterrogation and interrogation via the USB connector 132. In oneparticular embodiment, switch 230 may remain in an OFF position ensuringthat one or more applications or accounts associated with fob 102 arenon-reactive to any commands issued by RFID reader 104. In anotherexample, fob 102 may be activated by default, but the resource candeactivate fob 102 when the resource comes in the vicinity of RFIDreader 104 to prevent fob 102 from engaging with RFID reader 104. Asused herein, the OFF position may be termed the “normal” position of theactivation switch 230, although other normal positions are contemplated.

In another exemplary embodiment, when switch 230 is moved from the OFFposition, fob 102 may be deemed activated by the resource. That is,switch 230 may activate internal circuitry in fob 102 for permitting thefob to be responsive to RF signals (e.g., commands from RFID reader104). In this way, switch 230 may facilitate control of the active andinactive states of fob 102. Such control increases the system securityby preventing inadvertent or illegal use of fob 102.

In one exemplary embodiment, switch 230 may be a simple mechanicaldevice in communication with circuitry which may electrically preventthe fob from being powered by a RFID reader. That is, when switch 230 isin its normal position, switch 230 may provide a short to fob 102internal circuitry, preventing fob 102 from being responsive tointerrogation by RF or via the USB connector 230. In this arrangement,switch 230 may be, for example, a “normally closed” (NC) configuredswitch, which may be electrically connected to antenna 202 at theinterface of antenna 202 and transponder 114. Switch 230 may bedepressed, which may open switch 230 fully activating antenna 202.

In yet another exemplary embodiment, fob 102 may include a biometricsensor and biometric membrane configured to operate as switch 230 andactivate fob 102 when provided with a biometric signal from a authorizedresource using fob 102. Such biometric signal may be the digital readingof a fingerprint, thumbprint, or the like. Typically, where biometriccircuitry is used, the biometric circuitry may be powered by an internalvoltage source (e.g., battery). In this case, the switch may not be asimple mechanical device, but a switch which is powered. In yet anotherexemplary embodiment, switch 230 may be battery powered though nobiometric circuitry is present in fob 102.

In yet another embodiment, switch 230 may be a logic switch. Whereswitch 230 is a logic switch, switch 230 control software may be readfrom the sequence controller 208 to selectively control the activationof the various fob 102 components.

FIG. 3 illustrates an exemplary block diagram of RFID reader 104 inaccordance with an exemplary embodiment of the present invention. RFIDreader 104 includes, for example, an antenna 106 coupled to a RF module302, which is further coupled to a control module 304. In addition, RFIDreader 104 may include antenna 108 positioned remotely from RFID reader104 and coupled to RFID reader 104 via a suitable cable 120, or otherwire or wireless connection.

RF module 302 and antenna 106 may be suitably configured to facilitatecommunication with fob 102. Where fob 102 is formatted to receive asignal at a particular RF frequency, RF module 302 may be configured toprovide an interrogation signal at that same frequency. For example, inone exemplary embodiment, fob 102 may be configured to respond to aninterrogation signal of about 13.56 MHz. In this case, RFID antenna 106may be 13 MHz and may be configured to transmit an interrogation signalof about 13.56 MHz. That is, fob 102 may be configured to include afirst and second RF module (e.g., transponder) where the first modulemay operate using a 134 kHz frequency and the second RF module mayoperate using a 13.56 MHz frequency. RFID reader 104 may include tworeceivers which may operate using the 134 kHz frequency, the 13.56 MHzfrequency or both. When RFID reader 104 is operating at 134 kHzfrequency, only operation with the 134 kHz module on fob 102 may bepossible. When reader 104 is operating at the 13.56 MHz frequency, onlyoperation with the 13.56 MHz module on fob 102 may be possible. WhereRFID reader 104 supports both a 134 kHz frequency and a 13.56 MHz RFmodule, fob 102 may receive both signals from RFID reader 104. In thiscase, fob 102 may be configured to prioritize selection of the one orthe other frequency and reject the remaining frequency. Alternatively,RFID reader 104 may receive signals at both frequencies from the fobupon interrogation. In this case, RFID reader 104 may be configured toprioritize selection of one or the other frequency and reject theremaining frequency.

Further, a protocol/sequence controller 314 may include an optionalfeedback function for notifying the resource of the status of aparticular performance tracking transaction. For example, the optionalfeedback may be in the form of an LED, LED screen and/or other visualdisplay which is configured to light up or display a static, scrolling,flashing and/or other message and/or signal to inform a resource usingfob 102 that a performance tracking transaction is initiated (e.g., fobis being interrogated), the fob is valid (e.g., fob is authenticated), aperformance tracking transaction is being processed, (e.g., fobtransponder account identifier is being read by RFID reader) and/or thetransaction is accepted or denied (e.g., account identifiers approved ordisapproved). Such an optional feedback may or may not be accompanied byan audible indicator (or may present the audible indicator singly) forinforming fob 102 resource of the performance tracking transactionstatus. The audible feedback may be a simple tone, multiple tones,musical indicator, and/or voice indicator configured to signify when thefob 102 is being interrogated, the performance tracking transactionstatus, or the like.

RFID antenna 106 may be in communication with a transponder 306 fortransmitting an interrogation signal and receiving at least one of anauthentication request signal and/or an account data from fob 102.Transponder 306 may be of similar description as transponder 114 of FIG.2. In particular, transponder 306 may be configured to send and/orreceive RF signals in a format compatible with antenna 106 in similarmanner as was described with respect to fob transponder 114. Forexample, where transponder 306 is 13.56 MHz RF rated antenna 106 may be13.56 MHz compatible. Similarly, where transponder 306 is ISO/IEC 14443rated, antenna 106 may be ISO/IEC 14443 compatible.

RF module 302 may include, for example, transponder 306 in communicationwith authentication circuitry 308 which may be in communication with asecure database 310. Authentication circuitry 308 and database 310 maybe of similar description and operation as described with respect toauthentication circuitry 210 and secure memory database 212 of FIG. 2.For example, database 310 may store data corresponding to fob 102 whichmay be used to authorize the tracking of resource performance oversystem 100. Database 310 may additionally store RFID reader 104identifying information and/or provide such information to fob 102 foruse in authenticating whether RFID reader 104 is authorized to beprovided the fob transponder account identifier stored on fob database214.

Authentication circuitry 308 may be of similar description and operationas authentication circuitry 210. That is, authentication circuitry 308may be configured to authenticate the signal provided by fob 102 in asimilar manner that authentication circuitry 210 may be configured toauthenticate the signal provided by RFID reader 104. As is describedmore fully below, fob 102 and RFID reader 104 engage in mutualauthentication. In this context, “mutual authentication” may mean thatoperation of the system 100 may not take place until fob 102authenticates the signal from RFID reader 104, and RFID reader 104authenticates the signal from fob 102.

FIG. 4 depicts a flowchart of an exemplary authentication process inaccordance with the present invention. The authentication process isdepicted as one-sided. That is, the flowchart depicts the process ofRFID reader 104 authenticating fob 102, although similar steps may befollowed in the instance that fob 102 authenticates RFID reader 104.

As noted, database 212 may store security keys for encrypting ordecrypting signals received from RFID reader 104. In an exemplaryauthentication process, where RFID reader 104 is authenticating fob 102,RFID reader 104 may provide an interrogation signal to fob 102 (step402). The interrogation signal may include a random code generated bythe RFID reader authentication circuit 210, which is provided to fob 102and which is encrypted using an unique encryption key corresponding tothe unique fob 102 identification code. For example, protocol/sequencecontroller 314 may provide a command to activate the authenticationcircuitry 308. Authentication circuitry 308 may provide from database310 a fob interrogation signal including a random number as a part ofthe authentication code generated for each authentication signal. Theauthentication code may be an alphanumeric code which is recognizable(e.g., readable) by RFID reader 104 and fob 102. The authentication codemay be provided to fob 102 via the RFID RF interface 306 and antenna 106(or alternatively antenna 108).

Fob 102 receives the interrogation signal (step 404). The interrogationsignal including the authorization code may be received at RF interface114 via antenna 202. Once fob 102 is activated, the interrogation signalincluding the authorization code may be provided to themodulator/demodulator circuit 206 where the signal may be demodulatedprior to providing the signal to protocol/sequence controller 208.Protocol/sequence controller 208 may recognize the interrogation signalas a request for authentication of fob 102, and provide theauthentication code to authentication circuit 210. The fob 102 may thenencrypt the authentication code (step 406). In particular, encryptionmay be done by authentication circuit 210, which may receive theauthentication code and encrypt the code prior to providing theencrypted authentication code to protocol/sequence controller 208. Fob102 may then provide the encrypted authentication code to RFID reader104 (step 408). That is, the encrypted authentication code may beprovided to RFID reader 104 via modulator/demodulator circuit 206, RFinterface 114 (e.g., transponder 114) and antenna 106.

RFID reader 104 may then receive the encrypted authentication code anddecryption it (step 410). That is, the encrypted authentication code maybe received at antenna 106 and RF interface 306 and may be provided toauthentication circuit 308. Authentication circuit 308 may be provided asecurity authentication key (e.g., transponder system decryption key)from database 310. The authentication circuit may use the authenticationkey to decrypt (e.g., unlock) the encrypted authorization code. Theauthentication key may be provided to the authentication circuit basedon the unique fob 102 identification code. For example, the encryptedauthentication code may be provided along with the unique fob 102identification code. The authentication circuit may receive the uniquefob 102 identification code and retrieve from database 310 a transpondersystem decryption key correlative to the unique fob 102 identificationcode for use in decrypting the encrypted authentication code.

Once the authentication code is decrypted, the decrypted authenticationcode is compared to the authentication code provided by RFID reader 104at step 402 (step 412) to verify its authenticity. If the decryptedauthorization code is not readable (e.g., recognizable) by theauthentication circuit 308, fob 102 is deemed to be unauthorized (e.g.,unverified) (step 418) and the operation of system 100 is terminated(step 420). Contrarily, if the decrypted authorization code isrecognizable (e.g., verified) by fob 102, the decrypted authorizationcode is deemed to be authenticated (step 414), and the transaction isallowed to proceed (step 416). In one particular embodiment, theproceeding transaction may mean that fob 102 may authenticate RFIDreader 104 prior to RFID reader 104 authenticating fob 102, although, itshould be apparent that RFID reader 104 may authenticate fob 102 priorto fob 102 authenticating RFID reader 104.

It should be noted that in an exemplary verification process,authorization circuit 308 may determine whether the unlockedauthorization code is identical to the authorization code provided instep 402. If the codes are not identical then fob 102 is not authorizedto access system 100. Although, the verification process is describedwith respect to identicality, identicality is not required. For example,authentication circuit 308 may verify the decrypted code through anyprotocol, steps, or process for determining whether the decrypted codecorresponds to authorized fob 102.

