The present invention relates to a system and method for conducting an interaction or transaction between an enterprise and a person using a mobile device. The present invention also relates to system and method for conducting an interaction or transaction that is structured and/or facilitated by a facilitator between an enterprise and a person such as a customer and/or consumer with a mobile device. The present invention also relates to system and method for conducting a transaction that is structured and/or facilitated by a facilitator between an enterprise and a customer with a mobile device involving the interchange of at least a first set of information and a second set of information between the enterprise and the customer. The system and method can be structured so that the transaction can be conducted without the facilitator receiving the second set of information (which may contain private or personal information of a customer). The system and method can be facilitated to operate over at least one communication channel.
It is well-known for persons (such as consumers, customers and potential customers, collectively referred to as “consumer” or “customer”) to interact and transact with enterprises (such as merchants and service providers) over communications channels and networks such as the internet. It is also known for consumers to use mobile devices (e.g. smart phones, cellular telephones, tablet computers, or other networked/computing devices) for conducting such interactions and transactions.
The ability and willingness of persons such as consumers to use mobile devices for interactions and transactions with enterprises has created opportunities for enterprises to grow and profit. The opportunities continue to expand with the growth in the number of persons having mobile devices, growth in the scope and capability of the networks over which such mobile devices operate (e.g. digital and wireless/cellular communication channels and networks), and growth in the capabilities of the mobile devices themselves, among other things. As the number and types of mobile devices in use expands, the number of people who interact and/or transact through mobile devices and the frequency in which they interact and transact through mobile devices will expand. For example, interactions and transactions that may have been conducted by persons from home computers are more frequently being conducted using mobile devices; communications that may have been exchanged through e-mail on a computer may now be exchanged by messaging on a mobile device (e.g. SMS/text or MMS or “push notification” in some manner/over some channel); potential customers who visited the website of an enterprise on a home computer may now be visiting the website from their mobile device. The growing number and wide variety of mobile devices and the manner in which persons use the mobile devices present challenges for enterprises. For enterprises that wish to grow and prosper, the ability to establish and maintain effective contact with persons using mobile devices (e.g. mobile customers) may be an important business consideration, notwithstanding the challenges.
It is known that in the interaction and transaction between persons with mobile devices and enterprises such as merchants various items and sets of information are exchanged. For example, when a consumer makes a purchase of an item or service from a merchant, the consumer will provide a name/address and payment information (such as a credit card number and security/validation codes). Such information is sometimes stored by an enterprise (for the convenience of the person for use in future transactions) or deleted by an enterprise (perhaps in full or in some part, for the security of the information) after the interaction or transaction.
Certain information of a person is considered to be personal and/or or private and the unauthorized use or possession of such information may be restricted or regulated by law. Certain information relating to a person may be used or combined with other information to establish knowledge about the person such that the privacy or identity of the person may be compromised. Information of a person may be considered (e.g. from an administrative or regulatory standpoint) personal or private notwithstanding the willingness of a person to use or share the information (and notwithstanding the willingness of the person to share the information without exercising reasonable protections of their own). As indicated, a person is required to share certain combinations of information to transact business with enterprises.
The use of information in interactions or transactions may expose a person to potential risk of what is often called “identify theft” or more generally a potential risk that others may conduct unauthorized transactions using personal information that others should not be using or possessing, for example, as in the unauthorized use of a credit card or other financial account, or the unauthorized use of personal information to obtain a credit card (or other account) or in connection with another commercial transaction. For certain types of information, such as health-care related information of a person (e.g. PHI or personal healthcare information), others who obtain the information without authorization may violate the privacy of the person (in a legal and/or practical sense).
The need to protect personal information, including what is considered “personally identifiable information” (PII), has been recognized. In many jurisdictions, certain items and categories of information have been designated as protected under various laws, such as state and federal laws relating to consumer protection or personal privacy (e.g. Health Insurance Portability and Accountability Act or HIPAA). Actual or perceived mishandling of personal information (e.g. PII, PHI, financial information designated as PCI, or other information) may subject an enterprise to various harms and liabilities, including those arising from violations of law and those arising from loss of public confidence and esteem.
Enterprises that use information for transactions may be at risk of potential liability even when they have undertaken good faith measures to protect information received from persons. Laws, regulations and rules relating to personal information are not necessarily consistent among jurisdictions (or agencies/organizations) and may also be subject to difficulties in interpretation. Information that such enterprises have stored in a manner considered to be secure by reasonable standards may be subject to compromise by others who attempt unlawful access (e.g. by “hacking” into computing systems).
