This disclosure describes using a near-field-communication tag (NFC tag) to access a gift-transfer system for electronically transferring a digital gift.
Sometimes people choose to give money as a gift to another person, such as by giving the person cash, a check, or a gift card. But, these options can be less personal than a greeting card or other gift item.
An aspect of the present invention includes a physical gift item that is constructed to include an NFC tag. By scanning the NFC tag, a gift-transfer application can be launched, which allows a user to select a digital gift and associate the digital gift with the NFC tag. The physical gift item can be given to another user, who can also scan the NFC tag in order to retrieve the digital gift.
Some aspects of the invention are defined by the claims below, not this summary. A high-level overview of various aspects of the invention is provided here to introduce a selection of concepts that are further described below in the detailed-description section. This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended to be used as an aid in isolation to determine the scope of the claimed subject matter.
Illustrative embodiments of the present invention are described in detail below with reference to the attached drawing figures, which are incorporated herein by reference, wherein:
The subject matter of this disclosure is described with specificity herein to meet statutory requirements. But, the description itself is not intended to necessarily limit the scope of claims. Rather, the claimed subject matter might be embodied in other ways to include different elements or combinations of elements similar to the ones described in this document, in conjunction with other present, or future, technologies. Terms should not be interpreted as implying any particular order among or between various steps herein disclosed unless, and except, when the order of individual steps is explicitly claimed.
At a high level, this disclosure describes a system that allows a person (“gift sender”) to electronically transfer a digital gift (also sometimes referred to as an “e-gift”) to another person (“gift recipient”). A digital gift may take various forms, and some examples of digital gifts include electronic funds (e.g., deposited to an account) or a digital experience (e.g., e-card, digital video, digital audio, digital image, etc.). In order to electronically transfer the digital gift, the gift sender can access a gift-transfer software application (e.g., mobile application or web application) by using his or her mobile device to scan a near-field-communication tag (NFC tag) constructed into a physical gift item, such as a greeting card, toy, and the like. Using the gift-transfer software application, the gift sender can associate the digital gift with the NFC tag. The gift sender can then give the physical gift item to the gift recipient, and the gift recipient can access the digital gift by scanning the NFC tag with his or her own mobile device. In some instances, the gift sender may receive a notification that the gift recipient has used the digital gift.
Referring now to
In accordance with an aspect of the disclosure, the gift-sender mobile device 114 scans the NFC tag 112 to receive both the unique NFC-tag identifier and computer-executable instructions for opening a first gift-transfer application 122. The gift-transfer application 122 can be used to associate a digital gift with the unique NFC-tag identifier and to communicate the association to the gift-transfer service 118. The gift-transfer service 118 stores a record of the association between the unique NFC-tag identifier and the digital gift, and the payment system 130 facilitates payment for the digital gift by an account specified using the first gift-transfer application 122.
The physical gift item 110, which includes the NFC tag 112, can be given to a gift recipient, as illustratively depicted by an arrow 124. The gift-recipient mobile device 116 scans the NFC tag 112 to retrieve the unique NFC-tag identifier, and a second gift-transfer application 126 may use the unique NFC-tag identifier to retrieve the digital gift from the gift-transfer service 118. Having generally described some of the features of this disclosure, each of the components will now be described in greater detail with reference to some of the other figures.
In
In accordance with an aspect of the disclosure, the physical gift item 110 is constructed to include the NFC tag 112, and as previously explained, the NFC tag 112 is encoded to include a unique NFC-tag identifier. In
Referring to
Referring now to
The mobile device 410 includes an NFC chip 414 configured to receive a transmission of data from an NFC tag (e.g., tags 112, 212, and 232). In addition, the mobile device 410 includes the gift-transfer application 412, which includes a software application programmed to perform various functions described in this application. As described in other parts of this disclosure, data that is transmitted from the NFC tag to the mobile device includes computer-executable instructions that, when executed by the mobile device 410, cause the mobile device 410 to launch, open, or start the gift-transfer application 412.
