Systems, apparatuses and methods for verifying consumer activity and providing value to consumers based on consumer activity

ABSTRACT

Systems, apparatuses and methods of verifying consumer activity and providing value to consumers based on consumer activity are provided. In some examples, consumer activity may occur on a mobile electronic device and verification of the activity on the mobile electronic device may be performed. Value may be provided to the consumer after the activity is verified. Numerous types of activity may be performed by the mobile electronic device such as, for example, entering a location, scanning a product or image, or purchasing a product. Such activity may be verified in a variety of manners including, but not limited to, a verification element or rescanning a purchased product at a designated location. Systems, apparatuses and methods disclosed herein may also be utilized with other applications (“Apps”) to provide value to users of the other App.

RELATED APPLICATIONS

The present application claims the benefit of co-pending U.S.Provisional Patent Application No. 61/421,380, filed Dec. 9, 2010, theentire contents of which are incorporated herein by reference.

FIELD OF THE INVENTION

The present invention generally relates to providing value to consumersbased on their consumer activity and verifying the consumer activityand, more particularly, to providing value to consumers performingconsumer activity with their mobile electronic devices and verifying theconsumer activity performed with the mobile electronic devices.

BACKGROUND

Currently, people are taking their mobile electronic devices everywherewith them in their daily lives and, therefore, uses and applications ofmobile electronic devices are increasing at a rapid pace to accommodatepeople anywhere throughout their daily lives. Users of mobile electronicdevices are also consumers and many of the new uses and applications ofmobile electronic devices are in some manner associated with theconsumer activity of the users. In some instances, a consumer may opt touse the mobile electronic device during consumer activity.

Thus, a need exists for systems, methods, and/or apparatuses thatencourage and verify authenticity of the consumer's activity. Inaddition, a need exists for systems, methods, and/or apparatuses thatprovide value to consumers based on their consumer activity.

SUMMARY

In one example, a system is provided for providing value to a consumerbased on consumer activity.

In another example, a system is provided for verifying consumeractivity.

In yet another example, a method of providing value to a consumer basedon consumer activity is provided.

In still another example, a method of verifying consumer activity isprovided.

In a further example, an apparatus is provided for providing value to aconsumer based on consumer activity.

In yet a further example, an apparatus is provided for verifyingconsumer activity.

In still a further example, a method of providing value to a consumer isprovided and includes performing an action with a mobile electronicdevice, generating data associated with the action, communicating thedata to a server via a network, storing the data in a storage device,identifying value using the data, and providing the value to a consumer.

In another example, a method of providing value to a consumer isprovided and includes performing a first action associated with a mobileelectronic device, communicating data associated with the first actionto a server, performing a second action associated with the mobileelectronic device, communicating data associated with the second actionto the server, verifying authenticity of at least one of the firstaction and the second action using the data associated with the firstaction and the second action, and providing value to the consumer if theat least one of the first action and the second action is determined tobe authentic.

In yet another example, a method of verifying a location of a mobileelectronic device is provided and includes providing a verificationelement in a location, the verification element including a memory, aplurality of unique communications stored in the memory, and a broadcastelement, broadcasting one of the plurality of unique communications withthe broadcast element, receiving the one of the plurality of uniquecommunications with the mobile electronic device, communicating the oneof the plurality of unique communications to a server with the mobileelectronic device via a network, and verifying the one of the pluralityof unique communications is associated with the verification element.

In a further example, a method of verifying a location of a mobileelectronic device is provided and includes providing a verificationelement in a location, the verification element may include a memory, aunique id and secret key for generating non-predictable codes from analgorithm, a battery backup clock, a plurality of unique codes generatedon the fly or stored in the memory, and a broadcast element broadcastingand periodically changing one of the plurality of unique codes with thebroadcast element, receiving the one of the plurality of unique codeswith the mobile electronic device, communicating the one of theplurality of unique codes to a server with the mobile electronic via anetwork, and verifying the one of the plurality of unique codes isassociated with the verification element.

In still another example, a method of providing value to a consumer isprovided and includes performing an action with a mobile electronicdevice when the mobile electronic device is without access to a network,the mobile electronic device including a data storage device, generatingdata associated with the action, storing the data in the data storagedevice in the mobile electronic device, gaining access to a network withthe mobile electronic device, communicating the data to a server via thenetwork when the mobile electronic device has access to a network, andproviding value to the consumer.

In a further example, a method of providing value to a consumer isprovided and includes communication data to a mobile electronic devicevia a network when the network is accessible by the mobile electronicdevice, the mobile electronic device including a data storage device,storing the data in the data storage device of the mobile electronicdevice, wherein the data is associated with an action opportunity,prompting a consumer via the mobile electronic device of the actionopportunity when the mobile electronic device does not have access to anetwork, performing an action, with the mobile electronic device,associated with the action opportunity when the mobile electronic devicedoes not have access to a network, and providing value to the consumer.

In still a further example, a method of providing value to a consumer isprovided and includes operating an application on a mobile electronicdevice, performing an action with the mobile electronic device when theapplication is not operating on the mobile electronic device, generatingdata associated with the action, communicating the data to a server viaa network, identifying value using the data, wherein the value isassociated with the application, and providing the value to theconsumer.

In yet a further example, a method of verifying product interaction isprovided and includes providing a product, capturing an image associatedwith the product with a mobile electronic device, transmitting the imageover a network for verification, and verifying that the image isassociated with the product.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an exemplary system that may be used forverifying consumer activity and providing value to consumers based onconsumer activity, among other things;

FIG. 2 is a flowchart of an exemplary process of verifying consumeractivity and providing value to consumers based on consumer activity;

FIG. 3 is a flowchart of an exemplary process of creating an account andverifying a user device;

FIG. 4 is a flowchart of an exemplary process of action generation;

FIG. 5 is a flowchart of an exemplary process of performing an action todetermine whether or not a consumer will receive value;

FIG. 6 is a flowchart of another exemplary process of performing anaction to determine whether or not a consumer will receive value;

FIG. 7 is a flowchart of yet another exemplary process of performing anaction to determine whether or not a consumer will receive value;

FIG. 8 is a flowchart of still another exemplary process of performingan action to determine whether or not a consumer will receive value;

FIG. 9 is a flowchart of a further exemplary process of performing anaction to determine whether or not a consumer will receive value;

FIG. 10 is a flowchart of an exemplary process of verifying consumeractivity;

FIG. 10A is a flowchart of another exemplary process of verifyingconsumer activity;

FIG. 11 is a flowchart of yet another exemplary process of verifyingconsumer activity;

FIG. 11A is a flowchart of a further exemplary process of verifyingconsumer activity;

FIG. 12 is a flowchart of still another exemplary process of verifyingconsumer activity;

FIG. 13 is a flowchart of a further exemplary process of verifyingconsumer activity;

FIG. 14 is a flowchart of an exemplary process of value redemption;

FIG. 15 is a block diagram of an exemplary verification element that maybe used with the system;

FIG. 16 is a block diagram of another exemplary verification elementthat may be used with the system;

FIG. 17 is a flowchart of an exemplary process of enabling a user toreceive value when the user's mobile electronic device lackscommunication with one or more networks;

FIG. 18 is a flowchart of another exemplary process of enabling a userto receive value when the user's mobile electronic device lackscommunication with one or more networks; and

FIG. 19 is a flowchart of an exemplary process of marketing to aconsumer based on the consumer's own activity.

Before any independent features and embodiments of the invention areexplained in detail, it is to be understood that the invention is notlimited in its application to the details of the construction and thearrangement of the components set forth in the following description orillustrated in the drawings. The invention is capable of otherembodiments and of being practiced or of being carried out in variousways. Also, it is understood that the phraseology and terminology usedherein is for the purpose of description and should not be regarded aslimiting.

DETAILED DESCRIPTION

Disclosed herein are systems, methods, and apparatuses for interactingwith consumers during consuming activity, providing value to theconsumers based on their consumer activity, and verifying theauthenticity of the consumer activity. The disclosed systems, methods,and apparatuses may also be used to strategically market to and/orsurvey the consumers based on their consumer activity and/or based onstated or implied preferences.

With reference to FIG. 1, a block diagram of an exemplary system 20 ofthe present invention is illustrated. In this illustrated exemplaryembodiment, the system 20 includes a user electronic device 24, a globalpositioning system (“GPS”) 28, a first network 32, a second network 36,a plurality of accessible servers 40, a storage device or database 44, averification element 48, and a point of sale (POS) system 52. It shouldbe understood that the exemplary elements of the system 20 illustratedin FIG. 1 are provided for illustrative and exemplary purposes to assistwith an understanding of at least some of the many aspects of thepresent invention. These exemplary elements are not intended to belimiting upon the present invention and the present invention is capableof having various other elements, which are intended to be within thespirit and scope of the present invention.

With continued reference to FIG. 1, the user electronic device 24 may beany type of user electronic device such as, for example: a mobileelectronic device such as a smartphone, a personal digital assistant(“PDA”), a touch screen music player, a miniature laptop or tablet,etc.; a personal computer or laptop; a combination of a personalcomputer and a digital camera; or any other type of user electronicdevice. While the systems, methods, and apparatuses of the presentinvention are capable of utilizing any user electronic device, a “mobileelectronic device” will be used hereinafter when referring to userelectronic devices in order to provide a common theme throughout thedescription, simplify the following description, and for the sake ofbrevity. However, it should be understood that the use of “mobileelectronic device” is not intended to be limiting upon the disclosure ofthe present invention. The illustrated exemplary mobile electronicdevice 24 includes a microprocessor 56 and memory 60. While theillustrated exemplary embodiment of the mobile electronic device 24 isshown only with a microprocessor 56 and memory 60, it should beunderstood that the mobile electronic device 24 is capable of having allnecessary elements to carryout the present invention.

The exemplary system also includes a conventional GPS 28, which is wellknown in the art and, therefore, will not be described herein in greatdetail. The mobile electronic device 24 communicates with the GPS 28 todetermine the global coordinates of the mobile electronic device 24.Cellular tower and/or WI-FI triangulation via the internet may beutilized to determine the location of the mobile electronic device 24.Such triangulation is also well known in the art and will not bedescribed herein in great detail. These methods for determining thelocation of the mobile electronic device 24 may be used individually ormay be used in any combination.

As illustrated in FIG. 1, the exemplary system 20 includes a firstnetwork 32 and a second network 36. The first and second networks 32, 36may be similar types of networks or may be different type of networks.For example, the first network may be the internet and the secondnetwork may be a cellular network. The mobile electronic device 24 maycommunicate with one or both of the first and second networks to sendand receive data. Also, in the illustrated exemplary embodiment, thefirst and second networks may communicate with each other to send andreceive data. Further, the mobile electronic device 24 may utilize acellular network, a WI-FI network, or a wireless local area network(WLAN) such as, for example, first and second networks 32, 36, inaddition to or in lieu of the GPS 28 to determine the global coordinatesof the mobile electronic device 24.

The plurality of servers 40 illustrated in the exemplary system of FIG.1: may be specifically designated for cooperation with the systems,methods, and apparatuses of the present invention; may be utilized in acloud computing type atmosphere; or may cooperate with the systems,methods, and apparatuses of the present invention in any other manner.The illustrated exemplary servers 40 each include a microprocessor 64and a memory 68. While the illustrated exemplary servers 40 are shownonly with a microprocessor 64 and memory 68, it should be understoodthat the servers 40 are capable of having all necessary elements tocarryout the present invention. It should also be understood that thesystems, methods, and apparatuses of the present invention may includeany number of servers, including one, to carryout the present invention.

