Systems for providing electronic items having customizable locking mechanism

ABSTRACT

A method for providing a locked electronic item includes receiving a selection of an electronic lock and the electronic item from a first computing device associated with a sender. The electronic lock includes a lock clue and a lock solution. The method includes determining an answer input field configuration that includes a number of input boxes and spaces that may be arranged to correspond to the lock solution. The method includes transmitting the lock clue and the input field configuration to a second computing device associated with a recipient for display by the second computing device and receiving an attempted lock solution from the second computing device. The method further includes transmitting the electronic item to the second computing device for display or use by the second computing device in response to determining that the attempted lock solution matches the lock solution.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims priority under 35U.S.C. § 120 to, U.S. patent application Ser. No. 16/248,889, filed Jan.16, 2019, which is a continuation of U.S. patent application Ser. No.16/014,523, now U.S. Pat. No. 10,218,708, filed Jun. 21, 2018, theentire contents of which is incorporated herein by reference.

FIELD OF INVENTION

The present disclosure relates to systems and methods for providing alocked electronic item, and more particularly providing systems andmethods for remotely providing an electronic item or gift having acustomized locking mechanism that may be remotely modified by the senderto adjust the recipient's ability to unlock the locking mechanism.

BACKGROUND

Electronic locking mechanisms are often used to lock electronic devices.For example, it is common for smartphones and computers to includefeatures that allow a user to password protect a device with, forexample, a password, a pin, or a predefined swiping gesture. Similarly,password protection may also be applied to electronic files that may betransferred between users by attaching a static password to the filebefore sending it to the recipient. For example, a first user may applya password to a PDF document that is then transmitted to a second userwho may then access the contents of the PDF document by inputting thecorrect password. For each of these methods to work, it is necessarythat the person attempting to access the electronically locked item havedirect knowledge of the password required to access the item. However,it may be desirable to provide a system for password protecting adocument in which the recipient does not have direct knowledge of thepassword required to access an electronically locked item that has beentransferred from one person to another as a means of providing a degreeof entertainment between users, but requiring the recipient to guess orfigure out the solution to the locking mechanism. While it is possibleto password protect a shared document and require that a recipient guessthe password, this would likely to result in frustration as opposed toentertainment because a conventionally locked document may not provideany feedback to aid in the unlocking of the item. Therefore, it may beparticularly desirable to provide a locking mechanism which enablesremote, real-time connectivity to the sender in order to allow thesender to provide clues or adjustments to the locking mechanism. Such alocking mechanism may be particularly useful in relation to thetransmission of an electronic gift, such as a gift card, where elementsof entertainment and enjoyment are particularly relevant.

Accordingly, there is a need for improved systems that allow a gifter toprovide an electronic gift (or other electronic item) that is securedfrom access by a customizable electronic locking mechanism that (i)provides real-time feedback to the gifter and (ii) allows the gifter toprovide inputs, clues and adjustments in relation to the lockingmechanism. Embodiments of the present disclosure are directed to thisand other considerations.

SUMMARY

Disclosed embodiments provide systems and methods for providing a lockedelectronic item. In some embodiments the electronic item may be anelectronic file (such as a word processing file, spreadsheet, PDF or thelike), a data file, a text message, a digital image or video, an audiofile, an address book contact file, an electronic giftcard, any othersuch type of file or item that may be electronically exchanged betweenusers or even a subsequent digital experience (e.g., unlocking offeatures, functionality or content of an electronic item or softwareapplication).

Consistent with the disclosed embodiments, a method of providing alocked electronic item may include receiving, from a first computingdevice associated with a sender via a software application, a selectionof an electronic lock and the electronic item. The electronic lock mayinclude a lock clue and a lock solution. The method may includedetermining an answer input field configuration based on the locksolution. The answer input field configuration may include a number ofinput boxes and spaces that may be arranged to correspond to the locksolution. The method may include transmitting the lock clue and theinput field configuration to a second computing device associated with arecipient for display by the second computing device. The method mayinclude receiving an attempted lock solution comprising a set ofalphanumeric characters equal to the number of input boxes and a spatialarrangement that corresponds to the input field configuration from thesecond computing device. The method may further include transmitting theelectronic item to the second computing device for display or use by thesecond computing device in response to determining that the attemptedlock solution matches the lock solution.

Consistent with the disclosed embodiments, systems and non-transitorycomputer-readable mediums for providing a locked electronic item arealso disclosed.

Further features of the disclosed design, and the advantages offeredthereby, are explained in greater detail hereinafter with reference tospecific embodiments illustrated in the accompanying drawings, whereinlike elements are indicated be like reference designators.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and which are incorporated into andconstitute a portion of this disclosure, illustrate variousimplementations and aspects of the disclosed technology and, togetherwith the description, serve to explain the principles of the disclosedtechnology. In the drawings:

FIG. 1 is a diagram of an exemplary system that may be used to provide alocked electronic item;

FIG. 2 is a component diagram of an exemplary gift application server;

FIG. 3 is a component diagram of an exemplary user device;

FIG. 4A and FIG. 4B are exemplary embodiments of user interfaces of asoftware application for providing gifts that may be secured by acustomizable electronic locking mechanism;

FIG. 5A, FIG. 5B, FIG. 5C, and FIG. 5D are exemplary embodiments of userinterfaces of a customizable electronic locking mechanism of a softwareapplication for providing gifts;

FIG. 6 is a flowchart of an exemplary method for providing a lockedelectronic item;

FIG. 7 is a flowchart of another exemplary method for providing a lockedelectronic item; and

FIG. 8 is a flowchart of another exemplary method providing a lockedelectronic item.

DETAILED DESCRIPTION

Some implementations of the disclosed technology will be described morefully with reference to the accompanying drawings. This disclosedtechnology may, however, be embodied in many different forms and shouldnot be construed as limited to the implementations set forth herein. Thecomponents described hereinafter as making up various elements of thedisclosed technology are intended to be illustrative and notrestrictive. Many suitable components that would perform the same orsimilar functions as components described herein are intended to beembraced within the scope of the disclosed electronic devices andmethods. Such other components not described herein may include, but arenot limited to, for example, components developed after development ofthe disclosed technology.

It is also to be understood that the mention of one or more method stepsdoes not preclude the presence of additional method steps or interveningmethod steps between those steps expressly identified. Similarly, it isalso to be understood that the mention of one or more components in adevice or system does not preclude the presence of additional componentsor intervening components between those components expressly identified.

The disclosed embodiments are directed to methods for providing a lockedelectronic item. In one embodiment, a method may include receiving, froma first computing device associated with a sender via a softwareapplication, a selection of an electronic lock and the electronic item.The electronic lock may include a lock clue and a lock solution. Themethod may include determining an answer input field configuration basedon the lock solution. The answer input field configuration may include anumber of input boxes and spaces that may be arranged to correspond tothe lock solution. The method may include transmitting the lock clue andthe input field configuration to a second computing device associatedwith a recipient for display by the second computing device. The methodmay include receiving an attempted lock solution comprising a set ofalphanumeric characters equal to the number of input boxes and a spatialarrangement that corresponds to the input field configuration from thesecond computing device. The method may further include transmitting theelectronic item to the second computing device for display or use by thesecond computing device in response to determining that the attemptedlock solution matches the lock solution.

In another form, the present invention may be embodied in a method forproviding a locked electronic item. The method may include receiving,from a computing device and via a software application, electronic lockdata that may include a lock clue, an answer field configuration, and anindication of the electronic item. The method may include displaying thelock clue and a number of input boxes each configured to receive anddisplay a single character. The number of input boxes and spacing of theinput boxes may correspond to the answer field configuration. The methodmay include receiving, via a user input device, an attempted locksolution. The attempted lock solution may include a sequence ofcharacters, wherein each character of the sequence of characters isinput into one of the number of input boxes. The method may includetransmitting the attempted lock solution to the computing device. Themethod may include receiving the electronic item from the computingdevice in response to the computing device determining that theattempted lock solution matches a lock solution stored by the computingdevice. The method may further include displaying a notificationindicating receipt of the electronic item.

In another form, the present invention may be embodied in a method forproviding a locked electronic item. The method may include receiving,from a first computing device associated with a sender via a softwareapplication, a selection of an electronic lock and the electronic item,wherein the electronic lock comprises a lock clue, a lock image and alock solution. The lock solution may represent a trace path associatedwith a portion of the image. The method may include transmitting thelock clue and lock image to a second computing device associated with arecipient and for display by the second computing device. The method mayinclude receiving an attempted lock solution comprising an attemptedtrace pattern from the second computing device. The attempted tracepattern may represent a user-input trace pattern made by a user of thesecond computing device by tracing a line over a portion of the imageusing a touchscreen associated with the second computing device. Themethod may further include transmitting the electronic item to thesecond computing device for display or use by the second computingdevice in response to determining that the attempted lock solutionmatches the lock solution within a predetermined confidence level.

In another embodiment, a system may include one or more memory devicesstoring instructions, and one or more processors configured to executethe instructions to perform steps of a method of providing a lockedelectronic item as disclosed herein.

In another embodiment, a non-transitory computer-readable medium isdisclosed. The non-transitory computer-readable medium may storeinstructions that, when executed by one or more processors, cause asystem to execute a method of providing a locked electronic item asdisclosed herein.

Reference will now be made in detail to exemplary embodiments of thedisclosed technology, examples of which are illustrated in theaccompanying drawings and disclosed herein. Wherever convenient, thesame references numbers will be used throughout the drawings to refer tothe same or like parts.

FIG. 1 is a diagram of an exemplary system 100 that may be configured toperform one or more processes that may allow a first user of a firstcomputing device to send an electronic gift that is secured by auser-specified customizable locking mechanism to a second user of asecond computing device. For example, system 100 may be configured toallow a first user (who may be referred to as the “gifter”) to send afinancial gift to a second user (who may be referred to as the “giftrecipient”) that may be secured by a locking mechanism that may bespecified by the gifter, such that the gift recipient may not accessand/or use the financial gift until the gift recipient unlocks thelocking mechanism by entering the proper lock solution. In someembodiments, system 100 may provide notifications to the gifter inresponse to user inputs made by the gift recipient on the giftrecipient's device. For example, such notifications may include anotification of a successful attempt at inputting the proper locksolution, a notification of an incorrect attempt at entering the properlock solution that may include data representative of the content of theincorrect attempt (e.g., an incorrect password entered by the giftrecipient), a notification of a request for assistance made by the giftrecipient, or other such notifications. In some embodiments,notifications may be provided to a device of the gifter via, for examplepush notifications, text messages, or notifications presented in asoftware application. According to some embodiments, system 100 mayprovide a connection between the gifter's device and the giftrecipient's device so that the gifter may receive notifications inreal-time. In some embodiments, a connection between the gifter's deviceand the gift recipient's device established by system 100 may allow thegifter to view the activity of the gift recipient with respect to thelocking mechanism in real time. For example, in some embodiments, if thegift solution requires the gift recipient to input a drawing or tracepattern (e.g., via a stylus or swiping a touchscreen), a connectionestablished by system 100 may allow the gifter to view the giftrecipient's attempt to draw the image live. According to someembodiments, system 100 may be configured to allow the gifter toremotely provide updates to the locking mechanism, by for example,remotely unlocking the locking mechanism, filling in a portion of thelock solution, or reconfiguring the locking mechanism to require adifferent lock solution to be unlocked. According to some embodiments,system 100 may be configured to allow the gifter to create customizedelectronic gifts, such as a gift card to a particular merchant. In someembodiments, system 100 may enable the creation of customized gifts fora plurality of merchants based on monitoring of transactionauthorization request data, such that customized gifts may be createdfor a given merchant without requiring the merchant to register withsystem 100.

The components and arrangements shown in FIG. 1 are not intended tolimit the disclosed embodiments as the components used to implement thedisclosed processes and features may vary. As shown, system 100 mayinclude a pair of user devices 102, a network 106, a merchant databaseterminal 126, a merchant POS terminal 127, a third party financialserver 128, and an organization 108 including, for example, a web server110, a location services server 112, a transaction server 114, a localnetwork 116, a database 118 and a gift application server 120.

In some embodiments, a gifter and gift recipient may operate separateuser devices 102, respectively. User device 102 can include one or moreof a mobile device, smart phone, general purpose computer, tabletcomputer, laptop computer, telephone, PSTN landline, smart wearabledevice, voice command device, other mobile computing device, or anyother device capable of communicating with network 106 and ultimatelycommunicating with one or more components of organization 108. Accordingto some embodiments, user device 102 may communicate with a merchantdatabase terminal 126, merchant POS terminal 127 and/or third partyfinancial server 128 via network 106. In some embodiments, user device102 may include or incorporate electronic communication devices forhearing or vision impaired users. In some embodiments, one or more userdevices 102 may include software that is configured to allow a user togenerate and send a financial gift to another user (which may be hereinreferred to as the “gift mobile application”).

