Not Applicable
Not Applicable
1. Field of Invention
Embodiments relate to mobile tagging, and more particularly but not exclusively, to mobile tagging utilizing multidimensional barcodes. Embodiments also relate to PC and other computer tagging.
2. Description of Related Art
Multidimensional bar codes, such as the two dimensional (2D) Quick Response (QD) (trademarked) barcode as described in Masahiro, U.S. Pat. No. 5,726,435 and Masahiro, Jap. Pat. No. 2938338, allow users to enjoy both the convenience of traditional print media and the completeness of online media. Multidimensional bar codes with embedded URL codes often appear in magazine articles, business cards, item tags, and advertisements. Individuals, who wish to supplement this published media, may do so by taking a picture of a 2D bar code with a camera enabled cell phone that will redirect them to the programmed URL. The programmed URL can contain unlimited information to supplement the published media, including a products details, videos or contact information. Publishers and users can also print their own 2D barcodes for others.
For the most part, 2D bar codes have been commercially unavailable to individuals who merely want to generate a bar code and associate it with a video, photograph or document. Ordinary consumers and small businesses, find that the expense of investing into this technology exceeds the benefit provided. Further, another difficulty in using this technology is that the URL or video link usually requires a published website or hosting server. Moreover, current 2D bar codes cannot be processed visually and typically require a scanning mechanism.
Cloud storage providers, examples of whom include: Google Drive (trademarked), Rapidshare (trademarked) or Mega, are based on a model of storage where users upload data onto third party hosted servers. Cloud storage providers own large data centers and allow their customers to pay to buy or lease storage capacity on these websites. Some providers, like Rapidshare (trademarked), encourage sharing of user-submitted data by generating unique URL links to user-submitted content. In turn, users share their content with other by providing a URL link to this content. Typically, those who wish to enjoy user-submitted content must download this content through the unique link. For these reasons, clouds storage has become an incredibly popular service for users to upload and share photographs, videos, documents and other information.
Cloud storage models contain numerous disadvantages. URL links are often difficult to input by a user, unattractive on the text, and out of place when inserted into printed media. Further, users are often forced to download content before they may access it. Moreover, the interface of a cloud storage system is not friendly for a novel user and the files are not easily retrievable and shareable.
Accordingly, there exists a need to provide an improved, more user friendly, 2D code tagging systems, storage system, and processes for retrieving these tagged images for mobile phones, computers and other electronic devices.
Current U.S. Classification: 283/75, 283/77, 235/494, 235/462.1, 235/462.9
The present invention seeks to combine available and existing aspects of multidimensional tagging with the cloud storage's capabilities in a novel manner. This combination allows user to submit video, audio or other files onto a cloud based storage system. This process is achieved by and through an internet or network based network. The application tags each user submitted file by associating each file with a unique URL, 2D barcode and alphanumeric code. This hybrid multi-dimensional bar text code combination enables a user to, either with a 2D bar code or alphanumeric code, immediately view photographs, videos, audio files, or other data stored on a cloud storage system conveniently.
The present invention includes a convenient and easy storage system for users to submit their own video, audio or other files. One embodiment includes a cloud based file storage system where submitted files will be housed and linked with their tagged associated URL, 2d bar code and alphanumeric bar codes. In one embodiment, the user has the option to password protect their submitted files.
According to the preferred embodiment of this present invention, data is stored and tagged through the use of an electronic mobile application that is connected to the internet or network. This application stores user submitted data by processing it through a server that is connected to a cloud based database for storage, in one embodiment. Further, in one embodiment, this application tags user submitted data by associating files submitted by a user with a unique 2D barcode, alphanumeric bar code and a URL link. This application also grants the user many managerial functions over the submitted data including the power to delete files, add titles, add passwords, duplicate 2D barcodes, as well as other features. The application includes a component that allows a user to pay for the use of the application. Alternatively, the function of the above preferred embodiment may be performed by the application's website if the user should so choose.
An illustrative example of one embodiment of this present invention first starts with a person or business entity to producing a printed text such as a post card, sign, greeting card, advertisement or invitation to offer. Shortly thereafter, the person or business entity supplements their printed text with the hybrid multi dimensional bar text code of this present invention. Both the 2D barcode and text produced below said barcode are tagged and associated directly with a video, photograph, audio file, contact information, or other data supplied by the producing person or business entity and stored on this present invention's server. The printed text, along with the 2D barcode and alphanumeric code, is conveniently shared amongst friends, customers, businesses or provided for the general public to view.
Using the camera function of a smart phone, the user takes a photograph of the 2D barcode. Alternatively, the user may enter the alphanumeric code into a smart phone, computer or similar electronic device. The smart phone or personal computer then automatically initiates a communication with a third party cloud server, where the associated photograph, video, audio file, contact information or other stored data is retrieved for the user to listen to or view.
As a non-limiting example, a musical band, who is interested in promoting their music, will publish a printed advertisement, like a band poster, that includes a hybrid multi dimensional bar text code which they have associated with a sound file. A user captures a picture, using a smart phone, or inputs the alpha numeric number into his cell phone. Once the smart phone has processed the code or image, the smart phone transmits the audio file which is stored on a cloud based server. Thus, this present invention allows printed advertisements to be conveniently supplemented with media in a new and novel manner.
According to one aspect, there is provided a method for mobile or other computer tagging. The method can comprise: generating a hybrid multi dimensional bar-text code, wherein generating said hybrid code comprises generating a multi dimensional barcode including text symbols; tagging a video, audio or other file with said hybrid multi dimensional bar-text code by associating said generated hybrid code with said file; storing said tagged file for retrieval; and retrieving said tagged file utilizing said hybrid multi dimensional bar-text code.
According to another aspect, there is provided an apparatus for mobile or other computer tagging. The apparatus comprises: at least one processor operably connectable to a plurality of user devices; a data bus coupled to said at least one processor; a computer-usable medium embodying computer program code, said computer-usable medium being coupled to said data bus; and said computer program code comprising instructions executable by said processor and configured for performing the aforesaid method for mobile or other computer tagging.
A computer-usable medium for mobile or other computer tagging system, said computer-usable medium embodying computer program code, said computer program code comprises computer executable instructions configured for performing the aforesaid method for mobile or other computer tagging.
Some embodiments provide a method for providing a reusable multi-layer scannable tag, the method comprising (a) generating a scannable code tag; and (b) activating the scannable code tag when the scannable code tag is scanned, wherein activating the scannable code tag comprises: (i) tagging a video, audio or other file with the scannable code tag by associating the scannable code tag with the file; and (ii) tagging a reward with the scannable code tag by associating the scannable code tag with the reward.
Other embodiments provide a non-transitory computer readable storage media that includes executable instructions that when executed by a processor perform methods described herein.
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular embodiments, procedures, techniques, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details.
The most common and frequently used 2D barcode is the barcode symbology referred to as the Quick Response (QR) code, which have been standardized by the International Organization for Standardization. As seen in
QR bar code tag systems do not allow for alpha numeric entry, in other words, a user can only access and create the file by scanning the QR code. By sight alone, a consumer will be unable to input a QR code into a computer. As a result, if a user does not have the QR code, there is no way for the user to access the user files. Such systems are by no means user friendly. Other multi dimensional bar code tag systems also, for example a one dimensional UPC code, require scanning of the barcode to enable files to be accessed.
