The present invention relates to systems and methods to enhance independently sourced consumer-facing device clients (e.g., web sites, web apps and native apps)—whereby such an enhancement may facilitate a given ‘provider’ to better attract initial and repeat business from ‘seekers’—i.e., those seeking to obtain goods and/or services which may perhaps be urgently required goods and/or services (“URGS”), and furthermore: to facilitate providers to better leverage network visibility and on-line search facilities; to facilitate seekers to better determine availability and to more easily acquire such goods and/or services; and to facilitate device client sources to acquire, monitor and upgrade such device client enhancing facilities so as to more effectively utilize them.
Merchants and service providers may expertly conduct their businesses, yet have little or no skill at on-line interaction with potential customers. Most business people are older and less technically savvy than the consumer population. Often their web sites, if they have any, are static—providing little more interactive capability than virtualized page flipping through an electronic sales brochure. Additionally, they may have little or no presence through on-line search or social media. In an age of highly interactive mobile device apps and social media, relying on such static ‘display’ web sites may be woefully under-serving both seekers and providers. Additionally, many web sites are not suited for display on small mobile device displays and therefore further frustrate or annoy users.
Perhaps less obvious, but potentially more harmful, many device clients lack practical facilities for a device client source or a provider to conveniently and effectively measure and analyze device client use and results. Many device clients—particularly web sites—are operated without any measure of performance or attention to potential improvements. They simply drain money while providing near zero or possibly negative results.
It is therefore apparent that an urgent need exists for systems and methods that enhance independently sourced customer-facing device clients wherein such enhancements may include but not be limited to: configurable interactive facilities and services; support for newer generation client devices (e.g., mobile); exploitation of internet search and social media; and measurement and management facilities enabling providers to monitor and improve on-line presence and profitable interaction with customers. Although such a need clearly exists for the broad range of merchants and service providers who have only rudimentary on-line facilities, the need for enhanced facilities is even more urgent for providers of URGS because seekers of URGS are typically under duress and therefore much less patient or tolerant of being delayed and/or under-served.
To achieve the foregoing and in accordance with the present invention, systems and methods for incorporating enhancing co-client logic in a thusly adjuncted device client are provided. In particular the systems and methods for enabling an adjunct seeker to utilize the co-client to access information pertaining to one or more adjunct providers and further facilitating communication between such an adjunct seeker and an adjunct provider thusly enabling a commercial transaction and loyaltizing both parties. Additionally, such systems and methods may facilitate the loyaltization of additional parties such as device client sources and app vendors.
In one embodiment, a distributed computerized fulfillment system for co-clientized access to fulfillment services is configured to facilitate a source of a device client to incorporate a fulfillment system co-client in that source's device client. The device client source appoints a co-client administrator to configure and otherwise administer the co-client incorporated in the source's device client. The co-client administrator (and/or other parties) recruit one or more adjunct provider(s). Each recruited adjunct provider configures an adjunct provider profile describing their enterprise. The incorporated co-client is configurable to vary—potentially on a per co-client utilization basis—the assignment of adjunct provider(s) to the co-client as well as the fulfillment system service(s) expressed via the co-client. An adjunct seeker—urgently or normally seeking goods and/or services—utilizes the co-client incorporated in the adjuncted device client to access information from one or more adjunct provider profiles pertaining to one or more corresponding adjunct providers.
The co-client may provide a service portal enabling access to fulfillment system facilities for other user types including: adjunct providers, URGS Providers, URGS Seekers. co-client administrators and adjunct provider/admins.
The source of the device client may co-clientize a plurality of device clients—each with a corresponding co-client having appropriate facilities for incorporation. The source of the device client may incorporate a plurality of co-clients in a given device client. The source of the device client may acquire one or more ‘turn-key’ device client(s) already incorporating a co-client(s). An adjunct provider may be recruited to be an URGS Provider. An adjunct seeker may be recruited to be an URGS Seeker. All user/utilizers types may be loyaltized.
In this embodiment, the following may all be the same party: a source of a device client; a co-client administrator of the co-client incorporated in that device client; and an at least one adjunct provider recruited and to whom the co-client is subsequently assigned potentially. The source of the device client may utilize the services of the fulfillment system accessed via the co-client to better describe (normally and/or urgently required) goods and services provided by that source as an adjunct provider—or alternatively or additionally by adjunct provider(s) other than source of the device client.
Note that the various features of the present invention described above may be practiced alone or in combination. These and other features of the present invention will be described in more detail below in the detailed description of the invention and in conjunction with the following figures.
In order that the present invention may be more clearly ascertained, some embodiments will now be described, by way of example, with reference to the accompanying drawings, in which:
The present invention will now be described in detail with reference to several embodiments thereof as illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent, however, to one skilled in the art, that embodiments may be practiced without some or all of these specific details. In other instances, well known process steps and/or structures have not been described in detail in order to not unnecessarily obscure the present invention. The features and advantages of embodiments may be better understood with reference to the drawings and discussions that follow.
Aspects, features and advantages of exemplary embodiments of the present invention will become better understood with regard to the following description in connection with the accompanying drawing(s). It should be apparent to those skilled in the art that the described embodiments of the present invention provided herein are illustrative only and not limiting, having been presented by way of example only. All features disclosed in this description may be replaced by alternative features serving the same or similar purpose, unless expressly stated otherwise. Therefore, numerous other embodiments of the modifications thereof are contemplated as falling within the scope of the present invention as defined herein and equivalents thereto. Hence, use of absolute and/or sequential terms, such as, for example, “will,” “will not,” “shall,” “shall not,” “must,” “must not,” “first,” “initially,” “next,” “subsequently,” “before,” “after,” “lastly,” and “finally,” are not meant to limit the scope of the present invention as the embodiments disclosed herein are merely exemplary.