The gift-transfer application 412 may be a mobile application or a web application. The gift-transfer application 412 includes various programmed components that are useful to perform operations of the gift-transfer application 412 that facilitate transfer of a digital gift or e-gift. For example,
Referring now to
The tag-status-query module 416 might be invoked by both the gift-transfer application running on the gift-sender mobile device and the gift-transfer application running on the gift-recipient mobile device. For example, by executing the tag-status-query module on the gift-sender mobile device, the gift-transfer application can confirm that no digital gift has been associated with a particular NFC tag and that the process should proceed with allowing a user to select a digital gift to be associated with the NFC tag. In addition, by executing the tag-status-query module on the gift-recipient mobile device, the gift-transfer application can determine that a digital gift has been associated with a particular NFC tag and can proceed with allowing the gift recipient to receive the digital gift.
The gift-transfer service 118, which maintains a record of unique NFC-tag identifiers, can look up the unique NFC-tag identifier when the gift-transfer service 118 receives the communication 422. The gift-transfer service 118 can then provide a responsive communication indicating to the gift-transfer application 412 whether the unique NFC-tag identifier is associated with a digital gift. Depending on whether a digital gift has been associated with the unique NFC-tag identifier, various actions can be taken using the gift-transfer application, such as progressing through a digital-gift selection process or allowing a financial account to be selected to receive a credit of the digital gift.
Referring to
A digital gift can be selected in various manners. For example, the digital-gift-input module 418 may provide an input field into which a user can input a monetary amount. The user may be able to type the amount using a touchscreen keyboard or other type of keyboard. In addition, the mobile device 410 may provide a speech-to-text functionality that allows the user to audibly indicate the monetary amount. In other examples, pre-determined monetary amounts may be presented with selectable buttons (e.g., radio buttons) that allow the user to simply check a box. Other strategies may also be used to allow a monetary amount to be selected or input.
In other examples, the digital-gift-input module 418 may provide a digital-gift online store that allows a user to select a digital gift to be associated with the NFC tag. For example, the digital-gift online store may provide various types of digital media, including videos, images, audio, and the like. In addition, the digital-gift online store may provide the ability to purchase other types of digital gifts, including credits, points, and digital currency.
Once a digital gift has been selected and submitted to the gift-transfer application 412 the digital-gift-input module 418 generates or produces a gift-creating communication 426 (e.g., interprocess communication) that includes the unique NFC-tag identifier and an identification of the digital gift. The communication 426 can then be transmitted to the gift-transfer service 118, which may store a record indicating that the unique NFC-tag identifier is now associated with a digital gift. As described with respect to the communication 422, the digital-gift-input module 418 may generate an electronic communication that did not previously exist, or modify a pre-existing communication, by generating or modifying underlying code 428 constituting the communication 426. The communication 426 specifies both the unique NFC-tag identifier and the digital gift.
Referring now to
Once a financial-account identifier has been input, the financial-account-selection module 420 generates or produces a transaction-details communication 430 (e.g., interprocess communication) that includes an identification of the financial account (e.g., account number) as well as transaction details including the amount to be credited or debited. The communication 430 can then be transmitted to the payment system 130 to execute the transaction. As described with respect to the communications 422 and 426, the financial-account-selection module 420 may generate an electronic communication that did not previously exist, or modify a pre-existing communication, by generating or modifying underlying code 432 constituting the communication 430.
The gift-transfer application 412 may include other components as well that allow additional information to be input and communicated to the gift-transfer system. For example, the gift sender may wish to add a security measure to the gift transfer. As such, the gift-transfer application 412 may provide a security-input component that allows the input of a phone number, security answer, or other information that the gift sender may require before the digital gift can be transferred to the gift-recipient mobile device or account. In addition, the gift-transfer application 412 may allow the gift sender to further customize the gift exchange by adding a customized message, image, song, video, and the like. This additional information can be communicated by the gift-transfer application 412 to the gift-transfer service 118 to be stored in association with the unique NFC-tag identifier, such as by using communications similar to communications 422 and 426.
Having described some of the features of the gift-transfer application, reference is now made to
Among other things, the one or more server computing devices 132 function to receive communications from the various copies of the gift-transfer application, to update the information associated with each of the unique NFC-tag identifiers, and to provide information back to the gift-transfer applications. As such, the gift-transfer service 118 maintains a searchable data-store 136 that stores information in association with each unique NFC-tag identifier. Exemplary information that might be maintained in the searchable data-store 136 is illustrated in the magnified view 138. For example, the information that is stored in association with each unique NFC-tag identifier might include an indication of whether a digital gift has been associated with the unique identifier, a monetary value of the digital gift, a link to the digital gift (if appropriate), security information associated with the digital gift, customized messaging to be presented with the digital gift, payment information, payment-transaction details, and the like.