Network 106 may be of any suitable type, including individualconnections via the internet such as cellular or WiFi networks. In someembodiments, network 106 may connect terminals, services, and mobiledevices using direct connections such as radio-frequency identification(RFID), near-field communication (NFC), Bluetooth™, low-energyBluetooth™ (BLE), WiFi™, ZigBee™, ambient backscatter communications(ABC) protocols, USB, WAN, or LAN. Because the information transmittedmay be personal or confidential, security concerns may dictate one ormore of these types of connections be encrypted or otherwise secured. Insome embodiments, however, the information being transmitted may be lesspersonal, and therefore the network connections may be selected forconvenience over security.

Network 106 may comprise any type of computer networking arrangementused to exchange data. For example, network 106 may be the Internet, aprivate data network, virtual private network using a public network,and/or other suitable connection(s) that enables components in systemenvironment 100 to send and receive information between the componentsof system 100. Network 106 may also include a public switched telephonenetwork (“PSTN”) and/or a wireless network.

Organization 108 may be associated with an entity such as a business,corporation, individual, partnership, or any other entity that providesone or more of goods, services, and consultations to individuals such ascustomers. For example, in some embodiments, organization 108 may beassociated with a financial services provider.

Organization 108 may include one or more servers, devices, and computersystems for performing one or more functions associated with productsand/or services that organization 108 provides. Such servers, devices,and computer systems may include, for example, web server 110, locationservices server 112, transaction server 114, database 118 and giftapplication server 120, as well as any other computer systems necessaryto accomplish tasks associated with organization 108 or the needs ofcustomers (which may be customers of the entity associated withorganization 108).

Web server 110 may include a computer system configured to generate andprovide one or more websites accessible to customers, as well as anyother individuals involved in organization 108's normal operations. Webserver 110 may include a computer system configured to receivecommunications from user device 102 via for example, a mobileapplication, a chat program, an instant messaging program, avoice-to-text program, an SMS message, email, or any other type orformat of written or electronic communication. Web server 110 may haveone or more processors 132 and one or more web server databases 134,which may be any suitable repository of website data. Information storedin web server 110 may be accessed (e.g., retrieved, updated, and addedto) via local network 116 and/or network 106 by one or more devices ofsystem 100. According to some embodiments, web server 110 may hostwebsites, data or software applications that user device 102 may accessand interact with. For example, web server 110 may provide a website,web portal or software application that allows a user of user device 102to access or view account information associated with one or morefinancial accounts of the user. In some embodiments, web server 110 mayreceive and forward communications or portions of communications betweenuser device 102 and components of system 100, such as location servicesserver 112, transaction server 114, database 118 and/or gift applicationserver 120. According to some embodiments, web server 110 may beconfigured to transmit data and/or messages from a first user device 102to a second user device 102, via for example, a mobile application thathas been downloaded on one or both user devices 102.

Location services server 112 may include a computer system configured totrack the location of user device 102 based on information and datareceived from user device 102. For example, location services server 112may receive location data from user device 102, such as globalpositioning satellite (GPS) data comprising the coordinates of thedevice, RFID data of associated with known objects and/or locations, ornetwork data such as the identification, location, and/or signalstrength of a wireless base station (e.g., Wi-Fi router, cell tower,etc.) connected to user device 102 that may be used to determine thelocation of user device 102. According to some embodiments, locationservices server 112 may store geofencing information that represents adesigned location or area. As those of skill in the art will appreciate,a geofence may be a virtual geographic boundary that when crossed byuser device 102, may trigger system 100 to execute one or more actions.According to some embodiments, the contours of a geofence may bepredetermined, for example, location services server 112 may receive oneor more predetermined geofences that are associated with respectivelocations from a third party. For example, location services server 112may receive data representative of a geofence around a particular storefrom an organization associated with the store that determined thelocation of the geofence. In some embodiments, the contours of ageofence may be determined by receiving (e.g., from a user of system100) the location of a point (e.g., longitude and latitude) and a radiusand setting the contours of the geofence to be equal to the location ofa circle draw around the point at the specified radius. In someembodiments, a geofence may be specified by a user of system 100 by, forexample, drawing the geofencing onto a virtual map or otherwiseinputting the location of the geofence.

Location services server 112 may have one or more processors 142 and oneor more location services databases 144, which may be any suitablerepository of location data. Information stored in location servicesserver 112 may be accessed (e.g., retrieved, updated, and added to) vialocal network 116 and/or network 106 by one or more devices of system100. In some embodiments, location services server processor 142 may beused to determine the location of user device 102, whether user device102 has crossed a particular geofence or whether user device 102 isinside or outside of an area designated by a particular geofence. Asdescribed below, according to some embodiments, system 100 may usegeofences to represent a gift redemption location and/or a gift unlocklocation.

In some embodiments, location services server 112 may be configured sendmessages and/or data to other devices, such as for example, user device102 or gift application server 120, upon determining that user device102 has crossed a specified geofence or entered an area encompassed by aspecified geofence. For example, in some embodiments, location servicesserver 112 may send user device 102 a notification that the user of userdevice 102 has received a gift, and may provide, for example, thedetails of the gift, which in some embodiments may include a tokenizedPAN. According to some embodiments, location services server 112 mayreceive data representative of a location that is associated with agift. For example, gift application server 120 may provide data tolocation services server 112 representative of a location of aparticular store that is associated with a particular gift. Locationservices server 112 may generate, receive or access geofence informationassociated with the received location and may monitor location dataassociated with the user device 102 of a designated gift recipient todetermine when the user device 102 has entered the location. Locationservices server 112 may determine that user device has entered thelocation by determining that, for example, user device has crossed overthe geofence associated with the gift. In this way, location servicesserver 112 may determine when a gift recipient has entered a location orproximity to a redemption merchant specified by the gifter.

Transaction server 114 may include a computer system configured toprocess one or more transactions involving a financial accountassociated with a customer. For example, a transaction may be a purchaseof goods or services from a merchant that is made in association with afinancial account, such as a bank account or a credit card account.Transactions may be made at merchant POS terminal 127 by for example,swiping a credit card or making a payment using financial accountinformation stored on a smartphone in a digital wallet. Suchtransactions may be made at merchant locations or at a merchant websitevia the internet. Transactions may be made using for example, a creditcard, a debit card, a gift card, or other ways of conveying financialaccount numbers and/or account credentials that are known in the art.Transaction server 114 may have one or more processors 152 and one ormore transaction server databases 154, which may be any suitablerepository of transaction data. Information stored in transaction server114 may be accessed (e.g., retrieved, updated, and added to) via localnetwork 116 and/or network 106 by one or more devices of system 100.According to some embodiments, transaction server 114 may store accountnumbers, such as primary account numbers (PANs) associated withcredit/debit cards or other such financial account numbers, that may beused in transaction monitoring as described in greater detail below.Such account numbers may be associated with for example, financialaccounts that are associated with the gift recipient or a tokenized PANassociated with a financial account of the gifter. According to someembodiments, a tokenized PAN may be a temporary PAN linked to anunderlying financial account (e.g., the gifter's credit card account)that allows a user to make purchases against the financial accountwithin predetermined limitations, such as at predetermined merchants,merchant categories, geographic areas or time periods. In someembodiments, transaction server 114 may store rules, conditions,restrictions or other such limitations that are associated with a giftand that may be applied to an attempted transaction to determine if theattempted transaction should be authorized and/or identified as agift-eligible transaction.

According to some embodiments, transaction server 114 may receivetransaction authorization data and/or requests from one or more merchantPOS terminals 127 based on an attempted transaction made at a merchant.For example, if a purchaser swipes a credit card at card readerassociated with merchant POS terminal 127 or types in a credit cardnumber on a website to make a purchase, merchant POS terminal 127 maygenerate a transaction authorization request and transmit thetransaction authorization request to transaction server 114. Suchtransaction authorization requests may include data indicative of afinancial account (e.g., a PAN or account number) used to make apurchase, a time stamp, and merchant code associated with the merchantand/or location at which the attempted purchase was made. According tosome embodiments, transaction server 114 may determine whether toauthorize a transaction and/or whether the transaction is agift-eligible transaction based on the transaction authorization requestand any conditions or limitations associated with a gift that isassociated with the transaction and the method of providing the gift.For example, in some embodiments, a gift may be provided to the giftrecipient as a tokenized PAN that may be used as a payment method by thegift recipient at merchant POS terminal 127. In some embodiments, a giftmay be provided to the gift recipient in the form of a funds transfer orreimbursement to a financial account of the gift recipient, in responseto determining that a gift-eligible transaction was made using afinancial account associated with the gift recipient. In either case,the associated gift may include conditions such as a specifiedredemption merchant or window of time at which the gift may be used.Thus, in some embodiments, transaction server 114 may identify attemptedtransactions made by the gift recipient based on monitoring transactionauthorization data, and then may further determine whether the attemptedtransaction is authorized or designated as a gift-eligible transactionby applying the associated gift limitations to the data associated withthe transaction authentication request. Attempted transactions thatsatisfy the associated gift limitations may be referred to asgift-eligible transactions.

In some embodiments, in response to authorizing a transaction,transaction server 114 may store a record of the transaction and updateaccount information such as the balance of the account. Although thepreceding description was made with respect to a credit card, it shouldbe understood that other embodiments relating to other types of paymentmethods such as debit cards, gift cards, and any other such type offinancial account, including online financial accounts, are contemplatedas well.

According to some embodiments, transaction server 114 may determine theidentity of a merchant associated with an attempted transaction based onthe merchant category code (which may be referred to herein as a“merchant code”) included in the transaction authorization data and/orother transaction authorization data such as the zip code and countrycode. For example, in some embodiments, transaction server 114 may beconfigured to determine the identity of the business, such as aparticular chain of fast food restaurants, based on the merchant code.According to some embodiments, transaction server 114 may determineinformation about the merchant associated with a transaction such as themerchant's name, type/category of merchant, location, address and thelike, by utilizing third party data and/or machine learning techniquesto derive such information. According to some embodiments, transactionserver 114 may be configured to determine one or more of a merchantdescription, a merchant name, a merchant location/address/zipcode/country code based on a transaction ID associated with thetransaction. In some embodiments, transaction server 114 may beconfigured to determine the location or address of the attemptedpurchase based on the merchant category code or other data provided witha transaction authorization request. According to some embodiments, ifthe identity of the merchant may not be determined solely based on themerchant category code, it may be determined based on the merchantcategory code in conjunction with the location information derived fromthe transaction authorization request. In some embodiments, transactionserver 114 may be configured to determine the type of business at whichthe attempted transaction is made based on the merchant category code,such as whether the merchant is a restaurant, gas station, book store,movie theater or the like. In some embodiments, transaction server 114may cleanse the raw transaction data and output transaction data thathuman readable. For example, transaction server 114 may receivetransaction authorization data associated with a transaction that has atransaction ID of NCPI567 and may cleanse the transaction to output thatthe transaction took place at a restaurant called “Burger Joint” that islocated at 123 Main Street. By using transaction authorization requestdata to identify the merchant at which a gift is used, system 100 mayallow a gifter to create a customized gift to a wide variety ofmerchants without requiring the merchant to be registered with thesystem, thereby allowing a user to create a customized gift to amerchant at which gifts may not otherwise be available for purchase.

According to some embodiments, transaction server 114 may include atransaction listener 115 that may be configured to monitor transactionauthorization data that originates from, for example, one or moremerchant POS terminals or devices. According to some embodiments,transaction listener 115 may monitor incoming transaction authorizationrequests to identify attempted transactions that are associated with oneor more stored account numbers of PANs. For example, for each attemptedtransaction, transaction listener 115 may compare a PAN/account numberassociated with the attempted transaction with a specified PAN/accountnumber to identify all attempted transactions associated with thespecified PAN/account number. For example, transaction listener 115 mayidentify one or more attempted transactions associated with a particularcredit card account by monitoring transaction authorization request datato identify attempted transactions that were made in association withpayment method associated with a PAN that matches the PAN of thespecified credit card. According to some embodiments, transactionlistener 115 may receive transaction authorization requests in real timeif, for example, a financial account associated with the attemptedpayment method is part of a network associated with organization 108. Insome embodiments, transaction listener 115 may receive a batch oftransaction authorization requests at a particular time, such as at theend of the day, if, for example, the financial account associated withthe attempted payment method is not part of a network associated withorganization 108. Accordingly, in some embodiments, transaction listener115 may monitor transaction authorization data in real time (or, in veryclose temporal proximity to when each attempted transaction is made),and in some embodiments transaction listener 115 may monitor transactionauthorization data in batches at specified intervals, or somecombination of both. In this way, transaction server 114 may beconfigured to monitor, identify and authorize or reject and/or classifyas gift-eligible attempted transactions associated with a specifiedfinancial account in real time and/or intermittently at intervals.