Technical features described in this application can be used to construct various embodiments of methods and apparatus for mobile tagging or other computer tagging. In one aspect, the present invention system may comprise apparatus configured to perform functionality of the methods of the embodiments described herein. In another aspect, the present invention system may comprise software modules and instructions, which when executed by one or more processors, cause the processors to perform the functionality of the methods of the embodiments described herein.
In one approach, the method for mobile tagging or other computer tagging comprises generating a hybrid 2D bar-text code, wherein generating said hybrid barcode comprises generating a 2D barcode with included text symbols below.
In one embodiment,
Returning to
Referring to
Referring to
Referring back to
Still referring to
Embodiments may be practiced in many different methods. One example, the present invention may be used by an entity, business or group in conjunction with mass produced advertisements, such as but not limited to flyers, posters, brochures, pamphlets, business cards, magazine advertisements, newspaper advertisements, display racks, invitations and the like by including 2D Codes and alphanumeric codes generated by the present invention onto printed advertisements. In another example of this present invention, unique previously generated hybrid multi dimensional bar text codes may be pre-printed on to postcards, birthday cards, picture frames, special event cards, ecards, invitations, announcements, stationary and the like for the user to supplement with their own videos. In this embodiment, involving regenerated hybrid multi dimensional bar text codes, the processes of associating submitted images, videos, or other files may take different steps but still fall within the disclosures of this present invention.
Embodiments may be practiced in many different environments. By way of example, the memory tag hybrid multidimensional bar-text code system of embodiments may be implemented on at least one network server site in conjunction with at least one user processor apparatus, such as but not limited to video camera devices; mobile telephone devices; smart phone devices; tablet devices, portable processor devices; personal computer (PC) devices; surveillance devices. The network server site (see for example website server of
A non-limiting exemplary schematic diagram of one of many such different environments wherein the embodiments of the memory tag systems and methods may be practiced is depicted in
The non-limiting specific exemplary schematic diagram of one of many such different network environments wherein the embodiments of the memory tag systems and methods described in this present disclosure may be practiced is depicted in
A second example of a non-limiting exemplary diagram of one of many such network environments is further seen in FIG. 9. 911-914 demonstrate how a computer 961 or smart phone 901 may connect wirelessly or wired into a wireless WLAN system 913. First, the smart phone or computer must have an installed wireless card or wireless compatibility, and then it connects through the Wireless LAN device wirelessly 911 and 912. Alternatively, the computer or smart phone may connect to the wireless WLAN system through an Ethernet cable, 912. Next, the wireless WLAN device connects to a WLAN access point interface 914. Instead of a WLAN access point interface 914, it is feasible that some network systems will have a wireless network gateway 924, with integrated firewalls. After, the system connects to a wireless connector system, 930. If this wireless systems connector 914 is to be connected to the internet, the wireless systems connector must connect to an internet service provider (not shown) before the user may access the internet. This wireless system device is capable of connecting into the internet or designed network, 940. A third example of a non-limiting exemplary diagram of one of the many such network environments is shown in
Continuing with
In one example of this embodiment, an artist decides to promote their new album by publishing a band poster. Using the present invention, they are able to associate a sound file stored on a cloud based server with a hybrid multi dimensional bar text code. This hybrid multi dimensional bar text code, which is associated with the artist's top music track, appears is printed onto the artist's band poster. A user, who is interested in hearing the artist's track after seeing the album poster, is able to hear the stored music file by input the 2D Code or alphanumeric code into her smart phone or computer.
In another example, the application software configures hybrid multi dimensional bar text code into printable files which are provided to the user device to enable the user to print off the hybrid 2D text code onto individual labels or directly print or attach to end products. The user can place the code on anything and have details for it. By way of non-limiting example, for a greeting card, a user can record a personal video message to their special someone using their smart phone and associate the video message file to an hybrid multi dimensional bar text code using the application of the present invention. The user can simply print off the code onto an adhesive backed label and and stick the hybrid multi dimensional bar text code label on the greeting card. When the recipient gets the card, the recipient can use their smart phone or pc and the memory tag system to view the video message from the giver by scanning the code on the greeting card. In another non-limiting example, the user can stick the hybrid multi dimensional bar text code on a picture and upload a video or audio message describing the picture. Anyone who scans the 2D code or types in the alpha numeric code can listen or watch the person tell them what the picture is about. In another example, the barcode is pre-printed on post cards previously and the user simply has to associate a video message to the barcodes and alphanumeric codes.
The memory tag hybrid multidimensional bar-text code apparatus and methods of some embodiments capture different data and uses different databases. In one example, the hybrid 2D code uses both alpha and numeric and even symbols to further allow ease of use and protection for the user. The hybrid 2D codes while being generated capture the users name, phone, address and email a copy to the user for later usage or records in case of loss. The files are stored for an eternity where others only for 20 to a100 years. The system can be used by anyone with a simple skill set to create and share their own personal messages for any occasion for any medium.
In one example, the software application is configured to create an infinite amount of hybrid 2D codes that have alpha-numeric and even symbols then stores them in a database to be assigned to future users. The software application for generating and assigning the codes, for upload and storing the files and recording information work in harmony together capturing and storing all data, statistics stc.
In yet another example, the software application is configured to enable the user device, under control of the user, to design and customize the hybrid multidimensional bar-text code that is to be associated with the uploaded file.
Turning now to
Remaining on
Remaining on
In one example, the process of retrieving the tagged file utilizing the hybrid multi dimensional bar-text code may be implemented by scanning the multidimensional bar component of the hybrid code using the user device (mobile, PC, etc.) as the scanner, decoding the hybrid code and using the decoded contents to look up and retrieve the file associated with the hybrid code. In one example, the multidimensional bar component is a two dimensional barcode. For example the two dimensional bar code may be a 2D code. In another example, the component may be a datamatrix. In another example, the multidimensional bar component is a three dimensional bar code.
In another example, the user may optionally enter, via the user device, the text component of the hybrid code, that is, the characters, alpha, numeric, and/or symbols etc. of the text code included in the hybrid multi dimensional code. Text is used herein to mean any characters, alpha, numeric etc. or symbols that can be entered through texting operations on the mobile user device. ABCD123!@# is an example of such text. The tag system then utilizes the text component to enable the user to look up and retrieve the file associated with the hybrid code.
In one approach, a simple smartphone or PC downloads an application that allows the user to create their own personal audio or video message. The software then assigns hybrid multi dimensional bar text code to their file, the file is then stored for eternity. This personal message can be something as simple as a grocery reminder to a special message to a loved one on a greeting card.
The hybrid 2D code allows the user to scan the hybird 2D code or go directly to the application website and type in their alpha numeric and symbol code (text code) to view the files. Unlike known tag systems in which lose of the 2D code results in the user never being able to recover the data, the app and software of one or more embodiments captures the users name, phone#, email address and sends them confirmation codes to view and use the 2D code in the case they lose or misplace the physical 2D code to scan or use the alpha numeric symbol code. It allows people to create a scannable and alpha numeric 2D code personal video or audio file that's easy for anyone to create or view.
Software and apps from smartphone or pc create a unique, scannable, 2D code with alpha numeric functionality that allows the user to create, share and view a video or audio file, safely stored and accessible for eternity, viewable and accessible from PC or smartphone.
In one example, the system retrieves the file associated with a hybrid code by using the text component, e.g. the alphanumeric code, of the hybrid code to first retrieve the hybrid code in a database or other storage area. The file associated with the hybrid code can then be accessed using the retrieved hybrid code.