As previously described, the gift-transfer service 118 may receive a tag-query interprocess communication (e.g., element 422 in
The gift-transfer service 118 may receive the tag-query communication in the context of a gift sender initially scanning the NFC tag or in the context of a gift recipient scanning the NFC tag after receiving the physical gift item. If the unique NFC-tag identifier has not been associated with a digital gift, then the communication generated by the server 132 may indicate such, in which case the gift-transfer application may proceed through the series of steps that allows a digital gift to be associated with the unique NFC-tag identifier using the gift-sender mobile device.
If the unique NFC-tag identifier has been associated with a digital gift, then the communication (e.g., gift-notification interprocess communication 142) generated by the server 132 may also include at least some of the additional information stored in association with the unique NFC-tag identifier. For example, the communication may also indicate the amount of the digital gift, a copy of the digital gift, a link to the digital gift, and any customization details. Or, if the unique NFC-tag identifier is associated with security information, then the communication may request that certain information be verified before the digital gift is transmitted or is allowed to be credited. When generating the gift-notification interprocess communication 142, the tag-identification lookup module 140 may generate an electronic communication that did not previously exist, or modify a pre-existing communication, by generating or modifying underlying code 144 constituting the communication 142.
Having described components depicted in
At step 710, the NFC tag 112 transmits a unique NFC-tag identifier 712a and computer-executable instructions 712b to the gift-sender mobile device 114, the computer-executable instructions 712b for opening a gift-transfer application on the gift-sender mobile device 114. The gift-sender mobile device 114 opens the first copy of the gift-transfer application 122. As previously described, if the gift-sender mobile device 114 does not includes a copy of the gift-transfer application, then the instructions 712b may direct the gift-sender mobile device to a downloadable version of the gift-transfer application (e.g., at an online application store or at a website). Once open on the gift-sender mobile device 114, the first copy of the gift-transfer application 122 produces a tag-query interprocess communication 714 including the unique NFC-tag identifier. The tag-query interprocess communication 714 is transmitted 716 to the gift-transfer service 118, which looks up 718 the unique NFC-tag identifier in a searchable data-store (e.g., 136) by executing a tag-identifier lookup module. When the gift-transfer service 118 determines that the unique NFC-tag is not associated with a digital gift, the gift-transfer service 118 sends 720 a response communication 722 to the gift-transfer application 122, indicating that the unique NFC-tag identifier is not associated with a digital gift.
Using the gift-sender mobile device 114 and the first copy of the gift-transfer application 122, a digital gift may be selected (e.g., input of monetary amount or selection of digital media or digital experience), and a financial account may be selected to provide payment for the digital gift (e.g., by debiting a selected financial account). The first copy of the gift-transfer application produces a transaction-details interprocess communication 724 that includes a financial-account identifier and an amount to be paid for the digital gift, which is transmitted 726 to the payment system 130. The payment system 130 facilitates 728 payment from the financial account that was selected, and provides 730 payment confirmation 732 to the first copy of the gift-transfer application 122. The first copy of the gift-transfer application 122 may then transmit 734 a gift-creating interprocess communication 736 to the gift-transfer service 118, the gift-creating interprocess communication including at least the unique NFC-tag identifier and an identification of the digital gift. The gift-transfer service 118 may then update 738 the information stored in association with the unique NFC-tag identifier to indicate that the unique NFC-tag identifier is associated with a digital gift. For example, the gift-transfer service 118 may update an existing record that relates to the unique NFC-tag identifier, or may create a new searchable entry that links the unique NFC-tag identifier to the digital gift.
As previously described, a gift sender may give the physical gift item 110 to a gift recipient. Using the gift-recipient mobile device 116, the NFC tag 112 is scanned and the unique NFC-tag identifier 740a and computer-executable instructions 740b are transmitted 742 to the gift-recipient mobile device 116. The gift-recipient mobile device 116 opens the second copy of the gift-transfer application 126 in response to the instructions 740b (or downloads the application 126 if necessary). The second copy of the gift-transfer application 126 may then transmit 744 a tag-query communication 746 to the gift-transfer service 118, the tag-query communication 746 including the unique NFC-tag identifier. The gift-transfer service 118 may perform a look up function 748 by searching its data store for the unique NFC-tag identifier to determine that the unique NFC-tag identifier is associated with the digital gift. The gift-transfer service 118 may transmit 750 a gift-notification interprocess communication 752 to the second copy of the gift-transfer application 126, the gift-notification interprocess communication including a description of the digital gift, as well as any information that helps to retrieve the digital gift, such as a link to the payment system, a copy to digital content, a link to 3rd-party digital content, and the like. Using the gift-recipient mobile device 116 and the second copy of the gift-transfer application 126, a financial account may be selected to receive the credit specified by the digital gift. In turn, the second copy of the gift-transfer application 126 may produce a transaction-details interprocess communication 754 that is transmitted 756 to the payment system 130. The payment system 130 can then facilitate credit 758 of the financial account specified in the transaction-details interprocess communication 754.