Risks relating to personal information may be intensified when interactions or transactions are conducted by persons using mobile devices and/or when information is communicated over a network and shared with other entities (by virtue of the manner of use of mobile devices). Such information may include a wide variety of types and categories, such as relating to personal identity, personal financial, personal health or personal security, etc. (or enterprise/network security). The greater the amount of personal information and/or the greater the number of entities that receive personal information, the greater the risk that there may be a compromise of information security. Enterprises who conduct interactions and transactions with persons using mobile devices necessarily must receive and use personal information, notwithstanding the potential risk.
It would be advantageous to have a system and method for facilitating interactions and transactions between consumers using mobile devices and enterprises. It would also be advantageous to have a facilitator with expertise to structure and/or manage the interactions and transactions in a manner that allows enterprises to connect more efficiently and effectively with persons using mobile devices. It would further be advantageous to have a facilitator to structure and/or manage interactions and transactions between persons using mobile devices and enterprises in a manner that addresses potential liabilities that may arise from the sharing of information, including personal/private information. It would further be advantageous to have a system and method for a transaction between a person using a mobile device and an enterprise that was facilitated in a manner to designate a first set of information and a second set of information used for the interaction or transaction but to limit the use of the second set of information (which may comprise personal/private information). It would further be advantageous to have a system and method for a facilitating an interaction or transaction between an enterprise and a person using a mobile device that can be conducted over at least two communication channels.
A system for conducting a transaction that is structured by a facilitator to be conducted between an enterprise and a consumer with a mobile device involving the interchange of a first set of information and a second set of information between the enterprise and the consumer may comprise a computing system operated by the facilitator that is configured to assemble data to the mobile device of the consumer and a network connection configured to transmit the data to be presented on the mobile device of the consumer. The first set of information may comprise information considered personal or private or relating to the consumer; the second set of information may comprise information relating to an account used by the consumer.
The system may comprise a computing system, a network interface to allow communications over a network, and data storage for information. The computing system may comprise a general-purpose computer configured to facilitate interactions and transactions with a mobile device; application programs may operate to configure the computing system to facilitate interactions and transactions using data. Data transmitted from the computing system to the mobile device may provide the capability for the user of the mobile device to conduct a transaction with the enterprise. The computing system may facilitate the transmission of data and files that can be presented on a user interface on the mobile device; data and files may be transmitted from the mobile device to conduct the transaction with the enterprise. The data may comprise the first set of information; the data may also comprise the second set of information. Data from the first set of information may be stored by the facilitator; data storage may be temporary with some portion of the data relating to the interaction being deleted or destroyed after the interaction is concluded. The network interface may comprise a computing device configured to function as a gateway to a network. Information may be presented to the mobile device of the consumer by a message over a communication channel or network. The message may comprise a text message or multi-media message or push notification or may use another type of messaging service. The communication channel may comprise short message service (SMS) or multi-media messaging service (MMS) or some other channel allowing for messaging to a mobile device.
A system may comprise a configuration wherein the message comprises a link to a mobile web page that opens on the mobile device to present a form to be completed by the consumer by the inclusion of the second set of information; and wherein the form comprises a link configured to have the form submitted to the enterprise to facilitate the completion of the transaction so that the facilitator does not receive any of the second set of information. A system may comprise a configuration wherein the message comprises an application that runs a program on the mobile device to present a form to be completed by the consumer by the inclusion of the second set of information; and wherein the form comprises a link configured to have the form submitted to the enterprise to facilitate the completion of the transaction so that the facilitator does not receive any of the second set of information. A system may comprise a configuration wherein the account used by the consumer comprises a credit card account. The system may comprise a configuration wherein the account used by the consumer comprises a bank account. The system may comprise a configuration wherein the first set of information comprises and identifier of the consumer. The system may comprise a configuration wherein the first set of information comprises data maintained by the facilitator to identify the consumer.
A method of conducting a transaction that is structured by a facilitator to be conducted between an enterprise and a consumer with a mobile device involving the interchange of a first set of information and a second set of information between the enterprise and the consumer may comprise receiving a communication from the enterprise to make a communication to the consumer; processing the communication from the enterprise on a computing system to identify at least one consumer; transmitting a communication to the mobile device of the consumer relating to the first set of information; receiving a response from the mobile device of the consumer; reviewing the response from the consumer; providing a communication to the mobile device of the consumer to that is configured to obtain from the consumer a second set of information and to transmit upon approval by the consumer the second set of information to the enterprise to initiate the completion of the transaction; receiving a notification from the enterprise relating to the status of the transaction; transmitting a notification of the status of the transaction to the consumer.