According to some embodiments, transaction server 114 may be configuredto send and/or initiate payments from a financial account in response toauthorizing an attempted transaction associated with the account. Forexample, if transaction server 114 authorizes a particular transactionmade using a specified financial account at a merchant, then transactionserver 114 may generate an instruction to debit the specified financialaccount with the amount of the transaction and credit an accountassociated with the merchant with the same amount. In some embodiments,if transaction server 114 authorizes an attempted transaction associatedwith a tokenized PAN, then transaction server may initiate a paymentfrom an account associated with the tokenized PAN (such as a financialaccount of the gifter) to a merchant at which the payment was made.According to some embodiments, transaction server 114 may initiate afunds transfer, such as an ACH transfer for example, from a financialaccount associated with a gifter to a financial account associated witha gift recipient upon detecting a gift-eligible transaction associatedwith an account of the gift recipient. According to some embodiments, ifthe funds are being transferred between two accounts that are bothassociated with an entity associated with organization 108, suchtransfers may occur instantaneously or substantially instantaneously.According to some embodiments, if one or more of the accounts involvedin the transfer is not associated with an entity associated withorganization 108, then transaction server may communicate with thirdparty financial server 128 to carry out the transfer and there may be adelay of, for example, one or two business days in transferring thefunds. In some embodiments, a funds transfer may alternatively includeone or more of an account credit, a transfer of rewards points, or billpayments made to the gift recipient's credit card account.

Local network 116 may comprise any type of computer networkingarrangement used to exchange data in a localized area, such as WiFi,Bluetooth™ Ethernet, and other suitable network connections that enablecomponents of organization 108 to interact with one another and toconnect to network 106 for interacting with components in systemenvironment 100. In some embodiments, local network 116 may comprise aninterface for communicating with or linking to network 106. In otherembodiments, components of organization 108 may communicate via network106, without a separate local network 116.

According to some embodiments, database 118 may be a database associatedwith organization 108 and/or its related entity that may store a varietyof information relating to customers, transactions, customerinformation, and business operations. Database 118 may also serve as aback-up storage device and may contain data and information that is alsostored on, for example, local databases associated with web server 110,location services server 112, transaction server 114, or giftapplication server 120. Database 118 may be accessed by other devicesand may be used to store records of every interaction, communication,and/or transaction a particular customer has had with organization 108and/or its related entity. According to some embodiments, database 118may store data associated with current or past gifts sent or received byusers of system 100, such as for example, data identifying a sender of agift, a receiver of a gift, an amount of a gift, an account designatedto pay for the gift or to receive a reimbursement for the gift, thestores and/or types of stores that the gift is authorized to be redeemedat, electronic lock information associated with a gift, an expirationand/or an authorized usage date of a gift, and any other suchinformation that may be pertinent to the provision of a gift.

Gift application server 120 may include a computer system configured tofacilitate the creation and transmission of a locked electronic item,such as a customizable gift from a gifter that may be associated with afirst user device 102 to a gift recipient that may be associated with asecond user device 102. According to some embodiments, gift applicationserver 120 may generate an electronic gift associated with a gifterfinancial account in response to receiving gift information via, forexample, a software application running on user device 102. In someembodiments, gift application server 120 may associate an electroniclock with the gift such that the gift must be unlocked by the giftrecipient prior to access or use. According to some embodiments, andelectronic lock may include a lock clue and a lock solution that may bespecified or selected by the gifter via, for example, gift mobileapplication 402 installed on gifter user device 102, as described ingreater detail below.

In some embodiments, gift application server 120 may be configured toreceive and/or generate a locked gift in response to user inputsreceived from the gifter's user device 102. According to someembodiments, gift application server 120 may cause an indication of thelocked gift to be transmit to gift recipient's user device 102. Forexample, gift application server 120 may cause system 100 to send giftrecipient's user device 120 a message indicating that a locked gift hasbeen created for gift recipient and may provide data representative ofthe electronic lock and/or a lock clue for display by the giftrecipient's user device 102. Upon system 100 determining that a correctlock solution has been input by the gift recipient, gift applicationserver 120 may unlock the gift. According to some embodiments, unlockingthe gift may include making some or all of the features of the gift(e.g., the identity of the gifter, the gift amount, the associatedredemption merchant(s) and gift limitation(s)) available for display bythe gift recipient's user device 102. In some embodiments, unlocking thegift may include making the gift available for use, by for example,transmitting or providing access to a tokenized PAN for use by the giftrecipient or activating transaction monitoring with respect to one ormore financial accounts of the gift recipient in the case where a giftmay be provided by a funds transfer or reimbursement to an account ofthe gift recipient following a gift-eligible transaction made by thegift recipient. In some embodiments, successful use of an unlocked giftmay be subject to the satisfaction of one or more conditions placed onthe gift by the gifter, as described in greater detail below.

According to some embodiments, gift application server 120 may receive agift creation request, that may include gift information and/or a gifttoken creation request, from user device 102 that is associated with thegifter. The gifter may, for example, specify features and conditions ofthe gift, that may include one or more of a selection of the giftrecipient, a gift account that is associated with the gifter from whichthe funds for the gift may be taken from or debited against, a giftamount, one or more redemption merchants, one or more types ofredemption merchants, one or more redemption locations, or a specifiedtimeframe in which the gift must be redeemed. The gifter may alsospecify or select an electronic lock to be associated with the gift, byinputting or selecting a lock solution and a lock clue. In someembodiments, the gifter may specify other conditions relating to theelectronic lock, such as a maximum number of unlock attempts after whichthe electronic lock may not be unlocked, additional clues that may bedisplayed by the gift recipient user device 102 upon the occurrence ofsome specified event (e.g., after 3 failed attempts at entering a locksolution or after a certain number of days has passed), an access dateafter or before which the electronic lock may no longer be unlocked, agift unlock location representing a location at which the gift recipientor gift recipient's user device 102 must be present to unlock the gift,and one or more gift recipient verification requirements, such as arequirement that the gift recipient be positively identified by giftrecipient user device 102 by comparing biometric data (e.g.,fingerprint, facial image, voice recording, authenticating gestures, andthe like) obtained by one or more sensors of gift recipient user device102 with stored biometric data to verify the identity of the giftrecipient before unlocking the gift or via multi-factor authenticationby requiring the gift recipient to enter a one-time code generated bysystem 100 and sent to the gift recipient (e.g., via text message oremail).

According to some embodiments, the selection of a gift recipient may beany information sufficient to identify an individual, such as a name, ausername, a handle, a phone number, an address, an email address, or thelike. In some embodiments, both the gifter and the gift recipient mayhave preregistered user accounts with a gift mobile application that maystore financial account numbers of the respective users and may allowthe gifter to easily identify and select the individual the gifter isdesignating as the gift recipient. According to some embodiments, basedon the gift creation request, gift application server 120 may take stepsto prepare a gift for use prior to activation of the gift. For example,in some embodiments, where the gift may be delivered in the form of atokenized PAN sent to a device associated with the gift recipient, giftapplication server 120 may generate a tokenized PAN associated with to aspecified account of the gifter to be authorized for use and/ortransmitted to user device 102 of the gift recipient upon activation ofthe gift. In some embodiments, where the gift may be delivered in theform of a reimbursement made from a financial account of the gifter to afinancial account of the gift recipient, gift application server 120 mayidentify one or more financial accounts of the gift recipient that maybe used in transaction monitoring upon activation of the gift todetermine if a particular transaction is gift-eligible.

According to some embodiments, in response to receiving a gift creationrequest, gift application server 120 may determine one or more giftredemption locations that correspond to locations of one or moremerchants or types of merchants that are specified by the gift request.For example, if the gifter specifies that the gift is for a particularchain of movie theater, gift application server 120 may determine one ormore gift redemption locations that correspond to locations of thespecified chain of movie theaters. Alternatively, if the gifterspecifies that the gift is for movie theaters generally, thenapplication server 120 may determine one or more gift redemptionlocations that correspond to locations of any movie theater. Accordingto some embodiments, in response to receiving a gift creation request,gift application server 120 may determine one or more gift unlocklocations that correspond to locations at which the gift is authorizedto be unlocked. For example, if the gifter specifies that a gift unlocklocation is a particular school, then the gift recipient (or by proxythe gift recipient user device 102) must be present at the school inorder to attempt to unlock the electronic lock. In some embodiments, agift redemption location and a gift unlock location may be the same. Insome embodiments, a gift redemption location and a gift unlock locationmay be different. According to some embodiments, system 100 may beconfigured to allow gifter to specify that a portion of a single gift orone gift of a plurality of gifts is may be unlocked at different unlocklocations. In some embodiments, a gifter may specify that the giftrecipient's location may constitute a lock solution, such that a giftmay be unlocked if system 100 determines that gift recipient's userdevice 102 has entered a specified gift unlock location. Accordingly,system 100 may allow a gifter set up a kind of scavenger hunt that mayrequire a gift recipient to travel to various gift unlock locations inorder to unlock the entirety of a single gift or a plurality of gifts.

In some embodiments, gift application server 120 may determine giftredemption locations by accessing a stored a list of gift redemptionlocations that correspond to particular merchants and types ofmerchants. In some embodiments, gift application server 120 maydetermine the gift redemption location(s) by communicating with amerchant database terminal 126 to obtain the locations of merchantstores from the merchant directly. In some embodiments, gift applicationserver 120 may determine the gift redemption location(s) by searchingthe internet to determine one or more addresses associated with thespecified merchant or type of merchant, in a particular region forexample. According to some embodiments, gift application server 120 maydetermine gift redemption locations that are within a predetermineddistance of a location specified by the gifter (e.g., via a softwareapplication), a location of the gifter (as determined by location datareceived from gifter user device 102) or a location of the giftrecipient (as determined by location data received from gift recipientuser device 102). According to some embodiments, gift redemptionlocations and/or gift unlock locations may be defined by an areaassociated with a geofence, a coordinate or point on a map, or an areaon a map that is defined by a radius extending from a point orcoordinate on a map. According to some embodiments, a gift redemptionlocation and/or gift unlock location may be designated by the positionof one or more devices or beacons associated with a merchant or merchantPOS terminal 127. For example, a gift redemption location and/or giftunlock location may be defined by a particular Wi-Fi network that isassociated with a merchant POS terminal, such that when user device 102connects to the Wi-Fi network, user device 102 may then be considered tobe at the gift redemption location and/or gift unlock location. Further,in some embodiments, location data of a gift recipient may be obtainedfrom a third party service, such a social networking account in whichthe gift recipient has “checked in” at a location to indicate the user'spresence at a location or if another user has tagged the gift recipientat the location in an image or post on a social media service.

According to some embodiments, gift application server 120 may monitorthe location of gift recipient's user device 102 to determine if andwhen the gift recipient has entered a gift redemption location and/orgift unlock location. Accordingly, in some embodiments, system 100 mayreceive location data from user device 102, such as for example, globalpositioning satellite (GPS) data or wireless access point connectioninformation associated with the gift recipient user device 102.According to some embodiments, wireless access point connection data mayinclude the location of one or more wireless access points, such asWi-Fi routers, cellular telephone towers or any other such wirelesstransmitter that may be associated with a location. According to someembodiments, system 100 may determine the location of the gift recipientuser device 102 by based on the locations of the one or more wirelessaccess points by, for example, comparing the wireless access points thatare visible to the gift recipient user device 102 to the known locationsof the wireless access points. In some embodiments, system 100 mayreceive wireless access point information over time and may determinethe location of the gift recipient user device 102 by performingtriangulation of the signals and/or by tracking the change in signalstrength of each wireless access point as detected by the gift recipientuser device 102 over time. In some embodiments, gift recipient locationdata may include visual information obtained from an image capturedevice associated with the gift recipient user device 102, from whichsystem 100 may determine the approximate location of user device 102 by,for example, performing image recognition on the image to identify asign or landmark.