Turning now to
In another embodiment of this present invention, users who upload, store and retrieve photos, videos, or other files using the application system of this present invention are not charged a monthly or yearly subscription. Under this present embodiment, the application is free to use, but there will be advertisements provided by third party advertisement companies. Each advertisement may appear somewhere in the interface of the present invention or website by a video, photo or audio file. Advertisers will support the application by remitting payments to the application's merchant account based on the amounts of advertisements transmitted, amount of advertisements clicked or other calculations the advertiser agrees to. In another embodiment, a user may agree to a subscription, as seen in
In another embodiment of this present invention, examples of momentos are provided utilizing this present invention involving the use of a hybrid multi dimensional bar text code.
These seal momentos can be used for various holidays, including, but not limited to wedding invitations (13-1, 13-4), Valentine's day (13-2) or anniversary celebrations (13-2), or other celebrations such as birth announcements (13-3), all of which may be used for other purposes as the user deems fit.
In another embodiment of this present invention
In another embodiment of this present invention,
The layered scannable tag 28-01 shown in
Another non-limiting embodiment of the present invention is shown in
The flow chart in
In another example of this present embodiment, the administrator of the application and application's server may have powers to manage user submitted data. The administrator of the application may decide to remove uploaded files if it is within their discretion. The administrator of the application of this present invention may also manage payment information.
The scannable tag may also provide a physical-to-virtual (P2V), and continued virtual, and back to physical realm, enabling users to interacting with others, including businesses or other organizations. There are examples of QR codes, that once scanned, may link the user directly to a website, usually consisting of the advertising something (such as a good), but there are not examples where scanning a scannable tag, equipped with data matrix, that allows the user to selectively upload or share their multimedia with others across the current popular social media sites, using an “App” used in conjunction (or as a stand alone) with the App's own specialized social media platform that provides the user with more options, functionality, allowing a more interactive and personal experience between persons, person to business, or business to business types of interaction.
This specialized social media platform, is not limited to sharing on its own site, but may also share on other sites or onto other social media platforms.
Once uploaded, the length of time these files stay on the server may be selected and maintained by the user, wherein the user can adjust or select the duration that the files are maintained or otherwise stay on the server. The shorter, or longer the file stands server, a fee may be required to maintain this request, but it is possible with the system. Most users may select the default option, which may be specified by the administrator of the server (could range from seconds, to minutes, to hours, to days, to weeks, or maybe even a month or more), but in the event that the user wants to choose something other than the default, a fee for this maintenance may be levied against the user's file that was uploaded.
The App provides an interactive page that allows or facilitates the scan of the scannable tag, to allow the user to upload various file types, including but not limited to, video, audio, pictures, or any other type of multimedia file, or any other file that the user wants to upload (providing that it is within the terms of service of the App), and selectively upload that to their own unique channel or unique user page, which may include a personal channel or a business channel, or a group channel, for example—where others may follow or watch the various channels, and even interact or post their own videos back to the original poster, linking to another layer of the scannable tag, for example.
Once uploaded, another user may scan this scannable tag, which may have more than one layer, or family of layers, that allows the user to visit various components associated with each layer within the specialized social media platform, for example for a business, for an employee of the business, or the employee page, or any personal social media platform page, previously set up by the user, wherein the scannable tag is linked from the physical scannable tag, to a virtual world, linking another user to this specialized social media platform so that they can continue to interact.
Besides personal uses, the scannable tag may also be used for business-to-business (B2B) purposes as well. For example, the multilayered scannable tag may provide an interactive experience with a manager, wherein the manager could scan the scannable tag and upload a message to her employees about recent changes in company policy, and once the employees have scanned the tag and watched, or viewed the message of the manager, the employees would be able to upload their response(s) to the message of the manager—to provide a personalized message or response to the group or individuals once scanned.
These multilevel, or multilayered scannable tags, will also allow for many other possibilities including, but not limited to, the opportunity for employees (workers, laborers, etc.) to interact with upper management to provide feedback on, for example, and not limited to, safety protocols where direct documentation can be obtained by scanning a multilevel tag and the user may uploads to the cloud, and becomes immediately accessible to upper-level safety management personnel, for example, so that they can quickly and adequately respond to any safety issue raised, and this would also provide an opportunity for the upper-level management to respond to this issue to let people know that of reported the issue that there report has been seen. The system would provide for adequate chain of custody and documenting employees concerns for any issue.
In another non-preferred embodiment, if a user goes to a store, such a shoe store, the user can scan a scannable tag on the shoe box or shoe of and this scanning event would link the user directly to the company's content, and social platform or respond in various way to give feedback directly, and potentially immediately, back through the tag to the user's profile or company's profile within the social media platform.
Additionally, a person-2-person sharing may also occur, where a user may place a scannable tag on their locker, another (person) with a device capable of scanning the tag, can respond directly to the first user, watch the first user's content or go to the first user's social media platform and view that user's profile, videos, content, based upon privilege information embedded into the layered scannable tag or within the application preferences.
These multilevel, or multilayered, scannable tags would have a data matrix that corresponds to a particular user, and their uploaded data, and the website by way of utilizing at least one layer of the scannable tags through the code system as defined by this specification. For example, the layers may correspond to at least one of the following, scan and watch; go to website; responding back (with read response receipts); responding with video response (video conversation, such as email), replies, where each layer can correspond with retrieving, sending, or interact to form other useful functions with the said layers.
While examples above contemplate the use of tags in certain circumstances and applied to various types of media, it will be understood that the multilevel, or multilayered, scannable tags can also be utilized with media such as letters, postcards, business cards, fliers, brochures, greeting cards, envelopes, invoices, signs, as well as other printed and electronic communication media, such as e-books and digital signage, that would be known to one of ordinary skill in the art with the present disclosure before them. It will be understood that basic concepts regarding the generation of a multilevel, or multilayered, scannable tag are provided in greater detail, supra.
According to some embodiments, multilevel, or multilayered, scannable tags may be utilized for business or commercial-specific applications. More specifically, but not by way of limitation, a tag may be used by a business to effectively create, track, and publish videos (or other media files) for marketing or customer communication purposes.
In these instances The App provides a tag owner with full viewing and manipulation control over various tag attributes. Example tag attributes include, but are not limited to, a number of scans for the tag, duration of use for the file associated with the tag, a geo-location that is indicative of a location where the tag was scanned, and monetization features.
With respect to a number of scans, The App may generate a user interface that provides the owner with metrics or statistics regarding the number of times that a tag has been scanned. For example, The App may be configured to provide the owner with metrics that designate how many times the tag has been scanned in a week, a month, or any other time period. In other instances the number of scans may be determined without reference to a specific time period and would refer to an aggregate or total scan number.
On a related matter, the owner may also be allowed to specify how many times a tag can be scanned. For example, a tag is attributed a specific number of scans such as 100. The number of scans may be associated with an action or set of actions that occur when the number of scans reaches this preset threshold. For example, a tag may be associated initially with a first advertisement video that is stored in the cloud. After 100 scans the tag may be automatically re-associated with a second advertisement video that is also stored in the cloud. In this way the owner can ensure that the content associate with the tag remains fresh and relevant to a target audience.