The method may comprise a configuration wherein the first set of information comprises information relating to the consumer. The method may comprise a configuration wherein the second set of information comprises information relating to an account used by the consumer. The method may comprise a configuration wherein the data is presented to the mobile device of the consumer by a text message. The method may comprise a configuration wherein the text message comprises a link to a web page that opens on the mobile device to present a form to be completed by the consumer by the inclusion of the second set of information; and wherein the form comprises a link configured to have the form submitted to the enterprise to facilitate the completion of the transaction so that the facilitator does not receive any of the second set of information. The method may comprise a configuration wherein the account used by the consumer comprises a credit card account. The method may comprise a configuration wherein the account used by the consumer comprises a bank account. The method may comprise a configuration wherein the first set of information comprises an identifier of the consumer. The method may comprise a configuration wherein the first set of information comprises data maintained by the facilitator to identify the consumer.
A system and method for configuring an interaction such as a transaction between a person using a mobile device and an enterprise that can involve a facilitator and a third party entity may comprise a computing system operated by the facilitator; at least one application program interface made available by the facilitator to the third party entity; data storage associated with the computing system for at least temporarily storing data related to the transaction; network connectivity from the computing system to the enterprise, to the third party entity and to the person using the mobile device. The facilitator may provide data files that can be presented to the mobile device for facilitating the transaction; and the facilitator may provide information relating to the transaction to the enterprise after the transaction has been initiated
The interaction or transaction may comprise at least one of (1) a banking transaction; (2) a financial transaction; (3) a wire transfer approval; (4) a payment collection; (5) a purchase; (6) an alert to the customer; (7) registration of the customer; (8) a retail transaction; (9) a transaction related to customer loyalty; (10) a medical transaction; (11) a reminder of an appointment; (12) a test or trial of a medication; (13) a test or trial involving the customer; (14) a notification; (15) a fee collection; (16) a service reminder; (17) a maintenance reminder; (18) a report on an account; (19) a telecommunications service; (20) a hospitality transaction; (21) an entertainment transaction; (22) a travel transaction; (23) a completion of an accommodation; (24) a confirmation of a reservation; (25) a reminder of a reservation; (26) a subscription; (27) a fraud alert; (28) a billing threshold alert; (29) a credit card usage alert; (30) a customer loyalty recognition transaction; (31) a notice of a customer loyalty opportunity; (32) a notice of a transaction that was initiated but that was not completed; (33) a notice of a pending transaction that remains pending; (34) a notice of a shopping cart that contains items to be purchased but that has been abandoned for a specified period of time; (35) a notice of the contents of a shopping cart for a transaction; (36) an account information message; (37) scheduling or rescheduling of an appointment; (38) scheduling of a service; (39) refilling or replenishing an product; (40) transacting with a pharmacy or health care provider; (41) transacting with a service provider; (42) informing of a completed transaction; (43) completion of a service or product available for pick-up or delivery; (44) approval of a wire or other financial transfer; (45) invoice or payment collection; (46) approval of a purchase order; (47) registration and coupon management; (48) subscription reminder; (49) billing information update; (50) medical test or trial reporting; (51) medical patient status reporting; (52) approval of a service; (53) upgrade of a service or purchase; (54) notice or collection or payment of a governmental fee or fine or other amount due; (55) hospitality reservation or status change; (56) request of approval of a transaction; (57) alert of a status change or account activity.
Mobile devices such as mobile/cellular telephones, “smart phones”, “super phones”, networked media players, tablets, tablet computers, readers, netbooks, GPS devices, cameras, memory devices/storage, etc. have gained widespread popularity. In many parts of society, mobile devices are becoming ubiquitous. Mobile devices are also becoming more full-featured, including through new features and functions and the combinations of features and functionality (i.e. convergence) within devices. The functionality of certain types of mobile devices is for practical purposes indistinguishable in relevant respects from the functionality of computers and data terminals (i.e. with respect to the ability to send and receive and display information by e-mail or over the web/internet, such as on a web browser). The capabilities of such devices to connect to each other and to other devices and resources through various networks and communication channels are rapidly expanding.
As shown in
As shown in
According to any exemplary embodiment, a mobile device may be any of a wide variety or type of devices or apparatuses that a person may use to connect through a communication channel/network, including any type of mobile/cellular telephone, smart phone, tablet, etc. or any other present or future device having communication or networking capability, computing capability with a suitable user interface (e.g. I/O capability) and able to connect to/through a channel/network (e.g. as indicated in
Combinations of features in mobile devices are producing both convergence (single devices that perform multiple functions/features that previously required multiple devices to perform suitably) and the emergence or growth in popularity of new types and categories of devices (e.g. personal/multi-function device such as a tablet computer, such as Apple iPad or Samsung Galaxy/Galaxy Note, Amazon Kindle, etc.) that expand user-available features and functions. For example, a mobile telephone (e.g. smart phone, such as Apple iPhone, Samsung Galaxy Note) may be configured with a camera and GPS (global positioning system) capability; it may have the capability to present and read data such as bar codes. (And of course it will be capable of use as a telephone and likely capable of various other data communications, such as web browsing, e-mail and text messaging, etc.) New mobile device features, functions and enhancements also continue to be developed and implemented as in networked media players such as the Amazon Kindle or other tablet devices/computers such as the Apple iPad, Samsung Galaxy, Lenovo IdeaPad, Herotab, etc. or other such devices.