Of note is that, in the remainder of this application, particular attention is placed upon visual displays on a mobile communication device. It is important to realize that the present invention may apply equally well to operation with all manner of consumer electronic network terminal devices including, but not limited to, computers, tablet computer systems, e-reader devices, and virtually any electronic device which includes WAN access and a user interface. In addition, while examples of a visual interface are described in great detail, the present invention is entirely capable of operation with a wide range of interface types, including any combination of a visual display, tactile and audio output and a visual, tactile or acoustic user interface (UI). And although the present invention may utilize the PSTN for communication between Seeker and Provider, it may equally well utilize equivalent communication over other WANs using services such as, but not limited to, VoIP and Skype.
The present application for letters patent describes a directory, request processing and fulfillment agent system which interposes between database(s) and the user interfaces of electronic network terminal devices in such a way as to bring Seekers and Providers of URGS together virtually and/or physically in a timely fashion.
The present invention enables a Provider to adaptably conduct commercial activities such as: to advertise and offer URGS, detail the type of URGS provided, accumulate independent third-party assessments and reviews, display credentials, leverage the draw of a centralized need-targeted electronic directory, offer informative mini-tutorials and FAQs, update and display availability status, prequalify prospective Seeker customers, provide repeatable direct Seeker-Provider communication, arrange for commercial transactions, facilitate and track progress towards consummating commercial transactions, consummate commercial transactions for URGS and possibly other service(s) and/or good(s) with Seekers, follow-up post-transaction with Seekers to encourage and enhance good-will, and measure and evaluate the effectiveness of the foregoing and make adjustments and refinements.
Additionally, the present invention enables a unified adaptable facility for a Seeker to prequalify, locate, evaluate, make repeatable contact with, and acquire URGS from, one or several Providers. Furthermore, the present invention enables enhancing a consumer-facing device client by incorporating a fulfillment system co-client thusly enabling users of the device client to access fulfillment system services and enabling providers (which may include URGS Providers) to configure information that such seekers may access in order to facilitate acquiring goods and/or service including URGS from such providers.
Although at first consideration, the present invention may have some resemblance to generic search engines such as Google, it is much different in operation, function and result. Unlike a generic search engine, it uses a great deal of specificity—including Seeker- and Provider—sourced Profiles—in selecting a usably small set of well qualified results. Furthermore, it provides a much richer service that is tailored to urgent requirement fulfillment. When using a generic search engine, a user is generally anonymous and the user's motivations not apparent, and therefore the results provided are often voluminous, non-applicable, poorly differentiated, commonly misranked and generally of little or no use. The present invention on the other hand—based in part on information provided by a given Seeker specifically for this purpose—may pre-authenticate, validate, rank and otherwise screen Providers before responding with a vetted set of Providers in reply to that Seeker's specific request.
I. Urgent Requirement Fulfillment System and Methods Thereof
The services of the Fulfillment System 2700 are provided by the Fulfillment Server(s) 155, which utilize one or more Database(s) 158 containing information about users who can utilize the Fulfillment System 2700 either as a Seeker or as a Provider. This distinction of two separate types of users does not prevent a user who is a Provider from also separately using the System 2700 as a Seeker; nor does it prevent a Seeker from separately using the System 2700 as a Provider. When describing use of the Fulfillment System 2700 that is equivalent whether by a Seeker or by a Provider, the term “User” is used to mean either of these two types of users.
Seeker terminal choices, 110 through 119, represent the multiplicity of devices that can support access to the Fulfillment System 150. Often these terminals are mobile communication devices—i.e., devices that can be carried easily from place to place by the Seeker—typically with Wi-Fi or cellular data or other wireless connectivity and in numerous instances with built-in mobile telephone capability. However, less portable or fixed installation terminals may also support access to the Fulfillment System 150.
Provider terminal choices, 190 through 199, mirror the choices available to a Seeker. They differ specifically in the role of the User, i.e., Provider rather than Seeker, and the specific device chosen by each individual User. So for instance a given Seeker may use a “smart phone” mobile communication device, 110, whereas a Provider may use a desktop computer, 199.
In some embodiments, a Seeker or Provider's use of the Fulfillment System 150 is not bound to a specific terminal device, so for instance a Seeker could initially access the Fulfillment System 150 using a laptop computer, say from home, and subsequently use the Fulfillment System 150 with a tablet computer, while traveling in a car.
In some instances, a User's electronic network terminal device that is dedicated to providing data access, e.g., a desktop computer, 119/199, may be augmented for telephone communication by a separate telephony device (not shown) and/or third party telephony software (not shown) running on the terminal device. Such separate telephony devices may include, but not be limited to: a mobile cellular phone or a landline telephone, or a headset paired with third party telephony software running on the terminal device, e.g., Skype.
At the level of network connectivity, a Seeker's terminal and a Provider's terminal operate in equivalent ways, therefore for simplicity: the terms “User's” device or “User's” terminal is used when operation of a Fulfillment System 150 feature applies in the same fashion to either a Seeker's terminal or a Provider's terminal device.
Inter-communication between a User's terminal device and the Fulfillment System 150 may use a Wide Area Network (WAN), 140, such as the Internet. Communication between a User and the Fulfillment System 150, or between a Seeker and a Provider, may involve traversing more than one WAN (not shown). In some embodiments, Fulfillment System-facilitated communication between a Seeker and a Provider may also involve a WAN or WANs such as the PSTN and/or the Internet.
The Database(s) 158 used by the Fulfillment System 150 may be centralized or distributed. In some embodiments, the Fulfillment System 150 is coupled to one or more external database(s) 170 via WAN 140.
Generally, the Database 158 used by the Fulfillment System 150 is remote from the User's terminal; however in some embodiments, portions of database(s) used by the System 150 may reside on the User's electronic terminal device (not shown).
Depending on the embodiment, the Fulfillment System 150 may use one or several models of connectivity including, but not limited to: client/server and peer-to-peer. Client/server connectivity may use a WAN such as the Internet for access between the User's terminal device and the Fulfillment System's server(s) 155. Peer-to-peer connectivity, such as a Fulfillment System-facilitated telephone call or text message exchange between a Seeker and a Provider, may typically also use a WAN such as the PSTN or the Internet.