According to some embodiments, system 100 may prevent a gift that hasnot yet been activated or unlocked from being redeemed. Thus, in someembodiments, upon determining that the gift recipient user device 102has entered a gift redemption location and/or that the correct locksolution has been input to unlock the electronic lock, gift applicationserver 120 may activate and/or unlock the associated gift so that it maybe redeemed. In some embodiments, activating and/or unlocking a gift mayinclude transmitting a tokenized PAN to gift recipient user device 102for use by the gift recipient and initiating of monitoring oftransaction authorization data to identify a purchase made with thetokenized PAN in accordance with any specified gift limitations. In someembodiments, activating and/or unlocking a gift may include initiatingmonitoring of transaction authorization data to identify a purchase madewith a known financial account of the gift recipient in accordance withany specified gift limitations (i.e., a gift-eligible purchase) andinitiating a funds transfer to reimburse the gift recipient from anaccount of the gifter for the cost of the gift-eligible purchase. Insome embodiments, upon determining that the gift recipient user device102 has entered a gift redemption location and/or gift unlock location,gift application server 120 may cause system 100 to generate and send anotification to the gifter and/or gift recipient via for example, textmessage, email or through a mobile application installed on user device102, to provide a notice that the gift has been activated or isavailable to be unlocked, respectively, and may provide details of thegift such as the gift amount and any limitations on the gift that werespecified by the gifter. In this way, system 100 may allow a gifter tocreate a customized, electronically locked, location-activated gift thatmay only be used upon system 100 determining that gift recipient's userdevice 102 has entered a gift redemption location to activate the giftand that the correct lock solution has been entered to unlock the gift.According to some embodiments, system 100 may be configured to allowgifter to specify a date before or after which the gift may not beactivated and/or unlocked. For example, a gifter may create a gift foruse at a particular chain of movie theaters but may specify that thegift may not be activated and/or unlocked until after a specified date,and so if the gift recipient visits one of the specified movie theatersprior to the specified date, the gift will not be activated or madeavailable to be unlocked, but it may be activated or unlocked in thefuture if the gift recipient visits one of the specified movie theatersafter the specified date.

In some embodiments, gift application server 120 may receive data fromgift recipient user device 102 that is representative of an attemptedlock solution input by the gift recipient. Gift application server 120may compare the attempted lock solution to a stored location solutionthat is associated with the gift to determine if the correct locksolution has been entered. In some embodiments, gift application server120 may provide notifications to the gifter user device 102 and/or thegift recipient user device 102 representative of a gift recipient'sattempts to unlock the gift. In some embodiments, gift applicationserver 120 may transmit the gift solution to gift recipient user device102 and gift recipient user device 102 may perform the function ofdetermining whether a correct lock solution has been input. In someembodiments, gift application server 120 may receive data from gifteruser device 102 representative instructions to permanently lock, unlock,or modify an electronic lock displayed by gift recipient user device102. For example, in some embodiments, the gifter may monitor the giftrecipients attempts to unlock the gift and may determine after severalunsuccessful attempts that a lock clue associated with the electroniclock does not provide enough information to the gift recipient toreasonably figure out the lock solution, in which case the gifter mayupdate the lock clue (e.g., via gift mobile application) and giftapplication server 120 may receive the update from the gifter userdevice 102 and transmit the update to the gift recipient user device tomodify the gift clue. In some embodiments, system 100 may allow thegifter to input a portion of the gift solution to be displayed by thegift recipient user device 102 to aid the gift recipient in determiningthe correct lock solution. In some embodiments, system 100 may allowgifter to remotely unlock the gift via a user input to, for example,gift mobile application 402.

Merchant database terminal 126 may have one or more processors 162 andone or more merchant databases 164, which may be any suitable repositoryof merchant data. Merchant database terminal 126 may be located at thePOS location, off-site at another merchant location, or at a third-partylocation. Information stored in merchant database terminal 126 may beaccessed (e.g., retrieved, updated, and added to) via network 106 by oneor more devices (e.g., service provider terminal 110) of system 100. Inother embodiments, merchant POS terminal 127 may be configured toprocess online transactions on behalf of the associated merchant.Merchant database 164 may store information relating to products andservices offered by merchants such as pricing, quantity, availability,discounts, reviews, and any other such generally available informationthat a consumer may utilize in making a purchasing decision. In someembodiments, merchant database 164 may also include location informationassociated with products and services that identifies the location(s)that a particular product or service is available for purchase. In someembodiments, the location information may include an identification of aparticular store, terminal, or kiosk that the product or service may bepurchased from.

Merchant POS terminal 127 may have one or more POS devices 172, 174, 176that communicate with one or more devices (e.g., user device 102) ofsystem 100 via network 106. In some embodiments, POS devices 172, 174,176 may devices that are configured to receive or obtain paymentinformation from user device 102. For example, one or more POS devices172 174, 176 may include a near-field communication interface, aBluetooth communication interface, a WiFi communication interface, orany other such communication interface that may enable communicationbetween merchant POS terminal 127 and user device 102. In someembodiments, one or more POS devices 172, 174, 176 may include a scannerfor scanning images or data that convey payment information displayed byuser device 102, an image capture device for capturing images displayedby user device 102, a card-reading device for obtaining paymentinformation from a card (e.g., by reading a chip imbedded in the card orreading information from a magnetic strip), or a keypad for receiving auser input representative of payment information (e.g., a typed creditcard number).

Third party financial server 128 may include a computer systemconfigured to store information related financial accounts, such aschecking accounts, savings accounts, credit cards accounts, and thelike. For example, third party financial server 128 may store accountnumbers, PANs, balances, transaction data, fund transfer information,and user account information. According to some embodiments, a gifterand/or a gift recipient may have one or more financial accountsassociated with third party financial server. In some embodiments,transaction server 114 and/or gift application server 120 may beconfigured to send instructions to third party financial server 128 vianetwork 106 to cause third party financial server 128 to debit afinancial account associated with third party financial server 128 orinitiate a transfer of funds between financial accounts, such as anaccount of the gifter and an account of the gift recipient (such debitor credit constituting the gift). Accordingly, in some embodiments, giftapplication server 120 may store login credentials of financial accountsassociated with the gifter and/or gift recipient and transmit suchcredentials to third party financial server 128 as necessary to initiatesuch transactions.

Although the preceding description describes various functions of a webserver 110, location services server 112, transaction server 114,database 118, gift application server 120, merchant database terminal126, merchant POS terminal 127 and third party financial server 128, insome embodiments, some or all of these functions may be carried out by asingle computing device. For example, some or all of the functions ofweb server 110, location services server 112, transaction server 114,database 118 and gift application server 120 may be carried out by asingle device.

For ease of discussion, embodiments may be described in connection withuse of a mobile application on a mobile device to create, customize,send and receive, and in particular, gifts with customized lockingmechanisms that may be redeemed at specified merchants. It is to beunderstood, however, that disclosed embodiments are not limited to useof sending gifts with customized locks, but also contemplate the sendingof custom-locked messages, files, data, images, animations, video, an“emoji bomb” that showers emojis or other images on the display screenof the gift recipient user device 102 upon receiving, opening oractivating a gift, or other additional such features or other mediafiles. Further, steps or processes disclosed herein are not limited tobeing performed in the order described, but may be performed in anyorder, and some steps may be omitted, consistent with the disclosedembodiments.

The features and other aspects and principles of the disclosedembodiments may be implemented in various environments. Suchenvironments and related applications may be specifically constructedfor performing the various processes and operations of the disclosedembodiments or they may include a general-purpose computer or computingplatform selectively activated or reconfigured by program code toprovide the necessary functionality. Further, the processes disclosedherein may be implemented by a suitable combination of hardware,software, and/or firmware. For example, the disclosed embodiments mayimplement general purpose machines configured to execute softwareprograms that perform processes consistent with the disclosedembodiments. Alternatively, the disclosed embodiments may implement aspecialized apparatus or system configured to execute software programsthat perform processes consistent with the disclosed embodiments.Furthermore, although some disclosed embodiments may be implemented bygeneral purpose machines as computer processing instructions, all or aportion of the functionality of the disclosed embodiments may beimplemented instead in dedicated electronics hardware.

The disclosed embodiments also relate to tangible and non-transitorycomputer readable media that include program instructions or programcode that, when executed by one or more processors, perform one or morecomputer-implemented operations. The program instructions or programcode may include specially designed and constructed instructions orcode, and/or instructions and code well-known and available to thosehaving ordinary skill in the computer software arts. For example, thedisclosed embodiments may execute high level and/or low-level softwareinstructions, such as machine code (e.g., such as that produced by acompiler) and/or high level code that can be executed by a processorusing an interpreter.

An exemplary embodiment of gift application server 120 is shown in moredetail in FIG. 2. Web server 110, location services server 112,transaction server 114, merchant database terminal 126, merchant POSterminal 127, third party financial server 128 and/or user device 102may have a similar structure and may include many components that aresimilar to or even have the same capabilities as those described withrespect to gift application server 120. As shown, gift applicationserver 120 may include a processor 210, an input/output (“I/O”) device220, a memory 230 containing an operating system (“OS”) 240 and aprogram 250. For example, gift application server 120 may be a singledevice or server or may be configured as a distributed computer systemincluding multiple servers, devices, or computers that interoperate toperform one or more of the processes and functionalities associated withthe disclosed embodiments. In some embodiments, gift application server120 may further include a peripheral interface, a transceiver, a mobilenetwork interface in communication with the processor 210, a busconfigured to facilitate communication between the various components ofgift application server 120, and a power source configured to power oneor more components of gift application server 120.

A peripheral interface may include hardware, firmware and/or softwarethat enables communication with various peripheral devices, such asmedia drives (e.g., magnetic disk, solid state, or optical disk drives),other processing devices, or any other input source used in connectionwith the instant techniques. In some embodiments, a peripheral interfacemay include a serial port, a parallel port, a general purpose input andoutput (GPIO) port, a game port, a universal serial bus (USB), amicro-USB port, a high definition multimedia (HDMI) port, a video port,an audio port, a Bluetooth™ port, a near-field communication (NFC) port,another like communication interface, or any combination thereof.

In some embodiments, a transceiver may be configured to communicate withcompatible devices and ID tags when they are within a predeterminedrange. A transceiver may be compatible with one or more of:radio-frequency identification (RFID), near-field communication (NFC),Bluetooth™, low-energy Bluetooth™ (BLE), WiFi™, ZigBee™, ambientbackscatter communications (ABC) protocols or similar technologies.

A mobile network interface may provide access to a cellular network, theInternet, a local area network, or another wide-area network. In someembodiments, a mobile network interface may include hardware, firmware,and/or software that allows the processor(s) 210 to communicate withother devices via wired or wireless networks, whether local or widearea, private or public, as known in the art. A power source may beconfigured to provide an appropriate alternating current (AC) or directcurrent (DC) to power components.

Processor 210 may include one or more of a microprocessor,microcontroller, digital signal processor, co-processor or the like orcombinations thereof capable of executing stored instructions andoperating upon stored data. Memory 230 may include, in someimplementations, one or more suitable types of memory (e.g. such asvolatile or non-volatile memory, random access memory (RAM), read onlymemory (ROM), programmable read-only memory (PROM), erasableprogrammable read-only memory (EPROM), electrically erasableprogrammable read-only memory (EEPROM), magnetic disks, optical disks,floppy disks, hard disks, removable cartridges, flash memory, aredundant array of independent disks (RAID), and the like), for storingfiles including an operating system, application programs (including,for example, a web browser application, a widget or gadget engine, andor other applications, as necessary), executable instructions and data.In one embodiment, the processing techniques described herein areimplemented as a combination of executable instructions and data withinthe memory 230.

Processor 210 may be one or more known processing devices, such as amicroprocessor from the Pentium™ family manufactured by Intel™ or theTurion™ family manufactured by AMD™. Processor 210 may constitute asingle core or multiple core processor that executes parallel processessimultaneously. For example, processor 210 may be a single coreprocessor that is configured with virtual processing technologies. Incertain embodiments, processor 210 may use logical processors tosimultaneously execute and control multiple processes. Processor 210 mayimplement virtual machine technologies, or other similar knowntechnologies to provide the ability to execute, control, run,manipulate, store, etc. multiple software processes, applications,programs, etc. One of ordinary skill in the art would understand thatother types of processor arrangements could be implemented that providefor the capabilities disclosed herein.

Gift application server 120 may include one or more storage devicesconfigured to store information used by processor 210 (or othercomponents) to perform certain functions related to the disclosedembodiments. In some embodiments, gift application server 120 mayinclude memory 230 that includes instructions to enable processor 210 toexecute one or more applications, such as server applications, networkcommunication processes, and any other type of application or softwareknown to be available on computer systems. Alternatively, theinstructions, application programs, etc. may be stored in an externalstorage or available from a memory over a network. The one or morestorage devices may be a volatile or non-volatile, magnetic,semiconductor, tape, optical, removable, non-removable, or other type ofstorage device or tangible computer-readable medium.

In some embodiments, gift application server 120 may include memory 230that includes instructions that, when executed by processor 210, performone or more processes consistent with the functionalities disclosedherein. Methods, systems, and articles of manufacture consistent withdisclosed embodiments are not limited to separate programs or computersconfigured to perform dedicated tasks. For example, gift applicationserver 120 may include memory 230 that may include one or more programs250 to perform one or more functions of the disclosed embodiments.Moreover, processor 210 may execute one or more programs 250 locatedremotely from system 100. For example, system 100 may access one or moreremote programs 250, that, when executed, perform functions related todisclosed embodiments. In some embodiments, gift application server 120may include a program that when executed, processes a request from agifter to provide a gift to a gift recipient and creates, provides andadministers the gift as disclosed herein.