Authentication circuitry 308 may additionally be in communication withprotocol/sequence controller 314 of similar operation and description asprotocol/sequence controller 208 of FIG. 2. That is, protocol/sequencedevice controller 314 may be configured to determine the order ofoperation of RFID reader 104 components. For example, FIG. 5 illustratesand exemplary decision process under which protocol/sequence controller314 may operate. Protocol/sequence controller 314 may command thedifferent components of RFID reader 104 based on whether fob 102 ispresent (step 502). For example, if fob 102 is not present, thenprotocol/sequence controller 314 may command RFID reader 104 to providean uninterrupted interrogation signal (step 504). That is,protocol/sequence controller 314 may command authentication circuit 308to provide an uninterrupted interrogation signal until the presence offob 102 is realized. If fob 102 is present, the protocol/sequencecontroller 314 may command RFID reader 104 to authenticate fob 102 (step506).

As noted above, authentication may mean that protocol/sequencecontroller 314 may command authentication circuit 308 to provide fob 102with an authorization code. If a response is received from fob 102,protocol/sequence controller may determine if the response is a responseto RFID reader 104 provided authentication code, or if the response is asignal requiring authentication (step 508). If the signal requiresauthentication, then protocol/sequence controller 314 may activate theauthentication circuit as described above (step 506). On the other hand,if fob 102 signal is a response to the provided authentication code,then protocol/sequence controller 314 may command RFID reader 104 toretrieve the appropriate security key for enabling recognition of thesignal (step 510). That is, protocol/sequence controller 314 may commandauthentication circuit 308 to retrieve from database 310 a security key(e.g., transponder system decryption key), unlock the signal, andcompare the signal to the signal provided by RFID reader 104 in theauthentication process (e.g., step 506). If the signal is recognized,protocol/sequence controller 314 may determine that fob 102 isauthorized to access system 100. If the signal is not recognized, thenfob 102 is considered not authorized. In which case, protocol/sequencecontroller 314 may command the RFID controller to interrogate forauthorized fobs (step 504).

Once protocol/sequence controller 314 determines that fob 102 isauthorized, protocol/sequence controller 314 may seek to determine ifadditional signals are being sent by fob 102 (step 514). If noadditional signal is provided by fob 102, then protocol/sequencecontroller 314 may provide all the components of RFID reader 104 toremain idle until such time as a signal is provided (step 516).Contrarily, where an additional fob 102 signal is provided,protocol/sequence controller 314 may determine if fob 102 is requestingaccess to resource engine 130 POI terminal 110 or if fob 102 isattempting to interrogate RFID reader 104 for return (e.g., mutual)authorization (step 518). Where fob 102 is requesting access to resourceengine 130 POI terminal 110, protocol/sequence controller 314 maycommand RFID reader 104 to open communications with POI terminal 110(step 524). In particular, protocol/sequence controller 314 may commandPOI terminal communications interface 312 to become active, permittingtransfer of data between RFID reader 104 and resource engine 130 POIterminal 110.

On the other hand, if protocol/sequence controller determines that fob102 signal is a mutual interrogation signal, then protocol/sequencecontroller 314 may command RFID reader 104 to encrypt the signal (step520). Protocol/sequence controller 314 may command encryptionauthentication circuit 318 to retrieve from database 320 the appropriateencryption key in response to fob 102 mutual interrogation signal.Protocol/sequence controller 314 may then command RFID reader 104 toprovide the encrypted mutual interrogation signal to fob 102.Protocol/sequence controller 314 may command authentication circuit 318to provide an encrypted mutual interrogation signal for fob 102 tomutually authenticate. Fob 102 may then receive the encrypted mutualinterrogation signal and retrieve from authentication circuitry 212 aRFID reader decryption key.

Although an exemplary decision process of protocol/sequence controller314 is described, it should be understood that a similar decisionprocess may be undertaken by protocol/sequence controller 208 incontrolling the components of fob 102. Indeed, as described above,protocol/sequence controller 314 may have similar operation and designas protocol/sequence controller 208. In addition, to the above,protocol/sequence controllers 208 and 314 may incorporate in thedecision process appropriate commands for enabling USB interfaces 222and 316, when the corresponding device is so connected.

Encryption/decryption component 318 may be further in communication witha secure account identifier database 320 which stores the security keysnecessary for decrypting the encrypted fob account identifier. Uponappropriate request from protocol/sequence controller 314,encryption/decryption component (e.g., circuitry 318) may retrieve theappropriate security key, decrypt the fob account identifier and forwardthe decrypted account identifier to protocol/sequence controller 314 inany format readable by any later connected POI terminal 110. In oneexemplary embodiment, the account identifier may be forwarded in aconventional magnetic stripe card format compatible with the ISO/IEC7813 standard. That is, in accordance with the invention, there is noneed to translate or correlate the account identifier to traditionalmagnetic stripe format as is done with the prior art. The inventionprocesses the performance tracking transaction request directly, as ifthe card associated with the account has been presented for performancetracking.

Upon receiving the account identifier in magnetic stripe format,protocol/sequence controller 314 may forward the account identifier toPOI terminal 110 via communications interface 312 and data link 122, asbest shown in FIG. 1. Performance tracking terminal 110 may receive thedecrypted account identifier and forward the magnetic stripe formattedaccount identifier to host network 112 for processing under theemployer's business as usual standard. In this way, the presentinvention eliminates the need of a third-party server. Further, wherePOI terminal 110 receives a response from host network 112 (e.g.,performance tracking authorized or denied), protocol/sequence controller314 may provide the network response to RF module 302 for opticallyand/or audibly communicating the response to fob 102 resource.

RFID reader 104 may additionally include USB interface 316, incommunication with the protocol/sequence controller 314. In oneembodiment, the USB interface may be a RS22 serial data interface.Alternatively, RFID reader 104 may include a serial interface such as,for example, a RS232 interface in communication with protocol/sequencecontroller 314. USB connector 316 may be in communication with apersonalization system 116 (shown in FIG. 1B) for initializing RFIDreader 104 to system 100 application parameters. That is, prior tooperation of system 100, RFID reader 104 may be in communication withpersonalization system 116 for populating database 310 with a listing ofsecurity keys belonging to authorized fobs 102, and for populatingdatabase 320 with the security keys to decrypt fob 102 accountidentifiers placing the account identifiers in ISO/IEC 7813 format. Inthis way, RFID reader 104 may be populated with a unique identifier(e.g., serial number) which may be used by fob authentication circuitry210 to determine if RFID reader 104 is authorized to receive fob 102encrypted account identifier.

FIG. 1B illustrates an exemplary personalization system 100B, inaccordance with the present invention. In general, typicalpersonalization system 100B may be any system for initializing RFIDreader 104 and fob 102 for use in system 100A. With reference to FIG.1B, the similar personalization process for fob 102 may be illustrated.For example, personalization system 116 may be in communication with fob102 via RF ISO 14443 interface 114 for populating fob database 212 withthe security keys for facilitating authentication of the unique RFIDreader 104 identifier. In addition, personalization system 116 maypopulate on database 212 a unique fob 102 identifier for use by RFIDreader 104 in determining whether fob 102 is authorized to access system100. Personalization system 116 may populate (e.g., inject) theencrypted fob 102 account identifier into fob database 214 for laterproviding to an authenticated RFID reader 104.

In one exemplary embodiment, personalization system 116 may include anystandard computing system as described above. For example,personalization system 116 may include a standard personal computercontaining a hardware security module operable using any conventionalgraphic user interface. Prior to populating the security key informationaccount identifier and unique identifying information into fob 102 orRFID reader 104, the hardware security module may authenticate fob 102and RFID reader 104 to verify that the components are authorized toreceive the secure information.

In another exemplary embodiment, resource engine 130 may be configuredto facilitate implementing the functions of personalization system 116.For example, resource engine 130 may be configured as personalizationsystem 116. Thus resource engine 130 may be in communication with fob102 via RF ISO 14443 interface 114 for populating fob database 212 withthe security keys for facilitating authentication of the unique RFIDreader 104 identifier. In addition, resource engine 130 may populate ondatabase 212 a unique fob 102 identifier for use by RFID reader 104 indetermining whether fob 102 is authorized to access system 100. Resourceengine 130 may further populate (e.g., inject) the encrypted fob 102account identifier into fob database 214 for later providing to anauthenticated RFID reader 104.

FIGS. 6A-B illustrate an exemplary flowchart of a personalizationprocedure which may be used to personalize fob 102 and/or RFID reader104. Although the following description discusses mainly personalizationof fob 102, RFID reader 104 may be personalized using a similar process.The personalization process, which occurs between personalization system116 and the device to be personalized (e.g., fob 102 or RFID reader104), may begin, for example at step 602. Mutual authentication mayoccur between personalization system 116 and the device to beauthenticated in much the same manner as was described above with regardto fob 102 mutually authenticating with RFID reader 104. That is,personalization system 116 may transmit a personalization system 116identifier to the device to be authenticated which is compared by thedevice authentication circuitry 210, 308 against personalization systemidentifiers stored in the device database 212, 310. Where a match doesnot occur (step 604), the personalization process may be aborted (step612). Where a match occurs (step 604), personalization system 116 mayprepare a personalization file to be provided to the device to bepersonalized (step 606). If personalization system 116 is operatedmanually, the personalization file may be entered into personalizationsystem 116 using any suitable system interface such as, for example, akeyboard (step 606). Where personalization system 116 operator elects todelay the preparation of the personalization files, personalizationsystem 116 may abort the personalization process (step 610). In thiscontext, the personalization file may include the unique fob 102 or RFIDreader 104 identifier, security key for loading into database 212 and310, and/or security keys for decrypting a fob transponder accountidentifier which may be loaded in database 320.

Fob 102 may be personalized by direct connection to personalizationsystem 116 via RF ISO/IEC 14443 interface 114, or fob 102 may bepersonalized using RFID reader 104. Personalization system 116 and RFIDreader 104 may engage in mutual authentication and RFID reader 104 maybe configured to transmit the fob personalization file to fob 102 viaRF. Once fob 102 is presented to RFID reader 104 (steps 608, 614) forpersonalization, fob 102 and RFID reader 104 may engage in mutualauthentication (step 614). Where fob 102 is not presented to RFID reader104 for personalization, the personalization process may be terminated(step 610).

If fob 102 is detected, personalization system 116 may create as a partof the personalization file, a unique identifier for providing to fob102 (step 616). The identifier is unique in that one identifier may begiven only to a single fob. That is, no other fob may have that sameidentifier. Fob 102 may then be configured and loaded with thatidentifier (step 618).

The encrypted fob 102 transponder account identifier may be populatedinto fob 102 in the same manner as is described with respect to theunique fob 102 identifier. That is, personalization system 116 maypre-encrypt the account data (step 620) and inject the encrypted accountinto fob database 214 (step 622). The encrypted account data may beloaded (e.g., injected) into fob 102 using RFID reader 104 as discussedabove.

Once the personalization file is populated into fob 102, the populatedinformation is irreversibly locked to prevent alteration, unauthorizedreading and/or unauthorized access (step 624). Personalization system116 may then create a log of the personalization file information forlater access and analysis by the personalization system 116 resource(step 626).