In some embodiments, communication between a Seeker and a Provider may be intermediated by the Fulfillment System 150. In such intermediation—sometimes referred to as “proxying”—the System 150 may source, receive, reroute, multicast, broadcast or otherwise initiate or respond to and/or terminate communication: from a Seeker (or on a Seeker's behalf) intended for a Provider, and/or; from a Provider (or on a Provider's behalf) intended for a Seeker. In addition, the System 150, may translate, clarify, expand, simplify, repeat, and/or generally modify or enhance the content communicated between Users in such a way as to improve or enhance comprehension or to increase the likelihood of successful completion of the communication. Such intermediation services may have varying mixes of automation and/or direct human participation depending on the embodiment.
Additionally, the Fulfillment System 150 may translate, clarify, expand, simplify and otherwise modify or enhance what is communicated. At a signal content level, the System 150 may amplify, filter, encode, decode, transcode, compress, expand, error correct and generally process the signal corresponding to the communication in ways well understood to one well versed in the art.
In some embodiments, voice communication may be intermediated by the Fulfillment System 150 in such a way that the telephone number(s) nominally routed directly to a User are actually directed to and/or are routed by the System 150. For example, the Fulfillment System 150 may provide additional services to a Provider or on a Provider's behalf including, but not limited to: PBX services including call routing/forwarding, call attendance, voice mail, call center and client notifications by outgoing call.
In some embodiments, data communication may be intermediated by the Fulfillment System 150 in such a way that logical network addresses—e.g., web site URLs and email addresses—nominally routed directly to a User are actually routed to and/or sourced from and/or redirected by the System 150. For example, the Fulfillment System 150 may provide additional services to a Provider or on a Provider's behalf including, but not limited to: Web site, email, blog, on-line forum/social network posts, electronic newsletters, and push notifications to clients.
In some embodiments, text messaging communication may be intermediated by the Fulfillment System 150 in such a way that logical texting addresses—e.g., Universal Resource Identifiers—nominally routed directly to a User are actually routed to and/or sourced by and/or redirected by and/or translated by the System 150. For example, the Fulfillment System 150 may provide additional services to a Provider or on a Provider's behalf including, but not limited to: text-email translation, text-voice translation, system-to-system gateway (e.g., between SMS and IM) and push text messaging notifications to clients.
A number of third parties, such as Better Business Bureau, Chamber of Commerce, professional/trade organizations and consumer rating sites—e.g., Angie's List and 1800Dentist—maintain large databases describing service vendors. In some embodiments, the Fulfillment System 150 may use data from such third party databases and/or from Users' terminal devices. Hence, Seekers have access to a very wide variety of Providers listed in a virtual aggregate database or virtual composite database comprised of Database 158 plus data accessed or acquired from third parties plus data stored on or acquired from Users' terminal devices. For simplicity in the following description, we refer to representative Database 158.
A large number of third parties, such as telephone companies, business journals, professional associations, and business directory companies—e.g., yp.com—maintain directories of service vendors as a business. In some embodiments, the Fulfillment System 150 may redirect certain Seekers to third party directory sites; or the System 150 may display contents from third party sites to Seekers. Motivations to do so may include, but not be limited to: Seeker requires non-urgent service, the third party pays for referrals, no suitable Providers are found in the Database 158 for the URGS the Seeker requires.
Elemental to the operation of the Fulfillment System 150 is User-descriptive data entered into the Database 158 voluntarily by Seekers and Providers themselves. In some embodiments, this data may be augmented with data from third parties, which may be copied or simply utilized on a one-time basis. Such User-descriptive data for a given User may be referred to as a “Profile” or for multiple Users or in aggregate—“Profiles”.
Profiles may be stored in Database 158 and can be organized, portioned, sorted, encrypted, firewalled, access-restricted, backed-up, transaction logged and otherwise managed, maintained and protected using techniques familiar to one skilled in the art.
In general, industry best practices are applied so as to comply with any legal mandates, regulatory requirements, or industry consensus on the protection of private, sensitive and proprietary information or otherwise privileged information. So for instance when a Profile includes or the System 150 accesses a User's medical records, appropriate HIPPA standards are complied with. Encryption may be applied to protect information in the Database 158 and also protect information communicated between Users and the System 150 and/or third parties and the System 150. In many embodiments, encryption may occur as appropriate using technologies familiar to one well versed in the art, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Virtual Private Network (VPN).
In some embodiments, Seekers' Profiles may describe things such as their creditworthiness, their employment, their recent purchases, their property, their health, their physical and work addresses, their phone number(s), their email address(es), and similar descriptive information that may assist in determining whether a given Seeker is someone a given Provider might want to do business with. The Fulfillment System 150 may automatically and transparently vet some Seekers so as to preempt a potential match with a Provider. In other instances, portions of a Seeker's Profile may be viewable to a Provider to assist that Provider in deciding whether to do business with a given Seeker.
In the case of Providers, their Profiles may describe details such as their qualifications and specializations, their education and training, their credentials and licenses, their professional memberships and associations, their career histories, their work philosophies, languages they may speak, as well as more prosaic information such as a business address, telephone number and email address.
In a typical embodiment, a User's Profile may specify requirements that User has for transacting commerce with their counterpart User—i.e., a Seeker with a given Provider; and a Provider with a given Seeker. So for instance, a Seeker may indicate what form of payment they wish to have accepted, what awards programs they wish to have credited, what language they prefer to be spoken to them, and other details of how they prefer or require a transaction to be conducted. Similarly, a Provider may indicate what form of payment they are willing to accepted, what awards programs they support, what language(s) they speak, and other details of how they prefer or require a transaction to be conducted.
Sources for information in a User's Profile may include, but are not limited to: the User directly, private records from third parties (possibly with the User's permission), and publicly accessible records. Some Profile information may be placed into the Database 158 and not be updated for indeterminate periods of time. Other Profile information may have a specific “time to live” after which it is either updated or simply deleted. The shortest such “time to live” may be per access. Other Profile information may be sourced from a User or a third party on a per use basis. This may be done for instance because the sources prohibit retaining copies of it, or because there is a need to get the most up-to-date information, e.g., checking criminal records.