With further reference to the exemplary system illustrated in FIG. 1, anexemplary database 44 for storage of data is illustrated. Whileexemplary FIG. 1 only illustrates a single database 44, the systems,methods, and apparatuses of the present invention are capable ofincluding any number of databases 44 for storage of data and the one ormore servers 40 are capable of communicating with the one or moredatabases 44 as needed to carryout the present invention. In addition,while the following description and accompanying figures may notspecifically identify communication between the one or more servers 40and the one or more databases 44, communication between the one or moreservers 40 and the one or more databases 44 may occur as needed tocarryout the present invention.

The exemplary verification element 48 illustrated in FIG. 1 may be awide variety of verification elements 48, which will be described ingreater detail below. The mobile electronic device 24 and verificationelement 48 communicate with each other to verify the authenticity of themobile electronic device 24, the location of the consumer, and consumeractivity carried out by the consumer with the mobile electronic device24. In some exemplary embodiments, the verification element 48 may havea finite communication range. Thus, in such exemplary embodiments, themobile electronic device 24 may store or cache its communications andcommunicate with the verification element 48 once it is within thecommunication range of the verification element 48.

With continued reference to FIG. 1, the exemplary POS system 52 may be awide variety of POS systems 52 and POS systems 52 may generally besystems implemented at venues selling products and/or services to tracksales, track consumer activity, perform various tasks associated withcompleting sales transactions, perform calculations using sales figures,accept loyalty cards and/or programs, process payments, provide salesreceipts, and a variety of other tasks. Such POS systems 52 may include,for example, cash registers, auto-checkout devices, more advancednetworked sales programming and devices, or any other programming and/ordevices.

A variety of systems, methods, and apparatuses may be used to verifyauthenticity of consumer activity and provide value to consumers basedon their consumer activity. The following description includes only someof the many systems, methods, and apparatuses capable of verifyingauthenticity of consumer activity and providing value to consumers basedon their consumer activity, and is included for exemplary andillustrative purposes and is not intended to be limiting upon thepresent invention.

Referring now to FIG. 2, a flowchart illustrates an exemplary overviewof providing value to consumers based on their consumer activity,verifying the authenticity of the consumer activity, and redeeming valueaccumulated by a consumer. Initially, a consumer creates or activates anaccount 72. After creating an account, action generation occurs 76,which requires the consumer to perform an activity or take a particularaction. Next, action verification occurs 80, which includes the systemverifying the authenticity of the consumer activity. After actionverification, value redemption occurs 84, which includes the consumerredeeming value obtained as a result of performing the consumeractivity. More details pertaining to each of the above steps will bedescribed below.

It should be understood that the steps provided in the flowcharts ofFIGS. 2-14 are only exemplary and the present invention is capable ofincluding additional or fewer steps than those illustrated in FIGS. 2-14and be within the intended spirit and scope of the present invention. Itshould also be understood that the order of steps illustrated in FIGS.2-14 are only exemplary and the steps may be performed in differentorders relative to each other and be within the intended spirit andscope of the present invention.

With reference to FIG. 3, step 72 of FIG. 2 relating to a consumercreating or activating an account will be addressed in more detail. Thefollowing steps for creating an account are only exemplary stepspresented in an exemplary order, and a variety of other steps, orders,and manners for creating an account are possible and are intended to bewithin the spirit and scope of the present invention. Initially, aconsumer accesses one or more networks with the mobile electronic device88. For example, the consumer may access the internet and/or a cellularnetwork with their mobile electronic device. The mobile electronicdevice retrieves data 92 from one or more servers and/or the databasevia one or more networks. The retrieved data is associated withperforming the present invention. After data retrieval, the mobileelectronic device downloads and stores the data in the memory 96. Themicroprocessor assists with retrieval, downloading, and storage of thedata. Upon completion of the data download, the mobile electronic devicemay send a confirmation 100 to one or more servers via one or morenetworks indicating that the download was successful. Alternatively, theone or more servers may send a confirmation to the mobile electronicdevice via one or more networks to determine if the download wassuccessful. After the necessary data (e.g., operating software, etc.) isdownloaded to the mobile electronic device, the mobile electronic devicemay access one or more networks 104 in order to communicate with andreceive data from the one or more servers and one or more databasespertinent to the present invention. The consumer may enter relevantpersonal information 108 such as, for example, name, age, gender, homeaddress, username, password, referral code, phone number, loyaltyprogram, etc., which is sent to the one or more servers via one or morenetworks and stored in the memory of one or more servers or, in thealternative or in combination, stored in the one or more databases. Thispersonal information may be retrieved at a later time for variousreasons. After submission of the personal information, the systemverifies authenticity of the consumer's information and the consumer'smobile electronic device 112.

The consumer's information and mobile electronic device may beauthenticated in a variety of different manners and at a variety ofdifferent times such as, for example, during account creation, duringlocation declaration, before, during or after consumer activity, duringpurchases, during value redemption, etc. The following exemplaryembodiments of authentication are for illustrative and exemplarypurposes and are not intended to be limiting. Other authenticationembodiments are possible and are intended to be within the spirit andscope of the present invention.

In one exemplary embodiment, verification may be transparent to theconsumer such that verification occurs without their active involvement.In other words, information and device verification occurs in thebackground. For example, upon establishing communication between themobile electronic device and the one or more servers via the one or morenetworks, the one or more servers may communicate with the consumer'smobile electronic device to verify that the device is authentic. Varioustypes of background verifying communication may occur between the one ormore servers and the mobile electronic device. These may includecommunications relying on an active connection to a mobiletelecommunication carrier's network to ensure that the electronic deviceis active, unique, and corresponds with the identifying informationprovided by the user. For example, a push notification or short messageservice (SMS) may be sent to the device 24 using its device token, UDID,telephone number, telephony ID, MAC address, etc. This allowsverification via a unique identifier on the network. It also eliminatesmultiple accounts on a verified device 24 and permits permanent banningof fraudulent accounts. This verification enables banning of aparticular device, which is not feasible on personal computers via theinternet. Personal computers are not tied to their communicationplatform with a unique identifiable number. While a particular IPaddress can be isolated on a network with a personal computer, thepersonal computer itself can be moved to a new network connection or aproxy server to generate a new IP address.

In another exemplary embodiment, upon establishing communication betweenthe mobile electronic device and the one or more servers via one or morenetworks, the one or more servers may send a communication to the mobileelectronic device that is displayed on the mobile electronic device andrequires a response from the consumer. Such communications may include,but are not limited to, emails, short message service (SMS)communications such as text messages, or any other type ofcommunication. In such exemplary embodiments, a challenge activity maybe presented to the consumer and the consumer must respond in aparticular manner in order for the mobile device to be authenticated.For example, the consumer may be required to answer a question, input apasscode, take a picture of himself/herself, take a picture of aparticular item, scan a barcode that may be recorded for futureverification via automated or manual methods, etc. If the consumerresponds properly, then the mobile electronic device is authenticatedand may be used in accordance with the present invention. If theconsumer responds improperly or does not respond, the mobile electronicdevice is not authenticated and may not be used in accordance with thepresent invention until such time that it is authenticated.

In yet another exemplary embodiment, upon establishing communicationbetween the mobile electronic device and the one or more servers via theone or more networks, the one or more servers may send an automatedtelephone call to the mobile electronic device or an individual mayplace a manual call to the mobile electronic device (i.e., if the mobileelectronic device is enabled for telephone communication). The consumeris required to respond to the automated or manual telephone call in aparticular manner in order for the mobile device to be authenticated.For example, the consumer may be required to answer a question, provideadditional information, enter a code, etc. If the consumer provides aproper response, then the mobile electronic device is authenticated andmay be used in accordance with the present invention. If the consumerprovides an improper response or the telephone call is not answered, themobile electronic device is not authenticated and may not be used inaccordance with the present invention until such time that it isauthenticated.

In a further exemplary embodiment, the consumer may be near averification element 48 and the verification element 48 may authenticatethe consumer's information and mobile electronic device as an authenticdevice. For example, the verification element may verify that the mobileelectronic device is at a certain location through the use of modulatingunpredictable communications or codes (described in more detail below).By this method, individuals cannot predict the verification element'scurrent communication or code and misreport their presence. The mobileelectronic device will receive, process, and transmit the securitizedcommunication or code from the verification element to the one or moreservers via the one or more networks. The one or more servers willcompare the transmitted securitized communication or code, the location,and time transmitted to the expected code in order to verify the mobileelectronic device's presence.

Referring now to FIG. 4, step 76 of FIG. 2 relating to action generationwill be addressed in more detail. As indicated above, action generationrequires a consumer to perform an activity or take a particular action.The following steps for action generation are only exemplary stepspresented in an exemplary order, and a variety of other steps, orders,and manners for action generation are possible and are intended to bewithin the spirit and scope of the present invention. Initially, aconsumer may log into the system 116. This can occur automatically or aconsumer may input a password or passcode, which is sent via one or morenetworks to one or more servers to indicate that the consumer is readyto initiate consumer activity. Next, the location of the consumer isidentified 120 by identifying the location of the consumer's mobileelectronic device. The location of the consumer's mobile electronicdevice may be identified in a variety of manners. In one exemplaryembodiment, the GPS system may communicate with the mobile electronicdevice to identify its location and, subsequently, the location of themobile electronic device is sent to one or more servers via one or morenetworks. In another exemplary embodiment, a cellular network or a WI-FIsignal is capable of identifying the mobile electronic device's locationand the identified location is sent to one or more servers via thecellular network and/or the internet. In still another exemplaryembodiment, one of the location verification methods may be coupled witha product scan to verify the location of the mobile electronic device.In yet another exemplary embodiment, the location of the mobileelectronic device may be identified by a verification element located inthe vicinity of the mobile electronic device.

The verification element 48 may be a wide variety of differentverification elements and the following examples of verificationelements are not intended to be limiting. The system is capable ofincluding other verification elements and such other verificationelements are intended to be within the spirit and scope of the presentinvention.

Referring now to FIG. 15, an exemplary verification element 48 isillustrated. This exemplary verification element 48 is powered by apower supply 137 such as, for example, an alternating current (AC) powersupply, and communicates with at least one network such as, for example,the internet. The verification element includes memory 138, anintegrated circuit 139, a timing device 141, a broadcast element 142, anadjustable output strength device 143, a user interface 145, and asecondary power supply 146. In this exemplary illustrated embodiment, alarge quantity of codes may be communicated to the verification elementfrom one or more servers via the at least one network and stored in theverification element's memory. Such a conveyance of codes from the oneor more servers to the verification element may occur a single time, inwhich case all the necessary codes would be communicated to theverification element in the single transfer of codes, or the one or moreservers may periodically communicate codes to the verification elementvia the at least one network as desired.

The integrated circuit cooperates with the timing device, such as aclock, to retrieve codes from the memory at appropriate times andcommunicates the retrieved codes to the broadcast element forinteraction with a user and his/her mobile electronic device. Theintegrated circuit retrieves and broadcasts codes in a manner that isunpredictable to users, but is understood by the one or more serverssuch that when the user's mobile electronic device communicatesverifying data to the one or more servers via the one or more networks,the one or more servers recognizes the verifying data and verifies theauthenticity of the user's mobile electronic device.

The integrated circuit may retrieve codes from memory and communicatethe codes to the broadcast element in any time increment and be withinthe intended spirit and scope of the present invention. For example, theintegrated circuit may retrieve a new code from memory and communicatethe new code to the broadcast element every 10 minutes, 30 minutes,hour, day, week, month, or any other period of time. Continuallymodulating verification codes inhibits fraudulent activity.

Instances may arise where the main power supply is not available for theverification element. The on-board secondary power supply may providesufficient power to the verification element in order to maintain adesired level of operability. In some exemplary embodiments, thesecondary power source may power the verification element in a mannerthat facilitates complete operability of the verification element. Inother exemplary embodiments, the secondary power source may only powerthe timing device to ensure that the timing device continues to run andkeep accurate time in instances where the main power supply is notavailable.

