SYNERGY RULES FOR DISTRIBUTED PRODUCT OR SERVICE

Information

  • Patent Application
  • 20230206269
  • Publication Number
    20230206269
  • Date Filed
    February 28, 2023
    a year ago
  • Date Published
    June 29, 2023
    10 months ago
Abstract
The present disclosure is directed to a system and method to allow sellers of products to establish individual products in a multilevel marketing (MLM) commission system, where the product is offered and sold to a first purchaser—who then actively by requesting a code, or passively, through the purchase of the product, becomes a user of the commission system. This user is provided a code such that the code may be passed onto followers of the registered user. The registered user will be allowed to advertise the product to a second purchaser and the second purchaser will be allowed to purchase the product and provide advertisements to other purchasers. Commissions paid to respective downline purchasers for a single product may be limited by a preset number of defined levels. After a product is purchased, commissions are paid out to each respective purchaser according to the defined commission levels. The system may integrate with other MLM organizations, detect potential product conflicts, and alter the commission plan for users that are members of that organization.
Description
BACKGROUND OF THE INVENTION
Field of Invention

The present disclosure is generally related to multi-level commission payment systems and methods. More specifically the present disclosure is directed to providing commissions, referral, and/or finder fees to purchases made by related users.


Description of the Related Art

A Multilevel marketing (MLM) commission payment system is a sales methodology used by some direct sales companies, which may be used to encourage existing distributors to recruit new distributors who are paid a percentage of their recruits' sales. The recruits are “downline” of the distributors. Distributors also make money through direct sales of products to customers. Amway, which sells health, beauty, and home care products, is an example of a well-known direct sales company that uses multilevel marketing.


Multilevel marketing (MLM) has been found to be a legitimate business sales methodology if participants receive something of value for their participation in an MLM organization. Even though Amway has a pyramid like structure where sponsors may receive more benefits than new recruits, Amway been judged to be a legitimate organization because all participants receive the benefit of purchasing products at a competitive price. One problem with some MLM organizations referred to as “pyramid schemes” is in instances where new recruits do not receive any benefit based on just joining the MLM organization. One characteristic of an MLM “pyramid scheme” versus a legitimate MLM organization is that in a “pyramid scheme” participants receive benefits based primarily from signing up other new recruits. Thus, money received from the new recruits only pays people above them or at the top of the organization rather than new recruits or others who actually perform work (e.g. the selling of products). As such, a “pyramid scheme” is also characterized by paying sponsors rather than individuals that perform the work. This is why “pyramid schemes” are illegal. These “pyramid schemes” involve taking advantage of people by pretending to be engaged in legitimate multilevel or network marketing activities when their greater focus is on recruitment rather than on product sales.


One issue in determining the legitimacy of a multilevel marketing company is whether it sells its products primarily to consumers or to its members who must recruit new members to buy their products. If it is the former, the company is likely a legitimate multilevel marketer. If it is the latter, it could be an illegal pyramid scheme.


Each MLM company dictates its own specific financial compensation plan for the payout of any earnings to their respective Distributors. Compensation is exclusively in the form of commissions that require a participant to enter a contract, pledging exclusivity in participation to the MLM company paying the commissions. A new recruit by contract, is expressly prohibited from joining, recruiting for another MLM, and offering alternative goods or services from any other MLM Company.


MLM compensation plans theoretically pay out to participants only from two primary possible revenue streams. The first is paid out from commissions of sales made by the participants directly to their own retail customers. Retail customers are not tracked or known by the MLM company therefore MLM companies cannot substantiate either their existence or their sales volume individually or collectively. The second is paid out from commissions based upon the wholesale purchases made by other distributors below the participant who have recruited those other participants into the MLM; in the organizational hierarchy of MLMs, these participants are referred to as one's downline distributors.


MLM salespeople (distributors) are, therefore, expected to sell specific MLM company products directly to end-user retail consumers by means of relationship referrals and word of mouth marketing, but most importantly they are incentivized to recruit others to join the company's distribution chain as fellow salespeople so that these can become downline distributors.


Currently, no large financially successful MLM salesperson (distributor) can earn commissions of any significance or take full advantage of a commission compensation plan without personally recruiting others into their downline.


All MLM compensation companies permanently place new recruits in a tree structure for calculating commissions. Once placed, all sales made by that distributor from their personal purchases, or from new recruits they sponsor, generate commissions only for their sponsor and upline, regardless of all future products sold.


MLM companies offer goods or services offered specifically and exclusively by them. The large markups required for payment of commissions necessitate MLM companies to limit what products they can offer such that they will be financially indifferent regarding which product a distributor chooses to buy.


MLM companies currently require a “pay to play” requirement. Distributors are required to make monthly purchases, and/or meet downline group sales volumes to qualify for commissions. Thus, the mode, median and average purchase size of a Distributor in MLMs is virtually equal to this minimum qualification requirement and no greater.


Distributors only qualify for commissions if they have purchased a minimum threshold of products offered exclusively by the MLM company as set forth by an MLM company's commission program rules.


Currently, in order to join an MLM organization, there is an initiation fee, which may be a barrier against those that just wish to refer a single product offered by the MLM company. Current multi-level marketing (MLM) systems do not take full advantage of the internet and how consumers can influence other consumers to make purchases. Also, current MLM systems do not incorporate incentivizing users of a multilevel marketing system by offering a dynamic commission tree. In addition, there is no current MLM system that utilizes the money or funds dedicated to discounts or coupons to be reincorporated into a multilevel marketing system to incentive consumers to make purchases and advertise the product that they purchased.


Currently, a company that is not utilizing an MLM structure for paying commissions for sales, cannot introduce one without developing a compensation plan specific for their company, following the methodology outlined above, and thus requiring them to become and subsequently adhere to applicable MLM law.


Thus, there is a need to provide any company an opportunity to compensate consumers in the way of commissions, referral, and/or finder fees without being subject to MLM law.


Further, there is currently no systematic way for consumers to promote any brand of preference outside the MLM industry and be paid in an MLM commission methodology without subjecting themselves to a contractual signup, initiation fees, minimum recurring purchases sales volume requirements, recruiting, exclusivity and permanent tree placement (resulting in only upline Distributors earning commissions).


However, existing MLMs have spent time cultivating a network of distributors and purchasers which could be improved upon by solving the previously stated problems and which in turn could benefit an existing distribution network by providing a list of interested members and contacts. Thus, there is a need to work with existing organizations to quickly build a distribution system for the benefit of both the users of a new system and the organization.





BRIEF DESCRIPTIONS OF THE DRAWINGS


FIG. 1 illustrates a system for Multi-Level Marketing of products via a set of computing devices.



FIG. 2 illustrates a method that may be performed by a computer that performs functions consistent with the administration network computer 110 of FIG. 1.



FIG. 3 illustrates a method that may be performed at a user device when operations of a multi-level-management system consistent with the present disclosure are performed.



FIG. 4 illustrates a method that may be performed by a computer at the third party network computer 170 of FIG. 1.



FIG. 5 illustrates a second method that may be performed at the administration network computer 110 based on a set of fourth party commission program instructions 140 of FIG. 1 and using data from the fourth party organization computer 185 of FIG. 1.



FIG. 6: Illustrates a computing system that may be used to implement an embodiment of the present invention.