Information in a User's Profile may be beneficial or derogatory. The information in a Provider's Profile is generally there for the use of Seekers. Similarly, the information in a Seeker's Profile is generally there for the use of Providers. Consequently, even if a User can enter or view an item of information in their Profile, they may not necessarily be able to alter or delete it.
Some information in a Provider's Profile may be entered by Seekers—typically in the form of ratings. Similarly, a Seeker's Profile may contain information entered by Providers. Additionally, third parties may source some information in a User's Profile. In some instances, such ratings or characterizations may be unsolicited or gathered as part of a follow-up instigated by the Fulfillment System 150.
Profiles for Seekers contain generally different information than, and are commonly kept separate from, Profiles for Providers. In the instance where a User is both a Seeker and (separately) a Provider, the contents of the User's Seeker and Provider Profiles are typically not intermingled. Of course, some User information may be duplicated in both Profiles, for example the User's name.
Some portions of a User's Profile may be used strictly internal to the Fulfillment System 150 or for the purposes of operators of the Fulfillment System and never be visible to any Users—Seeker or Provider—nor utilized on their behalf by the System 150.
Some Seeker Profile information may be visible to a Provider or to the Fulfillment System 150 on a Provider's behalf, but not visible to that Seeker. Similarly, some Provider Profile information may be visible to a Seeker or to the System 150 on a Seeker's behalf, but not visible to that Provider.
Some of the Profile information of a Seeker may be visible to other Seekers. For example, in some embodiments limited Profile information may be viewable via an on-line user forum that is part of the Fulfillment System 150.
A User who is a Provider may conceivably offer several different types of URGS as separate businesses. The Fulfillment System 150 may allow multiple Provider Profiles for such a User, where some of the information in the Profiles is duplicated in each Profile and other information is unique to a Profile specific to the corresponding URGS provided. In some embodiments, such Profiles may be accessed using separate unique accounts.
Referring to
In step 230, the Fulfillment System 150 prepares to proffer a set of potential Providers to the Seeker. Substantial amounts of information about the Seeker and about potential Providers may be retrieved from the Database 158 and utilized by the System 150 to either validate or reject potential pairings of the Seeker to proximate Providers.
As mentioned above, both the Profiles of the Seeker and potential Providers may contain requirements that are mandatory qualifiers as well as other requirements that reflect non-mandatory preferences. Accordingly, some embodiments may apply weightings to Profile preferences and instantiate rankings of potential Providers based on the degree of “acceptability” or “goodness” of a given Provider as determined algorithmically based on Seeker and Provider Profiles, third party ratings, and other external data. In some embodiments, the ranking of potential Providers may be displayed for the Seeker's use (not shown herein) prior to selecting a Provider. A given Provider's ranking may be represented by a color code, icon size, some number of stars, a ranking number, or any of a multiplicity of indicators of relative rank familiar to one skilled in the art. In some embodiments and some instances, there may be more potential Providers than is practical to proffer. In some embodiments, the Fulfillment System 150 may limit the number of potential Providers proffered to a number lower than the total available. In such instances, the ranking of a given Provider—relative to other potential Providers—may determine whether or not that Provider is proffered.
Some of the Profile information of a User may affect other aspects of Fulfillment System 150 operation and use. For example, language preference may cause the System 150 to generate displays in a language suited to the User. A “zooming” feature and/or audio dialog may support the visually impaired. A multiplicity of behaviors—System 150 operation in general and display operation specifically—may be influenced by User Profile preference settings.
As shown in step 320 of
Information from the Seeker's Profile may include preferences that affect how the Seeker's Locale is determined. In many embodiments, the Fulfillment System 150 displays information reflecting the Fulfillment System 150's calculation of the Seeker's Locale (not shown)—allowing the Seeker to determine if the Fulfillment System 150 has made a mistake in attempting to establish a Locale for the Seeker.
Having ascribed a Locale to the Seeker, in Step 330 the Fulfillment System 150 processes the Database 158 to identify proximate Provider(s) of the URGS sought by the Seeker. Proximity typically involves measuring between locations. As relates to URGS fulfillment, those locations commonly correspond to the Seeker's Locale and to the Provider's Locale. Where the Seeker's Locale or a given Provider's Locale may be ascertained to be—for the purpose of determining proximity—can depend on a number of factors. In some instances, determination of proximity may be affected by preferences in the Seeker's Profile in the Database 158 and/or in a given Provider's Profile in the Database 158. For example, a given Provider's Profile preference may require the rendezvous location and/or the Seeker's Locale to lie within a specific region or territory based on the strictures of a License or Certificate or third party permission issued to that Provider. If that preference is not met, the Provider is determined by the Fulfillment System 150 to not be proximate to the Seeker.
Proximity may also have temporal determining factors. For instance, a potential Provider may be relatively near a Seeker, but have prior commitments that must be seen to first. Or for example, bad traffic may slow the time it takes to travel to a rendezvous location. In an urgent situation, temporal proximity may be more important than physical proximity. In many embodiments, the Fulfillment System 150 may ascribe proximity to a given Provider based on a multiplicity of temporal-related factors including, but not limited to: projected travel route, third party traffic congestion and weather reports, historical traffic patterns and records, and Provider promptness ratings. In some instances, factors impacting temporal proximity may not be apparent to the System 150 such that communication between the Seeker and a Potential Provider may indicate a different—perhaps less attractive—temporal proximity.
For the purposes of Step 330, the Provider's Locale may be ascribed in a number of different ways depending on numerous factors including but not limited to: the type of URGS provided; whether the acquisition of the URGS requires the actual physical presence of the Provider and/or of the Seeker; whether the Provider operates from a fixed business location; and/or whether it is necessary for the Provider to travel to provide the URGS. So for instance, the Provider's Locale may be taken to be the Provider's place of business as defined by the Provider's Profile in the Database 158. Or the Provider's Locale may be taken to be the expected location of the Provider based on a schedule defined by the Provider's Profile in the Database 158. Or the Provider's Locale may be taken as a geo-location provided by the Provider or by a mobile communication device in the Provider's possession. Information from the Provider's Profile may include preferences that affect how the Provider's Locale is determined.