It should be understood that broadcasting a unique code is only one ofthe many manners of communication between the verification element and amobile electronic device. Many other types of unique and securecommunication may occur between the verification element and a mobileelectronic device and be within the spirit and scope of the presentinvention. For example, other types of unique and secure communicationbetween the verification element and a mobile electronic device includevisual images, sonic communications through in-audible high frequencysound, changing WIFI identification such as, for example, MAC address,through IP based communication, RFID or NFC, etc.

The verification element may be located in a wide variety of venueshaving a wide range of spaces. It may be desirable to have theverification element broadcast codes in an area complementary to thearea of the venue in which the verification element is positioned. A bigbox store may have a large retail space footprint, while a smallconvenience store may have a small retail space footprint. It may not bedesirable to have the broadcast element output a signal of similarstrengths for the big box retail store and the small convenience store.Thus, the verification element may include an adjustable output strengthdevice for adjusting the output strength of the signal broadcast by thebroadcast element. The adjustable output strength device may beappropriately adjusted so that the verification element broadcast astronger signal for a big box store and a weaker signal for a smallconvenience store, thereby coordinating the strength of the broadcastsignal with the environment in which the verification element islocated. The adjustable output strength device may be adjustable in avariety of manners such as, for example, manually via a user interface,automatically with the integrated circuit, through the network from alocation other than the venue in which the verification element islocated, or any of a variety of other manners, all of which are intendedto be within the intended spirit and scope of the present invention.

Referring now to FIG. 16, another exemplary verification element 48 isillustrated. This exemplary verification element 48 is powered by apower supply 137 such as, for example, an alternating current (AC) powersupply, and includes an integrated circuit 139, a unique identifier 147,an encryption key 149, a timing device 141, a broadcast element 142, anadjustable output strength device 143, a user interface 145, and asecondary power supply 146.

In this exemplary illustrated embodiment, the integrated circuitcooperates with the unique identifier, the encryption key, and thetiming device to generate unpredictable codes, apply an encryption tothe codes, and communicate the codes to the broadcast element forinteraction with a user and his/her mobile electronic device. Theintegrated circuit retrieves, encrypts, and broadcasts codes in a mannerthat is unpredictable to users, but the broadcast codes will matchunpredictable codes derived by one or more servers utilizing a similarprocess and algorithm such that when the user's mobile electronic devicecommunicates verifying data to the one or more servers via the one ormore networks, the one or more servers recognizes the verifying data andverifies the authenticity of the user's mobile electronic device.

Each verification element has a unique identifier and encryption keywhich are never broadcast. The integrated circuit transforms the uniqueidentifier using the encryption key and the precise time to regularlymodulate unpredictable codes. Since it is not possible for someonereceiving the unpredictable code to determine the original uniqueidentifier and encryption key, all codes remain unpredictable except tothe servers that can generate its own matching codes because they havethe unique identifier, encryption key, and current time. Periodically,the server may compare the received unpredictable code to its expectedand internally generated unpredictable code at a particular date andtime. If the code does not match exactly for the particular time, butmatches another expected code in a designated window before or after,the server may incorporate a time offset to sync the verificationelement's clock with its own. For example, the timing device of theverification element may not be in sync with the timing device of theone or more servers (e.g., the timing devices may be off a few seconds,minutes, hours, etc). Thus, the code generated by the verificationelement and communicated by the user's mobile electronic device may notmatch the code generated by the one or more servers. This syncingcapability accommodates such inconsistent codes and may stillauthenticate the code sent by the user's mobile electronic device,thereby ultimately authenticating the user's mobile electronic device.

The integrated circuit may retrieve, encrypt, and communicate codes tothe broadcast element in any time increment and be within the intendedspirit and scope of the present invention. For example, the integratedcircuit may retrieve, encrypt, and communicate a new code to thebroadcast element every 10 minutes, 30 minutes, hour, day, week, month,or any other period of time. Continually modulating verification codesinhibits fraudulent activity.

Instances may arise where the main power supply is not available for theverification element. The on-board secondary power supply may providesufficient power to the verification element in order to maintain adesired level of operability. In some exemplary embodiments, thesecondary power source may power the verification element in a mannerthat facilitates complete operability of the verification element. Inother exemplary embodiments, the secondary power source may only powerthe timing device to ensure that the timing device continues to run andkeep accurate time in instances where the main power supply is notavailable.

Similarly to the exemplary verification element illustrated in FIG. 15,the exemplary verification element illustrated in FIG. 16 may be locatedin a wide variety of venues having a wide range of spaces. The exemplaryverification element illustrated in FIG. 16 includes all the samestructure and operability as the exemplary verification elementillustrated in FIG. 15 in order to adjust the broadcast strength of thebroadcast element. Thus, for the sake of brevity, such structure andoperability will not be repeated herein. Rather, reference is made tothe description above pertaining to the exemplary verification elementillustrated in FIG. 15.

The broadcast element described herein and illustrated in FIGS. 15 and16 may be a variety of different types of elements for broadcasting themodulating unpredictable codes. For example, the broadcast element maybe a WI-FI, WLAN, or other antenna enabled device for broadcasting asignal, a sonic device, or an electronic display or monitor.

The following is an example of a WI-FI, WLAN, or antenna enabledbroadcasting device. A periodically modulating SSID verification elementmay be a wireless router type of device capable of automaticallychanging its wireless network name (service set identifier, SSID, etc.)or MAC address, which can be picked up and transmitted via a WI-FI,WLAN, or other antenna equipped electronic device to one or moreservers. These strings may correspond to a code periodically andsecurely sent to the verification element over one or more networks suchas, for example, the internet. Alternatively, without need for a networkor internet connection, these strings may be a non-predictable code thatis independently algorithmically generated both at the one or moreservers and the verification element from a fixed code and encryptionkey, corresponding to the electronic mobile device, and one or moredynamic variables, based on the current time. The one or more serverscompare the non-predictable code to the code sent from the electronicmobile device to verify if the electronic mobile device is near aparticular verification element at a given time. Alternatively, theverification element and one or more servers may have a preset scheduleof codes unique to each particular verification element at a given time.This signal can be transmitted by the electronic mobile device to one ormore servers for verification. The modulating SSID verification elementmay also include a method to calibrate the intensity of signaltransmission so that the range of the verification element may beadjusted to fit the eligible parameters of the venue. This modulatingSSID verification element may take the form of a wireless router withthe notable exception that it does not need to be connected to theinternet as it only needs to broadcast its identifying information viaSSID and/or MAC address to the electronic mobile device. The modulatingSSID verification element may include an internal clock, battery, andpreset unique codes. The modulating SSID verification element may alsoinclude a method to calibrate the intensity of signal transmission sothat the range of the device may be adjusted to fit the eligibleparameters of the venue. By way of example, a large store with theverification element in the middle of the store might have the signalintensity set to a maximum. A small store or one with the verificationelement placed near an entryway might have the transmission intensityset to a minimum.

The following is an example of a sonic broadcasting device. Aperiodically modulating high frequency sonic verification element is adevice capable of generating ultrasound outside of human hearing atparticular pitches in particular patterns. These patterns correspond toa code that can be modulated automatically as described below. Thisauditory signal can be picked up via microphone on a mobile electronicdevice and transmitted to one or more servers for verification via oneor more networks. The sonic verification element may also include amethod to calibrate the intensity of signal transmission so that therange of the verification element may be adjusted to fit the intendedeligible parameters of the venue. By way of example, a large store withthe verification element in the middle of the store might have thesignal intensity set to a maximum. A small store or one with theverification element placed near an entryway might have the transmissionintensity set to a minimum.

The following is an example of the broadcasting device comprising anelectronic display or monitor. A periodically modulating barcodeproducing verification element may include a display that displays aperiodically changing barcode. This barcode may be a one dimensionalbarcode, a QR code, a two dimensional barcode, a universal product code(UPC), etc. The consumer may scan the displayed barcode with the mobileelectronic device's on-board camera and the mobile electronic device maysend the captured scan to one or more servers via one or more networksfor identification. The system will be able to verify the location ofthe mobile electronic device based on the scanned barcode. It should beunderstood that the periodically changing barcode may be modulated atany desired increment. It should also be understood that the barcode mayinstead be other images and such other images may be modulated at anydesired increment.

As used herein, the term “scan” may be interpreted to include any typeof scanning technology for scanning any type of image and/or may beinterpreted to be any type of digital imaging such as, for example, adigital picture taken with a digital camera. In addition, a “scan” maybe, among other things, an image captured with a user electronic deviceand may include a digital picture of the image as well as the decodedstring of data from the image. Further, a “scan” may be any image or anydata captured by a user electronic device.

Modulating codes transmitted by verification elements protect againstfraudulent reproduction of their signal to gain undeserved value. Suchverification elements are modulated in a manner so that the one or moreservers can match a particular code from a particular verificationelement at a particular time, while other people cannot predict thatcode. Several methods exist to synchronize these codes and such methodsare unpredictable so that fraudulent value is not obtained. Thesestrings may correspond to a code periodically and securely sent to theverification element over one or more networks such as, for example, theinternet. Alternatively, without need for an internet connection, thesestrings may be a non-predictable code that are independentlyalgorithmically generated both at the one or more servers and theverification element from a fixed code, corresponding to the electronicmobile device, and one or more dynamic variables, based on the currenttime. The one or more servers compare its non-predictable code to thecode sent from the electronic mobile device to verify if the electronicmobile device is near a particular verification element at a given time.Alternatively, the verification element and one or more servers may havea preset schedule of codes unique to each particular verificationelement at a given time. These methods may require a clock, batterypower supply for the clock, active or passive storage for underlyingcode, list of codes, and/or algorithm for generating codes. In addition,a method for calibrating the one or more servers and the timing devicemay need to occur. This code will be transmitted by the mobileelectronic device to one or more servers for verification via one ormore networks.

Once the system identifies the location of the consumer, the mobileelectronic device may display the action opportunities 124 near thelocation of the consumer. For example, if the consumer is near a grocerystore, one of the displayed action opportunities may relate toperforming an action associated with the grocery store. Once the actionopportunities are displayed on the mobile electronic device, theconsumer selects one or more of the action opportunities 128. Next, theconsumer satisfactorily performs the action(s) associated with theselected action opportunity(ies) 132. Satisfactorily performing actionsassociated with action opportunities will be described in more detailbelow. Upon satisfactory performance of the action, the consumerreceives value 136. Such value may be a wide variety of different typesof value including, but not limited to, advertising, redeemable/rewardpoints, coupons, special offers, gift certificates, money, consumergoods, charitable contributions, sweepstakes entries, airline miles,features in an App, product review information, storing grocery list,sweepstakes, or anything else of value.

Exemplary consumer activity relating to FIG. 4 will be described hereinfor illustrative purposes and is not intended to be limiting upon thepresent invention. For example, a consumer may be in a particular cityand may activate/log into the system. The system will identify theconsumer's location in the particular city and display numerous actionopportunities on the consumer's mobile electronic device. A fewexemplary action opportunities may include a nearby restaurant, a coffeeshop, a grocery store, a convenience mart, etc, and a map, directions,and/or a distance from the action opportunities may also be displayed onthe mobile electronic device. As an example, the consumer may choose togo to the nearby grocery store. One or more particular actions such as,for example, checking into a grocery store, scanning a particularproduct, etc., may be associated with the chosen grocery store. If theconsumer satisfactorily performs the one or more actions, the consumerwill receive value such as, for example, points, coupons, giftcertificates, money, consumer goods, charitable contributions, any ofthe other types of value disclosed herein, or anything else of value.

A variety of different types of actions may be generated and suchactions may have different requirements for performing and/or completingthe actions satisfactorily. The following paragraphs relating to FIGS.5-9 describe a few exemplary actions generated and a few exemplarymanners of satisfactorily performing the exemplary actions. Thefollowing exemplary actions and manners of satisfactorily performing theactions are for exemplary and illustrative purposes and are not intendedto be limiting. A wide variety of other actions and manners ofsatisfactorily performing the actions are possible and are intended tobe within the spirit and scope of the present invention.

