Manufacturers, retailers, and sometimes third party promoters often offer discounts, incentives, and other price reductions to entice potential customers to purchase their products. These price reductions are often distributed on paper coupons that the customer must present at the point-of-sale terminal to redeem the value of the price reduction. Typically the final retail point-of-sale terminal is reimbursed for this price reduction by sending the redeemed paper coupon back to the provider that issued the paper coupon along with a record of the transaction for validation. This validation is often done by hand and may be conducted by a third party vendor who verifies that the paper coupon is valid, compares it to the record of the transaction, and then applies any relevant business rules. Not until the end of this tedious process does the retail point-of-sale terminal get reimbursed for the redeemed paper coupon. This is a time-consuming and expensive process that is prone to fraud and human error. Paper coupons are relative easy to forge and the infrastructure required to process them is highly labor intensive.
There have been some attempts to provide price reductions in digital form. Some deliver the incentives to the customer in digital format but require the customer to present a printed coupon at the point-of-sale for redemption of the incentive which does nothing to address the reimbursement processing costs. Other systems require hardware connections which are expensive and impractical to implement. Some other systems require the use of mobile devices such as smart phones and personal digital assistants that store all of the customer's information, These systems are prone to loss and also exclude a large segment of the market that does not have such devices. What is presented is message broker for redemption of digital incentives at a point-of-sale terminal for a commercial transaction that does not require paper coupons, does not require any additional hardware for implementation at the point-of-sale, and can digitally administer redemption to reduce, if not eliminate, fraud in the process.
A message broker is presented for redemption of digital incentives at a point-of-sale terminal for a commercial transaction. The message broker is able to communicate with a central database external to the point-of-sale terminal. The central database contains unique customer registration information and unique identifiers assigned to the unique customer registration information. The central database also contains business rules for redemption of digital incentives including at least all of the attributes of an industry-standard barcode, plus additional rules as required by specific application.
Redemption of digital incentives by a customer at the point-of-sale terminal occurs at the time of purchase as follows: the customer's purchases are recorded in a basket list at the point-of-sale terminal; the customer presents their unique identifier; an instruction to process a transaction is initiated at the point-of-sale terminal; the message broker routes the unique identifier and the basket list to the central database; the central database applies the rules for redemption of digital incentives; the central database returns validated applicable digital incentives to the message broker; the message broker forwards the validated digital incentives to the point-of-sale terminal for redemption; the point-of-sale terminal applies the validated digital incentives to the customer's purchase; and the message broker routes an acknowledgement message to the central database confirming the application of the validated digital incentives.
The customer may be informed of a successful redemption of digital incentives by SMS text message, e-mail, mail, telephone call, or on a printed receipt from the point-of-sale terminal. The customer presents their unique identifier from any of a virtual smart card, a cellular phone, a magnetic strip on a swipe card, a bar code, biometrics information, a telephone number, an e-mail address, a pin number, an RFID tag, or an account number. The message point-of-sale terminal can be retail cash registers, internet cheek-out web pages, broadcast television signals, cable television signals, or cellular telephones. The message broker can also route information to the central database that includes time specific information, location specific information, order totals, other discounts, voided transactions, or UPC characteristics.
Those skilled in the art will realize that this invention is capable of embodiments that are different from those shown and details of the devices and methods can be changed in various manners without departing from the scope of this invention. Accordingly, the drawings and descriptions are to be regarded as including such equivalent embodiments as do not depart from the spirit and scope of this invention.
For a more complete understanding and appreciation of this invention, and its many advantages, reference will be made to the following detailed description taken in conjunction with the accompanying drawings.
Referring to the drawings, some of the reference numerals are used to designate the same or corresponding parts through several of the embodiments and figures shown and described. Variations of corresponding parts in form or function that are depicted in the figures are described. It will be understood that variations in the embodiments can generally be interchanged without deviating from the invention.