SUMMARY OF THE CLAIMED INVENTION

A buyer purchases a product that is registered with an administration network. The buyer then automatically becomes a user (user A) of the administration network. The administration network generates a code (code A) that is associated with user A. Another buyer purchases the same product, and in the process of making the purchase uses code A. The second buyer also automatically becomes a user (user B) of the administration network. The administration network generates different code (code B) that is associated with user B and with code A. The user A is awarded commission because user B used code A. Another buyer purchases the same product using the code associated with user B. The third buyer also automatically becomes a user (user C) of the administration network. The administration network generates different code (code C) that is associated with user C and code B. Both user A and user B are awarded commission because use C used code B, which is associated with code A. Users who are also members of another organization may have their commission altered based rules set by that organization. Products for which these rules may apply may be products the organization distributes.


Alternatively, a computer that is part of an administration network receives a notification that a buyer has purchased a registered product. The computer then identifies the buyer as a user (user A). The computer generates a code (code A) that is associated with user A. The computer receives a notification that another buyer has purchased the same product, and the notification includes code A. The computer then identifies the second buyer as a user (user B). The computer generates a different code (code B) that is associated with user B and code A. The computer awards commission to user A because the notification included code A. The computer receives a notification that another buyer has purchased the same product, and the notification includes code B. The computer then identifies the third buyer as a user (user C). The computer generates a different code (code C) that is associated with user C. The computer awards commission to both user A and user B because the notification included code B, which is associated with code A. Users who are also members of another organization may have their commission altered based rules set by that organization. Products for which these rules may apply may be identified by the computer based on which products the organization distributes.


DETAILED DESCRIPTION

The present disclosure is directed to a system and method to allow sellers of products to enroll an individual product in a multilevel marketing (MLM) type commission system [system], where a good or service [product] is offered by any vendor and sold to a first purchaser—who at the time of the purchase becomes a system user. This user has a code tied to the specific product(s) offered by the participating vendor. The code is shared by this first user passively (by a purchase) or actively (by request) to the new buyer. The code share makes the new buyer a user of the system. The new user, like the first, will be allowed to purchase the product and provide advertisements to other purchasers. Commissions paid to respective downline purchasers for a single product may be limited by a preset number of defined levels. After a product is purchased, commissions are paid out to each respective purchaser according to the defined commission levels.


An administration network computer, as shown in FIG. 1, identifies that a product has been purchased from a user(s) of the system [first user]. The system may generate an embedded coded link that connects (links) the referrer to the purchaser(s). This link may be shared automatically or manually depending on the referrer's preference. The computer may then automatically pays remuneration, in the form of a commissions, referral, and/or finder fees, to the first user. Additionally, the purchaser(s) becomes a second user(s) of the system. Should a new individual buy the same product from the second user(s), another embedded coded link may connect the first user to not only the second user but the new individual(s) as well. Both the first and second user of the system are remunerated for the new individual(s) purchase. This wave of creating and recreating users (1, 2, 3, etc.) based on purchases and linking them together may be indefinitely iterative. Remuneration on this specific product may be paid to all users linked together in the system, each time a purchase is made. The links may be unique and are fixed to each good or service being referred.



FIG. 1 illustrates a system for Multi-Level Marketing of products via a set of computing devices. The system of FIG. 1 includes an administration computer or “administration network” computer 110, a user computing device 150 (user device), and a third party network computer 170. Each of the devices of FIG. 1, the administration network computer 110, the third party network computer 170, and user device 150 may communicate with each other via the communication network 195 such as the Internet or a cloud.


A memory, as shown in FIG. 6, at the administration network computer 110 may store commission program instructions 120 executed by a computer processor, and an administration database 130. User device 150 of FIG. 1 may be any user device such as a laptop, smartphone, tablet, computer, or smart speaker which may include a user device communication interface 160 which may be a network interface as shown in FIG. 6. The third party network computer 170 of FIG. 1 may include discount program instructions 180 executed by a computer processor, a memory, and a communication interface 175 which may be a network interface.


Use of the system may be as follows. A user connects a user device 150 to the communication network 195 via the user device communication interface 160. Through the communication network 195 the user device 150 connects with the third party network computer 170 via the third party network communication interface 175. A set of third party network discount program instructions 180 allow the user to purchase a product from the third party network computer 170 and apply a discount to the product if a user has a code. Confirmation of the purchase and the code are then sent from the third party network computer 170 to the administration network computer 110. If the user did enter a code, a set of administration network commission program instructions 120 will pay commission to at least another user that is associated with the code. A new code is then generated by the administration network 110 per the administration network commission program instructions 120. The new code is associated with the user of the user device 150. The commission and the newly generated code are stored in the administration network administration database 130.


Program code instructions of the administration network computer 110 may be organized as one or more software modules that include instructions for performing different functions. For example, a set of commission program instructions 120 may include base program instructions, advertising program instructions, calculation program instructions, and vendor program instructions. the administration network computer 110 may also access one or more databases, such as a compensation database that stores compensation data and a code database that stores program code or web link data, for example. The administration network computer 110 may accept sellers (third parties), where a “single product tree” multi-level marketing method is formed, comprising the steps of, providing at least one product, providing an MLM system with a seller's commission structure, and providing at least one seller of a product with its associated commission structure. The term “single product tree” refers to a unique structure for associating distributors of an MLM organization where products are used to identify relationships between distributors and commissions paid to related distributors. This “single product tree” structure allows for a particular user to be considered a sponsor or any other user based on that user sending promotions to other users to purchase a product that those other users were not previously associated with.


The administration network computer 110 may also provide a plurality of buyers/distributors, allow the at least one first seller to enroll a product to the MLM system, and allow at least a first buyer/distributor to purchase the product. Other functions that may be performed by the administration network computer 110 include allowing the at least the first buyer/distributor to advertise the product to other potential buyers/distributors and allowing at least a second buyer/distributor to buy the advertised product. Here the seller may set a commission structure for a product, may enroll the product into the MLM system, may allow the first, second and so on purchasers/distributors to purchase and advertise the product.


Once products have been enrolled with a commission structure, the administration network computer 110 may allow the purchasers/distributors to receive a commission based upon the seller's product commission structure. A distributor may refer to the non-salaried workforce selling the company's products or services. Here the earnings of the participants may be derived from a pyramid-shaped or binary compensation commission system. The term product may refer to articles or substances manufactured or refined for sale. Product may refer to an individual product, a line of products such as unique brand and model of drill, or a group of products such as all power tools. A service may refer to a system supplying a public need such as transport, communications, or utilities such as electricity or water.


A service which may be an act of dealing with a customer in a store, restaurant, or hotel by taking their orders, showing, or selling them goods. Additionally, a service which may be work that someone does or time that someone spends working for an organization, or a business that offers a particular type of help or work. The system 100 of FIG. 1 may distribute commissions according to an MLM tree or commission tree that is a payment structure in which commissions are given out at different percentages at different levels of the MLM tree, for example. In such a system distributor (users) that perform the sale or that are at a level that is “closer” to the distributor that performed the sale may receive larger commissions than distributors that are “farther” from the sale.


In another example, a first MLM distributor that performs a sale may receive a higher percentage than a second distributor that sponsored the first distributor, and a third distributor that signed up the second distributor may receive a lower commission than the commission received by the second distributor for the sale. Distributors in an MLM tree may be referred as “downline” or “upline” distributors depending on where different users rank on the MLM tree. For example, a first user that sponsors a second user is “upline” from the second user and the second user is “downline” from the first user in the MLM tree. Furthermore, any user/distributor that the second user sponsored would be considered downline from the second user and could be downline from the first user as well for a given MLM product tree. When a “single product tree” structure is used to identify commissions, users that are downline from the second user may not be downline from the first user based on the second user purchasing and advertising products not associated with the first user. When the first user purchases the product initially advertised by the second user, the second user may be considered upline of the first user after the first user for this product. Because of this, the second user is not relegated to always be downline from the first user just because the first user originally sponsored the second user to become an MLM distributor.