With regard to the metric of duration of use of the file associated with the tag, The App may allow the owner of a tag to determine, for example, how long a video file was watched. This information will indicate to the owner if those viewing the video file are engaged or interested in the content. It can be assumed that if the overall video file duration is five minutes, but viewers are only watching the first two minutes of the video file that viewers are becoming disinterested in the content of the video file.
Another metric that may be tracked is a determination of what time viewers stopped a video file. For example, it may be determined that viewers stop watching a video file at one minute when the overall duration of the video is three minutes. It could be inferred that the content occurring around minute one and a half is somehow causing viewers to lose interest. Knowing video file metrics such as viewing duration and stopping time may allow the owner to query viewers about the content of the video file in light of their actual viewing behaviors.
Another analytic/metric that is tracked includes the geo-location where a tag was scanned. For example, the geo-location information may include global positioning system (GPS) data such as latitude and longitude where a computing device scanned a tag. This geo-location information can be captured by requiring the computing device that scanned the tag to attach current GPS location information for the computing device (if available). Alternatively, the computing device can attach a last known position information for the computing device if a current GPS signal is unavailable. Notwithstanding, in some instances the geo-location information is attached to a message that is transmitted when the computing device requests the content (such as a video file) that is coupled with the scanned tag. In another embodiment, the link for the video file is not displayed to the viewer until the viewer gives permission for the computing device to provide its GPS information to a server that tracks the analytics and metrics for tags. Again, an example server includes the memory tag system website server of
In another embodiment a metric of viewer device platform is determined when a tag is scanned or a file associated with the tag is accessed. For example, the viewer may use a device (such as the camera enabled smart phone of
As mentioned above, an example tag of the present technology may be embodied as a 2D barcode that is affixed to a product. A viewer may use a device to take a picture of the 2D bar code, for example, with a camera enabled cell phone that will redirect them to the programmed URL. The phrase “taking a picture” or “take a picture” will be understood to include, for example, scanning the 2D bar code using known bar code scanning methodologies. In one example, cell phones can execute bar code reading applications that identify, capture, or otherwise receiving the 2D bar code using the camera of the cell phone. Thus, the bar code scanning application may process the view captured by the camera and extract or determine information included in the scanned 2D bar code. So it will be understood that aspect of taking a picture is not strictly confined to a traditional image capturing and storing procedure, but may also include instances where visual information, such as a bar code or QR code is obtained using a camera. This information can be stored locally on the device or may be utilized within the runtime memory of the scanning application that is utilized.
The present technology also contemplates other known methods for identification and translation of encoded images that would be known to one of ordinary skill in the art with the present disclosure before them.
In other embodiments, metrics that relate to other attributes of the computing device of the viewer that impact video/audio playback are requested from the computing device. These attributes may include display size, display resolution, video processor type and speed, web browser application type, display driver settings, video/audio file format compatibility (e.g., which types of media files can be played by this device), as well as other attributes of the viewer's device.
Another metric includes a location of a link that was clicked by a viewer in order to access a file that is associated with a tag. For example, the link may be displayed on a social network, a website, a blog, or any of the online media types described herein. If the point of origin of a request can be determined, such metrics are tracked.
The metrics described in the foregoing paragraphs can be tracked for an owner. These metrics can be tracked over time and can provide the owner with insight into how viewers are finding, requesting, and ultimately using the owner's files. Owners can specify which of the metrics they are interested in tracking, using The App. A cost is associated with the tracking of one or more metrics. That is, the owner is required to pay for The App to track metrics. When the tag and file are used in the context of a marketing campaign, these metrics can be used as key performance indicators (KPI) that inform the owners of the success of a particular marketing campaign.
Owners can request the creation and display (e.g., either over the network or available for download) of reports regarding their selected metrics. These reports are also provided at a cost to the owner.
In some embodiments, The App is configured to log the number of times a video is watched, the type of device requesting the video, and where that device is located (in addition to date and time). These metrics are uploaded to a server database and synchronized with similar analytic data that has been tracked and retrieved from the playback pages from a website, which tracks browser views.
Anytime an owner wishes to access and review their video information, data from both The App and browser views is made available to them. The information may be viewed by the owner either logging into The App or logging into their dashboard (see
A dashboard user interface, such as the dashboards illustrated in
Other types of tag information such as number of tags in circulation, and any other measurable (and ultimately measured) attribute of a tag can be displayed to the owner.
With respect to owner accounts, and specifically when an owner account is associated with an organization, rather than an individual, The App allows for role-based account access. For example, a company may have multiple team members that involved with marketing, such as a marketing director and one or more marketing subordinates. Each of these individuals can be assigned a different degree of access to a company's tags. For example, the marketing director can have complete control and full access to all tags for the company. A marketing subordinate may have the right to view and edit tags and/or files, but not the right to publish a tag or file. A company account may require a subscription fee that is based upon the size of the company or number of company employees who require access to The App, as well as the functionalities required by the company.
The App also provides accounts that provide features at differing price points. For example, a small business account may follow a pay-as-you-go model (pay for each service individually as-needed). Alternatively, a mid-sized account may pay a monthly subscription to gain a greater number of unlocked functions and a certain number of “credits” which may be used to change videos more frequently (among other things).
A large-business account may pay a higher monthly subscription to unlock all features, such as reporting, and maintain unlimited changes to all tags and associated videos. For the small and medium accounts, any user who has zero credit but wants to change a video may tap the “change” button. The App will recognize that they have no credit and will inform them that there is a price to do so. If the user agrees to the price, they are navigated to a native application store window for payment. This native application store is facilitated, for example, in the mobile device area, by the manufacturer of the operating system for the device. By way of example, devices that use the iOS operating system will use the Apple iTunes Store (trademarked). Upon completion of the payment, a credit is added to the user's account and the owner is given the option to use the credit for the purpose of changing the video. The owner may repeat this process as often as desired. With respect to monetization, The App allows an owner to monetize advertisements that are displayed along with their file that is linked to a tag. For example, a tag may be linked to a video file. In turn, the video file is associated or linked with advertising content that can be displayed or presented to a viewer before, during, or after the presentation of the video file. By way of example, a video file may be coupled with a banner advertisement that is presented to the viewer along with the video file. Other combinations of files and advertisements and their respective methods of presentation that would be known to one of ordinary skill in the art are also likewise contemplated for use in accordance with the present technology.
In accordance with the present disclosure a tag is configured so as to allow the owner to change a message and/or associated file as desired. Rather than requiring the owner to create a new tag when the content associated with the tag changes, the owner can selectively couple the tag with a new message or content as desired. For example, the owner may initially couple a first video file with a tag. As mentioned above, the first video file is stored in the cloud at a particular location or address, referred to as a first path. Rather than creating a new tag the owner can simply associate a subsequent file with the tag by updating the location or address, referred to as a second path. The coupling of the tag with new content may require the owner to upload the new content to the cloud. In some instances the tag can be rotatingly or periodically associated with a plurality of files. For example, the tag owner may upload five different video files to cloud storage, where each of these five video files has a unique location. The tag is couplable with each of these five video files at different times or at different time intervals.
The owner may specify a schedule that determines when the video files are coupled with the tag. For example, the first video file is coupled with the tag for one week. The following week the second video file is coupled with the tag, and so forth, ending with the fifth video file. In another example the tag is associated with a different video file each time the tag is scanned. For example, upon a first scan the first video is displayed to a viewer. Upon a second scan the second video is displayed to a viewer. While these example schedules have been provided for descriptive purposes it will be apparent to one of ordinary skill in the art that other similar schedules can also likewise be utilized.