Referring now to FIG. 5, an exemplary manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail. After aconsumer selects an action (see step 128 in FIG. 4), a consumer isprompted via the display 140 on the mobile electronic device if he/shewishes to perform the action 144. If the consumer does not wish toperform the action, the consumer does not receive any value 148. If theconsumer wishes to perform the action, the consumer initiates the action152 and completes the action 156. Upon completion of the action, thesystem determines if the action was completed successfully 160. If theconsumer does not complete the action satisfactorily, the consumer doesnot receive value 164. If the consumer completes the actionsatisfactorily, the consumer receives value 168. Step 168 in FIG. 5pertaining to the consumer receiving value may correspond to step 136 inFIG. 4 of the consumer receiving value.

Exemplary consumer activity relating to FIG. 5 will be described hereinfor illustrative purposes and is not intended to be limiting upon thepresent invention. In some instances, a consumer may be asked if theywould like to perform a particular action such as, for example, go to agrocery store and scan a particular item. If the consumer does not wantto go to the grocery store, then the consumer will not receive value. Ifthe consumer does wish to go to the grocery store and scan theparticular item, the consumer travels to the grocery store and scans theparticular item. Then, the system determines if the consumer went to thegrocery store and scanned the item. If the consumer did not go to thegrocery store or did not scan the particular item, the consumer will notreceive value. If the consumer does travel to the grocery store andscans the particular item, the consumer will receive value.

Referring now to FIG. 6, another exemplary manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail. In someinstances, the selected action does not require a significant investmentof time and effort by the consumer. FIG. 6 illustrates such an instance.In this exemplary instance, the consumer is not required to perform anyadditional activity 172 after selection of the action in order toreceive value 176. In other words, the consumer may automaticallyreceive value associated with certain actions. In some exemplaryembodiments, authentication of the electronic mobile device may occurprior to receipt of value. The mobile electronic device may beauthenticated in any of the authentication or verification mannersdescribed herein or any other possible manner. After authentication, theconsumer receives value 176. Step 176 in FIG. 6 pertaining to theconsumer receiving value may correspond to step 136 in FIG. 4 of theconsumer receiving value.

Exemplary consumer activity relating to FIG. 6 will be described hereinfor illustrative purposes and is not intended to be limiting upon thepresent invention. An exemplary instance where a consumer may receivevalue for performing no additional activity may include activating anaccount. After activating an account, the consumer may receive valuewithout performing any action.

Referring now to FIG. 7, yet another exemplary manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail.Similarly to FIG. 6, FIG. 7 illustrates one of many possible exemplaryinstances where the selected action does not require a significantinvestment of time and effort by the consumer. However, as illustratedin FIG. 7, some instances requiring little activity by the consumer mayinclude activity in the background possibly without explicit consumeraction in order for the consumer to receive value. For example, in FIG.7, the system may desire to confirm the consumer's location 180 prior tothe consumer receiving value 184. The system identifies the consumer'slocation by identifying the location of the consumer's mobile electronicdevice. The location of the consumer's mobile electronic device may beidentified in any of the variety of manners described herein or anyother possible manner. After the consumer's location is identified, theconsumer receives value 184. Step 184 in FIG. 7 pertaining to theconsumer receiving value may correspond to step 136 in FIG. 4 of theconsumer receiving value.

Exemplary consumer activity relating to FIG. 7 will be described hereinfor illustrative purposes and is not intended to be limiting upon thepresent invention. An exemplary action may require a consumer to“check-in” at a particular venue such as, for example, a grocery store.All the consumer needs to do to receive value is travel to the grocerystore. The system will identify that the consumer is at the grocerystore by identifying the location of the consumer's mobile electronicdevice. Upon arrival of the consumer at the grocery store, the consumerwill receive value automatically (i.e., without actively performing asignificant quantity of other steps or actions).

Referring now to FIG. 8, still another exemplary manner ofsatisfactorily performing a selected action, which is generallyrepresented as step 132 in FIG. 4, is illustrated and will be describedin more detail. After the consumer selects an action (see step 128 inFIG. 4), the system displays the instructions on the display of themobile electronic device 188 that are required for satisfactorilyperforming the action. Next, the consumer performs an action 192 and thesystem determines if the instructions were followed 196 when theconsumer performed the action. If the consumer performed an action inaccordance with the displayed instructions, the consumer receives value200. If the consumer performs an action that does not follow thedisplayed instructions, the consumer does not receive value 204. Step200 in FIG. 8 pertaining to the consumer receiving value may correspondto the step 136 in FIG. 4 of the consumer receiving value.

Exemplary consumer activity relating to FIG. 8 will be described hereinfor illustrative purposes and is not intended to be limiting upon thepresent invention. An exemplary action pertaining to FIG. 8 may includedisplaying instructions on a consumer's mobile electronic device thatinstruct the consumer to travel to a particular venue such as, forexample, a grocery store, and perform particular activities at thegrocery store. For example, the instructions may instruct the consumerto go to the store, find a particular brand of cereal, and purchase thecereal. In response to the instructions, the consumer performs an actionor actions. The system then determines if the consumer satisfactorilyfollowed the instructions with his/her action(s). If the consumer didnot satisfactorily follow the instructions, the consumer does notreceive value. If the consumer satisfactorily follows the instructions,the consumer receives value.

Other exemplary consumer activities that may relate to FIG. 8 include,but are not limited to, displaying instructions for downloading aparticular application and downloading the particular application toreceive value, displaying instructions to complete a survey andresponding to the survey to receive value, displaying instructions forpublicizing actions or messages to one or more social networks andpublicizing actions or messages to the one or more social networks toreceive value, displaying instructions to enter a promotional code andentering a promotional code to receive value, etc.

Referring now to FIG. 9, a further exemplary manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail. Afterthe consumer selects an action (see step 128 in FIG. 4), the system maydisplay a plurality of secondary action opportunities associated withthe selected action 208. The consumer then selects one of the secondaryaction opportunities 212. In the illustrated exemplary embodiment, afterthe consumer selects the secondary action opportunity, the camera on themobile electronic device activates 216. After activation of the camera,the consumer takes a picture or scans an item or a portion of the item,such as, for example, a barcode, associated with the selected secondaryaction opportunity 220. The consumer then receives value 224. Step 224in FIG. 9 pertaining to the consumer receiving value may correspond tothe step 136 in FIG. 4 of the consumer receiving value.

Exemplary consumer activity relating to FIG. 9 will be described hereinfor illustrative purposes and is not intended to be limiting upon thepresent invention. For example, a consumer may be at a convenience storeand one or more action opportunities associated with the conveniencestore may be displayed on the consumer's mobile electronic device. Onesuch displayed action opportunity may include, for example, finding aparticular brand of potato chips, scanning the bag of potato chips, andreceiving value for scanning the bag of potato chips.

As indicated above, a variety of different actions and valueopportunities exist beyond the exemplary actions and value opportunitiesdescribed herein. Another exemplary action and value opportunityincludes receiving value for referring another user to the system.Referral actions and value receipt for the referral actions may beachieved in a variety of different manners. For example, a current usermay provide a referral code to a new prospective user and, uponregistration of the new user, the new user enters the referral code andthe current or first user receives value. Also, for example, a currentuser may provide a registration link to a new prospective user and thenew prospective user may follow the registration link to ultimatelyregister as a new user. If the new user follows the link and becomes anew registered user, the current or first user receives value.

Unfortunately, in instances where consumers receive any type of value,there will be those people who perform fraudulent activity in order todeceive the system and receive value to which they are not entitled.Thus, the present invention includes numerous systems, methods, andapparatuses to provide an audit trail of actions, verify authenticconsumer activity, provide value for such authentic activity, and alsoidentify fraudulent activity and withhold value for such fraudulentactivity. The following examples of verifying authentic activity areprovided for exemplary and illustrative purposes and are not intended tobe limiting. In addition, the following examples are only some of themany possible manners of verifying authentic activity, all of which areintended to be within the intended spirit and scope of the presentinvention.

With reference to FIG. 10, an exemplary manner of verifying authenticactivity, which is generally represented as step 80 in FIG. 2, isillustrated. The following steps for action verification are onlyexemplary steps presented in an exemplary order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the present invention. Inthis exemplary embodiment, the system verifies authentic activity aftera consumer satisfactorily performs an action 228 (also see step 136 inFIG. 4). As a consumer satisfactorily performs an action, the systemidentifies the consumer's location 232 by identifying the location ofthe consumer's mobile electronic device. The location of the consumer'smobile electronic device may be identified in any of the mannersdescribed herein or any other possible manner. The identified locationof the mobile electronic device is sent to one or more servers via oneor more networks 236. The one or more servers determine if the locationof the mobile electronic device corresponds to the selected action 240.One example where the location of the mobile electronic device maycorrespond to the selected action is if the selected action relates to aconsumer venue and the mobile electronic device is identified to be inor near the particular consumer venue. If the location of the mobileelectronic device does not correspond to the selected action, theconsumer does not receive value 244. If the location of the mobileelectronic device corresponds to the selected action, the consumerreceives value 248. Step 248 in FIG. 10 pertaining to the consumerreceiving value may correspond to the step 136 in FIG. 4 of the consumerreceiving value.

Exemplary verification of consumer activity as it relates to FIG. 10will be described herein for illustrative purposes and is not intendedto be limiting upon the present invention. For example, if a consumersatisfactorily performs an action such as, for example, scanning orpurchasing a particular brand of ice cream at a grocery store, thesystem determines the consumer's location to ensure that the consumer isactually at the grocery store. If the consumer is not at the grocerystore corresponding to the ice cream just scanned or purchased, then theconsumer does not receive value. If the consumer is located at thegrocery store where the ice cream was just scanned or purchased, thenthe consumer receives value. This type of verification may be used toverify scans or purchases originating at the actual location. Mobileelectronic devices may be fraudulently manipulated to create fraudulentscans or purchases in an effort to receive undeserved value. Suchfraudulent scans or purchases may be generated from a location otherthan at the actual location (e.g., grocery store). The presentverification activity will identify that the mobile electronic device isnot at the actual location (e.g., grocery store) and will know that thescan or purchase is fraudulent.

As indicated above, the examples provided herein for verifying authenticactivity are only exemplary and many other examples of verifyingauthentic activity are intended to be within the spirit and scope of thepresent invention. For example, the steps provided in the exampleillustrated in FIG. 10 may be performed in a different order. One suchexample is illustrated in FIG. 10A.

In the illustrated exemplary embodiment of FIG. 10A, another exemplarymanner of verifying authentic activity, which is generally representedas step 80 in FIG. 2, is illustrated. The following steps for actionverification are only exemplary steps presented in an exemplary order,and a variety of other steps, orders, and manners for actionverification are possible and are intended to be within the spirit andscope of the present invention. In this exemplary embodiment, the systemverifies authentic activity by identifying the consumer's location 232Aby identifying the location of the consumer's mobile electronic device.The location of the consumer's mobile electronic device may beidentified in any of the manners described herein or any other possiblemanner. The identified location of the mobile electronic device is sentto one or more servers via one or more networks 236A. The one or moreservers determine if the location of the mobile electronic devicecorresponds to the selected action 240A. One example where the locationof the mobile electronic device may correspond to the selected action isif the selected action relates to a consumer venue and the mobileelectronic device is identified to be in or near the particular consumervenue. If the location of the mobile electronic device does notcorrespond to the selected action, the consumer does not receive value244A. If the location of the mobile electronic device corresponds to theselected action, a consumer may satisfactorily perform an action 228A(also see step 136 in FIG. 4). As a consumer satisfactorily performs anaction, the consumer receives value 248A. Step 248A in FIG. 10Apertaining to the consumer receiving value may correspond to the step136 in FIG. 4 of the consumer receiving value.