It should be noted that in the event the personalization process iscompromised or interrupted (step 628), personalization system 116 maysend a security alert to the resource (step 630) and the personalizationprocess may be aborted (step 612). On the other hand, where no suchcompromising or interruption exists, personalization system 116 may beprepared to begin initialization on a second device to be personalized(step 632).

FIGS. 7A-B illustrate another exemplary embodiment of a personalizationprocess which may be used to personalize RFID reader 104. RFID reader104 may be in communication with personalization system 116 via RFIDreader USB connection 316 (step 702). Once connected, personalizationsystem 116 may establish communications with RFID reader 104 and RFIDreader 104 may provide personalization system 116 any RFID reader 104identification data presently stored on RFID reader 104 (step 704). Inaccordance with step 708, where RFID reader 104 is being personalizedfor the first time (step 706), RFID reader 104 and personalizationsystem 116 may engage in mutual authentication as described above withrespect to FIGS. 6A-B. After the mutual authentication is complete,personalization system 116 may verify that RFID reader 104 is properlymanufactured or configured to operate within system 100. Theverification may include evaluating the operation of RFID reader 104 bydetermining if the RFID reader will accept predetermined defaultsettings. That is, personalization system 116 may then provide RFIDreader 104 a set of default settings (step 708) and determine if RFIDreader 104 accepts those settings (step 712). If RFID reader 104 doesnot accept the default settings, personalization system 116 may abortthe personalization process (step 714).

If the personalization system 116 determines that the personalizationprocess is not the first personalization process undertaken by RFIDreader 104 (step 706), personalization system 116 and RFID reader 104may engage in a mutual authentication process using the existingsecurity keys already stored on RFID reader 104 (step 710). Ifauthentication is unsuccessful (step 712), personalization system 116may abort the personalization process (step 714).

Where personalization system 116 and RFID reader 104 successfullymutually authenticate, personalization system 116 may update RFID reader104 security keys (step 716). Updating the security keys may take placeat any time as determined by a system 100 manager. The updating may takeplace as part of a routine maintenance or merely to install currentsecurity key data. The updating may be performed by downloading firmwareinto RFID reader 104 (step 718). In the event that personalizationsystem 116 determines in step 706 that RFID reader 104 is undergoing aninitial personalization, the firmware may be loaded into RFID reader 104for the first time. In this context, “firmware” may include any filewhich enables the RFID reader 102 to operate under system 100guidelines. For example, such guidelines may be directed toward theoperation of RFID reader protocol/sequence controller 314.

Personalization system 116 may then determine if the personalizationkeys (e.g., security keys, decryption keys, RFID identifier) need to beupdated or if RFID reader 104 needs to have an, initial installation ofthe personalization keys (step 720). If so, then personalization system116 may download the personalization keys as appropriate (step 722).

Personalization system 116 may then check RFID reader 104 to determineif fob 102 identifiers and corresponding security keys should be updatedor initially loaded (step 724). If no updating is necessarypersonalization system 116 may end the personalization procedure (step732). Contrarily, if personalization system 116 determines that fob 102identifiers and corresponding keys need to be updated or installed,personalization system 116 may download the information onto RFID reader104 (step 726). The information (e.g., fob security keys andidentifiers) may be downloaded in an encrypted format and RFID reader104 may store the information in RFID reader database 310 as appropriate(step 728). Personalization system 116 may then create or update astatus log cataloging for later use and analysis by personalizationsystem 116 resource (step 730). Upon updating the status log, thepersonalization process may be terminated (step 732).

It should be noted that, in some instances it may be necessary torepersonalize the RFID reader in similar manner as described above. Inthat instance, the personalization process described in FIGS. 7A and 7Bmay be repeated.

FIG. 8 illustrates an exemplary flow diagram for the operation of system100A. The operation may be understood with reference to FIG. 1A, whichdepicts the elements of system 100A which may be used in an exemplarytransaction. The process is initiated when a resource desires to presentfob 102 for performance tracking (step 802). Upon presentation of fob102, the employer initiates the RF performance tracking transaction viaRFID reader 104 (step 804). In particular, RFID reader 104 sends out aninterrogation signal to scan for the presence of fob 102 (step 806). TheRF signal may be provided via RFID reader antenna 106 or optionally viaexternal antenna 108. The RF interrogation signal then activates fob 102(step 808).

Fob 102 and RFID reader 104 may then engage in mutual authentication(step 810). Where the mutual authentication is unsuccessful, an errormessage may be provided to the resource via the RFID optical and/oraudible indicator (step 814) and the performance tracking transactionmay be aborted (step 816). Where the mutual authentication is successful(step 814), a performance tracking request will be initiated. That is,RFID reader 104 may provide the resource with an appropriate opticaland/or audible message (e.g., “performance tracking processing” or“wait”) (step 818). Fob protocol/sequence controller 208 may thenretrieve from database 214 an encrypted fob account identifier andprovide the encrypted account identifier to RFID reader 104 (step 820).

RFID reader 104 may then decrypt the account identifier and convert theaccount identifier into magnetic stripe (ISO/IEC 7813) format (step 822)and provide the unencrypted account identifier to resource engine 130(step 824). In particular, the account identifier may be provided to POIterminal 110 for transmission to host network 112 for processing (step828). Processing performance tracking will be discussed in greaterdetail herein. Upon processing, POI terminal 110 may then send anoptical and/or audible performance tracking status message to RFIDreader 104 (step 830) for communication to the resource (step 832). Oncethe resource receives the status message, the transaction is completed(step 834.)

Processing performance tracking may be achieved by several methods. Forexample, in accordance with another aspect of the present invention, andwith reference to FIG. 10, a resource 1002 may access resource engine130 through user interface 118 to facilitate performance tracking, suchas management, assignment, grading and/or scoring of resources, tasks,and/or applications.

More particularly, in one embodiment illustrated in FIG. 11, resourceengine 130 may comprise a variety of subprograms and/or databases thatfacilitate managing, tracking, grading, and assigning resources,applications, skills, and tasks. Resource engine 130 may interface withvarious subprograms or databases, wherein the subprograms may be part ofhost network 112 and/or network 136. One skilled in the art willappreciate that resource engine 130 may additionally interface withcomponents directly, through a LAN network or indirectly via any othersystem or network.

The databases comprising resource engine 130 may be managed by anadministrative resource 1160. Administrative resource may be anindividual, software, and/or hardware configured to facilitatemanagement, control, organization and/or oversight of resource engine130. Additionally, there may be one or more parameters 1170 governingresource engine 130. Parameters 1170 may include, for example, securityfeatures, software requirements, hardware requirements, coding protocolsand/or other requirements or preferences.

The databases comprising resource engine 130 may be interconnected suchthat information from one database may be accessed by one, two, three ormore other databases. By the term “access,” the databases may transmit,receive, obtain, link, connect, associate, interface, share, route,acquire, ascertain, retrieve, and gain information from one database toanother. Thus, any information updated, received and/or sent to onedatabase such as, for example, resource database 1130, may beautomatically updated throughout all or any portion of the otherdatabases that are accessed by resource database 1130.

For example, resource database 1130 may access a master resourcecalendar 1180 for scheduling all resources. Master resource calendar1180 may additionally access resource application calendar 1182 toaccess calendar and schedule information relating to the applications towhich a resource may be assigned. Resource database 1130 may also accessa resource schedule 1132 for scheduling that specific resource.Additionally, resource database 1130 may access a resource skillsdatabase 1134 comprising information relating to the various skills of aresource. Resource database 1130 may access a resource applicationdatabase 1154 comprising information relating to the application thatthe resource is assigned to support. Further, resource database 1130 mayaccess a resource application category 1136 comprising informationrelating to specific category subset of an application that a resourceis assigned to support. Finally, resource database 1130 may access amanager database 1110 comprising information on managers and theportfolios for which the managers are responsible.

With further reference to an exemplary embodiment depicted in FIG. 11,application 1150 may also interface with a plurality of databases. Forexample, a manager privilege class 1112 database may access application1150 to obtain information regarding the queues of problem ticketsassigned to various managers 1110. Resource applications 1154 may alsoaccess application 1150 in order to provide resource and/or resourcedatabase 1130 updates, changes and/or other information to application1150. Application 1150 may further be accessed and divided into varioussub-application categories 1152. Application categories 1152 may befurther accessed by application category skills 1142 in order todetermine what skills 1140 are needed to support application category1152. Application categories 1152 may also be accessed by resourceapplication categories 1136 in order to link resource databases 1130 toapplications 1150.

With further reference to an exemplary embodiment illustrated in FIG.11, task databases 1120 may also interface with a plurality ofdatabases. For example, task 1120 may access resource applicationcategory 1136. Additionally, task 1120 may access an IMR database 1122,which may provide information on specific tasks associated with an IMR.Further, task 1120 may access databases such as a task class 1128, anestimated time of arrival (ETA) 1126, and a task day 1124 database. Taskclass 1128 may provide information on the classification of task 1120,for example, whether task 1120 is a build task. ETA 1126 may provideestimations on task 1120 completion times based on previous taskcompletion times. Task day 1124 may provide scheduling information fortask 1120 relating to when task 1124 was assigned and/or when it isscheduled to be completed.

While FIG. 11 illustrates a plurality of databases interfacing in aspecific manner, any of the databases comprising resource engine 130 mayinterface to one another in any manner, and the interfaces orconnections are not limited to those depicted. For example, task day1124 may additionally access master resource calendar 1180 and/or anyother database comprising resource engine 130.

In an exemplary embodiment, the databases within resource engine 130, asillustrated in FIG. 11, may operate in real-time. In this context,“real-time” includes information that may be immediately, or nearlyimmediately, accessed at the time an IMR and/or task is generated. Forexample, upon detection of an application problem, an IMR is generated.This IMR is then automatically broken down into applications andapplication tasks. The tasks are further automatically assigned tomanagers and/or resources based on skill and availability. As such, upondiscovery of an IMR, resource 1102 may immediately view or manageresources, applications, skills, and/or tasks associated with the IMR onresource engine 130 via user interface 118. Resource engine 130 may alsoimmediately facilitate updates to resources, applications, skills,and/or tasks to a network such that resource 1102 may view any manualassignment or management changes through user interface 118.

One skilled in the art will also appreciate that resource engine 130 mayoperate fully or partially in any less than real-time mode, such as, forexample, batch processing. In an exemplary embodiment, the system mayoperate partially in real-time and partially in batch mode, whereinduring batch mode, system information may be stored, and periodicallyupdated to the network. Thus, in this embodiment, resource 1102 mayaccess resource engine 130 at a later time through user interface 118 tomanage, assign, track, score or grade resources, tasks, applications,and skills.

The present invention may use the foregoing system components to performthe following method, wherein the exemplary steps discussed may beperformed in any order. With respect to FIG. 12, resource 1102 mayaccess resource engine 130 through user interface 118 (step 1201) by anycommunication method discussed herein. In one embodiment, resource 1102selects a web-based option for interfacing with resource engine 130 suchthat the system presents the resource 1102 with an input screen.Resource engine 130 may then conduct an authorization (step 1203) by anymethod discussed herein, such as, for example, by use RFID reader 104communicating with POI terminal 110.