In some instances, a plurality of different video files (or other types of files) may be associated with different layers of the multi-layer tag. For example, a multi-layer tag may include three separate, unique layers. A unique file can be associated with each of the layers and a unique link is created for each layer. For example, a first layer of the tag may include a link to a first video file. A second layer of the tag may include a link to a second video file, while a third layer of the tag may include a link to a third video file, where all the video files are stored on the cloud resource. Stated otherwise, a multi-layer scannable tag may comprise a plurality of unique URL links and a plurality of unique layers, each of the plurality of unique layers embedding one of the plurality of unique URL links
In one example the first video file is a high definition version of a video. The second video file is a lower definition of the same video. Based upon knowledge about the viewer computing device or the network used by the viewer computing device, The App may intelligently select an appropriate version of the video file for the viewer computing device. In general, The App may select one of the plurality of unique layers to read based upon device characteristics of the computing device that scanned the multi-layer scannable tag.
The App that executes on the viewer computing device can be configured to distinguish between the various layers of the tag. In some instances, when the tag is scanned, The App may select which of the layers is read. In the example above, The App may determine that the viewer computing device is not capable of displaying high definition video. Thus, The App reads the second layer of the tag, rather than the first layer. The viewer computing device obtains the second file from the second URL.
In some embodiments, if the file associated with a tag is a video file, the playback duration of the video file may be limited to thirty seconds. This playback duration can be increased to any desired duration. The App may apply a cost multiplier that corresponds to the increase in playback duration. In instances where the owner has purchased a subscription, the subscription fee can be increased. When the owner is on a pay-per-play cost structure, the owner is billed more per each playback of the content having an extended duration.
In accordance with the present disclosure a file or files associated with a tag can be modified using The App. In one embodiment the tag is scanned by the owner. Assuming that the owner has been authenticated by The App, the scanned tag is opened for modification. The owner can change the file associated with the tag or make other modifications to the tag. This may require the owner to upload a file to the cloud if the file is not already present on the cloud. When finished, the tag is updated on the cloud and published for use in any of the mediums described above. Each time an owner changes the file that is coupled with the tag, a cost may be assessed to the owner.
As mentioned above, the tag can be applied to many different types of mediums, some of which cannot be readily updated, such as physical mediums (e.g., newspapers, magazines, signage, etc.). It is preferred in these instances that the link or location associated with the tag not change. Again, the tag is originally assigned a first path or location in relation to a file on the cloud. Thus, the original file stored in the cloud can be deleted and replaced with an updated file. The tag need not be updated and still point to the first path on the cloud. Alternatively, if the first path changes the tag is updated to reflect this change. Embodiments where the tag is displayed in a virtual format can more easily accommodate changes in the tag.
In some embodiments, a server, such as the memorytag system website server of
A tag owner is assigned a custom URL that can be used by the owner to direct customers, clients, associates, friends, and other third parties to the files that are hosted on the cloud. The customized webpage or dashboard is displayed when the third party accesses the custom URL. The tag owner may control the selection, placement, and display of the files on the custom URL. The App can be configured to provide control functionalities to the owner. In some instances the webpage associated with the custom URL can be branded with the owner's logo, trade name, graphics, artwork, or other creative media.
According to some embodiments, rather than linking or coupling a file to a tag, the tag is associated with, for example, a discount universal product code (UPC). In this embodiment, the owner would upload a barcode image to the cloud, which is logically associated with the tag. When uploaded, the barcode image is stored in the cloud and assigned a location identifier such as a uniform resource identifier (URI), a URL, or any other location identifier that can be used to identify the location of an object or file stored in a cloud storage system. The owner specifies a discount or special deal that is provided when the UPC is scanned at a retail establishment. For example, the UPC may provide a twenty percent discount on a garment. The instructions or information that specifies the parameters of the deal or discount are stored in a record in the cloud. Requests for the UPC will cause the cloud to respond with the parameters of the deal or discount.
While a barcode image has been disclosed, other methods of encoded data can also be used, such as a randomly generated token that includes a set of randomly generate characters that can be associated with the tag. The token can be associated with any type of information such as a discount code, a store credit, a message, or other data. When the owner specifies, for example, a discount code, The App is configured to create a randomly generated token. The token is stored in a database, along with the tag in a record. The token is provided when the tag associated with the token is scanned. The token can be redeemed using The App. For example, a viewer computing device may scan a tag. The token associated with the tag is provided to the viewer computing device. The viewer can redeem the discount code using The App. That is, The App can query the database for the record that includes the token. When the record is located, the discount code is displayed on the viewer computing device.
Turning to
In another embodiment, the viewer can scan the tag with their computing device. The discount UPC can be downloaded directly to the computing device and stored locally. The App is configured to provide a user interface that includes representations of all discount UPCs that have been downloaded to the computing device. That is, The App is configured to track and display the viewer's downloaded UPCs in a visual format. Alternatively, the viewer can access a mobile or desktop web page that includes the same information as the user interface. This embodiment is preferred when the viewer is not using The App, but is instead accessing discount UPCs through a webpage. The webpage is configured to operate in a manner that is consistent with the operation of The App.
The present technology can also be implemented in a virtual or physical gift card embodiment. Similarly to a discount UPC, the tag can be associated with a gift card, such as a prepaid amount of currency or merchant credit. The merchant may create a record in the cloud that specifies an amount of merchant credit available, for example, $100 of in store credit. This record is coupled to a tag of the present technology using any logical link such as a URL, a uniform resource identifier (URI), a domain, a subdomain, a virtual subdirectory, an IP address, and so forth. The data (e.g., store credit amount) associated with the record can be embodied, for example, in a barcode, a QR code, or any other visual object that is configured to encode data. During a transaction, when the visual object is scanned by the POS terminal, the POS terminal reads the URL encoded in the URL. The POS terminal requests the gift card/certificate information from the cloud using the URL. The cloud returns the requested data and applies the store credit to the balance of the transaction.
In embodiments where a merchant (e.g., owner) of a tag wishes to provide any of the aforementioned objects such as gift card, a discount UPC, or other similar object, the owner can create and manage these tags and associated objects using The App or accessing their owner dashboard over a network. Thus, owners can modify the details of a discount or gift card, if necessary. For example, an owner can specify that a discount UPC is to expire if not used in a specific period of time. In another example, the monetary value of a gift card can progressively decrease over time if the gift card is not used.
In some embodiments, The App may allow viewers or end users of The App to trade or exchange their discounts or gift cards with one another. For example, if a first user receives a discount UPC for a restaurant that they rarely frequent, the first user can exchange that discount UPC with a second user that currently possesses a gift card or discount UPC for a product or service that is frequently used or consumed by the first user. The App may facilitate an exchange or marketplace where users can post unwanted discount UPCs or gift cards. These discount UPCs or gift cards can also be purchased by other users rather than transferred via swap or exchange.
Next, the method includes generating 3302 at least one unique URL link and embedding 3203 the unique URL link is embedded into at least one layer of the multi-layer scannable tag. For example, the URL may include a virtual sub-directory such as http://www.domain.com/myfolder, or alternatively a subdomain such as mydomain.domain.com.
After embedding the at least one unique URL, the method includes tagging 3304 a video, image, audio or other file video, image, audio or other file with the least one layer by associating the least one layer with said unique file. For example, the subdomain of mydomain.domain.com may be logically associated with a layer of the tag in such a way that scanning of the tag by a device that is configured to scan the tag (such as a device that has The App) will retrieve the unique URL.