An MLM system which may be referred to as network marketing, may be a business model that depends on person-to-person sales by independent representatives, who may work from their home. A network marketing business may require the independent representatives to build a network of business partners or salespeople to assist with lead generation and closing sales. End of life of MLM tree may refer to the end of the MLM tree in which the commission tree may be restructured or eliminated. For example, further participants in the MLM may not receive a commission, the commission tree may “start up” (be reinitiated from a starting point) again, or the commission tree may be restructured in some other way. An existing MLM system may refer to currently existing or established companies that use the sales strategies to encourage existing distributors to recruit new distributors who are paid a percentage of their recruits' sales.


The administration network computer 110 may perform data security functions as well as functions associated with operation of an MLM algorithm that may calculate user compensation. Administration network computer 110 may be able to connect to a software application store, like the “Apple App Store,” where a program application can be downloaded from. Data security may refer to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security may include data encryption, tokenization, and key management practices that protect data across all applications and platforms. An MLM algorithm may refer to a calculation performed using a compensation decay rate to calculate the commissions for downline participants.


The commission program instructions 120 of FIG. 1 may cause a computer processor in the administration network computer 110 to continuously poll for user data (e.g., data of a user who may be a product purchaser or product distributor) from another processor executing a set of discount program instructions 180 at a third party network computer 170. Once the processor of the administration network computer 110 receives the user data, commissions may be calculated using the commission program instructions 120 of FIG. 1. These commissions may be calculated based on data stored in an administration network compensation database. Downline and upline commissions for the other users (product purchasers/distributors) within the MLM tree may be paid. The administration network compensation database may be included within the administration database 130 of FIG. 1 or it may be a separate database accessible by the administration network computer 110. Alternatively, instead of the administration network computer 110 polling a third party network computer 170, the third party network computer 10 may send the user data to the administration network computer 110 after a sale has been made.


An upline may refer to the MLM distributors that recruits work for as salespeople to sell the products or services. A downline may refer to the recruits the MLM distributors are able to secure as participants in the MLM system. Downline MLM trees may go across country boundaries and commissions may be paid out for an MLM tree even though the participants in the MLM tree may not reside in the same country. The commissions may be calculated for the appropriate exchange rate to ensure participants are paid in their residing countries currency in the correct amount.


A processor executing the commission program instructions 120 of FIG. 1 may continuously poll for user data from the third party network computer 170. The administration network computer 110 may then receive the user data from the third party network computer 170. Then the administration network computer 110 may determine whether the user entered a code. If the user did enter a code, the processor at the administration network computer 110 may extract the code and then access the administration network compensation database to identify one or more different spheres of influence or potential product purchasers/distributors levels. Such a code may have been received from user device 150 based on user inputs.


The processor at the administration network computer 110 may also associate a code for each of the different spheres of influence. The administration network computer 110 may then extract a corresponding commission for the code that was retrieved from in the administration network compensation database. The administration network computer 110 may then send the commission to the user (purchaser/distributor). The administration network computer 110 may track profits and payments as well as track taxes for users enrolled in the MLM system. The tracking of profits and payments may refer to the MLM system tracking the profits of the MLM and tracking the payments or commissions paid out to participants. The tracking of taxes may refer to tracking the commissions provided to participants for tax purposes. Then the administration network computer 110 may also compare the extracted code to data stored at an administration network code database a list of users and code sent to followers may be stored. This administration network code database may be the same database as the administration database 130 of FIG. 1 or it may be another database accessible by the administration network computer 110. The administration network computer 110 may extract a user ID and sphere of influence or potential purchaser/distributor by using the extracted code.


The administration network computer 110 may then compare the extracted sphere of influence or potential purchaser/distributor to data stored at the administration network compensation database. The administration network computer 110 may then use the extracted sphere of influence data to extract a corresponding commission from the administration network compensation database. The administration network computer 110 may then send the commission to an upline user. If the user did not enter a code, the administration network computer 110 may then initiate a set of administration network advertising program instructions.


The administration database 130 may store data received from various third parties (various sellers) that are part of a set of MLM trees. This data may contain an item ID, description of the item, an original cost of the item, a discount for the item, a cost of the item with the discount, a compensation plan decay rate, and a link to the item. An advertising link may refer to a link that directs a consumer to a product, service or good.









TABLE 1







Administration Database Data










Third Party
Home Depot
Home Depot
Furniture Store





ID
654123
789654
123789


Item
Drill
Table Saw
Couch


Original Cost
$59.00
$tem119.00
$999.00


discount
15%
10%
10%


discount Cost
$50.15
$107.10
$899.10


Compensation
50%
50%
30%


Decay Rate


Link
HDDrill654123
HDTSaw789654
FSC123789









Table 1 table displays data that may be stored at the administration database 130 of FIG. 1. When the administration network computer 110 receives item data from third party network computer 170 it creates a link for the item, stores the received data in the administration network administration database 130, and sends the created link back to the third party network computer 170. The administration network administration database 130 may be used to store data collected from various third parties that enrolled in the multi-level marketing system 100 of FIG. 1. The administration network administration database 130 may store the name of the third party, the ID for an item, a description of the item, the original cost of the item, the discount provided by the third party, the cost of the item with the discount, the compensation decay rate or how the downline commissions are calculated, and the link to the item.


The administration database 130 may store data that the administration network computer 110 may access when communicating events with the downlines and uplines, providing dynamic incentives or rewards for a product, distributing marketing materials, providing banking referrals, or distributing materials for suggestive selling, etc. Here, communicating events with downlines and uplines may refer to sending information relating to advertising events to participants of an MLM system. Dynamic incentives and rewards for a product may refer to incentives or rewards that are continuously updated for a product. Marketing materials may refer to a means of marketing, advertising or promotional materials developed by or for license (or subject to licensee's approval) that promote the sale of the licensed product, including but not limited to, television, radio and online advertising, point of sale materials (e.g., posters, counter-cards), packaging advertising, print media and all audio or video media. Banking referrals may refer to a structured flow of collecting and organizing referrals for banks. Businesses who have been unsuccessful in a credit application process with a bank may be asked for their permission to have their financial information passed to designated finance platforms who can contact the business in a regulated timeframe. Suggestive selling may refer to a sales technique where an employee asks a customer if they would like to include an additional purchase or recommends a product which might suit the client.


The fourth party commission program instructions 140 of FIG. 1 may determine when a fourth party or its members have been involved in a sale of a product or service that would normally result in the payment of commissions to a user of the system. Then the fourth party commission program instructions may alter those commissions if the user is a member of a fourth party organization. These alterations may be set by the fourth party organization to encourage their member to use the system. Alternatively, the alterations may serve to deter fourth party organization members from using the system to distribute products that would otherwise be distributed through the existing fourth party organization structure or competing products.


As mentioned above user device 150 may include a memory, a processor, and a communication interface 160. The processor of user device 150 may execute instructions out of the memory when a user of user device 150 registers as a member of an MLM organization. Other tasks that a user may perform on user device 150 could include, identifying or connecting with other user devices (e.g. follower user devices), preparing advertisement information to share with follower user devices, receiving advertisement information prepared by other users, accessing product promotions at the third party network computer 170, and purchasing products based on offerings received from the third party network computer 170. Each of the tasks performed by user device 150 may include sending and receiving communications with the administration network computer 110, the third party network computer 170, or other user devices. Promotions prepared at a particular user device may be shared with other user device via administration network computer 110, third party network computer 170, a social media network computer, or directly from one user device to another. User devices may also be required to download and install an application program from an application store, such as the “Apple App store” as part of a process for registering as a member of an MLM organization.