Among other functions, using technology implemented through service providers or vendor (e.g. AT&T Wireless, Verizon Wireless, T-Mobile, Tracfone, StraightTalk, etc.) or the like (such as a mobile phone service, messaging aggregator, internet service provider, etc.), a consumer with a mobile device can use communications by voice and messages (e.g. SMS/text and MMS messaging), e-mail communications, social media and web browsing, for informational and/or commercial interactions and transactions. Persons with mobile devices are able to stay “connected” virtually anywhere that a communication service is available (e.g. transmit/receive signals from carrier by sharing/using network access in some manner).
Mobile devices in the hands of consumers (collectively if not individually) are put to multiple uses and have widely varying capabilities. In some instances, individual mobile devices may be equipped with multiple means of establishing connectivity to a network—e.g. via a cellular telephone connection, via a voice gateway/VOIP, via a Wi-Fi connection, via a Bluetooth connection, via a carrier-specific connection, etc. (In some instances, certain consumers may also wish to use other types of computing devices to effect the same or similar operations as they do on their mobile devices, or use their mobile device as a means to connect a computing device to a network.) In the hands of any particular consumer, a particular mobile device may be used in a different manner than is an identical mobile device in the hands of a different consumer. The use of mobile devices varies not only in relation to the capabilities of the particular device but also the needs and preferences of the consumer using the device.
According to any exemplary embodiment, an enterprise may be any of a wide variety of entities, such as a merchant/vendor or service provider, retail outlet, internet retail business, health care organization, pharmacy or health/medication provider or product supplier, health care clinic/hospital or treatment provider, communication/network access provider, technology or product vendor, restaurant/hotel or other food/hospitality provider, fuel/service or convenience store/outlet, transportation provider, insurance company or broker, financial institution or bank, personal networking service, news/media or entertainment provider, search engine/services provider, data management vendor/service, credit card issuer/merchant or consumer credit/loan provider, financial intermediary, educational institution or school, utility company, personal/home or pet care provider, business service provider, professional services firm/business, etc. in any category that now exists or that may exist in the future. For purposes of the system and method, any entity may be an “enterprise” if that entity has or intends to have interactions or transactions with one or more persons who use a mobile device (whether in a commercial or professional/personal or other context).
For enterprises such as merchants and vendors and other entities that provide informational and/or commercial services and products to consumers and potential customers (i.e. persons using mobile devices), the ability to establish and maintain communications with mobile devices is of potentially substantial commercial benefit. However, ongoing change and growth, the wide variety of mobile devices, the continuing convergence and emergence of new mobile devices, variations in operating systems/platforms for mobile devices, and interoperability issues, present challenges to enterprises who wish to communicate widely to consumers and customers through their mobile device.
Consumers may possess multiple mobile devices of different types, or may change/upgrade their mobile device multiple times within a matter of months. The set of mobile devices in operation (in the hands of consumers and potential customers) is expanding and changing, as devices come into service and other devices are taken out of service or have their service pattern changed. Customers may maintain an existing telephone number when they bring a new mobile device into service (e.g. taking the old mobile device out of service), or may obtain a new telephone number when they obtain a new mobile device (e.g. may use the new telephone number for the new mobile device or may transfer the new telephone number to the old mobile device and use the existing telephone number with the new mobile device). A single consumer may use and/or carry multiple mobile devices, for example, a mobile device used on behalf of an employer for work-related/professional functions and a mobile device used for personal and social/family communications. A consumer may have a mobile device that they use for international travel and a mobile device they use domestically when at or near home. A consumer may have a mobile device that they share with other members of a family or household, e.g. children and other relatives. A consumer may have mobile devices that are on different networks, e.g. for which connectivity of each device is provided by different service providers (or carriers).
Mobile devices come in a wide variety of types and form factors. Certain mobile devices have relatively small visible viewing areas (e.g. screens or displays, such as LCDs); other mobile devices have relatively large visible viewing areas; some mobile devices have multiple viewing screens. Certain mobile devices provide no keyboard for information entry; other mobile devices have physical keyboards and/or provide on-screen (e.g. touch screen) capability or keyboard simulation.