Next, the method includes storing 3305 said file alongside the unique scannable tag layer and URL link for retrieval. For example, a video file is stored on a cloud repository. This video file is stored on the path or link that is specified in the tag (e.g., the unique URL).
The method further comprises tracking 3306 the scanning of the multi-layer scannable tag and performance metrics of the tagged video, image, audio or other file. These metrics are storable in a database and can be retrieved for display by the owner of the tag. The various metrics, tracking methods, and display methods for these metrics are described in greater detail supra.
The method includes uploading 3401 a video, image, audio or other file video, image, audio or other file onto a cloud based file storage system. For example, a content owner may upload an advertisement video to a cloud based file storage system. Once the file (or files) is uploaded the method includes storing 3402 an associated unique scannable tag layer for a multi-layer scannable tag and URL link with the uploaded file. That is, the file is stored in a location on the cloud based file storage system. A pointer or path to the file is represented as a URL link, which is associated with the unique scannable tag layer of a tag.
Next, the method includes storing 3403 such submitted file and its associated unique scannable tag for an infinite period of time or until the user or systems administrator decides to delete or otherwise remove the submitted file.
According to some embodiments, the method includes requesting 3404 scanning metrics for multi-layer scannable tag or performance metrics of the tagged video, image, audio or other file, as well as subsequently receiving 3405 for display the requested scanning metrics or performance metrics. As mentioned above, these metrics can be requested and displayed on a dashboard user interface. These reports can be provided to the owner for a fee. The fee may include a one-time fee for a report or may include a subscription fee where the owner can receive unlimited reports or reports at given time intervals, such as daily, weekly, monthly, or quarterly.
Next, the method includes replacing 3505 the first video, image, audio or other file video, image, audio or other file with a subsequent video, image, audio or other file video, image, audio or other file by associating the first layer with the second video, image, audio or other file. In order to ensure that this subsequent file is provided when the tag is scanned, the method includes replacing 3506 the first video, image, audio or other file video, image, audio or other file with a subsequent video, image, audio or other file video, image, audio or other file by associating the first layer with the second video, image, audio or other file, and deleting 3507 the first video, image, audio or other file.
The method also includes storing 3508 the subsequent video, image, audio or other file video, image, audio or other file alongside the multi-layer scannable tag and URL link for retrieval, and tracking 3509 scanning of the multi-layer scannable tag and performance metrics of the second tagged video, image, audio or other file. Conceptually, the subsequent file becomes the “first file” and the process can be repeated when the owner decides to change the file associated with the URL link. That is, the URL link remains the same, but the owner can change the file associated with that URL link such that the scannable tag need not be changed to effectuate a change in the file that is associated with the scannable tag. Furthermore, as mentioned above, each time the file is changed a fee may be assessed to the owner.
Rather than replacing the first file, it will be understood that the file can be modified. For example, the owner may change video title, modify a video security/password, or privacy/public options for views, GPS location information, or sharing privileges, and so forth. The edited file would be the “subsequent” file.
Next, the method includes for each of the plurality of unique layers, tagging 3602 a video, image, audio or other file video, image, audio or other file therewith, as well as storing 3603 the video, image, audio or other file video, image, audio or other file of each of the plurality of unique layers, alongside the multi-layer scannable tag and the plurality of unique URL links for retrieval.
The method further includes applying 3701 a multi-layer scannable tag to an object, such as a drink container or any consumer good. As mentioned above, this may include, for example, printing a QR code on the consumer good or otherwise affixing a tag to the good. The consumer good is placed into commerce and eventually is purchased by a consumer. When a consumer scans the tag the method includes tracking 3702 scanning of the multi-layer scannable tag. The tracking may include capturing the location where the tag was scanned, if the file associated with the scanned tag was downloaded, how long the consumer viewed the file, if the consumer shared the video with another party by email, messaging, or posting to social media, and so forth.
The method may also include tracking 3703 metrics of the advertisement that was provided to the consumer. In addition to the tracking that occurs for the file associated with the tag, the system may track metrics for the advertisement that is associated with the file. For example, metrics such as impressions, duration, sharing, click through, and so forth may be tracked. It will be understood that while the file may be stored in a cloud repository the advertisements or promotions associated with the file can be stored in the cloud or can be stored remotely from the file and retrieved only when the file has been requested by the consumer.
As mentioned above, the file associated with the tag may itself be an advertisement. For example, the file may include a video advertisement for the company that produces, sells, or distributes the consumer good.
A mobile display device 3802 is used to display a dashboard that is similar in content to that displayed on the desktop display screen 3801, although the format is tailored to display on a smaller screen format.
According to some embodiments, the scannable code tag technology of the present technology can be leveraged to deliver gifts or rewards to a user. More specifically, but not by way of limitation, a gift or reward can be provided to the user in addition to the file or files stored for the scannable code tag.
For brevity and clarity, the word “reward” will be used throughout the following descriptions. It will be understood that the term “reward” should be construed broadly and in accordance with the embodiments described herein. A reward may include a gift such as a virtual reward or a physical reward that is provided to a user. For example, a reward may include a digital good such as a coupon, an electronic ticket, an IOU, an amount of currency, a monetary object such as a check, money order, or other electronic payment format. A reward may include a store or merchant credit or other rewards or digital goods that would be known to one or ordinary skill in the art with the present disclosure before them.
In some embodiments, a scannable code tag is a reusable printed indicia that can be printed onto an object. It is reusable because the printed indicia is placed onto an object, such as a card, letter, bag, package, or the like, and the printed indicia is not changed or reprinted. In order to activate the scannable code tag, files, such as video and audio files can be associated with the printed indicia. For example, a scannable code tag may include a barcode printed onto a box. Files can be selectively associated with the scannable code tag by storing files on a network at a location that is linked to the scannable code tag. A user can change the file associated with the scannable code tag at any time without requiring alteration of the printed indicia on the object. As with the files that can be selectively associated with the scannable code tag, rewards can also be selectively associated with the scannable code tag. These features will be described in greater detail infra.
In one example, a sender delivers something to a recipient using a box that includes a scannable code tag. The recipient can scan the scannable code tag and retrieve the file that was stored by the sender. The recipient can the reuse the box with the scannable code tag by associating the scannable code tag with a new file. The recipient can then deliver the box to a subsequent recipient. The scannable code tag can be selective associated with different files as needed or desired.
In some embodiments, a scannable code tag may include a multi-layer scannable. In these embodiments, a “layer” of a multi-layer scannable tag should be construed to include a uniquely addressable location of a scannable tag. For example, a QR code can be split into sections, and each section of the QR code can embed different types of information. The sections of the QR code would represent the layers of the multi-layer scannable tag.
For example, a first quadrant of a QR code can embed a logical link to a file, while a second quadrant of the QR code can embed a logical link to a reward that is associated with the file.
In accordance with the present disclosure, the following descriptions will reference an application “The App” as with the embodiments described supra. Conceptually, the present technology is implemented by way of a particular purpose computing device, such as a server or a mobile communications device. The App can be stored in memory and executed by a processor to perform the various functionalities described herein. These functionalities present tangible improvements to scannable barcodes and tags and related processes involving scannable barcodes.