In many embodiments, the information: URGS sought, Seeker's Locale, and each Provider's availability and Locale is deemed sufficient to allow the Fulfillment System 150 to process the Database 158 to identify proximate Provider(s) of the sought after URGS—see 330.
In many embodiments, additional winnowing of the set of potential Provider's may occur based on additional preferences a Seeker has indicated in their Profile and/or additional preferences a given Provider has in theirs—reference 340.
In some embodiments, the Fulfillment System 150 may attempt to winnow down the set of potential Providers. In 350, the Fulfillment System 150 may present the resulting set of potential Providers to the Seeker. In some embodiments, the System 150 may modulate the winnowing process so as to proffer at least two potential Providers.
In some embodiments, the set of potential Providers is displayed on a map that shows their approximate Locales and their relative proximity to the Seeker—see
Referring to 240—the Seeker typically selects one of the Providers proffered by the Fulfillment System 150.
The response by the Fulfillment System 150 to the Seeker's selection of a URGS Provider may vary between embodiments, but also in some instances, within a given embodiment based on the Provider's Profile.
A Seeker's selection of an URGS Provider—see 510—may be acknowledged by the Fulfillment System 150—reference 520—so the Seeker knows the Fulfillment System 150 has recorded the correct selection.
Referring to 525, a confirmation ID may be assigned that may be used subsequently to look up a record of the Seeker-Provider match that is stored in the Transaction Log—see 530.
In some embodiments, the Fulfillment System 150 may attempt—on behalf of the Provider—to pre-qualify the Seeker's ability to pay by running a test charge for a pre-set amount—typically a minimum payment—against the Seeker's payment card, insurance payer, or other payment source—see 535. Referencing 540, the Fulfillment System 150 may query the payment source for pre-approval.
In such embodiments, if the test charge is rejected by the payer, the Provider's Profile may be checked to see if the Provider accepts Seekers with potential payment problems—see 550. If not, the Fulfillment System 150 may inform the Seeker of denial—see 590—typically causing the Seeker to select a different potential Provider.
If on the other hand, the Seeker's payment source can pay, or the Provider accepts Seekers with potential payment problems, appropriate data about the Seeker—see 560—may be made available for the Provider and notification of the selection sent to the Provider—see 570—and a corresponding confirmation to the Seeker—see 580.
In some embodiments, the Fulfillment System 150 offers the Seeker the opportunity to initiate contact with the selected Provider immediately—
In most embodiments, particularly those where the Seeker contacts the Provider to complete the transaction, the Fulfillment System 150 acts to notify the Provider promptly of the selection—
To assist both the Seeker and the Provider, the Fulfillment System 150 may provide a tracking service—see 260—and corresponding map-based display mechanism that periodically updates, substantially in real-time, the geo-location of the traveler(s)—be it the Seeker, the Provider, or both—relative to the rendezvous location where the Seeker and Provider intend to transact the acquisition of the URGS. In some embodiments, tracking maps are made available for both the Seeker—
In some instances, where the URGS are a good or goods, it may be the good(s) traveling and the tracking map reflecting the current Locale of the good(s). In some instances, the URGS may be provided by ways that are not well suited to tracking on a map, e.g., funds may be wired electronically with seeming instantaneous travel.
The Fulfillment System 150 may utilize an internal set of identifiers and transaction records in the process of matching Seekers to Providers for the purpose of acquiring URGS. In a typical embodiment, a stored set of records is retained in the Database 158 (“Transaction Log”) that records the details of each such process.
Operators of the Fulfillment System may derive revenue or other recompense—from Seekers and/or Providers and/or third parties—for use of the System 150 and/or use of information accumulated in the Database 158. Information stored in the Transaction Log may serve to determine what recompense is appropriate and from whom. It may be used for instance, to provide details that may appear in an invoice. Such details may for example include transaction information representing a “billable moment”—e.g., when a valued service—such as facilitating a Seeker to contact a Provider—instantiated and correspondingly recorded in the Transaction Log.
In addition to maintaining Transaction Logs, in some embodiments, the Fulfillment System 150 may maintain in its Database 158 algorithmic manipulations of various log data (“Metrics”) for a single User or several Users individually or a set of Users as an aggregate—where a given User may be a Provider, or a Seeker, or both a Provider and a Seeker (dual use of Fulfillment System 150). Such data may be measurements, statistics, and correlations for an individual Provider, or Providers as individuals, or Providers as an aggregate, and/or Multiple Providers.
In addition to maintaining Transaction Logs, and Metrics, in some embodiments the Fulfillment System 150 may keep stored copies (as permissible) or aggregations of any information—from or about Users or third parties—that enters the Fulfillment System 150. This information may at some time be manipulated to derive useful data that may be of value to operators of the Fulfillment System, Fulfillment System Users, or third parties.
For most Providers, a key goal of providing URGS is to be compensated. In many instances a Seeker may contemplate using the Provider again, and therefore want the Provider to be pleased with being compensated. Also—for both a Seeker and a Provider—having a record of having transacted the requisite compensation is useful in case of a dispute, or more in general, to maintain good credit histories.
The Fulfillment System 150 may facilitate the compensation of Providers—270. In some embodiments, the Fulfillment System 150 provides a basic service to the Provider—access to a reproduction of the Transaction Log record reflecting the pairing of the Provider and the Seeker.
In some embodiments, the Provider may enter additional information into the Transaction Log to record the status of the transaction with the Seeker and the status of the corresponding compensation by the Seeker. Such information may include third party confirmation of compensation of the Provider by the Seeker. In some instances, such information may be provided to the Fulfillment System 150 directly from authoritative third parties.
Some embodiments may provide broader facilitation to a Provider such as Appointments, Billing and Accounting.
In some embodiments, a Seeker has access to a record of Provider searches and pairings conducted by the Fulfillment System 150 on behalf of the Seeker. Furthermore, in some embodiments, a Seeker may have access to a record of other related transactions conducted by the Fulfillment System 150 on behalf of the Seeker.