Once authentication has occurred, resource engine 130 then may transmita webpage and/or a resource screen for display on resource's 1102computer (step 1205). The webpage and/or resource screen may facilitateaccess to resource engine 130 for performance tracking of resources(step 1207). With reference to an exemplary screen shot illustrated inFIG. 13, resource screen 1300 may be configured with one or moretoolbars 1302 and/or task bars 1304 that facilitate navigation of engine130. Toolbar 1302 may be configured to be visible to resource 1102 atall times when navigating engine 130 through user interface 118. Taskbar1304 may be configured to facilitate performance tracking for thespecific tool chosen through toolbar 1302.

With continued reference to FIG. 13, resource screen 1300 may also beconfigured to facilitate resource 1102 using toolbar 1302 in selecting avariety of tools to be used by the present invention. These tools mayinclude, for example, managing resources, IMRs, tasks, applications andskills through, for example, “ADMINISTRATION” 1311; viewing reports onresource tasks and skills, “REPORTS” 1313, automating and viewing tasktime, “TASK TIME” 1315; creating, assigning and updating tasks, “TASKMANAGEMENT” 1317; and/or creating resource rosters, schedules, andtraining “PLANNING” 1319. The details of these tools will be discussedbelow. In accordance with a further aspect of the present invention, oneskilled in the art will appreciate that the web environment may becustomizable and scalable, offering various other resource screen 1300options depending upon the particular needs of resource 1102.

In accordance with the present invention, as illustrated in FIGS. 10, 12and 13, resource 1102 may interact with resource engine 130 through userinterface 118, using a device configured to facilitate interaction suchas ADMINISTRATION 1311, available through resource screen 1300. Whenaccessing administration information through ADMINISTRATION 1311,resource 1102 may be presented with a variety of options regarding theinformation accessible through taskbar 1304. These may include, forexample, “Manage Resources,” “Manage Privilege Class,” “ManageApplication,” and “Manage Skills.” Each of these various categories maycontain one or more additional links to further performance tracking.

The various resource fields may include, for example: First Name, MiddleName, Last Name, Phone Number, E-mail Address, Employer, Role, Manager,Location, Portfolio Description, Skill, Skill Level, Application,Resource Percentage, Start Date, and Weekly End Date. By selecting“Manage Resources,” resource/manager 1002 may manage resources withinits group by selecting the link/button indicating that specific task. Bythe terms “manage” and “management,” resource/manager 1002 may add,edit, delete, save, assign, reassign, search, define, determine, create,and/or cancel information relating to resources within its group. Forexample resource/manager 1002 selecting the Edit button may make changesto various fields associated with a resource.

“Manage Resources” may be configured such that the only time any of theAdd, Edit, Delete, Save, or Cancel buttons will display is if the persontrying to administer a resource has rights to do so. Thus, only aadministrator, manager, manager/lead, and/or any other authorized personmay update the Manage Resource screen. Resource engine 130 may beconfigured such that all buttons will be grayed out or un-selectable toresources 1002 without access rights.

After an authorized resource/manager 1002 inputs changes, resourceengine 130 may be configured to present an error message if all requiredfields are not completed. If all required fields are completed,information inputted into the fields may be automatically updated intoresource engine 130.

In accordance with an exemplary embodiment of the invention, fobresource 1002 may be provided limited access to a fob resource data filemaintained within the “Manage Resources” area of resource engine 130 formanaging the fob usage and fob resource 1002 information. Resource 1002may have access over the phone, online, or off line. Resource 1002 mayaccess the fob resource data file to change, for example, demographicinformation (e.g., fob resource address, phone number, email address, orthe like).

ADMINISTRATION 1311 may additionally facilitate the management ofprivilege classes through the “Manage Privilege Class” option on taskbar 1304. Privilege classes may include designations, such as queuenames, relating to IMRs/application failures tracked through resourceengine 130 and/or through a monitoring program, such as NetView workingin conjunction with resource engine 130. For example, NetView mayautomatically identify and generate a problem ticket describing the rootcause of a network failure. NetView may then transmit the problemticket/IMR to a specific network failure privilege class within resourceengine 130. Transmission of the IMR from NetView to resource engine 130may be through any communications means described herein.

By selecting “Manage Applications,” resource/manager 1002 may manageapplications and application categories. Additionally, resource/manager1002 may assign/add resources to applications and/or applicationcategories. Applications may be any software applications, processes,procedures, scripts, programs, and/or protocols running on a system. Forexample, Microsoft Word, a Service Delivery Platform application, and awindows application. Application categories may be any subsets ofApplications. For example, an Application may have a Distributivecategory and a Mainframe Category. By “assign” and/or “assignment,”resource/manager 1002 may determine the resources to be assigned toapplications, determine the resources to be assigned to applicationcategories, define how much time a resource is assigned to anapplication or application category, determine the starting and/orending date for an assignment for planning purposes, and/or track aresource's time spent on specific tasks, applications and/or applicationcategories.

Additionally, resource/manager 1002 may use “ADMINISTRATION” 1311 tofacilitate the management of resource skills by selecting the “ManageSkills” task. “Manage Skills” may be used to facilitate managing skillsand skill sets available and/or needed for applications and applicationcategories, defining and scoring the skills and skill sets of resources,determining skill set levels needed for application categories,assigning resources to application categories based upon resource skillsand/or skill sets scores, determining skill set scores for resourcesassigned to those application categories, and redefining resource skillsand/or skills set scores.

Resource engine 130 may employ one or more algorithms to facilitate themanagement of resource skills. That is, one or more algorithms may beused in defining, scoring, determining, and assigning resources, skills,skills sets, and skill set needs. These algorithms may be automated suchthat resource engine 130 automatically tracks resources and applicationcategories to continuously rescore and grade resource skills, skill setsand application categories. Resource engine 130 may also be configuredto allow for manual calculation, scoring, and grading of resourceskills, skill sets and application categories for assignment andmanagement purposes.

Resource/manager 1002 may assign one or more skills to a specificcategory. For example, one application category (e.g., Service DeliveryPlatform services) may include multiple skills (a “skill set”) tosupport it such as: Visual Basic, Microsoft SQL, exchange managementskills, phone payment skills, information management skills, and Cobol.Resource/manager 1002 may additionally define “skill set” scores. Forexample, high Visual Basic, Microsoft SQL, and Cobol skills may beneeded, while medium exchange management, and information managementskills may be required and low phone payment skills may suffice. Theskill set scores for the specific application category may be asfollows:

Skills Skill Level Score Visual Basic H 80 Microsoft SQL H 80 exchangemanagement M 60 phone payment L 30 information management M 60 Cobol H80 Total 390

The application categories skills may be further scored to determine thescore parameters for the skill levels needed to support the category.For example, high skill levels would encompass scores that are 80% of390 and above. An example of the parameters can be viewed in thefollowing table:

80% H 312 60% M 234 30% L 117

Resource engine 130 may be used to facilitate scoring skills and/orskill sets of resources. By “scoring,” resource/manager 1002 defines aresource's skills for a specific category. The score levels may be, forexample, high, medium, or low, wherein a high score may be assigned, forexample, 80 points, a medium score may be assigned 60 points and a lowscore may be assigned 30 points.

For example, a resource's skills may be defined as follows:

Skills Skill Level Score Visual Basic M 60 Microsoft SQL H 80 exchangemanagement L 30 phone payment M 60 information management L 30 Cobol M60 Total 320

The resource's skill set may be then compared to a category skill set todetermine if the resource may be assigned to the category. This may bedone by calculating a total resource category score based on the lowerof the resource and task category scores. In the provided example, theresource's category skill score is 290. The resource therefore hasmedium-level category skills (where medium is any score from 234-311).

Resource Category Resource Category Skill Score Skill Score Score 60 8060 80 80 80 30 60 30 60 30 30 30 60 30 60 80 60 Total 320 390 290Category Level M

Resource/manager 1002 may also use resource engine 130 to facilitatedefining resource application portfolios. For example, resource engine130 may be configured to gather all the application categories for aresource's portfolio of applications the resource is desired to support.Resource engine 130 may be configured to compute scores for theapplication categories in order to determine a rating for the resource,where the rating may range from a G1 (the lowest) to a G5 (the highest).

G-Rating G1 Greater than 0 but less than 75% G2 Greater than or equal to75% but less than 90% G3 Greater than or equal to 90% but less than 110%G4 Greater than or equal to 110% but less than 125% G5 Greater than 125%G-Rating % of average standard hours

For example, a resource's application portfolio may contain threeapplication categories. The resource may have ten different skills, eachskill may be scored as follows:

Skills Skill Level Score Skill-1 H 80 Skill-2 M 60 Skill-3 M 60 Skill-4L 30 Skill-5 H 80 Skill-6 H 80 Skill-7 M 60 Skill-8 M 60 Skill-9 L 30Skill-10 M 60

The three application categories in the resource's portfolio may havethe following required skill sets:

Application Category 1 Skills Skill Level Score Skill-1 M 60 Skill-2 L30 Skill-3 H 80 Skill-4 M 60 Skill-5 L 30 Total Score 260 80% H 208 60%M 156 30% L 78

Application Category 2 Skills Skill Level Score Skill-2 M 60 Skill-6 L30 Skill-7 H 80 Total Score 170 80% H 136 60% M 102 30% L 51

Application Category 3 Skills Skill Level Score Skill-3 L 30 Skill-4 H80 Skill-7 M 60 Skill-8 L 30 Total Score 200 80% H 160 60% M 120 30% L60

Thus, the resource will have a portfolio score as follows:

Res. Cat. Cat. Res. Cat. Skills Skills Score Res. Skills Skills ScoreSkills Skills Score 80 60 60 60 60 60 60 30 30 60 30 30 80 30 30 30 8030 60 80 60 60 80 60 60 60 60 30 60 30 60 30 30 80 30 30 Total 210 Total150 Total 150 Level H Level H Level M Portfolio Total Score 510 

Resource engine 130 determines the rating of the resource based on thepercentage of the total application category scores the resource scoresin:

Application X Task Total Score Task-1 260 Task-2 170 Task-3 200 Total630 1 <472.5 2 <567 3 <693 4 <787.5 5 >787.5

Thus, in order to achieve a G1 rating, the resource would need to scoreof less than 472.5. However, the resource in this example would rate asa G2 because the resource's total portfolio score is 510, which isgreater than the 75% range of the total category score of 630, but lessthan the 90% range.

Each portfolio may have its own defined scoring based on applicationcategories that make up the portfolio. The selection process may bechosen by a manager and/or resource engine 130 which selects specificapplication categories for all applications the manager and/or resourceengine 130 supports or by gathering all application categories for aspecific resource.