A big hurdle to successful implementation of a new technology is the startup and installation cost. Systems that require large initial investment in hardware that is incompatible with existing systems are not as easily adoptable as systems and methods that make use of existing equipment as much as possible. Typical retail environments, whether at a grocery store, a clothing store, or other brick and mortar retail outlets, have point-of-sale terminals where customers take their selections for purchase. These point-of-sale terminals are usually equipped with payment devices that allow the customer to use non-cash methods of payment. These payment devices are usually connected or to the point-of-sale terminal for exchanging customer ID information and payment information. The point-of-sale terminal often is used to establish secure connections to financial service providers to process payment and/or credit for the customer's purchases, while the payment device is simply used to collect the customer's information and pass it through to the point-of-sale terminal.
The same principle of a point-of-sale terminal and a payment device is also seen in internet retail applications. Customer selections on internet retail web sites are placed in “shopping carts” which act as point-of-sale terminals to aggregate and total the items to be purchased. Before purchases are finalized, the method of payment is usually processed with a payment device software that performs the same function as the brick-and-mortar equivalents but does not include a hardware component.
As the point-of-sale terminals and the payment devices are common to most retail establishments, the digital incentive issuance, redemption, and reimbursement system and method disclosed herein attempts to modify these items as little as possible to minimize implementation costs and increase participation. An example of a point-of-sale terminal that could be used in some of the embodiments disclosed herein is the IBM ACE POS manufactured by International Business Machines Corp. of Poughkeepsie, N.Y. Referring to
Payment devices 14 are typically able to maintain secure connections to the internet. They are generally third party devices used for exchanging transactional payment information between point-of-sale terminals and financial institutions. The payment devices 14 are typically sold to retailer to provide a secure communication gateway and therefore payment devices 14 typically employ sophisticated encryption and secure network connections because of the sensitive nature of the information transmitted over them. These payment devices 14 are generally programmable with customizable software to enable retailers to tailor the functionality of the payment devices 14 as needed.
A piece of software called a message broker 16 manages communications from the authenticated existing point-of-sale terminal 12 to the central database 10. The message broker 16 may be loaded onto the payment device 14 or the point-of-sale terminal 12, but in any case is able to function as described. The message broker 16 packages and routes communications from the payment device 14 and/or or the point-of-sale terminal 12 through the retailer's communication mechanism 18 to the central database 10. There are a variety of payment devices 14 in common use that can be programmed to include a message broker 16 as described herein, including touch screen interfaces, magnetic card readers, infra-red scanners, pin pads, and other devices. An example of a payment device 14 that can be used as a described herein is the 1000ES VeriFone PIN Terminal manufactured by VeriFone, Inc. of San Jose, Calif. The retailer's communication mechanism 18 may be a modem, a T-1 line, a telephone connection, a wireless communication system, or any other communication system that connects the message broker 16 to the central database 10.
Preferably, the central database 10 assigns a matching encrypted public/private key 20, 22 pair to each authenticated existing point-of-sale terminal 12. Any communications from the authenticated existing point-of-sale terminal 12 and any associated payment devices 14 to the central database 10 will be encrypted and include the public key 20. These messages can only be decrypted by the central database 10 which has the matching private key 22. Incoming messages to the central database 10 are first screened by a firewall 24 to block malicious software and then passed to an authentication service 26 that compares the public key 20 in the message with what is stored in the central database 10. The public key 20 matches the record of the location of the authenticated existing point-of-sale terminal 12 and the payment device 14 and if it passes, the central database 10 uses the private key 22 to decrypt the message for processing. The private key 22 is maintained solely on the central database 10. The message broker 16 includes the public key 20 in any transmission to the central database 10 for authentication, tracking, and auditing purposes. This adds a layer of security to ensure that transactions are from authenticated and authorized retailers. This reduces instances of fraud or theft.
A session token 28 is used to force the initial authentication and registration to time out after a short interval of time. Each initial authentication and registration process is assigned a session token 28 which is granted after all the credentials are authenticated. In the event of a security breach, the short life of the session token 28 reduces the chances of unauthorized initial authentication and registration from occurring. If an unauthorized person acquired a session token 28, unless they knew exactly what to do, what authentication credentials to use, and other specific information imbedded in the transaction, the unauthorized person would only have a few seconds to do anything before the session token 28 expires.
Transactions and redemptions that are carried out over authenticated point-of-sale terminals 12 and payment devices 14 may be catalogued and tracked on the central database 10 if required by the particular application.