Facilitating follow-up between Seekers and their Providers—see 280—is another utilization of the Transaction Log. For instance, the Fulfillment System 150 may communicate instructions from a selected Provider to the corresponding Seeker. In the opposite direction, the System 150 may communicate feedback from a Seeker to a Provider selected by that Seeker. Additionally, in some embodiments, the System 150 may obtain Provider ratings from Seekers and Seeker ratings from Providers and add these to User metrics in the Database 158. In some embodiments, positive or negative ratings may cause the System 150 to increase or decrease a given Provider's ranking, which may in turn impact the frequency of that Provider being proffered.
Follow-up with Seekers may be a key component of a Provider's client loyalty program. In some instances, it may generate immediate follow-on transactions. In other instances, it may generate good-will. By facilitating follow-ups, the Fulfillment System 150 may gain access to the Seeker's opinions, and help increase the Seeker's loyalty to the Provider. A side benefit may be increased loyalty of both the Seeker and the Provider to the Fulfillment System 150.
In addition to direct follow-up, the System 150, may provide, support, be affiliated with, link to, direct Users to, or otherwise facilitate follow-up via user forums/social media. Many consumers use social media such as Yelp, Facebook and Twitter to express their praise and/or criticisms regarding a vendor.
The Fulfillment System 150 facilitates Loyaltization—i.e., creating, maintaining, promoting and expanding User loyalty to the Fulfillment System 150—focused on both Providers and Seekers—see 290. Loyaltization may play an important role in the commercial acceptance and success of the Fulfillment System 150.
Loyalty may be created as a byproduct of the inherent usefulness of the Fulfillment System 150, but in some embodiments loyalty may be actively sought—using additional features and incentives—to make Providers and Seekers want to recommend the Fulfillment System 150 to others and continue using it themselves. For example, the System 150 may increase the ranking of a valued Provider and thereby increase the likelihood and frequency of that Provider being proffered. Additionally, in some embodiments, the System 150 may improve other metrics associated with a valued Seeker or Provider. Such metrics might be shared for instance with other Users and/or third parties.
In some embodiments, the Fulfillment System 150 may administer loyalty programs on the behalf of individual Providers. Additionally, the Fulfillment System 150 may operate loyalty programs on behalf of an aggregate of multiple Providers and offer incentives to Seekers based on desired behavior relative to any Provider within said aggregation. Such loyalty programs conducted on behalf of Providers also have the benefit of Loyaltization of Providers to the Fulfillment System 150. Similarly, in some embodiments, the System 150 may administer loyalty programs—on behalf of individual Seekers or Seekers in aggregate—that reward Providers and increase good-will between Providers and Seekers and perhaps the System 150 as well. Loyalty programs, whether on behalf of Seekers or Providers, may award benefits to Users—for example discounts for future URGS acquired using the System 150 or rewards such as goods and/or services from Providers and/or third parties. For instance, rewards may include airline frequent flier miles or hotel stay points. Also, in some embodiments, the System 150 may offer enrollment in third party loyalty programs.
In many urgent situations, a Seeker may have need for more than one URGS. For example, a vacationer with a broken down car may need a place to stay overnight in addition to automotive repair. If the car is seriously damaged, a rental vehicle may be needed. In typical embodiments, the Fulfillment System 150 may proactively facilitate the proffering of a set of related URGS based on Seeker-provided information and/or inference by the System 150. In some embodiments, the System 150 may facilitate the proffering of non-urgent services and goods that might be useful in the context of the Seeker's circumstances. For instance, the stranded traveler might like a book or newspaper to read or perhaps some comfort food—once the car and a place to stay have been taken care of. A Seeker's Profile may determine whether and how the System 150 proffers, suggests or recommends additional services and goods.
In addition to directly facilitating the Seeker's acquisition of a set of circumstance-related URGS and non-urgent services and goods—in some embodiments—the Fulfillment System 150, may suggest, recommend or otherwise prompt a Provider to proffer additional URGS and other non-urgent services and goods to a Seeker.
II. Exemplary Scenarios
The following discussions and references to figures are provided to illustrate a set of exemplary scenarios for some embodiments of the Fulfillment System 150. The examples may include particular limitations which are unique to the given example and are not intended to extend to the invention as a whole. Likewise, some examples may have been simplified in order to aid in clarity. It is understood that while the foregoing examples aid in explanation and clarification of the present invention, these examples do not limit the scope or function of the present invention.
In some instances, graphic representations with the appearance of screenshots from mobile communication devices are provided by way of example to aid in the illustration of some embodiments. This is not intended to imply that mobile communication devices are preferred to the exclusion of other terminal device types.
Several different fulfillment scenarios may occur when a Seeker and Provider are not situated at the same place. Such scenarios include, but are not necessarily limited to:
The Seeker travels to a rendezvous location that is the Provider's Locale,
The Provider travels to a rendezvous location that is the Seeker's Locale,
The Seeker and the Provider both travel to a fixed rendezvous location.
The Seeker and the Provider both travel towards each other without a fixed rendezvous location until they converge.
The scenario descriptions that follow detail the individual Scenarios—A, B, C and D—by stepping through the logic flow diagrams—
To illustrate the scenario of a Seeker traveling to the Provider's Locale, the Seeker is imagined to be a business traveler from Spain—Mirabella Sanchez—who has a severe toothache; the URGS is urgent dental care; and the URGS Providers are dentists. Referring back to
Referring to
In step 320, the Fulfillment System 150 determines the Seeker's Locale. In this example, the Seeker is imagined to use a “smart phone” mobile communication device, which allows the Fulfillment System 150 to use GPS to geo-locate the Seeker, who at the time is in San Ramon, Calif.
Referencing step 330, the Fulfillment System 150 examines its Database 158 and determines that the corresponding type of Provider sought is: a dentist. In this example, the Fulfillment System 150 uses the dentist office location specified in each Provider's Profile in the Database 158 as that Provider's Locale. Each Provider's Locale, so determined, is compared to the Seeker's Locale—San Ramon in this example—to determine if a given Provider is proximate. A set of proximate Providers is accumulated in this fashion by the Fulfillment System 150. In this example, the Fulfillment System 150 examines the Database 158 for dentists and identifies eight Providers proximate to San Ramon.