The user device communication interface 160 of FIG. 1 may send and receive data via a communication network 195 which may be a wired and/or a wireless network.


As discussed above the third party network computer 170 of FIG. 1 may include a computer processor a memory, and communication interface 175. This third party network computer 170 may be controlled by various third parties, such as retail stores (stores that sell product consumables, services, franchises, service networks, large box stores) or e-commerce sites that allow e-commerce sales. Such e-commerce sites may include an e-commerce shopping cart, that offer items to users at a discount, such as a product discount, in order to use the MLM system of FIG. 1. A franchise may refer to an authorization granted by a government or company to an individual or group enabling them to carry out specified commercial activities, e.g., providing a broadcasting service, or acting as an agent for a company's products. Product consumables may refer to goods by individuals and businesses that must be replaced regularly because they wear out or are used up. Service networks refer to a collection of people and information brought together on the internet to provide a specific service or achieve a common business objective, such as Angie's List. E-commerce sale may refer to sales of goods and services where the business takes place over the internet, an extra-net, Electronic Data Interchange (EDI), or other online system.


Payment may or may not be made online. Business in this context may be defined as an order placed by the buyer or price and terms of sale negotiated. E-commerce shopping cart may refer to a software used in E-commerce to assist visitors to make purchases online. Upon checkout, the software calculates the total of the order, including shipping and handling, taxes and other parameters the owner of the site has previously set. Retailer may refer to a person or business that sells goods to the public in relatively small quantities for use or consumption rather than for resale. Product discounts may refer to a reduce price or something being sold at a price lower than that item is normally sold for. It is a reduction to a basic price for a good or service. Large box stores may refer to a physically large retail establishment, usually part of a chain of stores, offers a variety of products to its customers. The term sometimes refers, by extension, to the company that operates the store, and which may be referenced as a supercenter, superstore, megastore, etc. These stores achieve economies of scale by focusing on large sales volumes. Because volume is high, the profit margin for each product can be lowered, which results in very competitively priced goods. The term “big-box” is derived from the store's physical appearance.


The third party network communication interface 175 of FIG. 1 may send data and receive via a communication network 195 which may be a wired and/or a wireless network.


The third party network discount program instructions 180 of FIG. 1 may be executed by a computer processor after being initiated by a set of third party network base program instructions. These instructions may cause the processor at the third party network computer 170 to prompt user for a discount code and to compare a received code to data stored at a third party network third party database. When a code received from a user matches data stored at the databases, a discount for the selected item may be applied and an order for a product may be processed.


The fourth party organization computer 185 of FIG. 1 may be a computer of a multi-level marketing organization, which has an existing distribution chain through its members.









TABLE 2A







Fourth Party Organization Database Member Data










Member ID
13347
34554
45345





KwikClick
Jim_Raynor
BBJackson
Marty1965


Username


First Name
Jim
Betty
Marty


Last Name
Raynor
Jackson
(Left Blank)


Email
Jayray@gmail.com
BBJackson@hotmail.com
madmarty@msn.com


Used IP
155:238:44:122
211:123:93:166,
133:244:256:256


Addresses

211:123:93:145


Facebook
Not Signed In
/Q1wUbdh4$$hd94hdk . . .
/3$d83h(djh58d93hD*d


Account


Geolocation
13347.dat
Unavailable
45345.dat


Data
















TABLE 2B







Fourth Party Organization Database Product Data










Product


fourth Party Internal


Code
Name
Category
Product Code













1
Quick Slim Superfood
Supplements
456-5494374975-004



Blend


2
Quick Slim Superfood
Supplements
456-5494374975-009



Blend - Silver (55+)


466533
Macho Man Power
Tools
996-5848648465-171



Drill









Table 2A and Table 2B display data that may be stored in the fourth party organization database 190 of FIG. 1. The database may contain information on members of the fourth party organization that is can be used to identify if a user of the system is also a member of the fourth party organization. The database may also contain information on products distributed within the fourth party organization. These data sets may be separated into a fourth party organization member database and fourth party organization product database. The database may also store information on non-members of the fourth party organization for which some amount of data is known. This data may be used to identify a person who is a contact of a member.


The communications network 195 of FIG. 1 may be the Internet or a cloud. This communication network or any of the communication network interfaces 150 or 170 discussed herein may be a wired and/or a wireless network. Such a communication network, if wireless, which may be implemented using communication techniques such as Visible Light Communication (VLC), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE), Wireless Local Area Network (WLAN), Infrared (IR) communication, Public Switched Telephone Network (PSTN), Radio waves, and other communication techniques known in the art. The communication network may allow ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over Internet and relies on sharing of resources to achieve coherence and economies of scale, like a public utility, while third-party clouds enable organizations to focus on their core businesses instead of expending resources on computer infrastructure and maintenance.



FIG. 2 illustrates a method that may be performed by a computer that performs functions consistent with the administration network computer 110 of FIG. 1. FIG. 2 begins at step 210 wherein the administration network computer 110 receives data from the third party network computer 170 of FIG. 1. The received data may contain information on a purchased product and the discount code applied to the purchase. This step may be facilitated by a set of administration network base program instructions stored in memory and executed by a processor. The administration network computer 110 may determine if the data received from the third party network computer 170 contains a code, at step 220. If the data does contain a code, the administration network computer 110 checks that both the product and code match data stored in the administration network administration database 130 and/or other databases and are recognized as valid, at step 230. If the code and product are valid, the computer at administration network computer 110 may calculate commissions due to each upline user, at step 230.


The commissions may be calculated by using the discount on the item and providing 50% of the discount to the user who supplied the code and then the remaining amount of the discount for the upline users at a 50% decay rate. For example, if the first user purchased an item that was originally $59.00 discounted by 15%, then a second user makes a purchase with the first user's code would receive $3.32 or 50% of the discount. Then any follower of the second user who uses the second user's code would cause the second user to receive 50% of the discount and the first user to receive 50% of the remaining discount or 50% of $3.32, and this may continue until there is only one cent left to pay out as a commission for the upline users. The threshold at which commission stops may be greater or less than one cent and may be set dynamically. This step may be facilitated by administration network calculation program instructions stored in memory and executed by a processor. Then, the administration network computer 110 may distribute the commission to the upline users, at step 250. Commission may be paid directly to a user via the user device 150 of FIG. 1. The data may be stored in a database, for example, an administration network compensation database discussed above. Whether or not a valid code was entered, the administration network computer 110 may generate a new code for the user such that the user can give the code to followers and receive commission on their purchases, at step 260 of FIG. 2. This generated code may be stored in the administration database 130 of FIG. 1 or another database, for example an administration network code database.


A set of administration network base program instructions may instruct the administration network computer 110 to connect to the third party network computer 170, initiate a set of vendor program instructions and initiate a set of calculation program instructions.


A set of administration network calculation program instructions which may be initiated by operation of the administration network base program instructions may instruct the administration network computer 110 to extract the discount received from the third party network computer 170 as well as the compensation plan or commission plan (e.g. its decay rate or commission structure so that each downline gets less and less commission) in order to identify the commissions for the MLM (Multi-Level Marketing) tree. Once identified, this commission data may be stored data in a database at the administration network computer 110 of FIG. 1. A commission may refer to a payment to someone who sells goods that is directly related to the amount sold, or a system that uses such payments. A compensation plan or a commission plan may refer to the decay rate of the commissions provided to the MLM system from the discount offered by the third party, the third party also selects the decay rate to calculate the commissions offered to the first purchaser as well as the percentage offered to the downline participants.