In accordance with another aspect of the present invention, when hiringnew hires, resource engine 130 may be configured to facilitate thegeneration of a portfolio application required for the new hire and ageneration of a listing of skills that comprise the portfolio. Resourceengine 130 may further be configured to facilitate grading of each skillbased on interview answers and generating a total score and G rating forthe potential new hire.

Further, resource engine 130 may be used to determine current resourceskill levels in order to determine hiring needs, training needs,equipment, software, and/or hardware upgrades, and/or other neededsupport. Resource engine 130 may employ one or more algorithms tofacilitate a determination of current resource skill levels. That is,one or more algorithms may be used in generating a portfolio applicationfor a potential new hire, generating a listing of skills within theportfolio, grading the skills based on potential new hire answers, andgenerating a total score for the potential hire. These algorithms may beautomated such that resource engine 130 automatically generates andgrades potential new hire portfolios and interview. Resource engine 130may also be configured to allow for manual generation of portfolios andportfolio skills and grading of potential hires.

With reference again to an exemplary embodiment depicted in FIG. 13,“TASK TIME” tool 1313 may be accessed by resource 1102 viewautomatically tracked time spent on different tasks. For example,resource 1102 may use fob 102 to communicate with RFID reader 104 whenresource 1102 enters/leaves a work environment. Resource engine 130 maythen calculate the total time resource 1102 was in the work environmentby measuring the time between a first communication between fob 102 andRFID reader 104 and a second communication between fob 102 and RFIDreader 104. For example, if a first communication occurs at 9:00 a.m.and a second communication occurs at 5:00 p.m., then the time resource1102 was in the work environment is eight hours. If resource 1102 entersand leaves a work environment multiple times throughout a reportingperiod (e.g., a day), resource engine may be configured to keep arunning tally of times corresponding to each period between entering andleaving.

As used herein, the phrase work environment may include an office, abuilding, a shipping location, a computer environment, a computerizedapplication, a computerized document, and/or any other work environment.

Resource engine 130 may be additionally configured to calculate the timebetween communications between fob 102 and interface 134 to determinethe time spent by resource 1102 on specific tasks. For example, withreference to FIG. 1A, resource's 1102 may use fob 102 to automaticallycommunicate with computer 134 when resource 1102 initiates use ofcomputer 134. Computer 134 may be configured to log the tasks resource1102 performs via computer 134. Computer 134 may also be configured tocommunicate information to resource engine 130 relating to the tasksresource 1102 performs via computer 134. Resource engine 130 may usethis information to facilitate tracking the performance of resource1102.

Resource engine 130 may also be configured to provide for “TASKMANAGEMENT” 1315 available through resource screen 1300. This tool maybe used to facilitate management of application tasks. Tasks may includeany project defined herein. Each task may be assigned to an applicationcategory and an application. Additionally, each task may have one ormore subtasks with each subtask having a resource assigned to it. Onemanager may be assigned to each task.

Tasks may be further categorized by class. For example, tasks generatedfrom problem tickets may be classified as IMRs. Other classes mayinclude, for example, tasks relating to assembly, meetings, training,bridge calls, projects, analysis, design, programming and build tasks.

Resource engine 130 may also be used to facilitate the creation ofsubtasks associated with each task. For example, once an IMR isgenerated, subtask X may be the first task generated. Subtask X mayrelate to re-installing problem software. Additionally, another subtaskfor analyzing the re-installed software may be generated, subtask Y. Ananalyst resource may then review the re-installation and determine thatanother analysis and/or installation task needs to be assigned. Resourceengine 130 may be configured to automatically generate subtasks based onpre-programmed standards. For example, resource engine 130 may bepre-programmed to assign tasks relating to re-installation of softwareand analysis of a network whenever a network failure occurs. Resourceengine 130 may also be configured for manual creation and/orreassignment of subtasks associated with each task.

Resource engine 130 may also be configured to automatically reassign atask and/or subtask to another resource if a resolution of the IMR hasnot been accomplished within a set task time period. For example,resource engine 130 may first assign IMR-related tasks ofre-installation and analysis to be completed within 10 working hours. Ifthe IMR has not been completed within a certain set time, such as, forexample 15 hours, resource engine 130 may automatically reassign there-installation and/or analysis tasks. Resource engine 130 may accesstime entries from “TASK TIME” to determine whether tasks have beencompleted within a predetermined time.

Resource engine 130 may also be configured to automatically generate alog of information relating to the resources and tasks already completedand/or worked on relating to the IMR. For example, if Word, Excel andPowerPoint have already been reinstalled successfully, resource engine130 may be configured to create a log of this information beforereassigning the task.

Resource engine 130 may be configured to facilitate the grading of tasksas well. Tasks may also receive the same G-1 through G-5 ratings asresources. The ratings may be based on the actual hours taken tocomplete a task compared to a standard. The standard hours for a taskmay be defined by a lead programmer, a manager, and/or resource engine130 using a model based on subjective standards for task completiontimes. The standard hours to complete a task may be based on the skilllevel of an average resource supporting an application. For resourceswith high skills, the standard hours may be 90% of the average standardhours. Similarly, for low skill resources, the standard hours may be110% of the average standard hours.

Ratings may be computed assuming the actual hours spent on a task.Errors may be created in labor tracking and often measuring a specifictask may be inaccurate. However, resource engine 130 may increaseaccuracy by combining the total effort for all tasks in a specifiedwindow of time. The bigger the window of time and/or the more tasks thatare being graded, the more accurate the grading score.

For any chosen window, there may be the possibility of having open tasksand closed tasks. Resource engine 130 may be configured to grade onlyclosed tasks. If a closed task falls partly within a window, it may begraded based on the percentage of the task within the window beinggraded. In order to determine this percentage, resource engine 130 maybe configured to define a Factor to adjust the standard hours in thewindow. The Factor may be created as follows:

${Factor} = \frac{{Task}\mspace{14mu} {Actual}\mspace{14mu} {hours}\mspace{14mu} {defined}\mspace{14mu} {within}\mspace{14mu} {window}\mspace{14mu} {interval}}{{Total}\mspace{14mu} {task}\mspace{14mu} {Actual}}$

Resource engine may be configured to multiply the Factor and thestandard hours to determine the adjusted standard hours for a task. Forexample:

Task B has 10 actual task hours and the hours are defined within thewindow

-   -   Task B has a factor of 1 (10/10=1).

Task A has 15 actual task hours, 12 hours are defined within the window,and 3 hours are outside of the window.

-   -   Task A has a factor of 0.8 (12/15=0.8)

Resource engine 130 may also be configured to grade the efficiency oftasks. In order to obtain a Grading efficiency for closed tasks,resource engine 130 may total all the closed tasks hours within a windowand then divide that number by the sum of all task hours within the samewindow. The following example shows a window of 100 hours with 90 closedhours within the window.

The result is a grading efficiency of 90%. Based on a grading efficiencyof 90, the G-rating would be G3.

The following is an example of how a resource task may be graded byresource engine 130. The diagram below illustrates 10 tasks assigned toa resource. It shows how the tasks relate to a window defined by theresource start and end dates.

The following chart shows that tasks 1 through 9 are closed and task 10is still open. Resource engine 130 may use only the closed tasks for thegrading. The total task hours equals 174 but only the closed task hours,equaling 166, may be used in the grading.

The chart also shows that task 1 has 20 actual hours but only 16 actualhours are inside of the window selected to grade. Resource Engine 130may use a factor of 0.80 (16/20) to obtain the adjusted standard hoursneeded to do grading. Tasks 2 through 9 are all within the window sotheir factor is equal to 1.00.

Actual Task Hours Task Status Task Window Factor Task - 1 Closed 20 160.80 Task - 2 Closed 30 30 1.00 Task - 3 Closed 11 11 1.00 Task - 4Closed 17 17 1.00 Task - 5 Closed 60 60 1.00 Task - 6 Closed 14 14 1.00Task - 7 Closed 3 3 1.00 Task - 8 Closed 9 9 1.00 Task - 9 Closed 6 61.00 Task - 10 Open 12 8 Total closed task hours 166 Total task hours174

The next chart shows the application category assigned to the closedtasks and the standard hours associated with each application category.Resource engine 130 may be configured to multiply the standard hoursagainst the factor to arrive at the adjusted standard hours. Resourceengine 130 may additionally be configured to add the adjusted standardhours for all the closed tasks in order to obtain the total standardhours.

Adjusted Standard Standard Application Task Hours Factor HourApplication Category 1 Task - 1 16 0.80 12.8 Application Category 1Task - 2 32 1.00 32.0 Application Category 1 Task - 3 8 1.00 8.0Application Category 1 Task - 4 16 1.00 16.0 Application Category 2Task - 5 64 1.00 64.0 Application Category 2 Task - 6 16 1.00 16.0Application Category 1 Task - 7 4 1.00 4.0 Application Category 1 Task -8 8 1.00 8.0 Application Category 3 Task - 9 4 0.80 4.0 Total StandardHours 164.8

After resource engine 130 has determined the total standard hours,resource engine 130 can assign a grade and grade efficiency to theapplication category tasks. In the example herein, the resource taskgrade would be G3 since 166 is under 181 and the Grade efficiency equals95.4%.

Standard Hours = 164.8 Rating Weight Score G1  75% 124 G2  90% 148 G3110% 181 G4 125% 206 G5 Anything higher

In accordance with an exemplary aspect of the present invention,resource engine 130 may be configured to facilitate assignment of tasksto resources. With reference to an exemplary flowchart illustrated inFIG. 14, a new IMR may be detected (step 1401) by resource engine 130 orby a software program such as NetView connected to resource engine 130.Resource engine 130 may then assign the IMR to an application category(step 1403). Resource engine 130 may use any method discussed herein forassigning to an application category. Resource engine 130 may thenassign the IMR to a resource (step 1405) based upon the resource'sskill. If the resource cannot do a task, resource engine 130 mayreassign the task to a new resource.

Resource engine 130 may also generate a new task (step 1407) at the sametime the new IMR is detected. Resource engine 130 may thenassign/reassign the new task (step 1409) to a resource by any methoddiscussed herein for assigning tasks. If the resource cannot do a task,resource engine 130 may reassign the task to a new resource.

Resource engine 130 may also be configured to determine whetherscheduling allows for a resource to complete a task in a specific timelevel (step 1411). Resource engine 130 may access master calendars,master schedules, resource calendars, and/or resource schedules in orderto determine optimum scheduling. If scheduling does not permit aresource to do a task within a time level, resource engine 130 mayreassign the task to a new resource.

Once resource engine 130 has assigned a task to a resource whoseschedule fits the correct time period, the resource may begin workingthe task to completion (step 1413). Resource engine 130 may also track(step 1415) the resource's work on the task to determine whether theresource has encountered problems with the task and needs additionalhelp (step 1417). If resource engine 130 determines that the resourceneeds additional help, it may reassign the task to another resource(step 1409). If resource engine 130 determines that the resource doesnot need additional help, the resource will continue working the task tocompletion (step 1415).