In Step 340, the Fulfillment System 150 further vets the potential Providers.
In Step 460, for each potential Provider, the Provider is vetted based on the Provider's willingness to accept the Seeker based in turn on a comparison of preferences—preset by the Provider in the Provider's Profile in the Database 158—against the Seeker's characteristics found in the Seeker's Profile in the Database 158. Two potential Providers have indicated preferences for payment specifically in cash or by pre-approved insurance organization. Mirabella's Seeker Profile indicates that she desires to pay either with V-Pay debit card or by check. Mirabella's Spanish dental insurance does not match the pre-approved insurance payers in these two Provider's Profiles. Therefore, these additional two potential Providers are rejected by the Fulfillment System 150. Three other Providers do accept checks and therefore pass the vetting process.
Referring to step 350, the Fulfillment System 150 has three potential Providers to display to Mirabella, so she can select one from them. One Provider has an office in Berkeley, one has an office in Vallejo, and the third has an office in Walnut Creek.
Referring to
The Fulfillment System 150 can facilitate communication between Seeker and Provider, by either providing contact information for the Provider or—as in this example—providing a facility to contact the Provider directly. In this instance, Mirabella telephones Dr. White by actuating the virtual button 1110 which causes her mobile communication device to place the phone call directly. The Fulfillment System 150 is not a party in the conversation between the Seeker Mirabella and the URGS Provider Dr. White, DDS.
Referring to
Dr. White's mobile communication device rings with the call from Mirabella—Dr. White answers. They discuss Mirabella's tooth and her dental history; go over compensation and any final details necessary to decide whether to meet; and agreeing to do so, set up an appointment for Mirabella.
In step 260, the Fulfillment System 150 initiates ongoing tracking of the progress of the Seeker traveling to meet the Provider. Referring to
In step 270, the Fulfillment System 150 facilitates compensation by logging the transaction that has just occurred whereby Seeker Mirabella Sanchez selected Provider Dr. White. Both Dr. White and Mirabella Sanchez can subsequently look up the Transaction Log record.
Referring to step 280—in this example, Dr. White's Provider Profile in the Database 158 is preset for the Fulfillment System 150 to facilitate follow-ups by alerting Dr. White at a future time to follow-up with a Seeker who has selected him—in this instance with Mirabella Sanchez.
The Fulfillment System 150 facilitates Loyaltization—step 290—as described above.
To illustrate the scenario of a Provider traveling to the Seeker's Locale, the Seeker is imagined to be a high-powered corporate executive just arrived at a major airport and running late for a critically important business meeting—Lee Nelson; the URGS is transportation to meeting location in time for his presentation; and the URGS Providers are helicopter operators. Referring back to
Referring to step 230—the Fulfillment System 150 works to proffer Providers of the type sought by the Seeker.
Referring to
In step 320, the Fulfillment System 150 determines the Seeker's Locale. In this example, the Seeker's Locale is determined by the System 150 via GPS support in his “smart phone” to be Alameda, Calif.
In Step 330, the Fulfillment System 150 examines its Database 158 and determines that the corresponding type of Provider sought is: a helicopter operator. In this example, the Fulfillment System 150 uses the Provider's heliport location specified in each Provider's Profile in the Database 158 as that Provider's Locale. Each Provider's Locale, so determined, is compared to the Seeker's Locale—Alameda—to determine if a given Provider is proximate. A set of proximate Providers is accumulated in this fashion by the Fulfillment System 150. The System 150 examines the Database 158 for helicopter operators and identifies four Providers proximate to Alameda.
Referring to step 340, the Fulfillment System 150 further vets the potential Providers.
In step 460, for each potential Provider, the Provider is vetted based on the Provider's willingness to accept the Seeker. Such willingness is determined by a comparison of preferences—preset by the Provider in the Provider's Profile in the Database 158—against the Seeker's characteristics found in the Seeker's Profile in the Database 158. Lee has sterling credit and five major credit cards. He is acceptable to all of the Providers.
Referring to
In
The Fulfillment System 150 can facilitate communication between Seeker and Provider, by either providing contact information for the Provider or—as in this example—providing a facility to contact the Provider directly. In this instance, Lee telephones Ms. Kelley by actuating the virtual button 1510 which causes his mobile communication device to place the phone call directly. The Fulfillment System 150 is not a party in the conversation between the Seeker Mr. Lee Nelson and the URGS Provider Ms. Chris Kelley—helicopter operator.
Referring to
Ms. Kelley's mobile communication device rings with the call from Lee Nelson—Ms. Kelley answers. They discuss Lee's urgent need for an immediate helicopter ride to Palo Alto; go over compensation and any final details necessary to be certain that Mr. Nelson is at the correct location at the airport in Alameda; and agreeing to the fare, set up to meet at Lee Nelson's Locale in Alameda.
In step 260, the Fulfillment System 150 starts ongoing tracking of the Provider as the Seeker awaits the Provider's arrival. Referring to
In step 270, the Fulfillment System 150 facilitates compensation by logging the transaction that has just occurred whereby Seeker Lee Nelson selected Provider Ms. Kelley—the helicopter operator. Both Ms. Kelley and Lee Nelson may subsequently look up the Transaction Log record.
Referring to step 280—in this example, Ms. Kelley's Provider Profile in the Database 158 is not preset for the Fulfillment System 150 to facilitate follow-ups. However because the Transaction Log record is available to Ms. Kelley, she can follow-up with Lee Nelson if she chooses to do so. In this case she does follow up promptly—step 280—because she would like referrals and hopefully a repeat customer. She subsequently revises her Provider Profile to facilitate follow-ups.
The Fulfillment System 150 facilitates Loyaltization—step 290—as described above.