Exemplary verification of consumer activity as it relates to FIG. 10Awill be described herein for illustrative purposes and is not intendedto be limiting upon the present invention. The present example willutilize a grocery store environment. For example, the system determinesthe consumer's location to ensure that the consumer is actually at thegrocery store. If the consumer is not at the grocery store correspondingto a particular brand of ice cream that is associated with the action,then the consumer does not receive value. If the consumer is located atthe grocery store where the ice cream associated with the action islocated, then the consumer needs to satisfactorily perform the actionassociated with the ice cream which may include, for example, scanningor purchasing the particular brand of ice cream at a grocery store. Ifthe consumer satisfactorily scans or purchases the ice cream, theconsumer receives value. This type of verification may be used to verifyscans or purchases originating at the actual location. Mobile electronicdevices may be fraudulently manipulated to create fraudulent scans orpurchases in an effort to receive undeserved value. Such fraudulentscans or purchases may be generated from a location other than at theactual location (e.g., grocery store). The present verification activitywill identify that the mobile electronic device is not at the actuallocation (e.g., grocery store) and will know that the scan or purchaseis fraudulent.

With reference to FIG. 11, another exemplary manner of verifyingauthentic activity, which is generally represented as step 80 in FIG. 2,is illustrated. The following steps for action verification are onlyexemplary steps presented in an exemplary order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the present invention. Inthis exemplary embodiment, the system verifies authentic activity aftera consumer satisfactorily performs an action 252 (also see step 132 inFIG. 4). After a consumer satisfactorily performs an action, the systemidentifies the consumer's location 256 by identifying the location ofthe consumer's mobile electronic device. The location of the consumer'smobile electronic device may be identified in any of the mannersdescribed herein or any other possible manner. The identified locationof the mobile electronic device is sent to one or more servers via oneor more networks 260. The one or more servers determine if the locationof the mobile electronic device corresponds to the selected action 264.One example where the location of the mobile electronic device maycorrespond to the selected action is if the selected action relates to aconsumer venue and the mobile electronic device is identified to be inor near the particular consumer venue. If the location of the mobileelectronic device does not correspond to the selected action, theconsumer does not receive value 268. If the location of the mobileelectronic device corresponds to the selected action, the consumer maybe required to purchase a product corresponding to the selected action272. One example where a purchased product corresponds to a selectedaction may occur in a consumer venue such as a grocery store. In such anexample, the selected action may relate to a particular product in thegrocery store and the consumer must purchase the particular product fromthe grocery store in order to eventually receive value.

With continued reference to FIG. 11, a consumer travels to a secondlocation 276 such as, for example, the consumer's home, after purchasingthe product. At the second location, the consumer takes a picture orscans the purchased product 280. For this example, the consumer'spicture or scan at the second location may be a second picture or scanof the product. As part of satisfactorily performing an action (see step252 and step 132 in FIG. 4), the consumer may have been required to takea first picture or scan of the product (see step 220 in FIG. 9). Thus,the picture or scan of the product occurring at step 280 in FIG. 11 maybe a second picture or scan of the product. After the second picture orscan occurs, the system may determine if the second picture or scanoccurred within a designated time limit 284. The time limit may be anyquantity of time and be within the intended spirit and scope of thepresent invention. Exemplary time limits may include, but are notlimited to, 30 minutes, 1 hour, 2 hours, etc. If the second picture orscan does not occur within the time limit, the consumer may not receivevalue 288. If the second picture or scan occurs within the time limit,the mobile electronic device sends the second picture/scan to the one ormore servers via one or more networks 292. The one or more servers thendetermine if the second picture/scan is taken of the same product fromwhich the first picture or scan was taken 296. If the secondpicture/scan is not of the same product, then the consumer does notreceive value 300. If the second picture/scan is of the same product,then the system identifies the location of the mobile electronic deviceat the second location 304. The location of the mobile electronic devicemay be determined in any of the manners described herein or any othermanners and be within the intended spirit and scope of the presentinvention. An additional exemplary manner of determining the secondlocation of the mobile electronic device may include a secondverification element at the second location. The second verificationelement can identify the second location of the electronic mobile devicein similar manners to that described herein in connection with the firstverification element. Continuing, the system then determines if thelocation of the mobile electronic device at the second location is thesame as the predetermined designated location 308. As indicated above,for example, the designated location could be the consumer's home. Auser's home may be verified in a variety of manners including, forexample, from information provided by the user upon account activation,professional or certified installation of the second verificationelement discussed above, credit card billing address, US mailingaddress, frequently visited GPS coordinates, or any other manner. If thesecond location of the mobile electronic device is at the designatedlocation, then the consumer receives value 312. If the second locationof the mobile electronic device is not at the designated location, theconsumer does not receive value 316. Step 312 in FIG. 11 pertaining tothe consumer receiving value may correspond to the step 136 in FIG. 4 ofthe consumer receiving value.

It may also be desirable to verify the authenticity of the scan taken bythe camera of the mobile electronic device. Fraudulent scans may be anartificially generated barcode, picture of a product barcode instead ofthe actual barcode on the product, or other fraudulent mannersattempting to receive undeserved value from fraudulent activity.Authenticity of the scan may be verified in a variety of differentmanners. The following exemplary embodiments are provided forillustrative and exemplary purposes, and are not intended to belimiting. Other exemplary embodiments of authenticating scans taken by amobile electronic device are possible and are intended to be within thespirit and scope of the present invention.

With respect to the exemplary embodiment illustrated in FIG. 11,multiple scans may require authentication. It should be understood thatthe verification of the authenticity of scans of the present inventionmay be performed in connection with any scan taken with a camera of amobile electronic device. However, for illustrative and exemplarypurposes, the following exemplary embodiments of scan verificationrelate to the exemplary embodiment illustrated in FIG. 11.

In one exemplary embodiment, the authenticity of a scan may be performedmanually. In such an embodiment, step 292, as well as any other scanningor picture taking step, may be replaced or followed by a step of anindividual visually inspecting the second scan. If the individualbelieves the second scan is authentic, the individual will thendetermine if the second scan is taken of the same product from which thefirst scan is taken. This manual determination occurs at query step 296in FIG. 11. After this manual verification at step 296, the processcontinues as illustrated in FIG. 11. Alternatively, manual verificationmay occur after value is credited or it may occur at certain valuethresholds to target certain behavioral patters of users.

In another exemplary embodiment, the authenticity of a scan may beperformed automatically by a computer system without manual interaction.For example, such a computer system may include network, servers,storage media with databases of scanned pictures, CPU, memory, temporarydrive or memory for performing image comparisons. In such an exemplaryembodiment, step 292, as well as any other scanning or picture takingstep, may be replaced by or followed by a step of automated imageduplication detection. This detection discovers if one or more users aresubmitting similar scans of a picture of a product or a generatedbarcode rather than an actual product barcode. Methods of verifyingauthenticity include ensuring uniqueness by comparing the entire imageto scans of the same product submitted by the same and/or other users todetecting identical shading and lighting (this will occur if a user isscanning the same photograph of a barcode that he or another usersubmitted). Uniqueness may also be confirmed by comparing scans of thesame product submitted by the same and/or other users by examiningportions of the image in the background outside of the barcode. Thismethod will detect if multiple scans of the same photograph of a barcodeare submitted. To increase the possibility that portions of thebackground are included in the image taken by the camera of the mobileelectronic device, the display or screen of the mobile electronic deviceseen by the consumer shows less than the full image that will becaptured by the camera when the camera takes the image. For example, theimage displayed on the screen of the mobile electronic device will besmaller than the actual size of the image captured by the camera. Thatway, the consumer will be unaware that more image will be captured thenhe/she expects. Yet another method for verifying the authenticity of ascan may include comparing the scan to one or more known verifiedversions of the product. This will confirm that the barcode is notartificially generated via a fraudulent method such as reproducing abarcode via a printer, electronic monitor, etc. Since the scans of trueproducts will appear similar because packages are the same, artificiallycreated barcodes will not match the actual product. Artificially createdbarcodes may be of the wrong color, and/or include pixilation, may notinclude background images from packaging, etc. Thus, this method willfind scans that are not of the actual product. Using these methods ofverifying similarity to actual products and/or dissimilarity topreviously submitted scans, automated methods can rate the fraudulentlikelihood of a given scan. To make an actual comparison, the one ormore servers may divide up an image into a set of many smaller imagesand compare similarity of the entire image, a subset of only the barcodeportion, or a subset excluding the barcode portion.

Exemplary verification of consumer activity as it relates to FIG. 11will be described herein for illustrative purposes and is not intendedto be limiting upon the present invention. For example, a consumer mayhave an action involving traveling to a grocery store and purchasing aparticular brand of shampoo. By traveling to the grocery store andpurchasing the shampoo, the consumer satisfactorily performs the action.Next, the system determines if the consumer is actually at the grocerystore and has purchased the shampoo. Verification of the consumer'slocation is performed to determine that the consumer is at the grocerystore and the consumer may scan the particular shampoo to confirm aninteraction and begin confirming purchase of the shampoo. If theconsumer is not at the grocery store or has not scanned the particularshampoo, the consumer does not receive value. After purchasing theparticular shampoo, the consumer travels to a designated second locationsuch as, for example, his/her home, to unload the shampoo along with anyother purchased products. In some instances, it may be desirable todisqualify particular locations as appropriate designated secondlocation. For example, the system may disqualify locations within aparticular radius of the venue from which the product was purchased ormay disqualify locations within a particular radius of venues offeringthe same product. Returning to the illustrated exemplary embodiment, theconsumer may take a second scan of the shampoo at the designated secondlocation. If the consumer does not take the second scan within aparticular time limit such as, for example, 1 hour, the consumer doesnot receive value. If the consumer performs the second scan within 1hour, the mobile electronic device sends the second scan of the shampooto one or more servers. The system determines if the second scan of theshampoo is of the same bottle of shampoo from which the first scan wastaken. If the scans are not of the same bottle of shampoo, the consumerdoes not receive value. If the scans are of the same bottle of shampoo,the location of the consumer is determined by determining the locationof the consumer's mobile electronic device. If the consumer is in factat his/her designated second location, the consumer receives value. Ifthe consumer is not at his/her designated second location, the consumerdoes not receive value. If the designated second location is a user'shome, verification of the user's home may occur by comparison with acredit card address, US mail address, a post card send to the user'shome, any other home and address verification manner described herein,or other types of home and address verification manners not explicitlydisclosed herein, but intended to be within the intended spirit andscope of the present invention.

As indicated above, the examples provided herein for verifying authenticactivity are only exemplary and many other examples of verifyingauthentic activity are intended to be within the spirit and scope of thepresent invention. For example, the steps provided in the exampleillustrated in FIG. 11 may be performed in a different order. Forexample, with reference to FIG. 11A, the consumer's satisfactoryperformance of an action 252A may be performed after the mobileelectronic device's location is determined to correspond to the actionopportunity (i.e., step 252A may be performed between step 264A and step272A). Also, for example, the location of the consumer may be determined304A and compared to the designated location 308A at various times inthe process. One example illustrated in FIG. 11A establishes that thelocation of the consumer may be determined 304A and compared to thedesignated location 308A after the consumer travels to the secondlocation 276A and prior to scanning the product a second time 280A.These examples are only a few examples of the many possibilities foralternative step orders and the illustrated and described process stepsare not intended to be limiting upon the present invention. Rather, thesteps may occur in any order and additional or less steps may beincluded in the process.