Memory 230 may include one or more memory devices that store data andinstructions used to perform one or more features of the disclosedembodiments. Memory 230 may also include any combination of one or moredatabases controlled by memory controller devices (e.g., server(s),etc.) or software, such as document management systems, Microsoft™ SQLdatabases, SharePoint™ databases, Oracle™ databases, Sybase™ databases,or other relational or non-relational databases. Memory 230 may includesoftware components that, when executed by processor 210, perform one ormore processes consistent with the disclosed embodiments. In someembodiments, memory 230 may include a database 260 for storing relateddata to enable gift application server 120 to perform one or more of theprocesses and functionalities associated with the disclosed embodiments.

Gift application server 120 may also be communicatively connected to oneor more memory devices (e.g., databases) locally or through a network.The remote memory devices may be configured to store information and maybe accessed and/or managed by CSR terminal 122. By way of example, theremote memory devices may be document management systems, Microsoft™ SQLdatabase, SharePoint™ databases, Oracle™ databases, Sybase™ databases,or other relational or non-relational databases. Systems and methodsconsistent with disclosed embodiments, however, are not limited toseparate databases.

Gift application server 120 may also include one or more I/O devices 220that may comprise one or more interfaces for receiving signals or inputfrom devices and providing signals or output to one or more devices thatallow data to be received and/or transmitted by gift application server120. For example, gift application server 120 may include interfacecomponents, which may provide interfaces to one or more input devices,such as one or more keyboards, mouse devices, touch screens, track pads,trackballs, scroll wheels, digital cameras, microphones, sensors, andthe like, that enable gift application server 120 to receive data fromone or more users. Gift application server 120 may include a display, ascreen, a touchpad, or the like for displaying images, videos, data, orother information.

In exemplary embodiments of the disclosed technology, gift applicationserver 120 may include any number of hardware and/or softwareapplications that are executed to facilitate any of the operations. Theone or more I/O interfaces may be utilized to receive or collect dataand/or user instructions from a wide variety of input devices. Receiveddata may be processed by one or more computer processors as desired invarious implementations of the disclosed technology and/or stored in oneor more memory devices.

FIG. 3 shows an example embodiment of user device 102. As shown, userdevice 102 may include a processor 310; an input/output (“I/O”) device320; a memory 330 containing an operating system (“OS”) 340, a database355, which may be any suitable repository of data, which may include adigital wallet for storing digital gifts and payment information, and/ora program 350; a geographic location sensor (“GLS”) 360 for determiningthe geographic location of user device 102; a user interface (“U/I”)device 370 for receiving user input data, such as data representative ofa click, a scroll, a tap, a press, or typing on an input device that candetect tactile inputs; a gyroscope and/or an accelerometer 380 and/orany other sensor configured to detect motion of user device 102; and/ora display 390 for displaying digital images and/or video. As describedin greater detail below, in some embodiments, program 350 may include agift mobile application that may be a software application configured torun on user device 102. According to some embodiments, the gift mobileapplication may allow users to create, customize, send and receivelocked electronic gifts as described further herein. In someembodiments, user input data may include biometric data associated witha user of user device 102 obtained by one or more sensors, such as afingerprint scanner, a microphone, an image capture device, and thelike. According to some embodiments, biometric data may be used toauthenticate a user prior to creating, customizing, sending or utilizingan electronic gift. For example, in some embodiments, the gift mobileapplication may require a user to authenticate themselves using, forexample, fingerprint data obtained from a fingerprint scanner of userdevice 102 prior to sending or using an electronic gift. It will beunderstood that other such authentication methods such as facialrecognition, voice recognition, gesture recognition, username/passwordlogin, multi-factor authentication (e.g., sending a user anauthentication code via an email or text message) and the like may alsobe used in a similar manner. In some embodiments, I/O device 320 mayinclude a transceiver for sending and receiving wireless signals, suchas Wi-Fi, cellular, Bluetooth, near-field communication, and any othersuch type of signal. In some embodiments, user device 102 may furtherinclude a peripheral interface, a mobile network interface incommunication with processor 310, a bus configured to facilitatecommunication between the various components of user device 102, and/ora power source configured to power one or more components of user device102. According to some embodiment, electronic gifts may be transmittedand stored using standard encryption techniques to add additionalsecurity. The various components of user device 102 may include the sameor similar attributes or capabilities of the same or similar componentsdiscussed with respect to gift application server 120.

FIGS. 4A-B show example embodiments of user interfaces of a gift mobileapplication 402 being run on user device 102. According to someembodiments, gift mobile application 402 may be a software applicationthat is configured to allow a gifter to create, customize and send agift to a selected gift recipient using a first user device 102.According to some embodiments, a gift recipient may have a second userdevice 102 that may receive a gift sent by the gifter. In someembodiments, second user device 102 may receive the gift via gift mobileapplication 402 that is installed on second user device 102. In someembodiments, second user device 102 may not have gift mobile application402 installed, but may be configured to receive the gift via, forexample, an email or a text message. FIG. 4A shows an example embodimentof a user interface of gift mobile application 402 that is configured toallow a gifter to select a gift recipient and FIG. 4B shows an exampleembodiment of a user interface of gift mobile application 402 that isconfigured to allow a gifter to select and configure a gift to send tothe selected gift recipient. According to some embodiments, gift mobileapplication 402 may facilitate communication between user device 102 andgift application server 120. In some embodiments, gift mobileapplication 402 may facilitate communication or the sending of messagesbetween gifter user device 102 and gift recipient user device 102. Forexample, gift mobile application 402 may enable the gift recipient torecord and send a thank you message to the gifter, or in someembodiments may initiate a telephonic or video link between gifter userdevice 102 and gift recipient user device 102 upon the gift recipientreceiving or using the gift. According to some embodiments, if atelephonic or video link cannot be established immediately (e.g., due toa user being out of cell tower range), mobile application 402 mayautomatically attempt to establish the link upon detecting a user device102 has reconnected to a network (e.g., Wi-Fi, cellular, etc.) or mayintermittently try to establish the link upon after a period of time haspassed.

According to some embodiments, user device 102 may provide gift mobileapplication 402 with access to a contacts list stored by user device102, so that a user of gift mobile application 402 may select a storedcontact as a gift recipient. As will be appreciated by those of skill inthe art, a contacts list may comprise a plurality of records, where eachrecord corresponds to an individual or entity and includes associatedstored contact information such as a name, telephone number(s),address(es), and other such information. As shown in FIG. 4A, a userinterface of gift mobile application 402 may allow a gifter to select arecent contact 404 as the gift recipient by selecting a displayed imageor name associated with the recent contact 404. In some embodiments, arecent contact 404 may represent an individual that the gifter has givena gift to in the recent past via gift mobile application 402. In someembodiments, a recent contact 404 may represent an individual that auser has communicated with via user device 102 (e.g., via phone call,text message, email, etc.) in the recent past. According to someembodiments, a user interface of gift mobile application 402 may allow agifter to specify a gift recipient by searching for a name of anindividual using a text search field 406, which may cause gift mobileapplication 402 to perform a search of the contacts list stored on userdevice 102. According to some embodiments, a user interface of giftmobile application 402 may display some or all of a list of contacts 407from which to select a gift recipient. In some embodiments, thedisplayed list of contacts 407 may be configured to scroll to reveal adifferent portion of the list in response to receiving a user input,such as a vertical swipe on a touchscreen of user device 102.

In some embodiments, gift mobile application 402 may be configured toallow a gifter to select a plurality of gift recipients and the giftermay specify whether an identical gift is to be sent to all of the giftrecipients individually, or whether a single gift is to be sent to allof the gift recipients for their collective use. For example, a giftermay send three friends a gift of $100 to collectively spend at aparticular restaurant, meaning that the gift will be exhausted when $100is spent at the restaurant by any one of the gift recipients, or whenthe total amount of the gift is spent by adding up the expenditures ofall three gift recipients at the restaurant. Furthermore, in someembodiments, a gifter may send a location-based group gift in which thegifter specifies a redemption location and conditions the gift on theoccurrence that all gift recipients must be at the location to utilizethe gift. For example, if a gifter wants two friends to meet for lunch,the gifter may create a gift to a particular restaurant but specify thatboth friends must be physically present at the restaurant in order forthe gift to be used. In this case, gift application server 120 mayreceive location data (e.g., GPS data) from mobile devices of the giftrecipients and verify that both recipients' user devices 102 are presentat the specified restaurant location prior to allowing the gift to beused. In some embodiments, the system may allow a gifter to specify anunknown gift recipient based on a specified merchant or location. Forexample, if a gifter is buying a cup of coffee and they want to buy acoffee for the person in line behind them (or another stranger), theymay select a “pay it forward” feature of the gift mobile application 402that may allow the gifter to provide a gift to the next person who makesa purchase from the location at which the gifter has just made apurchase.

As shown in FIG. 4B, in some embodiments, a user interface of giftmobile application 402 may allow a gifter to select and/or configure agift to send to a gift recipient by inputting or selecting a giftamount, which may also be referred to as a maximum gift amount, and oneor more redemption locations. The gift amount may represent the maximumamount of value that may be withdrawn from an account associated withthe gifter in relation to the gift. The one or more redemption merchantsmay represent merchants, ecommerce websites, stores, or locations atwhich the gift is authorized to be used. For example, the gift recipientmay select a movie theater chain as the redemption merchant, which meansthat the gift recipient would only be authorized to redeem the gift atthe specified movie chain. According to some embodiments, gift mobileapplication 402 may provide a number of predetermined gift amounts 408that may be selected by the gifter. In some embodiments, the gifter maytype in a customized gift amount via a gift amount input field. Giftmobile application 402 may provide a number of predetermined or recentredemption merchants 412 that may be selected by the gifter selecting anicon or button associated with the associated redemption merchant 412.According to some embodiments, gifter may search for redemptionmerchants by inputting the name of a desired redemption merchant intoredemption merchant search field 412. According to some embodiments,gift application server 120 may store a list of redemption merchantsthat are compatible for use with system 100 and gift mobile application402 may communicate with gift application server 120 in response to asearch entered into redemption merchant search field 414 to receivesearch results. According to some embodiments, gift mobile application402 may provide a list of redemption merchants 415 that may be displayedand manipulated in a manner similar to the list of contacts 407 shown inFIG. 4A. In some embodiments, gift mobile application 402 may allow agifter to designate a type of redemption merchant instead of aparticular redemption merchant. For example, instead of selecting aparticular movie theater chain, the gifter may instead select “movietheaters,” and system 100 may enable the gift to be used at a pluralityof different movie theaters and chains of movie theaters based on aclassification of the merchant determined by system 100 when the gift isredeemed.

Including and in addition to aspects shown in FIGS. 4A-B, in someembodiments, gift mobile application 402 may be configured to enable agifter to specify or customize various other aspects of a gift,including, but not limited to, the gift recipient, the merchantidentity, merchant type, redemption location, the amount of the gift,media associated with the gift (e.g., messages, images, videos, look andfeel of the gift, artwork and the like sent in association with thegift), an account associated with the gifter from which to fund thegift, an account associated with the gift recipient for receivingpayments or reimbursements relating to the gift, an expiration dateand/or time of the gift after which the gift will no longer be valid foruse, an authorized use date and/or time of the gift before which thegift may not be authorized for use, an electronic locking mechanismassociated with the gift that is described in greater detail below.Further, in some embodiments, gift mobile application 402 may beconfigured to send and/or receive messages from gift application server120 or another user device 102. For example, in some embodiments, userdevice 102 associated with the gifter may receive notifications fromgift application server 120 and/or user device 102 associated with thegift recipient, such as a notification that the gift recipient hasredeemed the gift. Likewise, in some embodiments, user device 102associated with the gift recipient may receive notification from giftapplication server 120 and/or user device 102 associated with thegifter, such as, for example, messages sent from the gifter or clues toassist in unlocking an electronic locking mechanism associated with agift.

FIGS. 5A-D show example embodiments of electronic lock user interfacesof a gift mobile application 402 being run on user device 102. Inparticular, FIG. 5A shows an example embodiment of a user interface ofgift mobile application 402 that is configured to present a giftrecipient with an electronic lock and FIG. 5B shows an exampleembodiment of a user interface of gift mobile application 402 that showsuser inputs to the electronic lock user interface that represent anattempt to unlock a gift being restricted for use by the electronic lockof gift mobile application 402. FIG. 5C shows an example embodiment of auser interface of a gift mobile application 402 that allows a user toselect an unlock pattern to apply as a locking mechanism and FIG. 5Dshows an example embodiment of a user interface of a gift mobileapplication that allows a user to input a custom pattern as a lockingmechanism.