Functioning of the calculation program instructions may be as follows. The process may begin with operations of the administration network base program instructions initiating the administration network calculation program instructions. The administration network computer 110 may then extract the discount from the administration network administration database 130, which may be received from the third party network computer 170. Then the administration network computer 110 may extract the compensation plan decay rate from the administration network administration database 130. The administration network computer 110 may then determine the commissions available to the downline users, or the followers of the user that purchased the item.


The commissions may be calculated by using the discount on the item and providing 50% of the discount to the first participant and then the remaining amount of the discount for the downline users at a 50% decay rate. For example, if the first user purchased an item that was originally $59.00 discounted by 15%, the first user to make the purchase would receive $3.32 or 50% of the discount. Then any follower of the user who made the initial purchase would receive 50% of the remaining discount or 50% of $3.32, and this may continue until there is only one cent left to pay out as a commission for the downline users. Then the administration network computer 110 stores the data in the administration network compensation database. The administration network computer 110 sends a request to the user device purchase program instructions for the data stored in the user device user database. Then the administration network computer 110 may receive the user device user database data from the user device 150. The administration network computer 110 may store the received data, as well as the code data, in the administration network code database. The administration network computer 110 may then return to executing the administration network base program instructions.


A set of administration network advertising program instructions, which may be initiated by operation of the administration network commission program instructions 120, may determine the user's sphere of influence or contact list in order to provide the user's potential downline purchasers/distributors with a link and a code for the potential downline purchasers/distributors to become part of the MLM Tree Functioning of the advertising program instructions may be as follows. The process may begin with operation of the administration network commission program instructions 120 causing the administration network computer 110 to initiate the administration network advertising program instructions. The administration network computer 110 then determines if the user entered a code. If it is determined that the user entered a code the code is extracted. The administration network computer 110 compares the extracted code to the administration network compensation database.


The administration network computer 110 then may determine the user's sphere of influence level. If it is determined that the user did not enter a code, then the administration network computer 110 sets the user as the “First Participant”. Then the administration network computer 110 extracts the code for the next sphere of influence level or potential purchaser/distributor to provide the user's followers with a code that would allow them to join the multi-level marketing tree. The administration network computer 110 then may send the code and the link to the item to the user device 150. A set of administration network vendor (those selling products) program instructions, which may be initiated by operation of the administration network base program instructions, may result in data being received from the third party network computer 170. The administration network computer 110 may then store the data in the administration network administration database 130, create a link for the item, send the link back to the third party network 160, and return to executing the administration network base program instructions.


Functioning of a set of vendor program instructions may be as follows. The process may begin with operation of the administration network base program instructions causing the administration network computer 110 to initiate the administration network vendor program instructions. The administration network computer 110 may then receive data from the third party network computer 170. This data may include an item to be enrolled in the MLM system, an original cost of the item, a discount provided by the third party, a cost of the item with the discount, a compensation plan decay rate, etc. Then the administration network computer 110 may create a link for the item for the third party network computer 170. A vendor may be a seller of a product, such as a retailer. The administration network computer 110 may then store the received data and the created link in the administration network administration database 130. The administration network computer 110 may then send the link to the third party network computer 170. The administration network computer 110 may then return to executing the administration network base program instructions.


An administration network compensation database, which may be created through operation of the administration network calculation program instructions, may store various commissions for the different product purchasers/distributors. Table 3 illustrates data that may be stored at a compensation database consistent with the present disclosure. The administration network computer 110 may extract discount information and a compensation plan decay rate to calculate the downline commissions for additional users. This discount, decay rate information, and the sphere of influence levels may be stored in the administration network compensation database discussed above. The administration network compensation database may store information that cross-references a third party, an item ID, item description, the compensation plan decay rate, the various sphere of influence levels, a commission for each sphere of influence level, and a code to be used by the user's followers to enroll in the MLM system 100 of FIG. 1. The administration network compensation database may store a lottery structure for how the commissions are paid to users or freelancers. This lottery structure may refer to a process or thing whose success or outcome is governed by chance. A means of raising money by selling number tickets and giving prizes to the holders of number drawn at random. Freelancers may refer to a person who works as a writer, designer, performer, or the like, selling work or services by the hour, day, job, etc., rather than working on a regular salary basis for one employer.









TABLE 3







Compensation Database Data










third party
Home Depot
Home Depot
Home Depot





ID
654123
654123
654123


Item
Drill
Drill
Drill


compensation
50%
50%
50%


Decay Rate


Sphere of
First
   2
   3


Influence Level
Participant


Commission
$3.31
$1.66
$0.83


Code
N/A
654123-SOI2
654123-SOI3









Table 4 illustrates data that may be store at an administration network code database. This data may identify the codes given to the product purchasers/distributors (users) for the product purchasers/distributors (user) to pass to their potential purchasers/distributors to advertise or promote an item that a user has purchased. The administration network code may also cross-reference a user ID with an item ID, an item name, a sphere of influence (/potential purchaser/distributor), and a code that may be shared with followers.









TABLE 4







Code Database Data














Sphere of






Influence/potential
code for


user ID
ID
Item
purchaser/distributor
Followers





JS1234
654123
Drill
First Participant
654123-SOI2


HY8569
654123
Drill
Second Participant
654123-SOI3


TB4567
789654
Table
First Participant
897456-SOI2




Saw


EL51346
789654
Table
Second Participant
897456-SOI3




Saw










FIG. 3 illustrates a method that may be performed at a user device when operations of a multi-level-management system consistent with the present disclosure are performed. First the user device 150 may allow a user to request to purchase a product from the third party network computer 170, at step 310 of FIG. 3. This may involve directing the user to a web site or an online store. A link stored in the administration network administration database 130 may be used to automatically generate a request to purchase of a specific product. Then the user device 150 may then allow the user to enter a discount code, at step 320. The code may be entered automatically if the user selected a link received from the administration network computer 110. The user may enter the discount code in a graphical user interface (GUI) element such as a text box or input box, either via a native application on the user device 150 or directly via the third party network computer 170 (for example, via a web browser). The user device 150 may then allow the user to finalize an order, at step 330. This step may involve the transfer of payment information from the user device 150 to the third party network computer 170. Any or all these steps may be facilitated by user device communication interface 160, user device purchase program instructions stored in memory and executed by a processor, or a user device user database stored in memory.


A set of instructions referred to as user device purchase program instructions may allow a user device to connect to the third party network computer 170, allow a purchaser/distributor to select an item and an associated link. This process may include, determining if the purchaser/distributor entered a code, and sending the link and code, if available, to the third party network computer 170.


A set of instructions referred to as purchase program instructions may cause the user device 150 to continuously poll for a request from the administration network computer 110 for user device user database data. The user device 150 may then receive a request from the administration network computer 110 for the user device user database data. Then the user device 150 may send the user device user database data to the administration network computer 110. The user device 150 may then connect to the third party network computer 170. Then the user may select an item from the third party network computer 170. The user may select a link from the third party network computer 170. Then the user device 150 if the user entered a code. If it is determined the user entered a code the user device 150 sends the code to the third party network computer 170. The user device 150 sends the user data to the third party network computer 170. The user data may be data to purchase the item such as name, address, billing information, etc. The user data sent to the third party network computer 170 may include information from a credit card system. A credit card system may refer to a system that allows cardholders to borrow funds with which to pay for goods and services with the condition that the cardholders pay back the borrowed funds, plus interest, as well as any additional agreed-upon charges.