With reference to FIG. 12, yet another exemplary manner of verifyingauthentic activity, which is generally represented as step 80 in FIG. 2,is illustrated. The following steps for action verification are onlyexemplary steps presented in an exemplary order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the present invention. Inthis exemplary embodiment, the system verifies authentic activity aftera consumer satisfactorily performs an action 320 (also see step 132 inFIG. 4). After a consumer satisfactorily performs an action, one or moreservers communicate with a point of sale (POS) system associated withthe consumer activity via one or more networks 324. The POS system maybe any of a variety of different POS systems including, but not limitedto, a cash register, payment processing system or pinpad, self-checkoutsystem, loyalty program system, near field communication system,transaction confirmation screen, etc. In one example, the consumeractivity may relate to a consumer venue and the POS system may beincorporated with the consumer venue to track consumer activity such as,for example, product purchases within the consumer venue. In thisexample, the one or more servers communicate with the POS system todetermine if the consumer made a purchase associated with the action328. If the consumer did not make a purchase associated with the action,the system may continuously or intermittently recheck to determine ifthe consumer has made the purchase. If the consumer makes the purchase,the consumer receives value 332. Step 332 in FIG. 12 pertaining to theconsumer receiving value may correspond to the step 136 in FIG. 4 of theconsumer receiving value.

Exemplary verification of consumer activity as it relates to FIG. 12will be described herein for illustrative purposes and is not intendedto be limiting upon the present invention. For example, an action mayrequire a consumer to travel to a grocery store and the consumersatisfactorily performs that action by traveling to the grocery store.To receive value, the consumer may also be required to purchase aparticular product at the grocery store. When the system identifies thatthe consumer is at the grocery store, it communicates with a POS systemof the grocery store to determine if the consumer has purchased theparticular product. If the POS system has not yet indicated that theconsumer has purchased the particular product, the system and the POSsystem may periodically communicate to determine if the consumer haspurchased the particular product. If the consumer purchases theparticular product, the POS system and the system communicate to verifythe consumer's purchase of the particular product and the consumerreceives value.

Referring now to FIG. 13, a further exemplary manner of verifyingauthentic activity, which is generally represented as step 80 in FIG. 2,is illustrated. The following steps for action verification are onlyexemplary steps presented in an exemplary order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the present invention. Inthis exemplary embodiment, the system verifies authentic activity aftera consumer satisfactorily performs an action 336(also see step 132 inFIG. 4). After a consumer satisfactorily performs an action, theconsumer may decide to purchase a product associated with thesatisfactorily performed action 340. Upon purchasing a product, a pointof sale (POS) system associated with the venue from which the productwas purchased generates an image 344. In some exemplary embodiments, theimage may be preprinted on the receipt paper and such preprinted receiptpaper may be provided to the venue in the form of a triggered coupon, animage on the consumer POS terminal, etc. The venue then loads theregisters with the preprinted receipt paper and prints relevantinformation on the receipt paper as consumers purchase products. Inother exemplary embodiments, the image is not preprinted on the receiptpaper and is instead printed on the receipt paper as the receipt isbeing generated for the consumer's purchase. In this embodiment, the POSsystem prints an image on the receipt paper during generation of thereceipt for the consumer.

The image may be a wide variety of types of images. For example, theimage may be a barcode, a code consisting of letters, numbers, and/orcharacters, an image of a product (either the product being purchased orsome other product), an image associated with the venue (e.g., atrademark associated with the venue, abbreviation or acronym of thevenue, etc.), a QR code, or two-dimensional barcode, or any other typeof image.

After receipt generation, the consumer receives the image 348. Theconsumer activates his/her camera 352 on the mobile electronic deviceand performs a scan of the image on the receipt with the camera 356.Then, the mobile electronic device sends the scan of the receipt image360 to one or more servers via one or more networks for verification364. The authenticity of the receipt image may be verified in any of themanners described herein such as, for example, manually, automatically,etc., or any other manner, all of which are intended to be within thespirit and scope of the present invention. This verification stepattempts to determine if the receipt image corresponds to the purchasedproduct and/or the venue of purchase 368. If the receipt imagecorresponds to the purchased product and/or venue, the consumer receivesvalue 372. If the receipt image does not correspond to the purchasedproduct and/or the venue, the consumer does not receive value 376. Step372 in FIG. 13 pertaining to the consumer receiving value may correspondto the step 136 in FIG. 4 of the consumer receiving value.

Exemplary verification of consumer activity as it relates to FIG. 13will be described herein for illustrative purposes and is not intendedto be limiting upon the present invention. The example used above toillustrate FIG. 12 will be relied upon herein with reference to FIG. 13at least in connection with the similar elements between the twoflowcharts. For example, an action may require a consumer to travel to acoffee shop and the consumer satisfactorily performs that action bytraveling to the coffee shop. To receive value, the consumer may also berequired to purchase a particular coffee drink. Upon the consumerpurchasing the particular coffee drink, the POS system of the coffeeshop generates a receipt for the consumer's purchase of the particularcoffee drink. An image such as, for example, a barcode is included onthe receipt. After the consumer receives the receipt, the consumeractivates the camera on his/her mobile electronic device and performs ascan of the barcode on the receipt. The consumer then sends the scan ofthe barcode for verification. The system verifies authenticity of thebarcode by determining if the barcode corresponds to the particularcoffee drink and/or the coffee shop. If the barcode in the scan does notcorrespond to the particular coffee drink and/or the coffee shop, theconsumer does not receive value. On the other hand, if the barcode inthe scan does correspond to the particular coffee drink and/or thecoffee shop, the consumer receives value.

Now that numerous examples of action generation and action verificationhave been described, at least one example of value redemption will bedescribed herein. The exemplary value redemption described herein is notintended to be limiting. Many other manners of value redemption may beperformed and are intended to be within the spirit and scope of thepresent invention.

As shown in FIG. 2, a general representation of value redemption isillustrated at step 84. Referring now to FIG. 14, an exemplary manner ofvalue redemption is illustrated in more detail. Initially, the consumerindicates that value redemption is desired 380. The consumer mayaccomplish this by selecting, on the mobile electronic device, thatvalue redemption is desired. The mobile electronic device thencommunicates with one or more servers via one or more networks toindicate the consumer's desire to redeem value. The one or more serversthen send appropriate data back to the mobile electronic device relatingto value redemption. The mobile electronic device then displays one ormore value redemption opportunities by category 384. The consumer thendetermines if a desired category is displayed 388. If a desired categoryof value redemption is displayed, the consumer selects the desired valueredemption category 392. After selection of a category, one or morespecific value redemption opportunities within the category aredisplayed on the mobile electronic device 396. The consumer selects oneof the value redemption opportunities 400 and the mobile electronicdevice may display additional information relating to the selectedredemption opportunity 404. After displaying the additional information,the consumer executes redemption of the value 408. The mobile electronicdevice communicates with the one or more servers via the one or morenetworks to indicate the redemption of value performed by the consumer412.

It should be understood that the consumer may redeem value on userelectronic devices other than mobile electronic devices such as, forexample, personal computers, laptops, or any other electronic devicecapable of communicating with the one or more servers via one or morenetworks.

Returning to step 388, if the consumer does not see a desired redemptionopportunity displayed on the mobile electronic device, the consumer mayinitiate a search for value redemption opportunities 416. In thealternative, the consumer may desire to perform a search for valueredemption opportunities at the onset of attempting to redeem value.Such an alternative may be desirable if the consumer does not want tolook through the full list of redemption opportunities. After initiationof the search, the consumer enters information into the mobileelectronic device related to a desired redemption opportunity 420. Theconsumer then executes the search 424 with the mobile electronic deviceafter entering desired information. The mobile electronic devicecommunicates the entered search criteria to one or more servers via oneor more networks 428. The one or more servers communicate search resultsrelated to the search criteria to the mobile electronic device via oneor more networks 432. The mobile electronic device then displays thesearch results for viewing by the consumer 436. Next, the consumerdetermines if a desired value redemption opportunity is displayed 440.If not, a new search may be initiated 444. If a desired value redemptionopportunity is displayed, the consumer selects the desired redemptionopportunity as illustrated at step 400 in FIG. 14. Then, steps 404-412are followed in a similar manner to that described above.

An example of value redemption as it relates to FIG. 14 will bedescribed herein for illustrative purposes and is not intended to belimiting upon the present invention. As an example, the consumer hasaccrued sufficient reward points from satisfactorily performing variousconsumer activities and wishes to redeem at least a portion of thereward points for a product or service. The consumer begins byindicating on his/her mobile electronic device that he/she desires toredeem points. The consumer's mobile electronic device displaysredemption opportunities by category such as, for example, gift cards,gadgets, e-delivery, charity, coupons, etc. For purposes of thisexample, we will assume the consumer desires to redeem points for a giftcard. The consumer sees the gift card category displayed on the mobileelectronic device and selects the gift card category. Next, the mobileelectronic device displays more specific gift card redemptionopportunities. The consumer selects one of the gift card redemptionopportunities and, if necessary, the mobile electronic device displaysadditional information about the selected gift card redemptionopportunity such as, for example, an expiration date, use and locationrestrictions, etc. The consumer executes the redemption reward pointsfor the gift card via the mobile electronic device, which thencommunicates the redemption to the one or more servers via the one ormore networks. Returning to the point in this example where thecategories of redemption opportunities are displayed on the mobileelectronic device, if the consumer does not see a desired category ordoes not want to survey the entire list of categories, the consumer mayinitiate a search for a particular type of redemption category. Forpurposes of this example, let's assume the consumer wants to redeemreward points for a digital music player. The consumer enters the words“digital music player” into the mobile electronic device and theconsumer executes the search. The mobile electronic device sends thesearch criteria to the one or more servers, which return the searchresults to the mobile electronic device pertaining to “digital musicplayer”. The mobile electronic device displays the search resultsrelating to digital music players. If the displayed search results arenot satisfactory to the consumer, he/she can initiate a new search. Ifthe search results contain a desirable digital music player, theconsumer selects the desired digital music player, executes theredemption of reward points, and the redemption of points for thedigital music player is complete.

The system is capable of having real-time or substantially real-timeoperation and nonreal-time operation. Real-time or substantiallyreal-time operation may occur when the user electronic device is capableof communicating with one or more networks and the one or more networksare continuously or substantially continuously available. With thesecapabilities, the system is capable of performing necessary steps andactions as such steps and actions are required. The system may operatein a nonreal-time manner for a variety of reasons. Some exemplaryreasons include, but are not limited to, when one or more networks arenot available (e.g., no internet access, poor or no cellular coverage,etc.), when the user electronic device is capable of communicating withonly a particular type of network (e.g., iPod Touch™ is not cellularcapable and is only internet capable) and such particular type ofnetwork is not available (e.g., internet not available), or a variety ofother reasons.

In instances where non-real time operation is necessary, the systemstores or caches data to allow the user to utilize his/her mobileelectronic device to receive value associated with the present system.The system is capable of storing or caching data in a variety ofdifferent manners and the following described manners are only exemplarymanners of storing or caching data. While not explicitly describedherein, the system is capable of performing other manners of storing orcaching data and such other manners are intended to be within the spiritand scope of the present invention.

For example, an instance may arise where the consumer is in an areahaving poor or no cellular coverage and no WI-FI or WLAN availability.In such an instance, the user's mobile electronic device may notcommunicate with one or more servers via one or more networks. However,the user may be in a location where an action may be performed toreceive value.

With reference to FIG. 17, an exemplary manner of enabling a user toobtain value when in a location lacking communication with one or morenetworks is illustrated. The following steps are only exemplary stepspresented in an exemplary order, and a variety of other steps, orders,and manners for enabling a user to obtain value when in a locationlacking communication with one or more networks are possible and areintended to be within the spirit and scope of the present invention. Inthis exemplary embodiment, an action is performed 500 such as, forexample, mobile electronic device communication with a verificationelement, user satisfactorily performs an action, etc. Data is obtainedas a result of the action 504. Communication between the mobileelectronic device and one or more networks needs to be determined 508.If the mobile electronic device is in a location with access to one ormore networks, the data associated with the action is communicated viaone or more networks 512. Subsequently, the user receives value 516. Ifthe mobile electronic device is in a location without access to one ormore networks, the data is stored or cached in the mobile electronicdevice 520. The mobile electronic device may check for the availabilityof one or more networks on a periodic or continuous basis 524. When oneor more networks become available, the mobile electronic devicecommunicates the stored or cached data via the one or more availablenetworks 528. Subsequently, the user receives value 516.