It is important to note that the system and method is not dependent on any existing loyalty card based system. Other solutions in the market place simply integrate with existing loyalty systems like IBM's EME or NCR's Copient loyalty systems. This means that these solutions only work in grocery stores and only in stores that require customers to have a retail specific loyalty card. The invention disclosed herein allows any store in any industry to participate in processing digital incentives whether the customer has a loyalty card or not.
The central database 10 assigns a unique identifier to the unique customer registration information so that the digital incentive usage and other account information and statistics and be tracked and processed. The unique identifier can be a randomly generated password or pin number, or it could be selected by the customer, or it could be the customer's phone number, address, or other unique attribute, or it could incorporate biometrics such as retina scans or fingerprints. The unique identifier could be stored on a virtual smart card, a cellular phone, a magnetic strip on a swipe card, or a bar code. It could also be entered manually by the customer. The unique identifier associates the customer with their account in the central database 10. The customer needs to carry no information as all of their account information is held in the central database 10.
Incentives providers 34 also have access to the central database 10. Incentives providers can be manufacturers, advertising agencies, service providers, grocery stores, retail outlets, financial institutions, or others that wish to provide digital incentives to customers registered with the central database 10. The incentives providers 34 supply the central database 10 with a listing of the incentives they wish to offer along with the business rules and limitations under which the incentives operate. Examples of incentives include: two-for-one offers, specific percentage or value discounts, etc. Since the business rules are maintained and processed on the central database 10, the business rules are not constrained by the limited attributes that exist on bar codes. The digital incentive system and method allows marketers to apply business rules that have never been available to them before. Bar codes have restricted marketers to targeting by manufacturer code with a limited set of value codes. The digital incentive system and method allows marketers to combine unlimited rules such as time elements, location specific rules, unlimited UPC combinations, any value, historical shopping patterns, and many others. Examples of business rules and limitations include: limits on the number of items purchased per customer, time limits on when the offer is valid, combinations of items that limit the incentive, geographic limitations by store, municipality, etc. These digital incentives are made available to qualifying customers. It is important to note that this invention is not dependent on any existing loyalty card based system. Other solutions in the market place simply integrate with existing loyalty systems like IBM's EME or NCR's Copient loyalty systems. This means that these solutions only work in grocery stores and only in stores that require customers to have a retail specific loyalty card. This invention allows any store in any industry to participate in processing digital incentives whether the customer has a loyalty card or not.
While the assignment of digital incentives to the customer's account could be automatic, it is preferable from an advertising perspective that customers actually browse and select digital incentives that they wish to use. In this way customers can be exposed to new product offers and can be incentivized to purchase items they would otherwise not have purchased.
The central database 10 can include functionality that permits the customer to search for digital incentives for specific items and the central database 10 will present the closest matches to the search and possibly other related digital incentives. It can also include a matching feature such that a customer enters a shopping list of generic or branded items and the central database 10 will alert the customer to available digital incentives that fit the list. The customer can print the shopping list or have the list sent or e-mailed to a personal digital assistant, a cellular phone, or other device as a shopping aid. Additional functionality can be included such that a shopping list can be sent to a retail outlet to have the selected items available for pick up by the customer or delivery to an address specified by the customer. Specific Internet links can also be provided to enable customers to redeem their digital incentives on-line or to find out more information about a particular digital incentive. Many other variations in functionality will be obvious to those of skill in the art and such variations are intended to be covered herein.
Under this system and method, information about the incentives is processed in the central database 10 externally of the point-of-sale terminal 12. Therefore, as all of the information is processed in one central location are no issues with synchronization, timing, or having to ensure that all nodes in the system are updated and accurate. The system and method described herein avoids the situation in which each retail location must have a copy of all of the possible incentives, business rules, customer information, etc. as here the central database 10 stores all of that information regardless of the location of the point-of-sale terminal 12. Under this system and method, when a customer shops, the customer's incentive account is available instantly at every location that has access to the central database 10. A customer making selections of incentives automatically updates the central database 10 with those selections and those incentives are available to be redeemed at all available stores in real time. So long as a connection is available to the central database 10, a customer should be able to access their selected incentives from any authenticated point-of-sale terminal 12.