Several of the components described in
The technology described in this disclosure may be described in the general context of computer code or machine-useable instructions, including computer-executable instructions such as program components, being executed by a computer or other machine, such as a personal data assistant or other handheld device. Generally, program components, including routines, programs, objects, components, data structures, and the like, refer to code that performs particular tasks or implements particular abstract data types. The technology described herein may be practiced in a variety of system configurations, including handheld devices, consumer electronics, general-purpose computers, specialty computing devices, etc. Aspects of the technology described herein may also be practiced in distributed computing environments where tasks are performed by remote-processing devices that are linked through a communications network.
With continued reference to
The computing device 800 typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by computing device 800 and includes both volatile and nonvolatile, removable and non-removable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented for storage of information such as computer-readable instructions, data structures, program modules, or other data.
Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Computer storage media does not comprise a propagated data signal.
Communication media is different from computer storage media and typically embodies computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.
The memory 812 includes computer storage media in the form of volatile and/or nonvolatile memory. The memory 812 may be removable, non-removable, or a combination thereof. Exemplary memory includes solid-state memory, hard drives, optical-disc drives, etc. The computing device 800 includes one or more processors 814 that read data from various entities such as the bus 810, the memory 912, or the I/O components 820. The presentation component(s) 816 present data indications to a user or other device. Exemplary presentation components 816 include a display device, speaker, printing component, vibrating component, etc. The I/O ports 818 allow computing device 800 to be logically coupled to other devices, including I/O components 820, some of which may be built in.
Illustrative I/O components include a microphone, joystick, game pad, satellite dish, scanner, printer, display device, wireless device, a controller (such as a stylus, a keyboard, and a mouse), a natural user interface (NUI), and the like. The computing device may include a radio 824. The radio 824 transmits and receives radio communications. The computing device may be a wireless terminal adapted to receive communications and media over various wireless networks. The computing device 800 may communicate via wireless protocols, such as code division multiple access (“CDMA”), global system for mobiles (“GSM”), or time division multiple access (“TDMA”), as well as others, to communicate with other devices. The radio communications may be a short-range connection, a long-range connection, or a combination of both a short-range and a long-range wireless telecommunications connection. When referring to “short” and “long” types of connections, it is not meant to refer to the spatial relation between two devices. Instead, general reference is made to short range and long range as different categories, or types, of connections (i.e., a primary connection and a secondary connection). A short-range connection may include a Wi-Fi® connection to a device (e.g., mobile hotspot) that provides access to a wireless communications network, such as a WLAN connection using the 802.11 protocol. A Bluetooth connection to another computing device is a second example of a short-range connection, as well as near-field-communication protocol. A long-range connection may include a connection using one or more of CDMA, GPRS, GSM, TDMA, and 802.16 protocols.
One or more of the computing devices 800 might be used in various capacities in the subject matter described in this disclosure. For example, the mobile computing devices 114, 116, and 410 may include at least some of the components described with respect to the computing device 800. In addition, the server(s) 132, the storage device(s) 134, and the payment system 130 may also include at least some of the components described with respect to the computing device 800. In a further aspect, the various modules (e.g., 416, 418, 420, and 140) may be implemented as a set of computer-readable instructions that utilize a processor to carry out respective operations and to create or modify data, which may be represented by underlying code.
Many different arrangements of the various components depicted, as well as components not shown, are possible without departing from the scope of the claims below. Embodiments of our technology have been described with the intent to be illustrative rather than restrictive. Alternative embodiments will become apparent to readers of this disclosure after and because of reading it. Alternative means of implementing the aforementioned can be completed without departing from the scope of the claims below. Certain features and subcombinations are of utility and may be employed without reference to other features and subcombinations and are contemplated within the scope of the claims.