A real-world example of enabling a user to obtain value when in alocation lacking communication with one or more networks will bedescribed herein for illustrative purposes and is not intended to belimiting upon the present invention. The present example will utilize agrocery store environment and a user attempting to scan a particularproduct to receive value. Before the user enters the grocery store, themobile electronic device may communicate with a verification element andthe mobile electronic device may store or cache data in its memoryassociated with the verification element for use when a network is notavailable. The user may then proceed to an aisle in a store with anetwork not available, view stored or cached opportunities, and scan thebarcode of a particular item. The mobile electronic device may store orcache transmission data associated with the scanned item when a networkis not available. The user may then decide to purchase the scanned itemand leaves the grocery store. As the user travels home, the user maydrive into an area having good cellular coverage. After entering thegood cellular coverage area, the mobile electronic device communicatesthe stored or cached data associated with the verification element andthe stored or cached data associated with the scanned item to the one ormore servers via the now available cellular network. Upon the one ormore servers' receipt and verification of the stored or cached data, theuser receives the deserved value. Had the mobile electronic device notstored or cached data of the opportunities available and/or the useraction when it was out of communication with one or more networks, theuser would not have received value obtained during the period ofnon-communication.

As another example, the user may have a mobile electronic device that isonly win internet capable and is not cellular capable (e.g., tabletcomputer, iPod Touch™, etc.). In such an instance, the user may haveinternet access at home, but may not have internet access away fromhis/her home. When the user is at home, the mobile electronic device maystore or cache data or preload data into its memory associated withactions and value receiving opportunities within a particular area. Sucha particular area may be, for example, a particular radius from theuser's home, a particular city, county, state, nation, or any otherarea. In the present example, the predetermined area will be a 50 mileradius from the user's home. Thus, the system stores or caches dataassociated with all the actions and value receiving opportunities withinthe 50 mile radius of the user's home.

When the user leaves his/her home and travels within the 50 mile radius,the various actions and value receiving opportunities are displayed onthe user's mobile electronic device. The user may desire to perform anaction and a value receiving opportunity within the 50 mile radius. Forexemplary purposes, assume the user is in a grocery store within the 50mile radius and the user wants to scan a particular product to receivevalue. When the user enters the grocery store, the mobile electronicdevice may communicate with a verification element and the mobileelectronic device may store or cache data in its memory associated withthe verification element. The user may then proceed to a particle aisleand scan the barcode of a particular item. The mobile electronic devicemay store or cache data associated with the scanned item. The user maythen decide to purchase the scanned item and leaves the grocery storefor home. As the user arrives at his/her home, the user enters intohis/her WI-FI, WLAN, or other network range. After entering the user'snetwork range, the mobile electronic device communicates the stored orcached data associated with the verification element and the stored orcached data associated with the scanned item to the one or more serversvia the now available home network. Upon the one or more servers'receipt and verification of the stored or cached data, the user receivesthe deserved value. Had data not been stored or cached or preloaded intothe mobile electronic device when the mobile electronic device was incommunication with the internet and had the mobile electronic device notstored or cached data when it was out of communication with theinternet, the user would not have received value for his/her activitiesperformed out of communication with the internet.

As consumers move from place to place, the mobile electronic device willgain and loose access to networks. The present invention accommodatessuch gain and loss of networks and still facilitates properfunctionality. With reference to FIG. 18, another exemplary manner ofenabling a user to obtain value when access to one or more networks isunavailable is illustrated. The illustrated exemplary embodiment is onlyone of many different manners of enabling a user to obtain value whenaccess to one or more networks is unavailable and all of such mannersare intended to be within the spirit and scope of the present invention.Initially, the mobile electronic device determines if one or morenetworks is available 532. If a network is available, the mobileelectronic device accesses a server via the accessible network andstores opportunities in the storage device of the mobile electronicdevice 534. At some point after the opportunities are stored on themobile electronic device, a user may attempt an action 536. Returning tostep 532, if a network is not available, the mobile electronic devicecannot access a server over a network and the mobile electronic devicemust use one or more of the opportunities previously stored in thestorage device of the mobile electronic device 538. Subsequently, a usermay attempt one of the previously stored opportunities 536. The mobileelectronic device again determines if one or more networks is available540. If a network is available, the consumer will receive value if theaction is verified 542. If a network is not available, data associatedwith the action is stored on the mobile electronic device until anetwork is available 544. When a network becomes available, the data iscommunicated and the consumer receives value if the action is verified542.

With reference to FIG. 19, as consumers perform various activities 550in commerce, data associated with the consumers' activities may begenerated 554, collected, stored, and utilized for a variety of reasons558. In some exemplary embodiments, consumer data may be utilized toeffectively market to the consumer 558. If the consumer is presentedwith value and/or opportunities 562 such as, for example, displayadvertising, videos, coupons, digital coupons, grocery list creation,discounts, highlighted products, special offers, etc., based on theconsumer's own activity, the value and/or opportunities are more likelyto be relevant to and desired by the consumer. In some exemplaryembodiments, the system may present value and/or opportunities relatingto products the consumer purchased or products in which the consumer isotherwise interested. In other exemplary embodiments, the system maypresent value and/or opportunities similar to or relating to competitors(e.g., having a different brand) of those products the consumerpurchased or is otherwise interested in. In further exemplaryembodiments, the system may present value and/or opportunities relatingto one or more demographics of a consumer such as, for example, age,sex, race, household income, geographic location, marital status, withor without children, etc.

An exemplary manner of marketing to a consumer based on the consumer'sown activity is described herein. The exemplary manner is not intendedto be limiting and many other manners of marketing to consumers based onthe consumers' own activity are intended to be within the spirit andscope of the present invention. In addition, the steps provided in theillustrated exemplary embodiment may occur in a variety of differentorders and the illustrated exemplary manner of marketing to a consumermay include more or fewer steps, all of such possibilities are intendedto be within the spirit and scope of the present invention.

For example, a consumer may be presented with an activity to scanspecific products or specific categories of products at a designatedlocation such as, for example, the consumer's home. The consumer mayscan specific products or categories of products for value which, alongwith other data, may trigger targeted advertisements, actionopportunities, and/or other forms of value. In some instances, it may bedesirable for the system to discern a designated location from a nearbystore. The system may choose to make ineligible a designated locationwithin a radius of the venue from which products were purchased by theconsumer, or within radii of venues offering the same product. Thedesignated location, if it is a consumer's home, may be verified in avariety of manners such as, for example, credit card addressverification, a postcard send, and/or other address confirmationmethods. When a consumer scans previously purchased products at home,data associated with the scanned products will be stored in a history ofthat consumer's purchases along with the time scanned. These purchasesmade by the consumer may be combined with database information from POSsystems and verified shopping trips to create a more comprehensivebuying history. This database may also be combined with demographics ofthe consumer. Based on these demographics and/or buying history and/orimmediate scans, triggers can be created resulting in customizedexperiences for particular consumers. These triggers may result intargeted advertisements, action opportunities, and/or other forms ofvalue that could appear immediately or at a later time such as, forexample, when a consumer enters a location, when the consumers is inother smartphone Apps on the mobile electronic device, when the consumeris performing smartphone web browsing on the mobile electronic device,and/or upon scanning a future purchased product. Triggers, by way ofexample, may include marketing a competing brand of soda to a consumerthat scanned a different brand at home. Another trigger may beidentifying a coffee drinker and marketing a new type of instant coffeeto the coffee drinker. Another trigger may be identifying a family withbaby food in the house and marketing a brand of diaper. Another triggermay include identifying an elderly user via demographics and offeringvalue upon completing a survey on vitamins designed for olderindividuals. These are only a few of the many possible types ofmarketing triggers and are provided for exemplary and illustrativepurposes only. Any possible triggers are intended to be within thespirit and scope of the present invention.

The many possible manners of marketing to consumers based on their ownactivity may allow targeted advertisements to reach a consumer based onspecific demographics, product ownership, and/or location visits.Additionally, these manners of marketing to consumers do not require,but may work with, connection to a POS system. Consumers may receive thetargeted value, action opportunities, etc., at many times such as, forexample, when the consumer is actively shopping or before a purchase ismade. Reaching consumers prior to purchase may be a more effectivemanner of marketing than targeting a consumer post-sale as the consumersare leaving the store and are less likely to retain any value, coupons,etc. for a return visit. Consumers also have opportunities to earn valuewithout making a purchase by, for example, scanning a product, enteringa particular location, etc. Engaging a consumer without requiring apurchase may increase the likelihood that a consumer will take an actionsuch as, for example, scanning a product, entering a location, etc. Uponfinding a product, entering a location, etc., the consumer is furtherdown the purchasing path and can be marketed again to evaluate the offerand ultimately make a purchase. With this process, the consumer may bemotivated to at least travel to the product or location, collect value,and gain more information about the product's fit for the consumer. Tothe contrary, post-purchase targeting such as coupons for randomproducts may be simply and outright dismissed by the consumer becausethe consumer is not interested in the product. The process of targetmarketing consumers based on the consumer's activity facilitatessurveying of consumer activity at critical decision making times inresponse to triggers.

Further, users may receive value in response to purchase interest orhistory. Users may interact with products they have purchased withinproduct categories to provide value. Users may also indicate interest inproducts, services, or stores via clicks or selections on digitalcoupons, offers, grocery list creation, loyalty card history, specificstores visited, etc. Value received by the user may include triggeredvalue advertising or offers targeted to specific categories of productsand/or stores through mobile electronic experiences. Such triggeredvalue may occur immediately after a triggering event or it may occur ata later time. Such triggered value may also occur in another application(App) on the mobile electronic device or on another electronic device ina household. Such value may occur outside of the system or applicationwhere the action occurred and may include, for example, targetedmessaging or advertising appearing via push, SMS message, email, inanother application, on a web browser, or another device within the samehousehold. The triggered value may be triggered by a specific store, aspecific product, or a range of stores and products. Also, the triggeredvalue may attempt to market the user a competing, a complementary, or asimilar category.

As can be seen above, a user may be required to perform any number ofsteps in order to satisfactorily perform an action and receive value. Insome instances no steps and/or actions are required to receive value,while in other instances numerous steps and/or actions are required toreceive value. It should be understood that, in instances where numeroussteps are required, a user may receive value only after satisfactorilyperforming all steps, a user may receive value after satisfactorilyperforming each step, or a user may receive value after satisfactorilyperforming any number of the various required steps. In instances wherea user may receive value after satisfactorily performing individualsteps or other numbers of steps less than the total number of steps, theuser may receive value even if the user does not satisfactorily performall the steps.

Many other applications (also referred to as “Apps”) exist that may beoperated on mobile electronic devices or other electronic devices. Thesystems, apparatuses, and methods disclosed herein may be utilized withother Apps to provide users of the other Apps with value. Such otherApps may be developed by an application developer, which may be any ofan individual person, a company or business entity, a software orprogram capable of developing Apps. The systems, apparatuses, andmethods disclosed herein may be utilized with the other Apps in avariety of different manners and value may be provided to users of theother Apps and/or to the application developer in a variety of differentforms and manners. For example, value provided to a user may includecurrency in a game app, phone minutes, advertising removal, etc. Also,for example, value that may be provided to an application developer mayinclude monetary value. The following exemplary scenarios are forillustrative purposes only and are not intended to be limiting upon thepresent invention. Rather, any possible utilization between the systems,apparatuses, and methods disclosed herein and other Apps, and any mannerof providing value to users of the other Apps are intended to be withinthe spirit and scope of the present invention.