The method begins with the user scanning 3905 a scannable code tag. In one example, the scannable code tag is placed onto a birthday card. The scannable code tag may include a barcode, QR code, or even a string of alphanumeric or other characters. The scannable code tag is printed onto a portion of the birthday card in this example.
When the user purchases the birthday card at a store, the user scans the scannable code tag on the birthday card with their mobile device. The mobile device executes a scannable code tag application (The App). When the user scans the scannable code tag, the method includes The App reading 3910 contents of the scannable code tag. The App reads contents of the scannable code tag and determines that a file needs to be either (1) uploaded; or (2) replaced with a second file if one file is already associated with the scannable code tag.
If a new file is needed, the method includes The App uploading 3915 a video, audio or other file for storage on a network. For example, the user may select a file on their mobile device, such as a video or audio recording of the user saying “Happy Birthday”.
The uploaded file may be stored in cloud storage on the network. When the uploaded file is stored, the cloud may inform The App as to the location on the cloud where the uploaded file was stored. For example, the cloud may inform The App that the uploaded file was stored on a domain at an IP address such as 123.123.123.1. The location may also include, for example, a subdomain or virtual subdirectory or folder. Any method for recording and storing a file in cloud storage can be used, so long as The App is provided with a location that can be used to obtain the file at a later time.
The method further includes The App generating 3920 a logical link, such as a URL or URI that includes the location where the uploaded file is stored. For example, the file may be stored at http://example.domain.com.
The method includes The App embedding storing 3925 the logical link, for example, in a database. For example, a representation of the scannable code tag can be stored in association with the logical link. The URL provides a pointer to a location on a network where a tagged file is stored. By way of example, the scannable code tag can include a barcode that is associated with a video file that is stored on the network. The database may include the barcode and the logical link. After the scannable code tag is activated, when a user scans the barcode The App can locate the barcode in the database and obtain the URL or other logical link.
The App may also allow the user select one or more rewards that can be tagged for association with the scannable code tag. For example, The App may provide the user with a selectable list of rewards that are available from a plurality of different merchants or reward providers. In one example, The App may choose a selectable list of rewards based upon content of the uploaded file. For example, if the uploaded file is a video about a movie, the rewards may include free movie tickets or coupons for movie theater refreshments.
Alternatively, The App may choose a selectable list of rewards based upon the object that the scannable code tag is associated with. For example, if the object is a birthday card for a child, the reward may include a coupon for a children's related merchant.
In another example, the reward may include an electronic gift card that can be redeemed by a recipient of the birthday card. As with the uploaded file, a logical link for the reward may be created and stored in the database. Thus, the method may include The App specifying 3930 a reward for the scannable code tag.
For example, a merchant system may control the electronic gift card. A logical link, such as a URL or alphanumeric code can be associated with the electronic gift card. When the URL or alphanumeric code is provided to the merchant system, the merchant system will release or activate the electronic gift card.
As mentioned above, these logical links can be embedded into one or more quadrants of a QR code. If the multi-layer scannable tag is a stacked barcode, the stack layers of the barcode may be embedded with different types of logical links or information.
The creation of a scannable code tag with a file and reward will result in the activation of the scannable code tag. That is, the scannable code tag is ready for subsequent scanning and retrieval of the associated file and reward.
The method further includes activating 3940 the scannable code tag when the scannable code tag is scanned. In some embodiments activating the scannable code tag includes tagging 3945 a video, audio or other file with the scannable code tag by associating the scannable code tag with the file. For example, a user may upload a file such as a video file to a network. The scannable code tag is tagged with the video file by creating a database record that includes the scannable code tag and a logical link to the video file, such as a location of the video file on the network.
Next, the method includes tagging 3950 a reward with the scannable code tag by associating the scannable code tag with the reward. As with the video file, a logical link for the reward can be stored in the database record with the scannable code tag and logical link for the video file.
When the activated, scannable code tag is scanned by a device that is using The App, the method includes retrieving 3955 the tagged file upon receiving an indication that the scannable code tag has been scanned.
Thus, in some embodiments the method includes The App scanning 4005 an activated scannable code tag. In some embodiments, the activated scannable code tag is embedded with a logical link for the uploaded file and/or one or more rewards.
The method includes The App locating the 4010 the logical link(s) of the scannable code tag. It will be understood that locating the scannable code tag may include reading an embedded link in the scannable code tag. In another embodiment, locating the logical link may include querying the scanned code tag against the database, finding a matching record for the scanned code tag and obtaining the logical link associated with the scanned code tag.
The method includes The App obtaining 4015 the uploaded file from the network at the location specified in the logical link.
After the file has been retrieved from the network and displayed to the user, the method may include The App requesting 4020 the reward associated with the scannable code tag upon retrieval or display of the uploaded file. The reward can be obtained using a second logical link that was embedded into the scannable code tag or by locating the second logical link in the database record created for the scannable code tag.
As mentioned above, the uploaded file is associated with a first logical link that indicates where the uploaded file is stored on the network. The reward can be associated with a second logical link that indicates the location of the reward. This location could be, for example, a merchant system or server that is configured to manage and provide rewards in response to requests for rewards.
In some embodiments, the reward can be retrieved and provided upon retrieval of the uploaded file. In another example, the reward is retrieved and provided only when use of uploaded file is complete. For example, if the uploaded file is a video, the reward is provided at the end of the runtime of the video. If the uploaded file is an audio file, the reward is provided at the end of the runtime of the audio file. If the uploaded file is an image, the reward is provided when the image is displayed to the user.
In some instances, the reward, or an indication/representation of the reward is displayed to the user. In another example, a link to the reward is displayed to the user. The user can click the link to retrieve the reward. In another embodiment, a message that the user has received a reward can be displayed and an email that includes a link to the reward is sent to the user. The user can retrieve the reward by clicking on the link.
If the reward is a coupon or code, the reward can be printed or displayed for use on the user's mobile device, either using The App or storing the reward locally on the device as a file and retrieving the reward file when needed.
In the example provided above, the scannable code tag includes both an uploaded file and a reward that can be used with, for example, a greeting card. This combination streamlines the gift-giving process. The card purchaser can leave a personal video or audio message for the recipient by recording the message and uploading the same for storage. The user can then select a reward for the recipient of the card. For example, the user can select a coupon to a restaurant. In the following embodiments, the scannable code tag is embodied as a multi-layer scannable tag. Generally, a multi-layer scannable tag is a scannable code tag that has multiple layers or dimensions. Each of the layers can be unique in the type of information that they embed. In some instances, logical links can be embedded into the layers.
Next the method includes tagging 4110 a video, audio or other file with the multi-layer scannable tag by associating the multi-dimensional barcode with the file. This step may include generating a logical link or pointer that identifies a location of the file on a network. Also, the method includes tagging 4115 a reward with the multi-layer scannable tag by associating the multi-dimensional barcode with the reward. This also includes creating a logical link for the reward.
Tagging may include the process of embedding the logical links for the file and the reward in the multi-layer scannable tag. As mentioned above, the logical link for the file may be embedded onto a first layer, while the reward is embedded onto a second layer.
In some embodiments, the method may include retrieving 4120 the tagged file upon receiving an indication that the multi-layer scannable tag has been scanned. Also, the method includes retrieving 4125 the reward upon receiving an indication that the tagged file has been either (1) viewed completely; or (2) retrieved from the network.