Mobile devices come with various data/voice communications capabilities and compatibilities; for example, certain mobile devices may use CDMA (Code Division Multiple Access) technology for communications with a service provider; other mobile devices may use, for example, GSM, 3G, 4G, or LTE technologies. Some mobile devices may also include, for example, capability for Wi-Fi or Wi-Max or other technology for communications. And carriers and other service providers continue to upgrade and enhance their networks to improve data/voice communications capability, with mobile devices concurrently being upgraded and enhanced for interoperability.
According to any exemplary embodiment, messaging communications with the mobile device will be facilitated using conventional or other known technology that is used by mobile devices and by carriers/service providers (including as indicated in
As indicated (schematically) in
Mobile devices may come with a variety of different service capabilities and/or billing plans with the service provider. For example, a consumer may have a billing plan with a carrier that allows for a limited number of minutes of voice (talk) time and a limited number of messages (e.g. SMS and/or MMS messaging) and a limited amount of data use (e.g. over the internet of mobile web/mWeb). Consumer with multiple mobile devices may have different service/billing plans for each of their mobile devices. How consumers use their mobile devices may be influenced if not constrained by the billing/service plans they have with their carriers. For example, a consumer with unlimited talk/voice time but limited or restricted messaging and data communication usage may tend to interact via voice calling or using an interactive voice response system (IVR/VRS using telephony); consumers with unlimited messaging usage in their billing/plan will likely have a different usage pattern for their mobile devices.
It has become common to see persons using mobile devices in almost all corners and contexts of developed society. How and where mobile devices may properly/safely or legally be used is in flux, notwithstanding expansion of the number of mobile devices in use and expansion of the capabilities of the new mobile devices being brought into use. For example, several states now have explicit legal restrictions prohibiting the use of messaging services on mobile devices while operating a motor vehicle (e.g. laws against “driving while texting”) as well as general prohibitions against inattentive driving. Motor vehicles may have installed technology that allows “hands free” communications by a driver or passengers through a mobile device. Mobile devices may include “voice activated” or “voice recognition” technology; mobile devices may include the capability to “read” aloud messages (e.g. e-mail or SMS messaging). Certain facilities prohibit the use or carrying of mobile devices (or mobile devices with certain capabilities). In certain situations or during certain events, for example, legal proceedings, religious services or entertainment events, consumers will be asked not to use or to turn off their mobile devices or perhaps use only in “silent mode. Yet at or in connection with other situations or events, such as sporting events, consumers may be freely allowed if not invited or urged to use their mobile devices.
In connection with the marketing of products and services, to build brand/name recognition, to expand or build awareness and relationships with consumers and potential customers, and/or to maintain contact and loyalty/relationships with consumers who are existing customers, many enterprises seek to connect with consumers/customers on their mobile devices. For example, consumers may wish to receive communications such as alerts, invitations, reminders, offers, campaigns, etc. from certain enterprises. The number of enterprises that will seek to make connection with consumers/customers on their mobile devices and the scope of the connections is very likely to expand dramatically in the future.
However, given the degree of variability and flux in the field of mobile devices and their use, including changes in mobile device technology/capability and consumer usage/usage patterns, it can be difficult for enterprises to maintain connections or effective connections with consumers/customers. For example, a message or web page transmitted to a mobile device from an enterprise that appears or loads sufficiently quickly and is readily readable on one mobile device may not load properly or loads slowly on another mobile device (or may not be readily readable on the device). A consumer who has grown accustomed to interacting with an enterprise on a mobile device in a certain manner (i.e. in terms of speed or ease of readability) may find that interaction with the enterprise is no longer the same or suitable when the consumer obtains a different mobile device. Consumers who are unable to interact conveniently (for their tastes) with an enterprise through their mobile devices may instead elect to interact or transact with another enterprise. For enterprises engaged in the marketing and selling of products and services, the inability to interact efficiently with consumers on mobile devices may mean lost revenue or slowed growth.
Providing continuity and at least some relatively stable level of uniformity in the presentation of communications to consumers using mobile devices can present a challenge to an enterprise. For example, as persons obtain new devices or gain new functionality on their devices or experience changes in their situations and interests (e.g. new employment, change in marital/relationship status, relocation, new hobby, birth/adoption of a child, etc.), it may be mutually beneficial for the enterprise to be able to provide communications of ongoing relevance to the persons. Moreover, the receptivity of persons to communications from various enterprises may change over time (including for reasons not readily known to an enterprise).