The authentication service 26 compares the public key 20 in the message with what is stored in its records. The authentication service 26 checks to see if the public key 20 matches the record of the location of the authenticated existing point-of-sale terminal 12 and the payment device 14 and if it passes, the central database 10 creates a session token 28 to identify the transaction and establish a time limit on the processing of the digital incentives. The session token 28 is used to force a digital incentives redemption transaction to time out after a short interval of time. Each individual redemption process is assigned a session token 28 which is granted after all the credentials are authenticated. In the event of a security breach, the short life of the session token 28 reduces the chances of unauthorized redemptions from occurring, If an unauthorized person acquired a session token 28, unless they knew exactly what to do, what authentication credentials to use, what digital incentives to use, and other specific information imbedded in the transaction, the unauthorized person would only have a few seconds to do anything before the session token 28 expires.
The central database 10 uses the private key 22 to decrypt the message for processing. The central database 10 compares the list of items to be purchased with the digital incentives previously selected by the customer. Applicable business rules are imposed and the session token 28 is returned to the message broker 16 with the validated digital incentives. The message broker 16 routes the session token 28 with the validated digital incentives to the authenticated existing point-of-sale terminal 12 via the payment device 14 for redemption. Redemptions are displayed on the transaction receipt from the authenticated existing point-of-sale terminal 12. The session token 28 is continuously checked for expiration and if the transaction is terminated if it cannot be completed before the session token 28 expires. Optionally, a confirmation of the redemption is sent back to the central database 10. The central database 10 records the details of the transaction and redemption of the digital incentives with the customer's account. The customer can be sent a summary of the redemption of the digital incentives by SMS text message, e-mail, mail, telephone call, printed receipt from the authenticated existing point-of-sale terminals, or by any other appropriate notification.
On successful completion of the digital incentive redemption, the central database 10 processes the transaction for reimbursement.
After successful redemption of the digital incentives, the central database 10 processes reimbursements 56. This could be conducted in real time as the digital incentives are reimbursed or it could be aggregated at periodic intervals, after specified threshold values are redeemed, or otherwise as determined by the particular business model. Records of the reimbursements can be made 46 for later auditing purposes. The reimbursement process 58 determines the cost of the digital incentive based on the applicable business rules and records the amount of money that is owed to the redeemer of the digital incentive by the incentives provider. The incentives provider can also be charged a transaction fee. The total due is sent to the incentives provider's accounts receivable 62. The reimbursement process 58 also accumulates any fees that are owed for the issuance, redemption, and reimbursement transactions and these fees are sent to accounts payable 62. The central database 10 can be configured to communicate directly with a financial institution to process payment for reimbursement of redeemed digital incentives. Preferably, all of the issuance, redemption, and reimbursement transaction data is aggregated and collated 64. A data services layer 68 can make this data available in real time and any billing or payables can be electronically transmitted to the customers 68, retailers 70, and/or incentives providers 72 on any interval necessary. These portals 68, 70, 72 have appropriate filters to limit the viewing of any sensitive information to the appropriate viewers.
As already discussed, the point-of-sale terminals that can be authenticated to apply the systems and method disclosed herein are not limited to retail cash registers and internet check-out web pages. Any device that can connect to the internet and communicate with the central database 10 can be used as well. For example cable and broadcast television signals combined with internet communications can be used to log a user into the central database 10 and process purchases through a television remote control. Other devices and combinations will be obvious to those of skill in the art and are intended to be covered herein.
A summary of the basic processes of the message broker are illustrated in
As shown in
This application claims the benefit of U.S. Provisional Application No. 61/179,964 filed on May 20, 2009, which is incorporated herein by reference. This application is related to co-ending U.S. application Ser. No. 12/783,666, filed on May 20, 2010.