Next, for at least a portion of the plurality of unique layers, the method includes tagging 4210 a video, image, audio or other file video, image, audio or other file therewith. Also, the method includes, for at least a portion of the plurality of unique layers, tagging 4215 a reward therewith, wherein each file is associated with at least one reward. Continuing with the example, layers three and four of the multi-layer scannable tag are embedded with logical links to two rewards. The file of layer one is associated with the reward of layer three and the file of layer two is associated with the reward of layer four.
In accordance with the present disclosure, The App may be included in a non-transitory computer readable medium such as memory, a hard drive, cache memory, cloud storage, CPU memory, or other storage mediums described herein.
The App, can be used to scan the multi-layer scannable tag and read the various layers of the multi-layer scannable tag. The ability of The App to read the various layers of the multi-layer scannable tag may depend on a user profile of the user. For example, when a user installs The App on their mobile device, prior to scanning any multi-layer scannable tags, the user is required to setup a profile or other identifier. The creator of the multi-layer scannable tag may specify which recipients can read which layers of the multi-layer scannable tag. For example, a child may send a card to their parents. The child can embed logical links for two different videos for each parent. Also, logical links for rewards can be embedded. The child can select which parent receives which file/reward combination and The App can restrict the layers such that only the appropriate party can read them. When the child uses The App to create the multi-layer scannable tag, the child can tag the files with an identifier for a parent. The identifier can identify the profile or user ID of the parent. When each parent scans the multi-layer scannable tag, The App executing on their respective mobile devices compares the user ID or profile embedded into the file layers of the multi-layer scannable tag and allows the parent to access the file only if they are permitted.
As with other embodiments described herein, an object with a multi-layer scannable tag can be reused without needed to change the multi-layer scannable tag that is placed on the object. For example, if the multi-layer scannable tag is a QR code printed on an gift bag, the QR code need not be changed to alter the file or reward associated with the QR code. By way of example, a user can reuse a gift bag that includes a QR code by uploading a new video or audio file and associating the file with a new reward. The only changes needed are to the logical links (e.g., URLs) for the files and reward. Thus, after receiving the gift bag, the recipient can also reuse the gift bag, “reloading” the multi-layer scannable tag with new files and/or rewards.
Specific reference to components, process steps, and other elements are not intended to be limiting. Further, it is understood that like parts bear the same reference numerals, when referring to alternate Figures. It will be further noted that the Figures are schematic and provided for guidance to the skilled reader and are not necessarily drawn to scale. Rather, the various drawing scales, aspect ratios, and numbers of components shown in the Figures may be purposely distorted to make certain features or relationships easier to understand.
The example computer system 1 includes a processor or multiple processors 5 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both), and a main memory 10 and static memory 15, which communicate with each other via a bus 20. The computer system 1 may further include a video display 37 (e.g., a liquid crystal display (LCD)). The computer system 1 may also include an alpha-numeric input device(s) 30 (e.g., a keyboard), a cursor control device (e.g., a mouse), a voice recognition or biometric verification unit (not shown), a drive unit 35 (also referred to as disk drive unit), a signal generation device 40 (e.g., a speaker), and a network interface device 45. The computer system 1 may further include a data encryption module (not shown) to encrypt data.
The drive unit 35 includes a computer or machine-readable medium 50 on which is stored one or more sets of instructions and data structures (e.g., instructions 55) embodying or utilizing any one or more of the methodologies or functions described herein. The instructions 55 may also reside, completely or at least partially, within the main memory 10 and/or within the processors 5 during execution thereof by the computer system 1. The main memory 10 and the processors 5 may also constitute machine-readable media.
The instructions 55 may further be transmitted or received over a network via the network interface device 45 utilizing any one of a number of well-known transfer protocols (e.g., Hyper Text Transfer Protocol (HTTP)). While the machine-readable medium 50 is shown in an example embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present application, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set of instructions. The term “computer-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, and carrier wave signals. Such media may also include, without limitation, hard disks, floppy disks, flash memory cards, digital video disks, random access memory (RAM), read only memory (ROM), and the like. The example embodiments described herein may be implemented in an operating environment comprising software installed on a computer, in hardware, or in a combination of software and hardware.
One skilled in the art will recognize that the Internet service may be configured to provide Internet access to one or more computing devices that are coupled to the Internet service, and that the computing devices may include one or more processors, buses, memory devices, display devices, input/output devices, and the like. Furthermore, those skilled in the art may appreciate that the Internet service may be coupled to one or more databases, repositories, servers, and the like, which may be utilized in order to implement any of the embodiments of the disclosure as described herein.
In other examples, a scannable code tag can be printed on other types of objects such as a postcard or envelope 4410, a letter or invoice 4415, or alternatively a sticker or tab 4420. Again, these are merely examples of objects that can be provided or printed with a scannable code tag of the present technology.
In an example use case, a recipient receives the greeting card 4405A from a sender. As mentioned above, prior to providing the recipient with the greeting card 4405A, the sender scans the scannable code tag 4405B of the greeting card 4405A and completes the process of uploading a message or video for the recipient. The message is stored in cloud storage at a location that can be defined by a logical link. The storage location on the cloud and the logical link may already exist and the sender needs only to upload the message for storage. In other instances, the storage location needs to be created and a logical link defined, such as when the scannable code tag 4405B is being used for a first time.
Also, the sender can choose a gift (e.g., reward) for the recipient, such as a gift card, a coupon or the like. The gift can be set up for delivery to the recipient by way of email. Thus, the sender inputs the email address of the recipient for delivery of the gift.
Once the greeting card 4405A is received by the recipient, the recipient scans the scannable code tag 4405B. The message is delivered to the recipient and an email is sent to the recipient's email address.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the present technology in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the present technology. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the present technology for various embodiments with various modifications as are suited to the particular use contemplated. Aspects of the present technology are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the present technology. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present technology. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It is to be understood that the described embodiments of the invention are illustrative only and that modifications thereof may occur to those skilled in the art. Accordingly, this invention is not to be regarded as limited to the embodiments disclosed, but is to be limited only as defined by the appended claims herein. It will further be understood that any features described in relation to any particular embodiment may be featured in combinations with other embodiments, for avoidance of doubt.
Please find references below.
This application is a continuation-in-part of U.S. Non-Provisional application Ser. No. 14/269,164, filed May 4, 2014, which continuation-in-part of U.S. Non-Provisional application Ser. No. 14/106,656, filed Dec. 13, 2013, which is a continuation-in-part application of U.S. Non-Provisional application Ser. No. 14/081,766, filed Nov. 15, 2013, which is a continuation-in-part of U.S. Non-Provisional application Ser. No. 13/925,724, filed Jun. 25, 2013, which is a continuation-in-part of U.S. Non-Provisional application Ser. No. 13/759, 863 filed Feb. 5, 2013, which claims the benefit of U.S. Provisional Application No. 61/711,216 filed Oct. 9, 2012. The entire contents of each patent application identified above is incorporated by reference herein as if fully set forth to provide continuity of disclosure.
Number | Date | Country | |
---|---|---|---|
61711216 | Oct 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14269164 | May 2014 | US |
Child | 14327502 | US | |
Parent | 14106656 | Dec 2013 | US |
Child | 14269164 | US | |
Parent | 14081766 | Nov 2013 | US |
Child | 14106656 | US | |
Parent | 13925724 | Jun 2013 | US |
Child | 14081766 | US | |
Parent | 13759863 | Feb 2013 | US |
Child | 13925724 | US |