Referring to
According to any exemplary embodiment of the system and method, communications with the mobile device will be facilitated by a computing system (e.g. server) generating content (e.g. a static web page, dynamic web page, etc.) that passes through a gateway to the network/communication channel for transmission and receipt by the mobile device where the relevant portions of the content are presented and displayed on a user interface (e.g. through a web browser, etc.). According to any other embodiment, other present/future technology that is used for communication of data (e.g. content such as information) between a facilitator and mobile device may be used in the system and method (i.e. the system and method uses such technology but can be implemented without requiring a specific type of such technology).
As shown in
The technology/platform provided by the facilitator to an enterprise/client to enhance the experience of a consumer and the efficacy of mobile communications with the enterprise may include features such as combined (or blended) communication methods (e.g. the ability to use multiple, integrated mobile technologies such as messaging, voice, mWeb and device-based (smart phone/mApp) applications), scalability (e.g. a messaging engine that can accommodate initiatives of any size and handle large volumes of data, in some instances millions of messages per day), stability (e.g. a redundant infrastructure, designed to protect data and store it properly), extensibility (e.g. APIs or other routines, files, forms, links/URLs able to be integrated into third-party systems, databases and business processes), uniformity/standardization across carriers and mobile devices (e.g. compatibility with carrier requirements and disparate handset technology to facilitate mobile communications in many parts of the world, in many languages and in any industry), and reporting/analytics (e.g. data collected in real-time and reported to allow review of results and insight and adjustments to maximize the value of mobile communication efforts). The facilitator may also provide a technology platform for mobile communication (e.g. to mobile devices) across various technologies and carriers, incorporating the technology for messaging (e.g. SMS/text and MMS or other formats), voice and voice response systems, web and mobile web engines with related software/application and interfaces.
According to any exemplary embodiment of the system and method, data (e.g. content such text, images, forms, pages, links/URLs, user-input templates and fields, etc.) may be presented and displayed on a mobile device using conventional or other known technology (e.g. as presently referred to as a web page, webform, web template, etc.); such data/content may be presented in a manner referred to as a static web page or rendering of a dynamic web page or webform or by other terms/other formats that can be used. According to an exemplary embodiment, content may be transmitted in the form of files such as defined in programming languages such as HTML, XHTML, Perl, PHP, or otherwise.
A facilitator can provide, maintain and improve a platform of technology and expertise for mobile communications with consumers that a typical enterprise will not readily be able to develop. A facilitator is able to provide a wide variety of additional or improved capabilities for clients who seek solutions to the challenges presented in mobile communications. The facilitator can deploy its expertise and technology to organize, structure, manage and conduct communications and interactions/transactions of virtually any type within the capability of consumers using mobile devices, across a wide variety of carriers and in different countries and different languages. In the implementation of communications, the facilitator is also able to collect and mine data from consumers, which data can be used to optimize future communications, reducing time and waste, maximizing efficiency, and enhancing the effectiveness of the enterprise/client of the facilitator (i.e. helping to determine return on investment/ROI and cost in comparison to results obtained).
A facilitator may assist an enterprise/client in a variety of different ways to enhance the experience that consumers/customers have with the enterprise in interactions/transactions conducted over mobile devices (i.e. understanding that a transaction and interaction are essentially the same in character and form). A facilitator may format communications to mobile devices in a manner that is relatively stable and uniform over a wide variety of mobile device interfaces (e.g. display screens). A facilitator may set up communication programs (e.g. campaigns or workflows) for an enterprise/client, for example, to encourage consumers/customers to transact with the enterprise, to repeat an interaction/transaction, to renew/refill a service or product, to try a new or existing product or service, etc. A communication program or campaign may be developed and implemented by the facilitator to use and combine multiple communication channels to achieve efficiencies and enhance consumer convenience; for example, in a campaign/initiative or consumer-directed program, consumers may initially be presented with a text message (e.g. by SMS messaging or MMS messaging or push notification or other messaging) and then be given the ability to respond further over the internet (e.g. using mobile web/mWeb capability or mApp capability) through a fillable-form web page submission.
The potential role of a facilitator to assist an enterprise/client with communications to consumers/customers using mobile devices is very flexible. A facilitator and/or facilitation system will allow the design and structure (and execution/implementation) of a transaction/interaction in a flexible manner, according to the purpose or intent of the enterprise/client and other possible considerations/constraints and objectives. According to any preferred embodiment, the interaction/transaction can be designed and implemented/executed to uses the capabilities (e.g. breadth, flexibility, etc.) of the facilitator and the facilitation system (see generally
A facilitator may assist an enterprise/client with the management and implementation of internal communications with employees who use mobile devices, for example, by broadcast messaging (e.g. by SMS technology or MMS technology or push notification or other messaging technology).