Number | Name | Date | Kind |
---|---|---|---|
4882675 | Nichtberger | Nov 1989 | A |
4949256 | Humble | Aug 1990 | A |
5053957 | Suzuki | Oct 1991 | A |
5403752 | Bruchhaus | Apr 1995 | A |
5537314 | Kanter | Jul 1996 | A |
5924080 | Johnson | Jul 1999 | A |
6009411 | Kepecs | Dec 1999 | A |
6035280 | Christensen | Mar 2000 | A |
6041309 | Laor | Mar 2000 | A |
6298329 | Walker | Oct 2001 | B1 |
6321208 | Barnett et al. | Nov 2001 | B1 |
6484146 | Day et al. | Nov 2002 | B2 |
6497360 | Schulze, Jr. | Dec 2002 | B1 |
6505773 | Palmer | Jan 2003 | B1 |
6516302 | Deaton | Feb 2003 | B1 |
6766301 | Daniel | Jul 2004 | B1 |
6775539 | Deshpande | Aug 2004 | B2 |
6889198 | Kawan | May 2005 | B2 |
6915271 | Meyer | Jul 2005 | B1 |
6937665 | Vandenameele | Aug 2005 | B1 |
6937995 | Kepecs | Aug 2005 | B1 |
6968180 | Kirby | Nov 2005 | B2 |
7013286 | Aggarwal | Mar 2006 | B1 |
7016860 | Modani | Mar 2006 | B2 |
7055031 | Platt | May 2006 | B2 |
7139793 | Lala et al. | Nov 2006 | B2 |
7188763 | Lee | Mar 2007 | B2 |
7228285 | Hull | Jun 2007 | B2 |
7257545 | Hung | Aug 2007 | B1 |
7308254 | Rissanen | Dec 2007 | B1 |
7318041 | Walker | Jan 2008 | B2 |
7343317 | Jokinen et al. | Mar 2008 | B2 |
7398225 | Voltmer | Jul 2008 | B2 |
7428498 | Voltmer | Sep 2008 | B2 |
7451177 | Johnson et al. | Nov 2008 | B1 |
7463898 | Bayne | Dec 2008 | B2 |
20010002486 | Kocher et al. | May 2001 | A1 |
20020010623 | McCollom | Jan 2002 | A1 |
20020010627 | Lerat | Jan 2002 | A1 |
20020026348 | Fowler | Feb 2002 | A1 |
20020065716 | Kuschill | May 2002 | A1 |
20020107738 | Beach et al. | Aug 2002 | A1 |
20020120496 | Scroggie et al. | Aug 2002 | A1 |
20020124170 | Johnson, Jr. | Sep 2002 | A1 |
20020128903 | Kernahan | Sep 2002 | A1 |
20020138348 | Narayan | Sep 2002 | A1 |
20020143612 | Barik et al. | Oct 2002 | A1 |
20020147636 | Modani | Oct 2002 | A1 |
20020161643 | Tai | Oct 2002 | A1 |
20030036950 | Nguyen | Feb 2003 | A1 |
20030050831 | Klayh | Mar 2003 | A1 |
20030055727 | Walker et al. | Mar 2003 | A1 |
20030125977 | Morioka et al. | Jul 2003 | A1 |
20030130889 | Fravel | Jul 2003 | A1 |
20030135414 | Tai | Jul 2003 | A1 |
20030158818 | George et al. | Aug 2003 | A1 |
20030208684 | Camacho et al. | Nov 2003 | A1 |
20030216967 | Williams | Nov 2003 | A1 |
20030220834 | Leung et al. | Nov 2003 | A1 |
20030229540 | Algiene | Dec 2003 | A1 |
20030233276 | Pearlman | Dec 2003 | A1 |
20040107135 | Deatherage | Jun 2004 | A1 |
20040117261 | Walker et al. | Jun 2004 | A1 |
20040128197 | Bam et al. | Jul 2004 | A1 |
20040129780 | Frank et al. | Jul 2004 | A1 |
20040210484 | Lee | Oct 2004 | A1 |
20040210771 | Wood et al. | Oct 2004 | A1 |
20040249712 | Brown | Dec 2004 | A1 |
20050010773 | Lapstun | Jan 2005 | A1 |
20050015300 | Smith | Jan 2005 | A1 |
20050033643 | Smith | Feb 2005 | A1 |
20050131761 | Trika et al. | Jun 2005 | A1 |
20050171845 | Halfman et al. | Aug 2005 | A1 |
20050173517 | Suk et al. | Aug 2005 | A1 |
20050234771 | Register | Oct 2005 | A1 |