With reference again to FIG. 13, “PLANNING” 1317 may be accessed withinresource engine 130 to facilitate the creation of employee rosters, thescheduling of meetings, training, tasks, personal time and projects, andthe calendaring of resources, tasks and projects. Resource/manager 1002may select create, manage, add, delete, update and/or define resourceschedule hours per work week. Additionally, resource engine 130 may beused to facilitate the creation of a resource calendar of the schedulesof all resource/manager's 1002 resources.

Resource/manager 1002 may also access resource engine 130 to facilitatethe creation of a master resource calendar. A master resource calendarmay include capacity hours, personal hours, and compensation hours.Capacity hours are the number of hours of planned capacity for aresource. For example, if a resource is scheduled to work eight hoursper day each five-day work week, the capacity for the resource would be40 hours. The Capacity hours may be recomputed monthly, weekly, dailyand/or annually. Personal hours may be vacation time, sick time, visaconstraint time, jury duty time, and/or any other type of time off ofwork. Personal hours may vary from one resource to another. Compensationhours may include time a resource is allowed to take off for overtimehours previously worked. Resource engine 130 may be configured tocompute available hours based upon the Capacity hours minus Personalhours and Compensation hours.

Resource/manager 1002 may also access resource engine 130 to facilitatethe management of a resource application calendar. A resourceapplication calendar may store resource-specific information regardingthe actual hours spent by a resource on an application, the number ofhours planned for meetings and training, and whether a resource isworking within its capacity. Resource engine 130 may connect the masterresource calendar with a resource application calendar to best scheduleresources and determine resource actualized hours.

Resource engine 130 may also be configured to provide for “REPORTS” 1319available through resource screen 1300. This tool may be used tofacilitate the generation of resource task and skill reports. Thereports may be used by resource/manager 1002 to manage local and remoteresources. For example, resource engine 130 may be used to generatereports on resource performance, resource capacities, resource trainingneeds, resource skill sets, resource deficiencies, task performance,task resource needs, task skill set needs, and application performance.Additionally, resource/manager 1002 may use REPORTS 1319 to determinetrends, problem areas, and efficiencies amongst resources, tasks, andapplications. For example, resource/manager 1002 may access resourceengine 130 to generate a report on various teams of resources todetermine which teams work more effectively together and which teamsunder perform. Additionally, resource engine 130 may be used tofacilitate a determination of hiring, training, and staffing needs.

In another exemplary application, illustrated in an exemplary embodimentdepicted in FIG. 9, fob 102 may be configured to include a biometricsecurity system 902, security system 902 may be used to facilitateperformance tracking. In this case, a resource operating a fob may beasked to provide assurance that the resource is in fact the sameresource whose details are stored on the fob. Accordingly, the resourcemay provide such verification by placing his finger over the biometricsensor 904. Biometric sensor 904 may then digitize the fingerprint andprovide the digitized fingerprint for verification as described above.Once verified, fob 102 may provide a tracking transaction authorizedsignal to RF transponder 202 (or alternatively to transponder 220) forforwarding to RFID reader 104. RFID reader 104 may then provide theauthorized signal to POI terminal 110 in a similar manner as is donewith convention PIN driven systems and POI terminal 110 may process thetransaction under the employer's business as usual standard.

In another exemplary application, fob 102 and/or RFID reader 104 may beconfigured to facilitate biometric authentication of performancetracking. For example, a human resource using fob 102 and/or RFID reader104 may pre-register biometric information that is unique to that humanresource. For example, this biometric information may include one ormore fingerprints, facial scans, retinal images, voice print, irisscans, and/or vascular patterns. By pre-registering, a user may set upone or more performance tracking accounts/tasks (e.g., programmingtasks, build tasks, etc) associated with his biometric information. Whena human resource desires to use fob 102 and/or RFID reader 104 to trackhis performance on a task, he may use a biometric security device,similar to that described herein, in association with fob 102 and/orRFID reader 104 for authentication purposes. By authentication, thehuman resource's present biometric information may be compared to thepre-registered biometric information to find a match. Once a match ismade, the human resource may be authorized to choose one or more tasksassociated with his biometric information in order to begin performancetracking.

In yet another exemplary application of the present invention, fob 102may be configured for use with global positioning technologies. Forexample, fob 102 may include any combination of positioning technologysuch as global position system (GPS), wireless assisted GPS, wirelessassisted protocol (WAP) based location, geography markoff language (GML)based location, differential GPS, enhanced observed time difference(E-OTD), enhanced cell identification, and uplink time difference ofarrival (U-TDOA) technologies. Fob 102 may be configured to communicateits positional information to one or more servers on network 136 and/orresource engine 130 to provide information based on the location of fob102. For example, a resource, such as a package, may be configured witha GPS-enabled fob 102 such that the package may be constantly tracked inorder to monitor its delivery performance.

In accordance with another exemplary application of the presentinvention, fob 102 may be used for travel, shopping and/or otherbusinesses to facilitate the tracking of travel, shopping and/or otheractivities. For example, U.S. patent application Ser. No. 10/439,617filed on May 16, 2003 entitled SYSTEM AND METHOD FOR FACILITATING ATRANSACTION BETWEEN A MERCHANT AND A CONSUMER, which is herebyincorporated by reference.

For example, in one exemplary embodiment in accordance with the presentinvention, a system and method for facilitating a transaction between amerchant and a consumer may be provided. The system may include aconsumer interface and a settlement administrator wherein the consumerinterface is configured to emit a consumer identity signal configured toidentify a consumer, and the settlement administrator is configured toreceive both the consumer identity signal and an amount owing signalindicative of an amount owed by the consumer. The settlementadministrator may also be configured to facilitate one or more paymentsbetween an account of the merchant and an account of the consumer uponreceipt of the consumer identity signal and the amount owing signal.

In an exemplary embodiment, the amount owing signal received by thesettlement administrator may be indicative of an inventory of purchasesof the consumer, and the settlement administrator may be configured todetermine an amount owing based at least in part on that inventory.

In another exemplary embodiment, the system may include an incentiveadministrator configured to emit an offer signal indicative of anincentive offer. Optionally, the incentive administrator may beconfigured to receive the consumer identity signal and to emit an offersignal indicative of an incentive offer that is based at least in parton that consumer identity signal.

For example, in accordance with another exemplary embodiment of thepresent invention, a shopper resource carrying fob 102, may enter astore and use fob 102 to track his progress through the store. That is,different aisles and/or checkpoints throughout the stores may beequipped with RFID readers 104 to facilitate tracking the shopper'sperformance. Fob 102 may be associated with a shopping identifier,similar to the employer identifier described herein. The shoppingidentifier may be used to facilitate the shopping experience. Byfacilitating the shopping experience, the shopping identifier may beused to track a shopper, to track a product, for checkout, for stocking,for inventory, for analysis, for shopping customization and/or for anyother shopping experience.

For example, in a hardware store, fob 102 may be used in conjunctionwith RFID readers 104 at the beginning and end of each aisle. Thus, whena shopper passes RFID reader 104, a performance tracking request may beinitiated and recorded within resource engine 130. A manager and/orother user of resource engine 130 may then use this performance trackingdata to determine which aisles the shoppers (and other shoppers) spendthe most time in. The manager may then use this information to plan forscheduling employees, stocking supplies, ordering products, and/or anyother related tasks. As yet another example, museums may use fobs 102and RFID readers 104 to track wait times, viewing times, heavilytrafficked areas and other related matters.

In another embodiment of the present invention, fob 102 may be used onall products in a business, such as, for example, a grocery store. Thestore may have various RFID readers 104 equipped throughout, such thatmanagers and/or other users may track the different products throughoutthe store for security, stocking and/or other purposes. For example,RFID reader 104 may be used in conjunction with one or more third-partymerchant systems, as described more fully in U.S. patent applicationSer. No. 10/192,488, entitled “SYSTEM AND METHOD FOR PAYMENT USING RADIOFREQUENCY IDENTIFICATION IN CONTACT AND CONTACTLESS TRANSACTIONS.”Third-party merchant systems may include any issuer system and/ormerchant system maintained by an entity, such as, for example anon-financial or financial institution, American Express®, Visa® and/orMasterCard®, etc.

As an example of an exemplary aspect of the present invention inconjunction with the merchant system, fobs 102 and RFID reader 104 maybe configured to reduce or eliminate the need for a clerk duringcheckout. Fobs 102 and RFID reader 104 may also facilitate transactiontime for shoppers. For example, a shopper may push his cart past RFIDreader 104 and all the products in the cart may communicate purchasinginformation to RFID reader 104 and one or more third-party merchantsystem via fobs 102 affixed to the products. A third-party merchantsystem may then be used to execute a payment transaction for theproducts. The shopper may than perform the transaction in an expeditedway, as neither the ringing up of the products nor payment for theproducts may require a clerk's assistance. Additionally, RFID reader 104may be configured to communicate product and purchasing informationrelating to the transaction to resource engine 130 for trackingpurposes.

While security measures exist that allow stores to monitor whetherproducts have been shoplifted, these security measures must be removedand/or deactivated at check-out. As a further example of an exemplaryaspect of the present invention, fobs 102 may be configured such thatthey do not require deactivation and/or removal. Instead, fobs 102 andRFID reader 104, used in conjunction with products, may be configured tocommunicate with one or more third-party merchants and resource engine130 to track the purchasing status of the products. For example,resource engine 130 may be configured to track whether fob 102 and RFIDreader 104 have been used to engage in a merchant transaction. Thus, ifa shoplifter tries to leave a store without paying for a product, RFIDreader 104, located at the exit of the store, may be configured tocommunicate with resource engine 130 in order to determine whether theproduct was the subject of a merchant transaction. If resource engine130 indicates that the product was not the subject of a merchanttransaction, RFID reader may be configured to sound an audible and/orsilent alarm and/or communicate with an alarm system to alert thestore's security personnel.

In another exemplary embodiment, the consumer interface may beconfigured to receive the offer signal and to retain the incentive offerfor use in conjunction with the checkout and settlement process. Inaccordance with this embodiment, the consumer interface may be furtherconfigured to emit the offer signal to be received, for example, by thesettlement administrator. In a complementary manner, the settlementadministrator may be configured to receive an offer signal indicative ofan incentive offer and to facilitate one or more payments between anaccount of the merchant and an account of the consumer, where the one ormore payments are based at least in part on the offer signal.

In yet an exemplary embodiment, the system may also include amerchandizing administrator in communication with the settlementadministrator and the incentive administrator. In accordance with thisembodiment, the settlement administrator may be configured to providemerchandizing information to the merchandizing administrator, and themerchandizing administrator may be configured to receive suchmerchandizing information and to provide incentive information to theincentive administrator such that the incentive offer may be based atleast in part on the merchandizing information. It should be noted thatsuch merchandizing information may also be transmitted to, received by,and used by any other parties in the supply chain.