A user device user database which may contain the user's (product purchasers/distributors) followers (sphere of influence) as well as the followers contact information for them to receive commissions on their purchases. A distributor contact list or followers may refer to the recruits or followers on social media that a distributor has secured to participate in their downline. The user device user database may include ratings and recommendations from the users. Rating and recommendation modules may refer to modules in which a company, entity, or person provides ratings and/or recommendations for products, goods, or services.


Table 5 displays data that may be stored at a user device user database. The data of table 4 cross-references user information with user follower information. The user device user database stores the user's ID, the followers user ID, codes provided to the followers, the follower's e-mail address, the follower's phone number, and the follower's address. The user device user database may store the follower's social media information such as user social media account information (Twitter, Instagram, Facebook, etc.). The user database may contain social media plug-ins for enhanced marketing or social media aggregators. Social media plug ins for enhanced marketing may refer to sharing content with other people through social media platforms, for example a share or like button. The user device user database may contain payment information such as bank accounts, credit card information, PayPal, Venmo, etc. A user ID or ID Enrollment may refer to a participant enrolling in an MLM product tree through an ID, which may be unique to each participant in the MLM system. Social media aggregators may refer to a tool that allows a person to collate posts and updates from many different social media feeds. It creates an organized view of social posts on a specific topic and are often used to display user-generated content on live social walls.









TABLE 5







User Database Data










user ID
JS1234
JS1234
JS1234





Follower ID
HY8569
IT8527
RW4569


code for
654123-SOI2
654123-SOI2
654123-SOI2


Followers


Follower
HY8569@gmail.com
IT8527@yahoo.com
RW4569@gmail.com


E-mail


Follower
781-654-8972
231-456-7891
654-987-3217


Phone


Follower
123 Main Street, Boston,
58 Elm Street,
96 2nd Ave, Salt


Address
MA
Burlington, VT
Lake City, UT









Operation of user device downline program instructions may cause the user device 150 to continuously poll to receive the code and link from the administration network computer 110 to allow the purchaser/distributor to pass the code and link to the user's followers stored in the user device user database. Functioning of the downline program instructions may be as follows. The process begins with the user device 150 continuously polling for the code and the link from the administration network computer 110. The user device 150 receives the code and the link from the administration network computer 110. The user device 150 provides a selection of the first follower in the user device user database. The user device 150 extracts the followers contact information stored in the user device user database. Then the user device 150 sends the code and link to the follower's contact information. The code and link may be shared on social media sites, such as Twitter, Instagram, Facebook, etc. This may allow the user's followers to receive the code and link based on communications that use one or more of these social media accounts. The user device 150 may then determine if there are more followers remaining in the user device user database. If it is determined that there are more followers stored in the user device user database, the user device 150 selects the next user stored in the user device user database. If the user device 150 determines that there are no more followers remaining in the user device user database, then the process ends.



FIG. 4 illustrates a method that may be performed by a computer at the third party network computer 170 of FIG. 1. FIG. 4 begins with step 410 wherein the third party network computer 170 receives a request from a user device 150 to purchase a product. This request may be facilitated by a public facing webpage, for example, an online store page for the third party retailer that controls the third party network computer 170. The third party network computer 170 then may identify if the user entered a code, at step 420. Here, the code may be entered prior to a request for purchase. For example, before checking out using an online shopping cart the user may be able to enter discount codes. If a code was entered, the third party network computer 170 may identify whether the code is recognized as a valid code for receiving a discount, at step 430 of FIG. 4.


The code may be retrieved from the administration network computer 110 via the third party network communication interface 175. Codes may be stored locally on the third party network computer 170 or in a third party network third party database accessible by the third party network computer. If the code is valid, the third party network computer 170 applies a discount to the item, at step 440. An amount associated with this discount may be retrieved by the administration network computer 110 via the third party network communication network interface 170. Discount amounts may be stored locally at the a third party network database. The third party network computer 170 may then allow the user to finish placing the order for the item, at step 450 of FIG. 4. The third party network computer 170 may then send some or all the data on the purchase, including the discount code if one was provided, to the administration network computer 110, at step 460. Any or all these steps may also be facilitated by execution of different sets of program instructions that may include: third party network base program instructions and third party network administration program instructions.


A third party network computer 170 may execute administration program instructions to cause the third party network computer to connect to the administration network computer 110, send the data for the items to be purchased, receive a link from the administration network computer 110, store the link in a third party network database, and return to executing a set of base program instructions. The process may begin with the third party network computer 170 administration program instructions being initiated by the third party network base program instructions. The third party network 160 may connect to the administration network computer 110 and then the third party network computer 170 may send third party network database data to the administration network computer 110. Then the third party network computer 170 may store the link in the third party network third party database.


Operation of a third party network discount program instructions 180 may include extracting a link sent by the user device 150 and comparing it to data stored at the third party network third party database. This may result in the identification of a corresponding discount for a selected item. This process may include identifying whether a user entered a code or not, after which a discount is applied and the order is processed.


The process of applying a discount may begin by extracting the link received from the user. Then the third party network computer 170 may compare data included in the extracted link to data stored at the third party network database. The third party network computer 170 may then extract a corresponding discount from the third party network third party database. Then the third party network computer 170 may apply the extracted discount to the user's order. The third party network computer 170 may then determine if the user entered a code. If it is determined that the user did not enter a code the third party network computer 170 sends the user data to the administration network computer 110 without a code. If it is determined that the user entered a code the third party network computer 170 sends the code and the user data to the administration network computer 110. Next the third party network computer 170 may process the user's order.


A third party network third party database may store information about the items that may be purchased. This the third party network database may include local media for the product or service, where this local media may refer to the various types of media, such as photos, videos, text, sounds, haptics, online product descriptions, etc. for enhanced marketing.


Table 6 illustrates data that may be stored at a third party database. This data may include information about the items enrolled in the MLM system as well as a link created by execution of the administration network vendor program instructions. The third party network database may cross-reference an item ID, an item description, an original cost of the item, a discount provided by the third party for the item, a cost of the item with the discount, a compensation plan decay rate which the third party enters, and a link received from the administration network computer. The third party network third party database may include the rates of exchange for product returns, marketing materials, airline sky miles, etc. Product returns may refer to a process in which a customer or consumer takes previously purchased product, merchandise, or goods back to the retailer, and in turn receive a refund in the original form of payment, exchange for another item (identical or different), or a store credit.


The information about the product or service which may be advertisements to the network, or as seen on TV sales. Advertisements to the network may refer to the advertisement provided to the MLM system from the third party offering a product, good or service. These as seen on TV sales may refer to a generic nameplate for products advertised on television in the United States for direct response mail-order through a toll-free telephone number. Marketing materials may refer to a means of marketing, advertising or promotional materials developed by or for license (or subject to licensee's approval) that promote the sale of the licensed product, including but not limited to, television, radio and online advertising, point of sale materials (e.g., posters, counter-cards), packaging advertising, print media and all audio or video media. Airline sky miles may refer to a loyalty program offered by airlines and/or credit cards. Typically, consumers accumulate a set amount of miles based on how much is spent on a ticket or a credit card and are also known as frequent flyer miles or travel points.