As shown in FIG. 5A, an electronic lock may include an electronic lockprompt 504 and an electronic lock interface 506. According to someembodiments, electronic lock prompt 504 may represent a clue orinstruction providing guidance to a gift recipient on how to solve theelectronic lock. According to some embodiments, the electronic lockprompt 504 may be specified by the gifter at the time of creation of thegift by selecting a predetermined lock prompt 504 or by providing acustomized lock prompt 504. In some embodiments, a lock prompt 504 maybe associated with a lock solution that represents the input that mustbe entered into electronic lock interface 506 to unlock a gift, message,or other file that is being protected by the electronic lock. Accordingto some embodiments, electronic lock interface 506 may comprise one ormore fields that may receive user inputs, such as for example, a numberof input boxes and spaces as shown in FIG. 5A. In some embodiments, thenumber of input boxes and spaces may be arranged and presented byelectronic lock interface 506 to correspond to the number of charactersand spacing associated with the lock solution. As shown in FIG. 5B, agift recipient may input a lock input 508 to attempt to unlock theelectronic lock. In the example shown in FIG. 5B, lock input 508represents a song title corresponding to electronic lock prompt 504.According to some embodiments, gift mobile application 402 may locallystore the lock solution associated with an electronic lock on userdevice 102. In such cases, gift mobile application 402 may unlock anassociated file, such as an electronic gift, a media file, an image, amessage, or any other such type of file, upon detecting that the giftsolution has been correctly entered into electronic lock interface 506.According to some embodiments, upon detecting that an incorrect giftsolution has been entered into electronic lock interface 506, giftmobile application 402 may cause user device 102 associated with thegift recipient to send an incorrect solution message to user device 102associated with the gifter. The incorrect solution message may provide anotification that the gift recipient has entered an incorrect solutionto the electronic lock and may provide the incorrect solution for thegifter's viewing and entertainment. According to some embodiments, thegift mobile application 402 may provide a messaging functionality thatmay allow the gifter to send additional clues to the gift recipient forviewing on user device 102. In some embodiments, gift mobile application402 may provide a remote unlock functionality that allows the gifter toremotely unlock a gift sent to the gift recipient, so that the giftermay authorize the gift recipient to access and use the gift despitefailed attempts at unlocking the gift. In some embodiments, gift mobileapplication 402 may be configured to enable a gifter to specify amaximum number of unlock attempts, such that in response to gift mobileapplication 402 determining that the gift recipient has incorrectlyattempted to unlock the electronic lock beyond the maximum number ofunlock attempts, then gift mobile application 402 may cancel the giftsent to the gift recipient and provide notifications to one or more ofthe gifter and the gift recipient that the gift has been cancelled dueto the gift recipients failure to unlock the gift within the number ofattempts specified by the gifter. According to some embodiments, anelectronic lock may comprise an image that a user must trace or color inby swiping on a touchscreen associated with user device 102. Forexample, in some embodiments, the electronic lock may be configured tounlock if the gift recipient traces around a target image within anaccuracy that falls within a predetermined confidence range.

In some embodiments, an electronic lock may include a trace lockingmechanism that includes an image or pattern specified by the gifter thatthe gift recipient may sufficiently trace or draw in order to unlock theelectronic lock. As shown in FIG. 5C, gift mobile application 402 mayinclude a user interface that may allow a gifter to input a selection ofone or more items to serve as a trace locking mechanism, which may serveas an electronic lock to an electronic item. For example, gift mobileapplication 402 may cause gifter user device 102 to display one or moreselectable buttons 510 that may each be associated with a predeterminedimage, icon, drawing or pattern that may correspond to a trace lockingmechanism solution. In some embodiments, a gifter may for example, viainput to user device 102, select a stored item image to serve as a tracelocking mechanism by selecting a selectable button 510. Alternatively,according to some embodiments, a gifter may create a customized tracepattern to serve as an electronic locking mechanism by selecting acustomization button 512 and then inputting (e.g., via user input to atouchscreen device) a custom trace locking mechanism 514 as shown inFIG. 5D.

According to some embodiments, in response to receiving a user inputindicative of a selection of a predetermined trace locking mechanism(e.g., a selection of a selectable button 510) or creation of a customtrace locking mechanism 514, system 100 (e.g., gift application server120) may associate the selected/custom trace locking mechanism with anelectronic gift or other electronic item (e.g., a media file, image,message, or other electronic file) selected by the gifter and to be sentto a gift recipient, such that the gift or other item may not beaccessed and/or utilized by the gift recipient until the gift recipienthas unlocked the trace locking mechanism by inputting a correspondingtrace locking mechanism solution. In other words, in some embodiments, agift recipient may receive an electronic gift or other electronic itemvia gift mobile application 402, but gift mobile application 402 mayprevent the recipient from accessing or utilizing the electronicgift/item until the recipient properly unlocks the trace lockingmechanism by inputting a corresponding trace locking mechanism solution.In some embodiments, gift application server 120 may store the gift orelectronic item until determining that the electronic lock has beenunlocked, at which point gift application server 120 may forward thegift or electronic item to gift recipient user device 102.

According to some embodiments, a trace locking mechanism may besuccessfully unlocked by a gift recipient in response to the giftrecipient entering a user input (e.g., a trace pattern input into atouch display of a user device 102) into gift recipient user device 102that satisfactorily corresponds to a trace locking mechanism solutionthat is associated with the trace locking mechanism. In someembodiments, a trace locking mechanism solution may be a trace patternthat corresponds to an image associated with the trace lockingmechanism. For example, if the trace locking mechanism is an image of abottle, then to unlock the associated electronic gift or otherelectronic item, a gift recipient may be required to trace an image ofthe bottle, by for example, swiping their finger or a stylus across atouchscreen of user device 102 in a trace pattern that satisfactorilymirrors the shape of the bottle. According to some embodiments, a tracepattern input by the gift recipient may be considered to satisfactorilymirror the shape of the trace locking mechanism solution if apredetermined amount of the trace pattern input by the gift recipientfalls within an inner boundary 516 and an outer boundary 518 of thetrace locking mechanism solution. In some embodiments, a trace patterninput by the gift recipient may be considered to satisfactorily mirrorthe shape of the trace locking mechanism solution if the trace patterninput by the gift recipient is exceeds a predetermined threshold ofsimilarity to the trace locking mechanism solution. According to someembodiments, gift application server 120 may determine a degree ofsimilarity between the trace pattern input by the gift recipient and thetrace locking mechanism by using image recognition techniques,statistical techniques and/or machine learning techniques. According tosome embodiments, the trace pattern input by the gift recipient may betransmit to gifter user device 102 so that gifter may indicate whetherthe gift recipient has input a correct solution or not. In suchembodiments, gift application server 120 may unlock the electronic lockin response to receiving an indication from gifter user device 102 thata satisfactory solution has been entered by gift recipient.

While web server 110, location services server 112, transaction server114, gift application server 120, merchant database terminal 126,merchant POS terminal 127, third party financial server 128 and userdevice 102 have been described as one form for implementing thetechniques described herein, those having ordinary skill in the art willappreciate that other, functionally equivalent techniques may beemployed. For example, as known in the art, some or all of thefunctionality implemented via executable instructions may also beimplemented using firmware and/or hardware devices such as applicationspecific integrated circuits (ASICs), programmable logic arrays, statemachines, etc. Furthermore, other implementations of the web server 110,location services server 112, transaction server 114, gift applicationserver 120, a merchant database terminal 126, merchant POS terminal 127,third party financial server or user device 102 may include a greater orlesser number of components than those illustrated. Furthermore,although much of the present disclosure is described with respect to thecreation and sending of a locked gift, it should be understood that itis contemplated that system 100 may allow the electronic locking andtransmission of other electronic items, such as for example, electronicfiles, media files, images, videos, messages, and the like.

FIG. 6 shows a flowchart of a method 600 for providing a lockedelectronic item, such as an electronically conveyed financial gift.Method 600 may be performed by a system including some or all of webserver 110, location services server 112, transaction server 114,database 118, gift application server 120, merchant database terminal126, merchant POS terminal 127, third party financial server 128 and oneor more user devices 102.

In block 610, the system (e.g., via gift application server 120) mayreceive, from a first computing device associated with a sender via asoftware application, a selection of an electronic lock and theelectronic item. In some embodiments, the electronic lock may include alock clue and a lock solution. According to some embodiments, theelectronic item may be an image. In some embodiments, the electronicitem may be a tokenized primary account number (PAN) or electronic giftcard. In some embodiments the electronic item may be a data file ormedia file. According to some embodiments, the system (e.g., via giftapplication server 120) may associate the electronic lock with theelectronic item such that the contents of the electronic item may not beviewed, accessed or used until the electronic lock is unlocked. Forexample, in some embodiments gift application server 120 may regulateaccess to a gift by storing the gift at the gift application server 120(or another remote storage location) until the electronic lockassociated with the electronic item is unlocked (either by the giftrecipient entering a correct solution or by the gifter instructing thesystem to unlock it), at which point the gift application server 120 mayforward the gift to the gift recipient user device 102. In someembodiments, the gift may be sent to the gift recipient user device 102prior to the associated electronic lock being unlocked, but the giftrecipient may be prevented from accessing or using the gift until giftapplication server 120 allows such access via gift mobile application402.

In block 620, the system (e.g., via gift application server 120) maydetermine, based on the lock solution, an answer input fieldconfiguration. In some embodiments, the answer input field configurationmay include a number of input boxes and spaces that are arranged tocorrespond to the lock solution. For example, if the lock solution isthe phrase “Lock solution”, then the answer input field configurationmay be a first series of four input boxes corresponding to each letterof “Lock” and a second series of eight input boxes corresponding to eachletter of “solution”, and one space representing the space between“Lock” and “solution”.

In block 630, the system (e.g., gift application server 120) maytransmit, to a second computing device associated with a recipient andfor display by the second computing device, the lock clue and the inputfield configuration.

In block 640, the system (e.g., gift application server 120) mayreceive, from the second computing device, an attempted lock solutioncomprising a set of characters, such as alphanumeric characters, equalto the number of input boxes. For example, the lock solution may becomprised of letters, numbers, and/or symbols that may conventionally becreated as user inputs using via a computer or smartphone keyboard. Insome embodiments, the set of alphanumeric characters may be configuredin spatial arrangement that corresponds to the input fieldconfiguration. For example, if the input field configuration correspondsto a first series of four input boxes and a second series of eight inputboxes separated by a space as described in the example above, then thecharacters of the attempted lock solution may also be in the form of a4-character “word” separated from an eight-character “word” by onespace.

In block 650, the system (e.g., gift application server 120) maytransmit the electronic item to the second computing device for displayor use by the second computing device. According to some embodiments,the system may transmit the electronic item in response to determiningthat the attempted lock solution matches the lock solution. According tosome embodiments, in response to determining that the attempted locksolution does not match the lock solution, the system may transmit afailure notification to the second computing device for display by thesecond computing device. In some embodiments, the failure notificationmay include an indication that the attempted lock solution is incorrect.

According to some embodiments, the system may transmit, to the firstcomputing device and for display by the first computing device, anunlock attempt notification, wherein the unlock attempt notificationcomprises an indication of the attempted lock solution and an indicationof a success or failure to unlock the electronic media item. In someembodiments, the unlock attempt notification may include an indicationof a number of failed unlock attempts. Accordingly, in some embodiments,system 100 may allow the sender of the locked electronic item to monitorthe recipient's attempts to unlock the item. In some embodiments, thesystem may receive an instruction to unlock the electronic item from thefirst computing device and transmit, to the second computing device andbased on the instruction to unlock the electronic item, an unlocknotification and the electronic item for display or use by the secondcomputing device. For example, if the sender of the locked electronicitem decides that the recipient is not going to solve the lock, therecipient may decide to nonetheless provide the recipient with access tothe item by remotely unlocking the item.

In some embodiments, the system may receive data representative of oneor more unlock conditions from the first computing device and prior totransmitting the electronic item to the second computing device, thesystem may verify that the one or more unlock conditions are satisfied.For example, in some embodiments, the system (e.g., gift applicationserver 120) may store the locked electronic item until the system hasreceived an indication that the lock has been properly solved, at whichpoint the system (e.g., via web server 112) may transmit the nowelectronic item to the recipient's device. Thus, in some embodiments,“locking” an item may mean that the item is not provided to therecipient device until it is unlocked. However, in some embodiments, thesystem may transmit the electronic item to the recipient device (e.g.,user device 102) along with the electronic lock, such that the recipientdevice prevents access to the locked item until the item is properlyunlocked. In some embodiments, a mobile application installed on therecipient device may serve to restrict access to the electronic itemwhile it is locked.