FIG. 15 illustrates the external flow of information surrounding anexemplary system 1600 for facilitating a transaction between a consumerand a merchant. In accordance with this embodiment, system 1600comprises a consumer interface 1650 and a settlement administrator 1640.In this exemplary embodiment, participants in the supply chain 1610,which may include one or more supplier, manufacturer, producer,distributor, warehouse, merchant, or other provider, supplies goodsand/or services 1612 to be placed in a cart 1620 controlled by aconsumer 1690. In addition to controlling cart 1620, consumer 1690 alsocontrols a consumer interface 1650, which is configured to emit aconsumer identity signal 1692 that is configured to identify consumer1690.

In an exemplary embodiment, consumer interface 1650 comprises fob 102and/or any other type of emitter (e.g., modulated light emitter, encodedsound emitter, electronic pulse emitter) that may be configured to emitsignals providing appropriate information. As described above, suchinformation may include a consumer identity, but such information mayalso comprise information collected by consumer interface 1650,processed by a resource engine 1654 associated with consumer interface1650, and/or stored in a database 1656 associated with consumerinterface 1650. Such information may include data regarding incentiveoffers collected by consumer 1690, time and location informationconcerning consumer 1690, traits or characteristics of consumer 1690,and the like. For more information related to radio frequencyidentification systems, see U.S. patent application Ser. No. 10/192,488,filed Jul. 9, 2002 and entitled System And Method For Payment UsingRadio Frequency Identification In Contact And Contactless Transactions,which is hereby incorporated by reference.

In an exemplary embodiment, an inventory acquirer is in communicationwith a settlement administrator 1660, which is configured to facilitateone or more payments among an account of consumer 1690 and an account ofone or more supply chain participant 610 to settle consumer's 1690purchase of goods/services 1612 in cart 1620. Inventory acquirer 1630examines the contents of cart 1620 to determine an inventory 1632. Anexemplary inventory acquirer may be found in U.S. Pat. No. 5,418,354,owned by Leonard Hailing, which generally discloses a self-service cartsystem which includes a bar code scanner, a security scanner and amagnetic card reader, the contents related to inventory acquisition ishereby incorporated by reference. The patent includes a cart having anelectrically latchable door, a device for optically acquiring a priceand description of a product, a security device for converting a tag onthe product from an unsecured state to a secured state (e.g., magneticto non-magnetic) and a controller for allowing access to the cart afteracquiring the information. Another exemplary system is disclosed in U.S.Pat. No. 5,729,697, owned by IBM, the contents related to inventoryacquisition is hereby incorporated by reference. The '697 patentgenerally discloses a shopping cart that automatically tracks objectsthat are selected and carried in the cart. The patent discloses a cartantennae which creates a radio frequency field within the shopping cart,an interrogator that interrogates radio frequency tags that are attachedto an object in the shopping cart and a data structure in memory whichincludes an object price and a running total of the prices along with amemory on each radio frequency tag which includes paid information afterthe shopper pays the running total.

It should be noted that inventory 1632 may comprise a monetary value, aset of quantities, item identities, and/or any other informationsufficient to enable a determination of an amount owed by consumer 1690to settle the purchase of goods/services 1612 in cart 1620. Uponcheckout or at any other appropriate interval, inventory acquirer 1630communicates inventory 1632 to settlement administrator 1640 tofacilitate settlement of the transaction among participants 1610 andconsumer 1690.

As suggested above, settlement administrator 1640 is in communicationwith inventory acquirer 1630 and is configured to receive inventory 1632and to determine an amount owing based at least in part on inventory1632. In an exemplary embodiment, settlement administrator 1640 includesdatabase 1642, which may contain pricing, taxation, and/or incentivedata for use in determine an amount owing by consumer 1690 based atleast in part on inventory 1632. In addition, settlement administrator1640 is configured to receive consumer identity signal 1692 transmittedby consumer interface 1650.

Based on consumer identity signal 1692 and the amount owing, settlementadministrator may communicate with a financial services provider 1660 tofacilitate a transfer of funds 1662, or another form or payment, amongan account of consumer 1690 and an account of one or more supply chainparticipant 1610.

In an exemplary embodiment, system 1600 also includes an incentiveadministrator 1680 configured to emit an offer signal 1682 indicative ofan incentive offer. Optionally, incentive administrator 1680 may beconfigured to receive consumer identity signal 1692 and to select,adapt, configure, or otherwise modify offer signal 1682 based at leastin part on consumer identity 1692. For example, in an exemplaryembodiment, once consumer identity 1692 is known by incentiveadministrator, attributes or characteristics of consumer 1690 may beretrieved from one or more databases to be used as factors inconfiguring offer signal 1682. Exemplary factors to be considered inconfiguring offer signal 1682 may include consumer's 1690 age, gender,purchasing history, time/duration and/or location/pathoccupied/traversed by consumer 1690 inside and/or outside merchant'sestablishment, economic information regarding consumer 1690 and/orpopulation in general, or the like. Incentive administrator 1680 may bepreconfigured with incentive information or may be configured to receiveincentive information 1672 from a merchandizing administrator 1670.

In an exemplary embodiment, consumer 1690 may obtain incentives outsidethe merchant location. For example, consumer 1690 may interact with aself-service incentive administrator 1680 that may be located in acommon area of a school, shopping center, bus station or other place ofpublic accommodation. In addition, consumer 1690 may interact withincentive administrator 1680 via a terminal or other suitable portalmeans for connecting to the Internet or another network.

For more information on incentive/loyalty systems, transaction systems,electronic commerce systems and digital wallet systems, see, forexample, U.S. patent application Ser. No. 09/836,213, filed on Apr. 17,2001 by inventors Voltmer, et al. and entitled System And Method ForNetworked Loyalty Program; U.S. Continuation-In-Part patent applicationSer. No. 10/027,984 was filed on Dec. 20, 2001 by inventors Ariff, etal. and is entitled System And Method For Networked Loyalty Program;U.S. Continuation-In-Part patent application Ser. No. 10/010,947 wasfiled on Nov. 6, 2001 by inventors Haines, et al. and is entitled SystemAnd Method For Networked Loyalty Program; the Shop AMEX™ system asdisclosed in Ser. No. 60/230,190 filed Sep. 5, 2000; the MR as Currency™and Loyalty Rewards Systems disclosed in Ser. No. 60/197,296 filed onApr. 14, 2000, Ser. No. 60/200,492 filed Apr. 28, 2000, Ser. No.60/201,114 filed May 2, 2000; a digital wallet system disclosed in U.S.Ser. No. 09/652,899 filed Aug. 31, 2000; a stored value card asdisclosed in Ser. No. 09/241,188 filed on Feb. 1, 1999; a system forfacilitating transactions using secondary transaction numbers disclosedin Ser. No. 09/800,461 filed on Mar. 7, 2001, and also in relatedprovisional applications Ser. No. 60/187,620 filed Mar. 7, 2000, Ser.No. 60/200,625 filed Apr. 28, 2000 and Ser. No. 60/213,323 filed May 22,2000, all of which are hereby incorporated by reference.

As mentioned briefly above, settlement administrator 1640 may also beconfigured to consider incentive information 1682 in determining anamount owing by consumer 1690. Such incentive information 1682 maycomprise a percentage discount, a two-for one, buy one get one free, orthe like. Where incentive information 1682 comprises an offer such asbuy 10 and get one free, settlement administrator 1640 may be configuredto track purchase history so as to determine whether and/or when thecondition has been satisfied. Accordingly, settlement administrator 1640may be configured to receive incentive information 1682 transmitted byconsumer interface 1650 or another reliable source. Moreover, by virtueof its function of receiving inventory 1632 as well as consumer identitysignal 1692 and incentive information 1682, settlement administrator1640 is positioned to collect information that may be extremely usefulin optimizing the merchandizing process from the perspective of consumer1690 and/or one or more supply chain participant 1610. Accordingly,settlement administrator 1640 may be configured to retain such inventory1632 as well as consumer identity signal 1692 and incentive information1682 in database 1642. Further, settlement administrator 1640 may beconfigured to transmit such information 1644 to one or more supply chainparticipant 1610 or to merchandizing administrator 1670.

It should be noted that in addition to incentive information 1682,consumer interface 1650 may also collect and transmit time and locationinformation regarding the path traversed by consumer 1690 within themerchant's facility. Such information may be acquired by consumertrackers situated at specific locations throughout the merchantsfacility. In one embodiment, consumer trackers emit location and/or timesignals that are received and stored by consumer interface to be laterdownloaded by settlement administrator 1640. In another embodiment,consumer trackers are configured to receive consumer identificationsignal 1692 as consumer passes within a usable field of proximity fromeach consumer tracker. Each consumer tracker may then communicate suchconsumer proximity information to settlement administrator 1640 and/ormerchandizing administrator 1670 for use in determining the pathtraversed by consumer 1690. Accordingly, such information may bereceived and stored by settlement administrator 160 for lattertransmission to, receipt by, and use by merchandizing administrator 1670in conjunction with information 1644. Accordingly, merchandizingadministrator may use information 1644 to determine how and whereconsumers 1690 spend time within the facility. In addition, offeringsmay be modified in order to improve the shopping process from theperspective of consumer 1690 and/or one or more of supply chainparticipants 1610.

Merchandizing administrator 1670 may be configured to communicateincentive information 1672 to incentive administrator 1680. Inaccordance with an exemplary embodiment, merchandizing administrator1670 may also be configured to receive consumer identity 1692 fromincentive administrator for use in configuring incentive information1672 to be communicated to incentive administrator 1680. In accordancewith another exemplary embodiment, merchandizing administrator 1670 maybe configured to receive collected merchandizing information 1644 fromsettlement administrator 1640 and to analyze such information 1644 inorder to improve the effectiveness of the merchandizing process. Forexample, merchandizing administrator 1670 may be configured to determinethe effectiveness of offers presented to particular consumers 1690 basedon the responses of those consumers 1690 as received through inventory1632. Accordingly, merchandizing administrator 1670 may be configured toformulate test incentive offerings to be communicated as incentiveinformation 1672 to incentive administrator 1680 for presentation toconsumer 1690 as incentive information 1682. It should also be notedthat incentive information 1682 may be specifically tailored forpresentation to consumer 1690 based on consumer identification signal1692. In addition to being configured to be received and stored byconsumer interface 1650, incentive information 1682 may also beconfigured to trigger a corresponding presentation to be perceived byconsumer 1690. For example, the presentation to consumer may beconfigured as any combination of an emission of a printed advertisement,a display of a moving or static video image, a performance of a soundrecording, or even an emission of a scent. Such offers may be configuredfor acceptance through an immediate act performed by consumer such aspushing a button, pulling a lever, orally responding to a prompt,remaining physically present in a location, proceeding to anotherpredetermined location, or submitting to biometric authentication. Suchoffers may also be accepted through later acts such as purchasing anincented item.

In an exemplary embodiment, the information regarding which goods wereselected by the user may be collected in a contactless method, e.g.,using unique radio frequency emitters, wherein the consumer 1690 merelypushes cart 1620 within a field of proximity of inventory acquirer 1630.In accordance with this embodiment, inventory acquirer 1630 detects aunique radio frequency from each product 1612, or from a tag on eachproduct 1612, accesses a database, and returns an inventory 1632.