20060089878 | Roberts | Apr 2006 | A1 |
20060100931 | Deaton et al. | May 2006 | A1 |
20060149627 | Brown | Jul 2006 | A1 |
20060224449 | Byerley | Oct 2006 | A1 |
20060265281 | Sprovieri | Nov 2006 | A1 |
20070022007 | Lawe | Jan 2007 | A1 |
20070083433 | Lawe | Apr 2007 | A1 |
20070094080 | Wiken | Apr 2007 | A1 |
20070150339 | Retter et al. | Jun 2007 | A1 |
20070152038 | Ciancio | Jul 2007 | A1 |
20070156517 | Kaplan et al. | Jul 2007 | A1 |
20070174115 | Chieu | Jul 2007 | A1 |
20070228157 | Eckert | Oct 2007 | A1 |
20070260509 | Hines | Nov 2007 | A1 |
20070276727 | Thibedeau | Nov 2007 | A1 |
20070288313 | Brodson et al. | Dec 2007 | A1 |
20080010114 | Head | Jan 2008 | A1 |
20080010131 | Bridges et al. | Jan 2008 | A1 |
20080065490 | Novick et al. | Mar 2008 | A1 |
20080086770 | Kulkarni | Apr 2008 | A1 |
20080097844 | Hsu et al. | Apr 2008 | A1 |
20080097855 | Rissanen | Apr 2008 | A1 |
20080097857 | Walker | Apr 2008 | A1 |
20080103909 | Huang | May 2008 | A1 |
20080183571 | Aaron | Jul 2008 | A1 |
20080228567 | Williams et al. | Sep 2008 | A1 |
20080243623 | Redford et al. | Oct 2008 | A1 |
20080255954 | Leung | Oct 2008 | A1 |
20080255960 | Nguyen | Oct 2008 | A1 |
20080262928 | Michaelis | Oct 2008 | A1 |
20080267500 | Keswani | Oct 2008 | A1 |
20080300970 | Scheibe | Dec 2008 | A1 |
20080319846 | Leming et al. | Dec 2008 | A1 |
20090006203 | Fordyce et al. | Jan 2009 | A1 |
20090018908 | Dersovitz | Jan 2009 | A1 |
20090030789 | Mashinsky | Jan 2009 | A1 |
20090036103 | Byerley et al. | Feb 2009 | A1 |
20090099929 | Thibedeau et al. | Apr 2009 | A1 |
20090106115 | James et al. | Apr 2009 | A1 |
20090144164 | Wane | Jun 2009 | A1 |
20090171793 | Gersovitz | Jul 2009 | A1 |
20090254930 | Lo | Oct 2009 | A1 |
20090271272 | Berkowitz | Oct 2009 | A1 |
20090287558 | Seth | Nov 2009 | A1 |
20100250351 | Gillenson et al. | Sep 2010 | A1 |
Number | Date | Country |
---|---|---|
2 430 297 | Mar 2007 | GB |
2 430 297 | Sep 2008 | GB |
WO 9721200 | Jun 1997 | WO |
WO 0039657 | Jul 2000 | WO |
WO 0150392 | Jul 2001 | WO |
WO 0177856 | Oct 2001 | WO |
WO 2006059124 | Jun 2006 | WO |
WO 2006084247 | Aug 2006 | WO |
PCTGB2006003441 | Sep 2006 | WO |
PCTUS2007088687 | Dec 2007 | WO |
WO 2008083115 | Jul 2008 | WO |
WO 2008143984 | Nov 2008 | WO |
Entry |
---|
M-Dot Network Creates a Secure Transaction Network for Digital Coupons, Reuters., Sep. 24, 2009. http://www.reuters.com/article/2009/09/24/idUS175012+24-Sep-2009+PRN20090924. |
Information about Related Patents and Patent Applications, see the section of the accompanying Information Disclosure Statement Letter entitled “Related Patents and Patent Applications” for further information. |
Regarding related patents and patent applications, see the section of the accompanying IDS letter entitled “Related Patents and Patent Applications” for further information. |
Number | Date | Country | |
---|---|---|---|
20100299198 A1 | Nov 2010 | US |
Number | Date | Country | |
---|---|---|---|
61179964 | May 2009 | US |