In some embodiments, the one or more unlock conditions may include anaccess date that may represent a date before which the locked item maynot be unlocked. Thus, in some embodiment, verifying that the one ormore unlock conditions are satisfied may include determining that thecurrent date is equal to or beyond the access date. In some embodiments,the one or more unlock conditions may include a maximum number of unlockattempts and verifying that the one or more unlock conditions aresatisfied may include determining that a number of attempted locksolutions received from the second device in relation to the electroniclock does not exceed the maximum number of unlock attempts. In someembodiments, the one or more unlock conditions may include a gift unlocklocation and verifying that the one or more unlock conditions aresatisfied may include determining, based on location data received fromthe second computing device, that the second computing device is withina predetermined proximity of the gift unlock location. According to someembodiments, the one or more unlock conditions may include a gift unlocklocation and method 600 may further include receiving, from the secondcomputing device in association with the attempted lock solution, animage obtained from an image capture device associated with the secondcomputing device and identifying a landmark in the image using imagerecognition techniques. In some embodiments, verifying that the one ormore unlock conditions are satisfied may include determining that theidentified landmark is within a predetermined proximity of the giftunlock location.

In some embodiments, the system may receive, from the second computingdevice in association with the attempted lock solution, an indication ofa positive identification of a user of the second computing device basedon one or more of: a positive identification of the user's fingerprintthat is obtained via a fingerprint scanner associated with the secondcomputing device, a positive identification of the user's face usingimage recognition techniques and based on an image obtained by an imagecapture device associated with the second computing device, a positiveidentification of a user's voice using voice recognition techniques andbased on an audio recording obtained by a microphone associated with thesecond computing device, or a positive identification of a user'sidentity based on matching motion data obtained from a gyroscopeassociated with the second computing device to a stored gestureassociated with authenticating the user's identity.

FIG. 7 shows a flowchart of a method 700 for providing a lockedelectronic item, such as an electronically conveyed financial gift.Method 700 may be performed by a system including some or all of webserver 110, location services server 112, transaction server 114,database 118, gift application server 120, a merchant database terminal126, merchant POS terminal 127, third party financial server 128 and oneor more user devices 102.

In block 710, the system (e.g., via user device 102) may receive, from acomputing device and via a software application, electronic lock datacomprising a lock clue, an answer field configuration, and an indicationof the electronic item. In some embodiments, the software applicationmay be installed on a recipient user device.

In block 720, the system (e.g., via user device 102) may display thelock clue and a number of input boxes each configured to receive anddisplay a single character. In some embodiments, the number of inputboxes and spacing of the input boxes may correspond to the answer fieldconfiguration.

In block 730, the system (e.g., user device 102) may receive, via a userinput device, an attempted lock solution. In some embodiments, theattempted lock solution may include a sequence of characters, whereineach character of the sequence of characters is input into one of thenumber of input boxes. For example, the recipient may use a keyboardassociated with the recipient user device 102 to input a letter intoeach input box that may be displayed by the recipient user device 102 inassociation with the lock clue.

In block 740, the system (e.g., user device 102) may transmit theattempted lock solution to the computing device.

In block 750, the system (e.g., user device 102) may receive theelectronic item from the computing device. For example, if the systemdetermines that the received attempted lock solution matches to a storedlock solution corresponding to the lock clue, then the system may unlockthe locked item and provide access to it.

In block 760, the system (e.g., user device 102) may display anotification indicating receipt of the electronic item. For example, arecipient user device 102 may receive the unlocked item and display anotification that the unlocked item has been received and is nowavailable to be accessed or used.

In some embodiments of method 700, the system may receive datarepresentative of a location-based unlock condition from the computingdevice. For example, a sender of the locked item may specify a conditionthat the item may only be unlocked when the recipient is at thespecified location. The system may display information representative ofan unlock location based on the data representative of thelocation-based unlock condition. The system may receive location datafrom a location sensor and transmit the location data to the computingdevice. In some embodiments, the system may receive, from the computingdevice, the electronic item in response to the computing devicedetermining based on the location data that the location-based unlockcondition is met.

According to some embodiments of method 700, the system may receive datarepresentative of a time-based unlock condition from the computingdevice, display information representative of an unlock time based onthe data representative of the time-based unlock condition, and receivethe electronic item from the computing device in response to thecomputing device determining based on the time data that the time-basedunlock condition is met. In other words, in some embodiments, a senderof the locked item may use system 100 to input a condition that thelocked item may only be unlocked during a specified time frame, andsystem 100 may verify that the time condition is met before allowing theitem to be unlocked.

According to some embodiments of method 700, the system may receive arequest for user authentication from the computing device and mayauthenticate a user prior to transmitting the attempted lock solution tothe computing device. In some embodiments, authenticating a user mayinclude one or more of: obtaining the user's fingerprint from afingerprint scanner and matching the obtained fingerprint to a storedfingerprint of the user within a predetermined confidence level,obtaining an image of the user's face from an image capture device andmatching the image to a stored image of the user's face using imagerecognition techniques, obtaining a recording of the user's voice from amicrophone and applying voice analysis techniques to positively identifythe user by comparing the recording to stored voice data associated withthe user, or obtaining motion data from a gyroscope and matching themotion data to a stored gesture within a predetermined confidence level,wherein the stored gesture represents an identifying gesture associatedwith the user.

FIG. 8 shows a flowchart of a method 800 for providing a lockedelectronic item, such as an electronically conveyed financial gift.Method 800 may be performed by a system including some or all of webserver 110, location services server 112, transaction server 114,database 118, gift application server 120, a merchant database terminal126, merchant POS terminal 127, third party financial server 128 and oneor more user devices 102.

In block 810, the system (e.g., via gift application server 120) mayreceive, from a first computing device associated with a sender via asoftware application, a selection of an electronic lock and theelectronic item. In some embodiments, the electronic lock may include alock clue, a lock image and a lock solution. According to someembodiments, the lock solution may represent a trace path associatedwith a portion of the image. In some embodiments, the lock solution maybe received from the first computing device. For example, according tosome embodiments, the lock solution may be a user-input trace patternmade by a user of the first computing device by tracing a line over aportion of the image using a touchscreen associated with the firstcomputing device.

In block 820, the system (e.g., via via gift application server 120) maytransmit the lock clue and lock image to a second computing deviceassociated with a recipient and for display by the second computingdevice.

In block 830, the system (e.g., via gift application server 120) mayreceive an attempted lock solution from the second computing device.According to some embodiments, the attempted lock solution may includean attempted trace pattern. In some embodiments, the attempted tracepattern may represent a user-input trace pattern made by a user of thesecond computing device by tracing a line over a portion of the imageusing a touchscreen associated with the second computing device.

In block 840, the system (e.g., via gift application server 120) maytransmit the electronic item to the second computing device for displayor use by the second computing device. In some embodiments, the systemmay transmit the electronic item in response to determining that theattempted lock solution matches the lock solution within a predeterminedconfidence level. According to some embodiments, determining that theattempted lock solution matches the lock solution within a predeterminedconfidence level may include: overlaying the attempted trace patternover the trace path, wherein the attempted trace pattern comprises aplurality of points, determining a plurality of verification distancesby, for each of the plurality of points of the attempted trace pattern,determining a nearest distance between the point and the trace path,determining an average verification distance by calculating an averageof the plurality of verification distances, and determining that theaverage verification distance is less than a predetermined threshold.

According to some embodiments of method 800, the system may receive,from the second computing device in association with the attempted locksolution, an indication of a positive identification of a user of thesecond computing device based on one or more of: a positiveidentification of the user's fingerprint via a fingerprint scannerassociated with the second computing device, a positive identificationof the user's face using image recognition techniques and based on animage obtained by an image capture device associated with the secondcomputing device, a positive identification of a user's voice usingvoice recognition techniques and based on an audio recording obtained bya microphone associated with the second computing device, or a positiveidentification of a user's identity based on matching motion dataobtained from a gyroscope associated with the second computing device toa stored gesture associated with authenticating the user's identity.

As used in this application, the terms “component,” “module,” “system,”“server,” “processor,” “memory,” and the like are intended to includeone or more computer-related units, such as but not limited to hardware,firmware, a combination of hardware and software, software, or softwarein execution. For example, a component may be, but is not limited tobeing, a process running on a processor, an object, an executable, athread of execution, a program, and/or a computer. By way ofillustration, both an application running on a computing device and thecomputing device can be a component. One or more components can residewithin a process and/or thread of execution and a component may belocalized on one computer and/or distributed between two or morecomputers. In addition, these components can execute from variouscomputer readable media having various data structures stored thereon.The components may communicate by way of local and/or remote processessuch as in accordance with a signal having one or more data packets,such as data from one component interacting with another component in alocal system, distributed system, and/or across a network such as theInternet with other systems by way of the signal.

Certain embodiments and implementations of the disclosed technology aredescribed above with reference to block and flow diagrams of systems andmethods and/or computer program products according to exampleembodiments or implementations of the disclosed technology. It will beunderstood that one or more blocks of the block diagrams and flowdiagrams, and combinations of blocks in the block diagrams and flowdiagrams, respectively, can be implemented by computer-executableprogram instructions. Likewise, some blocks of the block diagrams andflow diagrams may not necessarily need to be performed in the orderpresented, may be repeated, or may not necessarily need to be performedat all, according to some embodiments or implementations of thedisclosed technology.

These computer-executable program instructions may be loaded onto ageneral-purpose computer, a special-purpose computer, a processor, orother programmable data processing apparatus to produce a particularmachine, such that the instructions that execute on the computer,processor, or other programmable data processing apparatus create meansfor implementing one or more functions specified in the flow diagramblock or blocks. These computer program instructions may also be storedin a computer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meansthat implement one or more functions specified in the flow diagram blockor blocks.

As an example, embodiments or implementations of the disclosedtechnology may provide for a computer program product, including acomputer-usable medium having a computer-readable program code orprogram instructions embodied therein, said computer-readable programcode adapted to be executed to implement one or more functions specifiedin the flow diagram block or blocks. Likewise, the computer programinstructions may be loaded onto a computer or other programmable dataprocessing apparatus to cause a series of operational elements or stepsto be performed on the computer or other programmable apparatus toproduce a computer-implemented process such that the instructions thatexecute on the computer or other programmable apparatus provide elementsor steps for implementing the functions specified in the flow diagramblock or blocks.

Accordingly, blocks of the block diagrams and flow diagrams supportcombinations of means for performing the specified functions,combinations of elements or steps for performing the specifiedfunctions, and program instruction means for performing the specifiedfunctions. It will also be understood that each block of the blockdiagrams and flow diagrams, and combinations of blocks in the blockdiagrams and flow diagrams, can be implemented by special-purpose,hardware-based computer systems that perform the specified functions,elements or steps, or combinations of special-purpose hardware andcomputer instructions.

Certain implementations of the disclosed technology are described abovewith reference to user devices may include mobile computing devices.Those skilled in the art recognize that there are several categories ofmobile devices, generally known as portable computing devices that canrun on batteries but are not usually classified as laptops. For example,mobile devices can include, but are not limited to portable computers,tablet PCs, internet tablets, PDAs, ultra-mobile PCs (UMPCs), wearabledevices, and smart phones. Additionally, implementations of thedisclosed technology can be utilized with internet of things (IoT)devices, smart televisions and media devices, appliances, automobiles,toys, and voice command devices, along with peripherals that interfacewith these devices.

In this description, numerous specific details have been set forth. Itis to be understood, however, that implementations of the disclosedtechnology may be practiced without these specific details. In otherinstances, well-known methods, structures and techniques have not beenshown in detail in order not to obscure an understanding of thisdescription. References to “one embodiment,” “an embodiment,” “someembodiments,” “example embodiment,” “various embodiments,” “oneimplementation,” “an implementation,” “example implementation,” “variousimplementations,” “some implementations,” etc., indicate that theimplementation(s) of the disclosed technology so described may include aparticular feature, structure, or characteristic, but not everyimplementation necessarily includes the particular feature, structure,or characteristic. Further, repeated use of the phrase “in oneimplementation” does not necessarily refer to the same implementation,although it may.

Throughout the specification and the claims, the following terms take atleast the meanings explicitly associated herein, unless the contextclearly dictates otherwise. The term “connected” means that onefunction, feature, structure, or characteristic is directly joined to orin communication with another function, feature, structure, orcharacteristic. The term “coupled” means that one function, feature,structure, or characteristic is directly or indirectly joined to or incommunication with another function, feature, structure, orcharacteristic. The term “or” is intended to mean an inclusive “or.”Further, the terms “a,” “an,” and “the” are intended to mean one or moreunless specified otherwise or clear from the context to be directed to asingular form. By “comprising” or “containing” or “including” is meantthat at least the named element, or method step is present in article ormethod, but does not exclude the presence of other elements or methodsteps, even if the other such elements or method steps have the samefunction as what is named.