A facilitator may assist an enterprise/client in the expansion of communication-based capabilities for customers/visitors; for example, in the entertainment/hospitality industry, a facilitator may provide for the enterprise enhanced guest experiences at a destination by managing and implementing messaging (e.g. by SMS technology or MMS technology or push notification or other messaging technology) to present information to guests about status and events at the destination; guests may be able to make arrangements for events using messaging (e.g. by SMS technology or MMS technology or push notification or other messaging technology).
The facilitator may assist an enterprise with providing notifications to consumers/customers using messaging (e.g. SMS, MMS or push technology); for example, a pharmacy or other enterprise can use messaging to notify customers when products (e.g. prescriptions or photograph prints) are available to the customer for pick-up. The facilitator may assist an enterprise/client by providing reminders to customers of appointments and confirmation and rescheduling services using messaging over a mobile device (e.g. by SMS technology or MMS technology or push notification or other messaging technology); customers who wish to or are requested to provide additional information may be enabled to do so on their mobile device in response by completing a fillable-form transmitted to them over the mobile web (e.g. mWeb) and/or the internet.
Building and applying data and information shared by the consumer (or obtained with appropriate permissions granted or otherwise as authorized), the facilitator is able to customize and personalize interactions and transactions between the consumer on a mobile device and the enterprise/client. Such interactions can be tailored and adjusted at the request of the consumer, who may elect to opt-out of receiving communications, or who may seek to have episodic and/or regular scheduled messaging or reminders (e.g. by SMS, MMS, push message) (on a daily, weekly, monthly, or other timed/scheduled basis) on subjects of interest. Enterprises may also be able to present marketing messages and advertisements through the facilitator in the communications with consumers as a source of direct revenue or indirect revenue growth; shared content or links to sites of related business partners may also be presented to consumers, as a source of potential revenue and business growth for the enterprise.
As data and information is obtained by the facilitator and enterprise/clients, directly or from transactions with consumers, precautions may be exercised as to the handling of the information. As indicated in
Referring to
Referring to
Referring to
According to an exemplary embodiment as shown in
According to an exemplary embodiment, the system functionality will access a data storage system (e.g. data store) available for the session; according to a preferred embodiment, the data store will be “unstructured” insofar as it provides storage locations that can be configured and used flexibly according to the configuration of the particular session; in other words, availability of the data store is provided as system functionality but the actual data that is contained in the data store for a particular session will vary according to the design and needs/configuration of the session.
According to an exemplary embodiment, the system functionality will include the capability to facilitate and manage the “session” or interchange of data/information for the interaction or transaction; the system functionality will by application program interface (API) enable other entities to execute operations, for example, to create, read, update and delete data/information interchanged with the consumer, as well as access to a “notify” service (e.g. to inform the enterprise of other entity of data/information obtained during the create, read, update and delete (CRUD) operations). According to a preferred embodiment, the system functionality will allow the “unstructured” data store to be used for session data/information, e.g. creating data, reading data, updating data in the data store and then deleting all or part of the session data from the data store after the session; the session data may be given a pre-determined life span, a pre-determined number of uses or may be configured for the particular session or for a particular type of session.
According to an exemplary embodiment, the system functionality will include capability to facilitate information interchange management of users/consumers and for authentication routines and protocols as required by other participants in the transaction (e.g. by the enterprise or a third-party processor such as a bank or credit card company); according to an alternative embodiment, a separate or additional authentication or authorization function or layer may be provided by the facilitator as part of the system functionality. Authentication may comprise user/device authentication and/or consumer authentication. Authentication may comprise any type of authorization or authentication routine or protocol that is used or capable of use for a session/interaction on behalf of an enterprise or other entity. The system functionality may also comprise the capability to manage the creation, and use/passage of “tokens” between participants in the transaction (and providing PURL support).
Example transactions and interactions are shown schematically (e.g.
Upon receipt of the request the facilitator processes the information to generate a message or a group of messages that can be sent to specified consumers (see
The consumer can open the message on his/her device and generate a reply that can be sent to the enterprise (see
According to an alternative embodiment, the facilitator may generate a message with instructions to display a form page (e.g. using an API) on the consumer device (see
The facilitator directs the flow of information (e.g. by using web links that open a form and direct its submission) so that sensitive information (e.g. PII, PCI, PHI, ESD, etc.) is only received by the enterprise (or further down the line from the enterprise by a processor/bank) but not by the facilitator, thus avoiding any need for the facilitator to manage or destroy such sensitive information after use.