Accordingly, the system of the instant invention facilitatesimprovements in store layout, offers presented, pricing, inventorymanagement, payment reconciliation. In addition the collection of thatinformation provides a variety of other benefits such as the ability toprovide monthly or even annual statements to consumer 1690.

In on-line implementations of the instant invention, each participant isequipped with a computing system. Such computing units may be in theform of a personal computer, although other types of computing units maybe used including laptops, notebooks, hand held computers, set-topboxes, and the like. A merchant may have a computing unit implemented inthe form of a computer-server, although other implementations arepossible. The settlement administrator, the merchandizing administrator,the incentive administrator, the financial services provider, theinventory acquirer, and the supply chain participant, each may beimplemented as a computer, which may be a main frame computer or whichmay be implemented in other forms, such as mini-computers, PC servers, anetwork set of computers, and the like.

The settlement administrator, the merchandizing administrator, theincentive administrator, the financial services provider, the inventoryacquirer, and the supply chain participant computers may beinterconnected via a network, referred to as a settlement network. Thesettlement network represents a combination of existing proprietarynetworks and non-proprietary networks that presently accommodatetransactions for credit cards, debit cards, and other types offinancial/banking cards. The settlement network may be a closed network,assumed to be secure from eavesdroppers, and in an alternativeembodiment, may include any open network, such as the internet. Examplesof the settlement network include the American Express®, VisaNet® andthe Veriphone® network.

In an exemplary embodiment, the system is implemented as computersoftware modules loaded onto the computers of the settlementadministrator, the merchandizing administrator, the incentiveadministrator, the financial services provider, the inventory acquirer,and the supply chain participant. In an exemplary embodiment, thecomputers of the settlement administrator, the merchandizingadministrator, the incentive administrator, the financial servicesprovider, the inventory acquirer, and the supply chain participant donot require any additional software (beyond what is required toaccomplish traditional on-line transactions) to participate in theonline settlement transactions supported by the system. The additionalfacilitating software is implemented on the settlement administrator'scomputer, the financial service provider's computer, and/or themerchandizing administrator's computer.

Although labeled as a “provider of financial services” or a “financialservices provider,” such party may represent other types of issuinginstitutions, such as credit card companies, card sponsoring companies,or third party issuers under contract with financial institutions. Inaddition to issuing financial instruments, a bank or value source mayprovide value comprising non-financial instruments such as loyaltypoints, rewards, or coupons. It is further noted that other participantsmay be involved in some phases of the transaction, such as anintermediary settlement institution, but these participants are notshown.

The system also supports other payment forms that have evolved from, andare more prevalent, online. These other payment forms include, forexample, subscription or recurring payments for renewable, sweepaccounts, periodic services, as well as micro-payments forlocation-based (i.e., dispensing machines, parking meters, and the like)or digital rights management services such as those providing musicand/or software. Management of the micro-payments may includeaggregation for settlement with the merchant and transaction viewing bythe consumer. In addition, the system facilitates integratedstatementing and may be configured to draw funds from a designatedsource or set of sources into the consolidated account on a specifiedschedule. Alternatively, the designated source or set or sources couldbe scheduled to place funds into the consolidated account according to apredetermined schedule. In addition to scheduled value transfers, thesystem may be configured to accommodate condition-based triggers, whichenable the system to respond to unanticipated needs for value.

In a further aspect, as shown in FIG. 16, the present invention providesa method for facilitating a transaction between a merchant and aconsumer. As shown in FIG. 16, one or more supply chain participantsupplies goods and/or services to be placed in cart controlled byconsumer (step 1701). An exemplary method includes providing a consumerinterface configured to emit a consumer identity signal configured toidentify a consumer (step 1710). A method also includes receiving theconsumer identity signal (step 1720), receiving an amount owing signalindicative of an amount owing from the consumer (step 1730), andfacilitating one or more payments between an account of the merchant andan account of the consumer (step 1740).

In an exemplary embodiment, incentive signals are transmitted by one ormore incentive administrator for receipt and storage by consumerinterface (step 1750). Upon checkout, then, consumer interface maytransmit the incentive offer information as well as the consumeridentity information to be received by settlement administrator (step1760).

In another exemplary embodiment, an inventory acquirer receives signalsfrom goods contained in consumer's cart and produces inventory to bereceived and used by settlement administrator in settling the purchaseof the goods (step 1770). In another embodiment, an incentiveadministrator transmits incentive offers to be received by consumerinterface and optionally receives consumer identity information andmodified incentive offerings based on the consumer's identity (step1780). In yet another embodiment, a merchandizing administrator receivesmerchandizing information collected and transmitted by settlementadministrator for use in modifying incentive offerings provided toincentive administrator for transmission to selected consumers (step1790). Accordingly, the method of the instant invention facilitatesimprovements in store layout, offers presented, pricing, inventorymanagement, payment reconciliation.

The preceding detailed description of exemplary embodiments of theinvention makes reference to the accompanying drawings, which show theexemplary embodiment by way of illustration. While these exemplaryembodiments are described in sufficient detail to enable those skilledin the art to practice the invention, it should be understood that otherembodiments may be realized and that logical and mechanical changes maybe made without departing from the spirit and scope of the invention.For example, the steps recited in any of the method or process claimsmay be executed in any order and are not limited to the order presented.Further, the present invention may be practiced using one or moreservers, as necessary. Thus, the preceding detailed description ispresented for purposes of illustration only and not of limitation, andthe scope of the invention is defined by the preceding description, andwith respect to the attached claims.

Benefits, other advantages, and solutions to problems have beendescribed above with regard to specific embodiments. However, thebenefits, advantages, solutions to problems, and any element(s) that maycause any benefit, advantage, or solution to occur or become morepronounced are not to be construed as critical, required, or essentialfeatures or elements of any or all the claims. As used herein, the terms“comprises,” “comprising,” or any other variations thereof, are intendedto cover a non-exclusive inclusion, such that a process, method,article, or apparatus that comprises a list of elements does not includeonly those elements but may include other elements not expressly listedor inherent to such process, method, article, or apparatus. Further, noelement described herein is required for the practice of the inventionunless expressly described as “essential” or “critical.”

1-25. (canceled)
 26. A method comprising: receiving, by a computer system, a signal from a financial transaction device that includes a wireless interface, wherein the signal is indicative of a location of the financial transaction device; based on the signal, the computer system selecting, from a plurality of incentives, a particular incentive that corresponds to the location; and transmitting, by the computer system, the particular incentive to the financial transaction device.
 27. The method of claim 26, further comprising: prior to receiving the signal, the computer system receiving another signal from the financial transaction device, wherein the another signal is indicative of another location of the financial transaction device; and wherein the computer system selecting the particular incentive comprises the computer system modifying an initially selected incentive based on the another location to generate the particular incentive.
 28. The method of claim 26, further comprising: based on information indicating that the location has changed from a first location to a second location, the computer system determining a path between the first location and the second location; and the computer system transmitting to the financial transaction device a different incentive that corresponds to at least one item on the path.
 29. The method of claim 26, further comprising: determining, by the computer system, a first time duration indicative of an amount of time that the financial transaction device spent at the location; and based on information indicating that the first time duration exceeds a second time duration, wherein the second time duration is indicative of an amount of time that the financial transaction device spent at a different location, the computer system selecting the particular incentive, wherein the particular incentive corresponds to an item associated with the location.
 30. The method of claim 26, further comprising: based on the signal, the computer identifying a user corresponding to the financial transaction device; and the computer system selecting the particular incentive to include personalized information for the user.
 31. The method of claim 26, further comprising: comparing, by the computer system, an identifier received from the financial transaction device to a plurality of identifiers stored on the computer system; and based on a result of the comparing, wherein the result indicates that the identifier matches one of the plurality of identifiers, the computer system authenticating the financial transaction device.
 32. A financial transaction device, comprising: an RFID subsystem that, during operation, communicates with a point-of-sale (“POS”) system; and a processor that, during operation: transmits, to the POS system via the RFID subsystem, information indicative of a location of the financial transaction device; and receives from the POS system via the RFID subsystem, an incentive that corresponds to the location.
 33. The financial transaction device of claim 32, further comprising a display that, during operation, displays the incentive.
 34. The financial transaction device of claim 32, wherein, during operation, the processor further: transmits to the POS system a first item of information indicative of a first location; and subsequent to transmitting the first item of information, transmits to the POS system a second item of information that, in combination with the first item of information, is indicative of a path of the financial transaction device from the first location.
 35. The financial transaction device of claim 32, wherein the financial transaction device, during operation, processes user purchases.
 36. The financial transaction device of claim 32, wherein, during operation, the processor further: upon receiving the incentive, causes the incentive to be presented in at least a form of: a printed advertisement, a display of a moving or static video image, an audio, or an emission of a scent, or a combination thereof.
 37. The financial transaction device of claim 32, wherein during operation, the processor further: based on user information indicating that the incentive has been accepted, instructs the POS system to apply the incentive to a purchase.
 38. The financial transaction device of claim 32, further comprising an internal power source that, during operation, supplies power to the RFID subsystem.
 39. An article of manufacture including a non-transitory computer readable medium having instructions stored thereon that are executable by a processor to cause a computer system to perform operations comprising: detecting a plurality of signals from a financial transaction device of a user, wherein at least one of the plurality of signals is indicative of a location of the financial transaction device; based on the plurality of signals, determining a path associated with the user; selecting, from a plurality of incentives, a particular incentive that corresponds to the path; and transmitting the particular incentive to the financial transaction device.
 40. The article of manufacture of claim 39, wherein the operations further comprise: based on a first one of the plurality of signals, determining a first location of the user; subsequent to the determining, detecting, based on a second one of the plurality of signals, that the user has moved to a second location; and based on the path, wherein the path includes the first location and a second location, selecting the particular incentive, wherein the particular incentive corresponds to an item on the path.
 41. The article of manufacture of claim 39, wherein the operations further comprise: based on a first one of the plurality of signals, selecting a first incentive that corresponds to a first location of the user; subsequent to selecting the first incentive, detecting that the user has moved to a second location; and based on the second location, modifying the first incentive to generate the particular incentive.
 42. The article of manufacture of claim 39, wherein the operations further comprise: receiving information indicating that the particular incentive has been accepted by the user; and applying the incentive to a purchase made by the user using the financial transaction device.
 43. The article of manufacture of claim 39, wherein the operations further comprise: analyzing user information to determine effectiveness of the particular incentive, wherein the user information is indicative of whether the user has accepted the particular incentive; and based on the analyzing, modifying a future incentive for the user.
 44. The article of manufacture of claim 39, wherein the operations further comprise: determining that the user has moved from a first location on the path to a second location on the path; and based on information indicating that the user spent more time at the first location than the second location, selecting the particular incentive that corresponds to the first location.
 45. The article of manufacture of claim 39, wherein the operations further comprise: based on information indicating that the user has remained at a particular location on the path for a time interval, selecting the particular incentive that corresponds to the particular location. 