While certain embodiments of this disclosure have been described inconnection with what is presently considered to be the most practicaland various embodiments, it is to be understood that this disclosure isnot to be limited to the disclosed embodiments, but on the contrary, isintended to cover various modifications and equivalent arrangementsincluded within the scope of the appended claims. Although specificterms are employed herein, they are used in a generic and descriptivesense only and not for purposes of limitation.

This written description uses examples to disclose certain embodimentsof the technology and also to enable any person skilled in the art topractice certain embodiments of this technology, including making andusing any apparatuses or systems and performing any incorporatedmethods. The patentable scope of certain embodiments of the technologyis defined in the claims, and may include other examples that occur tothose skilled in the art. Such other examples are intended to be withinthe scope of the claims if they have structural elements that do notdiffer from the literal language of the claims, or if they includeequivalent structural elements with insubstantial differences from theliteral language of the claims.

Exemplary Use Cases

The following exemplary use case describes an example of a typical userflow pattern. They are intended solely for explanatory purposes and notin limitation. A first person (the “gifter”) may want to provide anelectronic item, such as a customized electronic gift, to another (the“gift recipient”), and may desire to lock the electronic item via acustomized lock selected or configured by the gifter. For example, thegifter may want to send a spouse a gift card to their favorite store asa gift to celebrate an anniversary but to add an element of playfulnessor entertainment, the gifter may require the gift recipient to solve apuzzle or a riddle associated with the gift before the gift recipient isable to access the gift. Accordingly, the gifter may use a mobileapplication (e.g., gift mobile application 402) to create a customizedgift to the selected store and may also lock the gift with a customizedlock. For example, the gifter may create a lock that has a clue of “Ourfavorite date spot” and a solution of “downtown movie theater.” Thesystem (e.g., via gift application server 120) may send a notificationto the gift recipient's smart phone (e.g., via user device 102) thatdisplays the clue and along with a series of empty boxes that correspondto the spacing and number of letters in the solution. The gift recipientmay enter letters into the boxes (e.g., via user device 102) in anattempt to solve the puzzle and may submit an attempted answer. Thesystem (e.g., via gift application server 120) may determine whether theattempted answer is correct, and if incorrect may send a notification toboth the gifter and the gift recipient that the attempted answer isincorrect. After being notified of several incorrect answers, the giftermay assist the gift recipient, by for example, inputting instructions tothe system (e.g., via user device 102) to reveal the first word of thesolution to the gift recipient. Upon the gift recipient entering thecorrect solution, the system may unlock the gift card so that the giftrecipient may see that the locked item is a gift card to their favoritestore and the gift card may be made available for use at the store. Insome embodiments, the system may use transaction authorization requestdata to verify that the gift recipient has used the gift at thespecified store before authorizing the transaction using the gift card.The system may allow the gifter to put other limitations on unlocking ofthe item or use of the gift, such as time and location restrictions. Forexample, the gifter may specify that the gift may only be unlocked ifthe gift recipient is at a pre-specified location or that the gift mayonly be unlocked or used the current date is beyond a date specified bythe gifter. In some cases, the system (e.g., via gift application server120) may enable the gifter to view, in real time, the user inputs and/orlocation of the gift recipient so that the gifter can monitor the giftrecipient's attempts at unlocking the gift and provide real-timefeedback, such as additional clues, to the gift recipient via thesystem. For example, in some embodiments, gift mobile application 402may facilitate a real-time connection between gifter user device 102 andgift recipient user device 102 (e.g., via gift application server 120)to provide real-time interactivity between the two. In this way, thesystem may allow a user to apply a customized and interactive electroniclock to an electronic gift (or any type of transferable electronic file)to add entertainment and enjoyment to the act of providing the gift toanother.

These computer-executable program instructions may be loaded onto ageneral-purpose computer, a special-purpose computer, a processor, orother programmable data processing apparatus to produce a particularmachine, such that the instructions that execute on the computer,processor, or other programmable data processing apparatus create meansfor implementing one or more functions specified in the flow diagramblock or blocks. These computer program instructions may also be storedin a computer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meansthat implement one or more functions specified in the flow diagram blockor blocks. As an example, implementations of the disclosed technologymay provide for a computer program product, including a computer-usablemedium having a computer-readable program code or program instructionsembodied therein, said computer-readable program code adapted to beexecuted to implement one or more functions specified in the flowdiagram block or blocks. Likewise, the computer program instructions maybe loaded onto a computer or other programmable data processingapparatus to cause a series of operational elements or steps to beperformed on the computer or other programmable apparatus to produce acomputer-implemented process such that the instructions that execute onthe computer or other programmable apparatus provide elements or stepsfor implementing the functions specified in the flow diagram block orblocks.

As used herein, unless otherwise specified the use of the ordinaladjectives “first,” “second,” “third,” etc., to describe a commonobject, merely indicate that different instances of like objects arebeing referred to, and are not intended to imply that the objects sodescribed must be in a given sequence, either temporally, spatially, inranking, or in any other manner.

What is claimed is:
 1. A method for providing a locked electronic item,comprising: receiving, from a first computing device associated with asender via a software application, a selection of an electronic lock andthe electronic item, wherein the electronic lock comprises a lock clueand a lock solution; determining, based on the lock solution, an answerinput field configuration, wherein the answer input field configurationcomprises a number of input boxes and spaces that are arranged tocorrespond to the lock solution; transmitting, to a second computingdevice associated with a recipient and for display by the secondcomputing device, the lock clue and the input field configuration;receiving, from the second computing device, an attempted lock solutioncomprising a set of alphanumeric characters equal to the number of inputboxes, wherein the set of alphanumeric characters are configured in aspatial arrangement that corresponds to the input field configuration;and responsive to determining that the attempted lock solution matchesthe lock solution, transmitting the electronic item to the secondcomputing device for display or use by the second computing device. 2.The method of claim 1, wherein the electronic item is an image.
 3. Themethod of claim 1, wherein the electronic item is a tokenized primaryaccount number (PAN) or electronic gift card.
 4. The method of claim 1,wherein the electronic item is a data file.
 5. The method of claim 1,further comprising: responsive to determining that the attempted locksolution does not match the lock solution, transmitting a failurenotification to the second computing device for display by the secondcomputing device, wherein the failure notification comprises anindication that the attempted lock solution is incorrect.
 6. The methodof claim 1, further comprising: transmitting, to the first computingdevice and for display by the first computing device, an unlock attemptnotification, wherein the unlock attempt notification comprises anindication of the attempted lock solution and an indication of a successor failure to unlock the electronic media item.
 7. The method of claim1, wherein the unlock attempt notification comprises an indication of anumber of failed unlock attempts, the method further comprising:receiving, from the first computing device, an instruction to unlock theelectronic item; and transmitting, to the second computing device andbased on the instruction to unlock the electronic item, an unlocknotification and the electronic item for display or use by the secondcomputing device.
 8. The method of claim 1, further comprising:receiving, from the first computing device, data representative of oneor more unlock conditions; and prior to transmitting the electronic itemto the second computing device, verifying that the one or more unlockconditions are satisfied.
 9. The method of claim 8, wherein the one ormore unlock conditions comprises an access date and verifying that theone or more unlock conditions are satisfied comprises determining thatthe current date is equal to or beyond the access date.
 10. The methodof claim 1, wherein the one or more unlock conditions comprises amaximum number of unlock attempts and verifying that the one or moreunlock conditions are satisfied comprises determining that a number ofattempted lock solutions received from the second device in relation tothe electronic lock does not exceed the maximum number of unlockattempts.
 11. The method of claim 1, wherein the one or more unlockconditions comprises a gift unlock location and verifying that the oneor more unlock conditions are satisfied comprises determining, based onlocation data received from the second computing device, that the secondcomputing device is within a predetermined proximity of the gift unlocklocation.
 12. The method of claim 1, further comprising: receiving, fromthe second computing device in association with the attempted locksolution, an indication of a positive identification of a user of thesecond computing device based on one or more of: a positiveidentification of the user's fingerprint via a fingerprint scannerassociated with the second computing device; a positive identificationof the user's face using image recognition techniques and based on animage obtained by an image capture device associated with the secondcomputing device; a positive identification of a user's voice usingvoice recognition techniques and based on an audio recording obtained bya microphone associated with the second computing device; or a positiveidentification of a user's identity based on matching motion dataobtained from a gyroscope associated with the second computing device toa stored gesture associated with authenticating the user's identity. 13.A method for providing a locked electronic item, comprising: receiving,from a computing device and via a software application, electronic lockdata comprising a lock clue, an answer field configuration, and anindication of the electronic item; displaying the lock clue and a numberof input boxes contemporaneously each configured to receive and displaya single character, wherein the number of input boxes and spacing of theinput boxes corresponds to the answer field configuration; receiving,via a user input device, an attempted lock solution, wherein theattempted lock solution comprises a sequence of characters, wherein eachcharacter of the sequence of characters is input into one of the numberof input boxes; transmitting, to the computing device, the attemptedlock solution; responsive to the computing device determining that theattempted lock solution matches a lock solution stored by the computingdevice, receiving, from the computing device, the electronic item; anddisplaying a notification indicating receipt of the electronic item. 14.The method of claim 13, further comprising: receiving, from thecomputing device, data representative of a location-based unlockcondition; displaying, based on the data representative of thelocation-based unlock condition, information representative of an unlocklocation; receiving, from a location sensor, location data;transmitting, to the computing device, the location data; and responsiveto the computing device determining based on the location data that thelocation-based unlock condition is met, receiving, from the computingdevice, the electronic item.
 15. The method of claim 13, furthercomprising: receiving, from the computing device, data representative ofa time-based unlock condition; displaying, based on the datarepresentative of the time-based unlock condition, informationrepresentative of an unlock time; determining time data, wherein thetime data represents a current time and/or date; and responsive to thecomputing device determining based on the time data that the time-basedunlock condition is met, receiving, from the computing device, theelectronic item.
 16. The method of claim 13, further comprising:receiving, from the computing device, a request for user authentication;and prior to transmitting the attempted lock solution to the computingdevice, authenticating a user, wherein authenticating a user comprisesone or more of: obtaining the user's fingerprint from a fingerprintscanner and matching the obtained fingerprint to a stored fingerprint ofthe user within a predetermined confidence level; obtaining an image ofthe user's face from an image capture device and matching the image to astored image of the user's face using image recognition techniques;obtaining a recording of the user's voice from a microphone and applyingvoice analysis techniques to positively identify the user by comparingthe recording to stored voice data associated with the user; orobtaining motion data from a gyroscope and matching the motion data to astored gesture within a predetermined confidence level, wherein thestored gesture represents an identifying gesture associated with theuser.
 17. The method of claim 13, further comprising: responsive todetermining that the attempted lock solution does not match the locksolution, transmitting a failure notification to the computing devicefor display by a secondary computing device, wherein the failurenotification comprises an indication that the attempted lock solution isincorrect.
 18. The method of claim 17, wherein the failure notificationcomprises the attempted lock solution.
 19. The method of claim 18,further comprising: receiving, from the computing device, a secondarylock clue; displaying the secondary lock clue contemporaneously with thenumber of input boxes; receiving, via the user input device, a secondattempted lock solution, wherein the attempted lock solution comprises asequence of characters, wherein each character of the sequence ofcharacters is input into one of the number of input boxes; transmitting,to the computing device, the second attempted lock solution; responsiveto the computing device determining that the second attempted locksolution matches a lock solution stored by the computing device,receiving, from the computing device, the electronic item; anddisplaying a notification indicating receipt of the electronic item. 20.A method for providing a locked electronic item, comprising: receiving,from a first computing device associated with a sender via a softwareapplication, a selection of an electronic lock and the electronic item,wherein the electronic lock comprises a lock clue and a lock solution;determining, based on the lock solution, an answer input fieldconfiguration, wherein the answer input field configuration comprises anumber of input boxes and spaces that are arranged to correspond to thelock solution; transmitting, to a second computing device associatedwith a recipient, the lock clue and the input field configuration forcontemporaneous display; receiving, from the second computing device, anattempted lock solution comprising a set of alphanumeric charactersequal to the number of input boxes, wherein the set of alphanumericcharacters are configured in a spatial arrangement that corresponds tothe input field configuration; responsive to determining that theattempted lock solution does not match the lock solution: transmitting afailure notification to the first computing device; receiving asecondary lock clue from the first computing device; transmitting thesecondary lock clue to the second computing device for displaycontemporaneously with the input filed configuration; receive asecondary attempted lock solution; and responsive to determining thatthe attempted lock solution or the secondary attempted lock solutionmatches the lock solution, transmitting the electronic item to thesecond computing device for display or use by the second computingdevice.