The enterprise receives the form along with the information submitted by the consumer and processes it securely. If the transaction involves a payment, the enterprise may engage a financial institution in the process. The enterprise may then respond to the consumer with a redirect request (e.g. if using mWeb, as in
Once the workflow has been set up and customized for a particular enterprise, the process can also be initiated by a consumer, as shown in
A facilitator is also able to structure and streamline commercial transactions that are conducted by consumers on mobile devices with an enterprise/client. A facilitator may provide expertise and technology (e.g. including APIs and other interfaces and/or data/file transfer systems and methods) that enable an enterprise to offer secure payment processing (through a bank or processor) on behalf of consumers via their mobile devices. The facilitator is able to manage electronic commerce transactions to allow for various billing methods, for example, credit card processing or billing through the consumer's telephone service provider (e.g. carrier).
An exemplary embodiment including a transaction is shown in
Referring to
Referring to
Referring to
According to an exemplary embodiment, considerations of security in the handling of PII and related information of sensitivity (e.g. PII, PHI, PCI, ESD, etc.) may allow the facilitator to structure interactions for an enterprise/client with consumers/customers in a manner intended to minimize risk and/or exposure of information that is private, personal, sensitive, secured, etc. See, e.g.,
According to an exemplary embodiment, for example, interactions with a consumer may be conducted in a session in which data/information exchanged in the interaction is not stored after the session has concluded, as shown in
The consumer may “click on” the PURL link (e.g. access/activate a file or web based action over a network) to send a response, triggering a request for a document or a form (i.e. a file) from the facilitator. The facilitator then checks for secure transaction support (e.g. HTTPS Support). If secure transactions are not supported, the facilitator may generate an error message or other instruction for the consumer. If the facilitator finds that there is support for secure transactions, it may generate a form and send it to the consumer (
After opening the message, the consumer may fill out the “form” with the information requested in/on the form and submit a completed form/file to the enterprise to initiate the transaction (see
According to an exemplary embodiment, the facilitator may structure the transactions to minimize the sharing of PII and related information of potential sensitivity (e.g. PHI, PCI, ESD, etc.). For example,
According to alternative embodiments, as shown schematically in
An exemplary embodiment of a financial transaction is shown in
According to an alternative embodiment, the facilitator may structure and format the redirected communications to and from the mobile device of the consumer/customer (e.g. by using templates or webforms/webpages). The facilitator may manage the “look and feel” (e.g. consistency) of communications to and/or displayed upon the mobile device (i.e. rather than having the communication appear as from or sent by the processor/financial institution). For example, the facilitator may prepare a template for the processor to use and/or may communicate directly to the mobile device such information as status information for the transaction, including a notification that payment has been “approved” and/or a receipt for the transaction (e.g. if provided with notice of successful execution of the redirect request or otherwise upon receipt of such information from the processor); the facilitator may also prepare a template for the processor to use for any other communications to the mobile device, such as another payment form if required for the consumer/customer to correct an error or omission or otherwise to complete the transaction successfully.
According to any exemplary embodiment of the system and method, in order to facilitate the convenience of the transaction and in an effort to reduce potential data entry errors, the facilitator may pre-populate with available information any webform that is presented to the mobile device with some portion or all of the information that is requested from the consumer/customer or otherwise required to be presented to the enterprise or processor; the consumer/customer may then verify the information that has been pre-populated in the webform and update or include any other information that is required for accuracy and completeness for the transaction. The facilitator may maintain and update databases containing any such information with authorization of the person using the mobile device. According to any exemplary embodiment, the facilitator will attempt to structure the transaction to provide a level of convenience, accuracy, speed and data security that is appropriate for the needs and objectives of the enterprise and its customers.
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
Referring to
According to the exemplary embodiment shown in
Referring to
As shown in
It is important to note that the construction and arrangement of the elements of the inventions as described in system and method and as shown in the figures above is illustrative only. Although some embodiments of the present inventions have been described in detail in this disclosure, those skilled in the art who review this disclosure will readily appreciate that many modifications are possible without materially departing from the novel teachings and advantages of the subject matter recited. Accordingly, all such modifications are intended to be included within the scope of the present inventions. Other substitutions, modifications, changes and omissions may be made in the design, variations in the arrangement or sequence of process/method steps, operating conditions and arrangement of the preferred and other exemplary embodiments without departing from the spirit of the present inventions.
It is important to note that the system and method of the present inventions can comprise conventional technology (e.g. computing systems, telecommunication systems, networking technology, data storage, data transmission, data/file structures/formats, systems/software, application programs, mobile device technology, etc.) or any other applicable technology (present or future) that has the capability to perform the functions and processes/operations indicated in the FIGURES. All such technology is considered to be within the scope of the present inventions.
The present application incorporates by reference and claims the benefit of priority of U.S. provisional patent application Ser. No. 61/515,052, filed Aug. 4, 2011.
Number | Date | Country | |
---|---|---|---|
61515052 | Aug 2011 | US |