TABLE 6







Third Party Database Data










ID
654123







Item
Drill



Original Cost
$59.00



Discount
15%



Discount Cost
$50.15



Compensation
50%



Decay Rate



Link
HDDrill654123











FIG. 5 illustrates a second method that may be performed at the administration network computer 110 based on a set of fourth party commission program instructions 140 of FIG. 1 and using data from the fourth party organization computer 185 of FIG. 1. FIG. 5 begins at step 510 with the administration network computer 110 receiving data from the third party network computer 170 that a code was used to purchase a product. The administration network computer 110 then determines if the code is associated with a user who is also a member of the fourth party organization, at step 520. If the associated user is not a fourth party organization member, the process will return to step 510 until new data is received from the third party network computer 170. If the user is a member of the fourth party organization, the administration network computer 110 alters the commission the user would normally receive at step 530. How the commission is altered may be based on the product and the status of the user within the fourth party organization. The altered commission is then sent to the user at step 540. The altered commission may be stored until requirements for withdrawal by the user have been met. If the user has already received the default commission the user may be sent a second additional commission which may be positive or negative to such that both combined commissions result in the correct altered commission amount.


The administration network computer 110 then sends the difference between the original and the altered commission to the fourth party organization computer 185 at step 550. This difference may be positive or negative based on whether the fourth party organization intends to deter or incentivize use of the system for a product. For example, the fourth party network may want to give members extra commission for selling a power drill through the system. In this case the user would receive additional commission and the negative difference in commission, or a charge, would be sent to the fourth party organization computer 185. The difference may also be retained by the administration network. Any or all these steps may be facilitated by a fourth party commission rules database, a set of synergy program instructions, and a synergy rules database.


Table 7 illustrates data that may be stored at a fourth party commission rules database. The database contains rules for how the fourth party organization, or its members should be compensated when they are involved in a sale of a product or service. For example, a rule may state that whenever a fourth party organization member makes a sale to another member, the fourth party organization should be compensated by 20% of the commission. Commission rules may be different for different products, and whether the purchaser is a member, contact, or not affiliated with the organization. Member to member compensation rules may specify the member's position in the organization structure, for example in Table 7, “member −1” corresponds to a member that is directly downline of the member being compensated, “member +2” corresponds to a member that is two degrees upline of the member being compensated, and “member” with no modifiers corresponds to members that are not in the upline or downline of the member being compensated. The rules in the figure are simply distributions of the compensation amount, for example “org=20%” would correspond to a rule that the fourth party organization receives 20% of the commission for that sale. Rules may be complex involving executable instructions with multiple steps that may be executed by a computer.









TABLE 7







Fourth Party Commission Rules Database Data










Fourth Party
Amway
Amway
Avon





Product Code
717
4657, 4658
ALL


Triggering
Any
Contact
Member − 1


Buyer A


Commission
Org = 20%
Org = 5%,
Member + N =


Rule A

Member + 1 =
5%/N




10%


. . .


Triggering
Member − 2
Member + N
Non-Member,


Buyer N


Non-Contact


Commission
Member − 1 =
Org = 10%
Org = −5%


Rule N
10%









A set of synergy program instructions may cause the administration network computer 100 to determine if there are any possible conflicts or opportunities for cooperation between third party products or services and fourth party products or services. For example, if a third party vendor and fourth party organization both sell diet soft drinks then there would likely be a conflict. However, if the third party sells milk and the fourth party sells cookies then there may be an opportunity for cooperation. If a potential conflict or opportunity for cooperation is determined by the synergy program instructions, then the program instructions will cause the administration network computer 110 to act according to a set of synergy rules. These rules may be stored in a synergy rules database.


The functioning of the synergy program instructions may be as follows. The process begins with the administration network computer 110 polling for new products in a third party database, the fourth party database 190 of FIG. 1, or any other database which stores information on products. The administration network computer 110 determines how close the new product is to existing products in all relevant databases. Closeness may be based on several factors including product's name, function, manufacturer, size, weight, product category, how often the two products are bought together, etc. Closeness may be given a score which allows synergy rules to be executed for a given score range. For example, a closeness score of 90-100 would indicate that two products are very similar, like two power drills, and will likely compete in the market. A score of 70-80 could indicate that two products are similar but do not compete and in fact are often bought together, like paper towels and disinfectant spray. A low score would indicate the two products are unlikely to have any market effects on each other, like shoes and printer paper.


The administration network computer 110 queries a synergy rules database for any entries that match the closeness score. An entry may have at least one set of executable instructions tied to at least one range of triggering scores. If multiple entries are returned, then the administration network computer 110 may execute more than one synergy rule or may choose one rule based on which entry has priority. For example, if a synergy rule would be executed for any score over 30, and another rule would be executed for any score over 70, then the administration network computer 110 may execute both. There may be a parameter in the synergy rules database that determines which rule should be executed.


The query can also be filtered by product, manufacturer, distributor, etc. so that different parties can have different synergy rules that execute under different conditions. The administration network computer 110 executes the synergy rule, or rules. For example, execution of a rule may mean that the administration network computer 110 sends a notification to an email address stating: “conflict detected”. The administration network computer 110 may delete the conflicting product or products from at least one database. The administration network computer 110 may add data to at least one database that indicates the products are often sold together. Complex rule execution may be handled by another set of program instructions which the synergy program instructions may cause the administration network computer 110 to initiate.


Table 8 illustrates data that may be stored at a synergy rules database the database may store rules on what actions should be taken when there is a conflict or opportunity to cooperate between the third and fourth parties. For example, if a conflict is detected the administrator network, third party, fourth party, or any combination thereof is notified of the conflict. A rule may call for an automated action such as removing the offending products from a database or initiating another module.









TABLE 8







Synergy Rules Database Data










Product Code
1
2
3





Distributor
Walmart
Amway
Jim's Discount





Pocket Watches


Triggering
>90
>80
>95


Score A


Response A
Notify_Distributor.exe
Notify_Distributor.exe
Remove_Product.bat


. . .


Triggering
50-75
60-90
N/A


Score N


Response N
Notify_Distributor.exe,
Notify_Distibutor_2.exe
N/A



Initiate_CustomersAlsoBought_Module.bat










FIG. 6 illustrates a computing system that may be used to implement an embodiment of the present invention. The computing system 600 of FIG. 6 includes one or more processors 610 and main memory 620. Main memory 620 stores, in part, instructions and data for execution by processor 610. Main memory 620 can store the executable code when in operation. The system 600 of FIG. 6 further includes a mass storage device 630, portable storage medium drive(s) 640, output devices 650, user input devices 660, a graphics display 650, peripheral devices 680, and network interface 695.


The components shown in FIG. 6 are depicted as being connected via a single bus 690. However, the components may be connected through one or more data transport means. For example, processor unit 610 and main memory 620 may be connected via a local microprocessor bus, and the mass storage device 630, peripheral device(s) 680, portable storage device 640, and display system 650 may be connected via one or more input/output (I/O) buses.


Mass storage device 630, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 610. Mass storage device 630 can store the system software for implementing embodiments of the present invention for purposes of loading that software into main memory 620.


Portable storage device 640 operates in conjunction with a portable non-volatile storage medium, such as a FLASH memory, compact disk or Digital video disc, to input and output data and code to and from the computer system 600 of FIG. 6. The system software for implementing embodiments of the present invention may be stored on such a portable medium and input to the computer system 600 via the portable storage device 640.


Input devices 660 provide a portion of a user interface. Input devices 660 may include an alpha-numeric keypad, such as a keyboard, for inputting alpha-numeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the system 600 as shown in FIG. 6 includes output devices 650. Examples of suitable output devices include speakers, printers, network interfaces, and monitors.


Display system 650 may include a liquid crystal display (LCD), a plasma display, an organic light-emitting diode (OLED) display, an electronic ink display, a projector-based display, a holographic display, or another suitable display device. Display system 650 receives textual and graphical information and processes the information for output to the display device. The display system 650 may include multiple-touch touchscreen input capabilities, such as capacitive touch detection, resistive touch detection, surface acoustic wave touch detection, or infrared touch detection. Such touchscreen input capabilities may or may not allow for variable pressure or force detection.