In some exemplary embodiments, an exemplary secondary or other App mayinclude free operation and may include upgraded operation requiringpayment to gain access to the upgraded operation. Rather than make amonetary payment for the upgraded operation, a user of the secondary Appmay have the option to perform functionality associated with thesystems, apparatuses, and methods disclosed herein. For example, a userof the secondary App may be able to perform an action such as, forexample, checking into a location, scanning product(s) at a particularlocation, or scanning product(s) at home, etc., similarly to thosemanners described and illustrated herein, and the user may receiveaccess to the upgraded operation by satisfactorily performing such anaction(s). In addition, the application developer of the secondary Appmay receive monetary value from business entities when the user performsthe above listed actions.

It should be understood that the present disclosure may be incorporatedwith any other or secondary Apps, may be incorporated into other orsecondary Apps in any manner, and may provide value to users of theother or secondary Apps in any form, all of which are intended to bewithin the spirit and scope of the present invention.

It should also be understood that a variety of different manners ofinteraction between mobile electronic devices and products are disclosedherein, and many other manners of interaction between mobile electronicdevices and products are contemplated and are intended to be within thespirit and scope of the present invention. For example, mobileelectronic devices may interact with a product by taking a picture ofthe product or a portion of the product, scanning a barcode or 2D codeon the product, radio frequency identification (RFID) or near fieldcommunication (NFC) interaction, etc.

The foregoing description has been presented for purposes ofillustration and description, and is not intended to be exhaustive or tolimit the invention to the precise form disclosed. The descriptions wereselected to explain the principles of the invention and their practicalapplication to enable others skilled in the art to utilize the inventionin various embodiments and various modifications as are suited to theparticular use contemplated. Although particular constructions of thepresent invention have been shown and described, other alternativeconstructions will be apparent to those skilled in the art and arewithin the intended scope of the present invention.

1. A computer implemented method of providing value to a consumer, themethod comprising: receiving notification an action was performed by auser with a mobile electronic device; authenticating that the action wasperformed in accordance with one or more predetermined criteria;identifying value associated with performance of the action; andproviding the consumer with the value if the action was performed inaccordance with the one or more predetermined criteria.
 2. The method ofclaim 1, wherein the action includes interacting with a product.
 3. Themethod of claim 2, wherein the action includes at least one of a scan ofa barcode on a product, a picture of the product, RFID communication,and near field communication.
 4. The method of claim 1, wherein theaction includes the consumer indicating interest in one of products andstores through at least one of coupons, offers, grocery lists, loyaltycard history, receipt, point of sale system, and stores visits.
 5. Themethod of claim 1, wherein the action includes entry of the mobileelectronic device into a venue.
 6. The method of claim 1, wherein theaction includes purchasing a product.
 7. The method of claim 1, whereinthe network is a cellular network.
 8. The method of claim 1, wherein thenetwork is the internet.
 9. The method of claim 1, wherein the valueincludes at least one of an advertisement, an offer, reward points, afeature in an application, a coupon, price comparison information,product review information, discount, removal of advertising, storinggrocery list, and sweepstakes.
 10. The method of claim 9, wherein theadvertisement occurs at one of immediately after performing the firstaction, at a later time after performing the first action, in a distinctapplication on the mobile electronic device, and on another electronicdevice.
 11. The method of claim 1, wherein the value is associated withthe action.
 12. The method of claim 11, wherein the action and the valueare similar in type and brand.
 13. The method of claim 11, wherein theaction and the value are similar in type and are different in brand. 14.The method of claim 11, wherein the action is of a related interest typeas the value.
 15. The method of claim 14, wherein the action relates toa diaper and the value relates to baby food.
 16. The method of claim 14,wherein the action relates to interacting with a romantic comedy DVD andthe value relates to an advertisement for a theatrical release of aromantic comedy playing near the consumer.
 17. A computer implementedmethod of providing value to a consumer, the method comprising:receiving notification that a first action was performed by a mobileelectronic device; receiving notification that a second action wasperformed by the mobile electronic device; using performance of thesecond action to verify whether or not the first action was performed inaccordance with one or more predetermined criteria; and providing valueto the consumer if an action was performed in accordance with one ormore predetermined criteria.
 18. The method of claim 17, wherein thefirst action includes purchasing a product and the second actionincludes scanning the purchased product with the mobile electronicdevice.
 19. The method of claim 18, wherein verifying if the criteria ismet further comprises verifying that the scanned product is the same asthe purchased product.
 20. The method of claim 19, wherein verifyingthat the scanned product is the same as the purchased product isperformed manually.
 21. The method of claim 19, wherein verifying thatthe scanned product is the same as the purchased product is performedautomatically.
 22. The method of claim 18, wherein providing valuefurther includes providing value associated with the product.
 23. Themethod of claim 22, wherein the product is a first product, and whereinthe value includes an advertisement for a second product.
 24. The methodof claim 23, wherein the second product is the same type and brand asthe first product.
 25. The method of claim 23, wherein the secondproduct is of the same type and different brand than the first product.26. The method of claim 23, wherein the second product is of a relatedinterest type as the first product.
 27. The method of claim 26, whereinthe first product is a tortilla chip bag and the second product is asalsa.
 28. The method of claim 18, wherein the product is purchased at afirst location and the product is scanned at a second location differentthan the first location.
 29. The method of claim 28, wherein verifyingfurther comprises verifying that the second location is different thanthe first location.
 30. The method of claim 28, wherein verifyingfurther comprises verifying that the second location is a designatedlocation.
 31. The method of claim 28, wherein the first location is avenue of commerce and the second location is a residence.
 32. The methodof claim 28, wherein the second location must be beyond a predefineddistance from the first location in order to provide value to aconsumer.
 33. The method of claim 17, wherein the first action includesidentifying a location of the mobile electronic device and the secondaction includes one of scanning a product and purchasing a product. 34.The method of claim 33, wherein verifying further comprises verifyingthe second action occurred at the location of the mobile electronicdevice.
 35. The method of claim 17, wherein the first action includesone of scanning a product and purchasing a product and the second actionincludes identifying a location of the mobile electronic device.
 36. Themethod of claim 35, wherein verifying further comprises verifying thefirst action occurred at the location of the mobile electronic device.37. The method of claim 17, further comprising providing an image with apoint of sale system subsequent to performing the first action and priorto performing the second action.
 38. The method of claim 37, wherein thefirst action includes purchasing a product and the second actionincludes scanning the image with the mobile electronic device.
 39. Themethod of claim 37, wherein providing an image includes one ofpreprinting the image on receipt paper before the first action, printingthe image on receipt paper after performing the first action, displayingthe image on a display.
 40. The method of claim 39, wherein the image isone of a barcode, a code containing letters, a code containing numbers,a code containing characters, a QR code, associated with a product, andassociated with a venue of commerce.
 41. A computer implemented methodof verifying a location of a mobile electronic device, the methodcomprising: providing a verification element in a location, theverification element including a memory, a plurality of modulatingcommunications stored in the memory, and a broadcast element;broadcasting one of the plurality of modulating communications with thebroadcast element; receiving the one of the plurality of modulatingcommunications with the mobile electronic device; communicating the oneof the plurality of modulating communications to a server with themobile electronic device via a network; and verifying the one of theplurality of modulating communications associated with the verificationelement.
 42. The method of claim 41, wherein the plurality of modulatingcommunications are a plurality of modulating codes, and wherein theverification element further includes an integrated circuit, anidentifier unique to the verification element, an encryption key, and atiming device that cooperate to generate the plurality of modulatingcodes and apply an encryption to the plurality of modulating codes. 43.The method of claim 41, wherein the network is one of a cellular networkand the internet.
 44. The method of claim 41, wherein the verificationelement further includes an adjustable output strength device foradjusting broadcast strength of the broadcast element.
 45. The method ofclaim 41, further comprising broadcasting a second one of the pluralityof modulating communications subsequent to broadcasting the one of theplurality of modulating communications.
 46. The method of claim 45,wherein the plurality of modulating communications are broadcast basedon time.
 47. The method of claim 41, wherein the plurality of modulatingcommunications are one of a plurality of modulating codes, a pluralityof modulating images, a plurality of modulating sounds, a plurality ofmodulating WIFI identifications, a plurality of modulating IP basedcommunications, a plurality of modulating RFID communications, and aplurality of modulating near field communications.
 48. A computerimplemented method of providing value to a consumer, the methodcomprising: providing a mobile electronic device including a datastorage device; storing first data in the data storage device, whereinthe first data is associated with an action opportunity; prompting aconsumer via the mobile electronic device of the action opportunity evenif the mobile electronic device does not have access to a network;performing an action, associated with the action opportunity, with amobile electronic device when the mobile electronic device is withoutaccess to a network; generating second data associated with the action;storing the second data in the data storage device in the mobileelectronic device; gaining access to a network with the mobileelectronic device; communicating the second data to a server via anetwork when the mobile electronic device has access to a network;authenticating that the action was performed in accordance with one ormore predetermined criteria; and providing value to the consumer if theaction was performed in accordance with the one or more predeterminedcriteria.
 49. A computer implemented method of providing value to aconsumer, the method comprising: operating an application on a mobileelectronic device; performing an action with the mobile electronicdevice; generating data associated with the action; communicating thedata to a server via a network; identifying value using the data,wherein the value is associated with the action; authenticating that theaction was performed in accordance with one or more predeterminedcriteria; and providing the value to the consumer, provided that theaction was performed in accordance with one or more predeterminedcriteria, through use of another application on one of the user'selectronic devices.
 50. The method of claim 49, wherein the value istriggered advertising including at least one of a push message, an SMSmessage, an email, a banner advertisement, and a video.
 51. The methodof claim 50, wherein one of the user's electronic devices can include,but is not limited to, one of the same application, another applicationon the mobile electronic device, a web browser on the mobile electronicdevice, another application on another mobile electronic device, and aweb browser on another mobile electronic device.
 52. A computerimplemented method of providing a first value to an application user anda second value to an application developer, the method comprising:creating an application by an app developer; operating the applicationon a mobile electronic device by the application user; performing anaction with the mobile electronic device; generating data associatedwith the action; communicating the data to a server via a network;identifying a first value and a second value using the data; providingthe first value to the application user; and providing the second valueto the application developer.
 53. The method of claim 52, wherein thefirst value is one of virtual currency in a game, ring tones in acommunication app, voice communication minutes, unlocked content,advertising removal, badges, price comparison information, a discount,an advertisement, an offer, reward points, features in an application,coupons, product review information, storing grocery list, andsweepstakes.
 54. The method of claim 53, wherein the second value ismonetary value.
 55. A computer implemented method of providing value toa consumer, the method comprising: providing a product interactionopportunity at a location; interacting with the product with a mobileelectronic device; communicating data associated with the productinteraction to a server; verifying authenticity of the productinteraction using the data associated with the product interaction; andproviding value to the consumer if the product interaction is determinedto be authentic.
 56. The method of claim 55, wherein interacting withthe product further includes capturing an image associated with theproduct with the mobile electronic device, the method further comprisingtransmitting the image over the network for verification, and verifyingthat the image is associated with the product.
 57. The method of claim56, wherein the image is a captured image and the mobile electronicdevice includes a screen, and wherein prior to capturing the capturedimage the method further comprises displaying a displayed imageassociated with the product on the screen of the mobile electronicdevice, and wherein a perimeter of the displayed image is croppedsmaller than a perimeter of the captured image.
 58. The method of claim56, wherein verifying the image further comprises manually verifyingthat the image correctly corresponds to the product interactionopportunity.
 59. The method of claim 56, wherein verifying the imagefurther comprises verifying that the image correctly corresponds to theproduct interaction opportunity with an automated system.