Peripherals 680 may include any type of computer support device to add additional functionality to the computer system. For example, peripheral device(s) 680 may include a modem or a router.


Network interface 695 may include any form of computer interface of a computer, whether that be a wired network or a wireless interface. As such, network interface 695 may be an Ethernet network interface, a BlueTooth™ wireless interface, an 802.11 interface, or a cellular phone interface.


The components contained in the computer system 600 of FIG. 6 are those typically found in computer systems that may be suitable for use with embodiments of the present invention and are intended to represent a broad category of such computer components that are well known in the art. Thus, the computer system 600 of FIG. 6 can be a personal computer, a hand held computing device, a telephone (“smart” or otherwise), a mobile computing device, a workstation, a server (on a server rack or otherwise), a minicomputer, a mainframe computer, a tablet computing device, a wearable device (such as a watch, a ring, a pair of glasses, or another type of jewelry/clothing/accessory), a video game console (portable or otherwise), an e-book reader, a media player device (portable or otherwise), a vehicle-based computer, some combination thereof, or any other computing device. The computer can also include different bus configurations, networked platforms, multi-processor platforms, etc. The computer system 600 may in some cases be a virtual computer system executed by another computer system. Various operating systems can be used including Unix, Linux, Windows, Macintosh OS, Palm OS, Android, iOS, and other suitable operating systems.


The present invention may be implemented in an application that may be operable using a variety of devices. Non-transitory computer-readable storage media refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile and volatile media such as optical or magnetic disks and dynamic memory, respectively. Common forms of non-transitory computer-readable media include, for example, a FLASH memory/disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, RAM, PROM, EPROM, a FLASH EPROM, and any other memory chip or cartridge.


While various flow diagrams provided and described above may show a particular order of operations performed by certain embodiments of the invention, it should be understood that such order is exemplary (e.g., alternative embodiments can perform the operations in a different order, combine certain operations, overlap certain operations, etc.).


The functions performed in the processes and methods which may be implemented in differing order. Furthermore, the outlined steps and operations are only provided as examples, and some of the steps and operations which may be optional, combined into fewer steps and operations, or expanded into additional steps and operations without detracting from the essence of the disclosed embodiments.

Claims
  • 1. A method for integrating product data across different systems, the method comprising: polling for online interaction information by an administrative computer, the online interaction information indicating use of a embedded link by a user device to interact with a product webpage, wherein the embedded link is configured to automatically enter a code embedded in the embedded link into an online request;querying a synergy rules database using a query based on the online interaction information regarding the product webpage, wherein the query identifies a set of one or more identified synergy rules;applying the identified set of synergy rules to identify one or more relationships between the product associated with a first entity system and with a different second entity system; andexecuting, at the administrative computer, one or more alteration actions associated with one or more of the identified set of synergy rules based on a closeness score of the identified relationships, the alteration actions executed upon one or more databases of the first entity system and the second entity system.
  • 2. The method of claim 1, wherein polling by the administrative computer includes continuous polling for information regarding the code and the embedded link.
  • 3. The method of claim 1, further comprising determining that the identified relationships fall into a predetermined range based on the closeness score.
  • 4. The method of claim 3, further comprising: identifying a priority level of one or more synergy rules in the set of synergy rules based on the closeness score; andapplying the priority level to the one or more synergy rules based on the closeness score meeting a predetermined score range.
  • 5. The method of claim 3, wherein querying the synergy rules database is further based on a priority level meeting the predetermined score range, and further comprising filtering the query based on the product, wherein the filtering results in the identified set of synergy rules.
  • 6. The method of claim 1, wherein executing the alteration actions is further based on a parameter that identifies the one or more synergy rules and identifies the alteration actions associated with the one or more synergy rules.
  • 7. The method of claim 1, further comprising: identifying a conflict in the relationships between the product associated with a first entity system and with a different second entity system, wherein the alteration actions include removing the product from administrative database; andnotifying one or more of the first entity system and the second entity system regarding the conflict.
  • 8. The method of claim 1, wherein executing the alteration actions is further based on a trigger associated with a predetermined triggering range of the closeness score.
  • 9. The method of claim 1, wherein the one or more synergy rules associated with the alteration actions are specific to the first entity system and the second entity system, and wherein executing of the alteration actions is further based on a first set of rules associated with a first and second organization of the one more organizations.
  • 10. The method of claim 1, wherein the identified relationships include identifying a product relationship between the product associated with a first entity system and another different product associated with the second entity system.
  • 11. A non-transitory computer-readable storage medium comprising instructions having embodied thereon a program executable by a processor to perform a method for integrating product data across different systems, the method comprising: polling for online interaction information by an administrative computer, the online interaction information indicating use of a embedded link by a user device to interact with a product webpage, wherein the embedded link is configured to automatically enter a code embedded in the embedded link into an online request;querying a synergy rules database using a query based on the online interaction information regarding the product webpage, wherein the query identifies a set of one or more identified synergy rules;applying the identified set of synergy rules to identify one or more relationships between the product associated with a first entity system and with a different second entity system; andexecuting, at the administrative computer, one or more alteration actions associated with one or more of the identified set of synergy rules based on a closeness score of the identified relationships, the alteration actions executed upon one or more databases of the first entity system and the second entity system.
  • 12. The non-transitory computer readable medium of claim 11, wherein polling by the administrative computer includes continuous polling for information regarding the code and the embedded link.
  • 13. The non-transitory computer readable medium of claim 11, further comprising instructions executable to determine that the identified relationships fall into a predetermined range based on the closeness score.
  • 14. The non-transitory computer readable medium of claim 13, further comprising instructions executable to: identify a priority level of one or more synergy rules in the set of synergy rules based on the closeness score; andapply the priority level to the one or more synergy rules based on the closeness score meeting a predetermined score range.
  • 15. The non-transitory computer readable medium of claim 13, wherein querying the synergy rules database is further based on a priority level meeting the predetermined score range, and further comprising filtering the query based on the product, wherein the filtering results in the identified set of synergy rules.
  • 16. The non-transitory computer readable medium of claim 11, wherein executing the alteration actions is further based on a parameter that identifies the one or more synergy rules and identifies the alteration actions associated with the one or more synergy rules.
  • 17. The non-transitory computer readable medium of claim 11, further comprising instructions executable to: identify a conflict in the relationships between the product associated with a first entity system and with a different second entity system, wherein the alteration actions include removing the product from administrative database; andnotify one or more of the first entity system and the second entity system regarding the conflict.
  • 18. The non-transitory computer readable medium of claim 11, wherein executing the alteration actions is further based on a trigger associated with a predetermined triggering range of the closeness score.
  • 19. The non-transitory computer readable medium of claim 11, wherein the one or more synergy rules associated with the alteration actions are specific to the first entity system and the second entity system, and wherein executing of the alteration actions is further based on a first set of rules associated with a first and second organization of the one more organizations.
  • 20. The non-transitory computer readable medium of claim 11, wherein the identified relationships include identifying a product relationship between the product associated with a first entity system and another different product associated with the second entity system.
CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation and claims the priority benefit of U.S. patent application Ser. No. 17/313,795 filed May 6, 2021, now U.S. Pat. No. 11,593,827, which claims the priority benefit of U.S. provisional application 63/020,997 filed May 6, 2020, the disclosures of which are incorporated herein by reference.

Provisional Applications (1)
Number Date Country
63020997 May 2020 US
Continuations (1)
Number Date Country
Parent 17313795 May 2021 US
Child 18115074 US