To illustrate the scenario of a Seeker and a Provider both traveling to a rendezvous location, the Seeker is imagined to be a landlord—Rick Sawyer—who has a leaking pipe at a rental home; the URGS is urgent plumbing repair; and the URGS Providers are plumbers. Referring back to
Referring to
Referring to step 320, the Fulfillment System 150 determines the Seeker's Locale. In this example, the Seeker is not at the location where the URGS need to be provided—i.e., the rental home with the leaking pipe. Rick Sawyer, the Seeker, enters the address of the rental home—located in Cotati, California—into the Fulfillment System 150. The Fulfillment System 150 processes the address to derive a geo-location and puts both the address and the corresponding geo-location into the Database 158 to set the rendezvous location.
At Step 330, the Fulfillment System 150 examines its Database 158 and determines that the corresponding type of Provider sought is: a plumber. In this example, the System 150 uses the plumber business location specified in each Provider's Profile in the Database 158 as that Provider's Locale. Each Provider's Locale is compared to the rendezvous location—Cotati—to determine if a given Provider is proximate. A set of proximate Providers is figured accordingly by the Fulfillment System 150. Processing plumbers in the Database 158, the System 150 identifies ten Providers proximate to Cotati.
Referring to Step 340, the Fulfillment System 150 further vets the potential Providers.
In Step 430, each of the potential Providers is vetted based on a comparison of preferences set by the Seeker in the Seeker's Profile in the Database 158—against a Provider's characteristics set in the Provider's Profile. Rick Sawyer's Seeker Profile indicates that he requires a English-speaking Provider. The Fulfillment System 150 rejects one of the potential Providers because their Profile in the Database 158 does not include English as one of the languages spoken by that plumber. Rick also requires licensed and bonded contractors—all potential Providers comply. Additionally, Rick's Seeker Profile contains a preference for a work guarantee. Two of the potential Providers do not have “work guaranteed” selected in their Profiles, and as a result are rejected by the System 150.
In Step 460, for each potential Provider, the Provider is vetted based on the Provider's willingness to accept the Seeker. That willingness is determined based on a comparison of preferences—the Provider's preferences expressed in the Provider's Profile in the Database 158—against the Seeker's characteristics preset in the Seeker's Profile in the Database. Three potential Providers have indicated preferences for payment specifically in cash. Rick's Seeker Profile reflects his preference to pay by check or credit card—but not cash. Therefore, the Fulfillment System 150 rejects these three additional potential Providers. Four remaining Providers accept check or credit payment—so they pass the vetting process.
Referring to
In
The Fulfillment System 150 can facilitate communication between Seeker and Provider, by either providing contact information for the Provider or—as in this example—providing a facility to contact the Provider directly. In this instance, Rick telephones Mark by actuating the virtual button 1910 which causes his mobile communication device to place the phone call directly. The Fulfillment System 150 is not a party in the conversation between the Seeker Rick and the URGS Provider Mark Walsh.
Referring to
In step 260, the Fulfillment System 150 starts ongoing tracking of the progress of the Provider and/or the Seeker both traveling to meet at the rendezvous location. Referring to
Referring to step 270, the Fulfillment System 150 facilitates compensation by logging the transaction whereby Seeker Rick Sawyer selected Provider Mark Walsh. Both Seeker and Provider can subsequently look up the Transaction Log record. Each can separately associate additional annotation with the Transaction Log. The Seeker and Provider annotations are separate and private to Seeker and Provider, respectively. They have no indication of, or access to, each other's annotations. In this example, Rick makes notes on the verbal guarantee he received from the Provider Mark. Separately, Mark records the details of the work done including time and materials and the amount charged to the Seeker's credit card.
In step 280, the Fulfillment System 150 facilitates follow-up. Mark's Provider Profile in the Database 158 indicates that the Fulfillment System 150 may, at a set number of days subsequent to a given transaction, prompt him to follow-up with the Seeker—in this case Rick Sawyer. The corresponding annotated Transaction Log reminds him of details of his work for the Seeker that are useful in conducting the follow-up. Mark may add further annotation to the Transaction Log to record the results of a given follow-up.
The Fulfillment System 150 facilitates Loyaltization—step 290. Mark has handled a large number of Seeker's URGS requests and has gotten consistently high ratings for quality and promptness. Accordingly, the Fulfillment System 150 improves the weighting in Mark's Provider Profile so as to increase his ranking and therefore likelihood of selection in the future. In some embodiments, the System 150 notifies the Provider of such improvement in weighting/ranking.
Scenario D—Seeker and Provider Both Travel Until they Converge
To illustrate the scenario of a Seeker and a Provider both traveling towards each other—without a fixed rendezvous location—until they converge, the Seeker is imagined to be a baseball fan—Judy Piper—who has arrived at the stadium with her son Bobby on his birthday, but has tickets for the wrong day; the URGS are two tickets for today's baseball game; and the URGS Providers are same-day ticket sellers.
Referring to
Referring to step 320, the Fulfillment System 150 determines the Seeker's Locale. In this example, the Seeker is in the North parking lot of the baseball stadium as geo-located by her “smart phone.”
At Step 330, the Fulfillment System 150 examines its Database 158 and determines that the corresponding type of Provider sought is: a same-day ticket seller. In this example, the Fulfillment System 150 uses the geo-location determined from a given Provider's “smart phone” to determine that Provider's Locale.
Each Provider's Locale is compared to the Seeker's Locale to determine if a given Provider is proximate. A set of proximate Providers is figured accordingly by the Fulfillment System 150. Processing same-day ticket sellers in the Database 158, the System 150 identifies twelve Providers proximate to Judy's Locale at the baseball stadium.
Referring to Step 340, the Fulfillment System 150 further vets the potential Providers.
In Step 430, each of the potential Providers is vetted based on a comparison of preferences set by the Seeker in the Seeker's Profile in the Database 158—against a Provider's characteristics set in the Provider's Profile. Judy Piper's Seeker Profile indicates that she requires a positive proof of identification. Six of the potential Providers do not have “will prove identity” selected in their Profiles, and as a result are rejected by the Fulfillment System 150.
In Step 460, for each potential Provider, the Provider is vetted by the Fulfillment System 150 based on the Provider's willingness to accept the Seeker. That willingness is determined based on a comparison of preferences—the Provider's preferences expressed in the Provider's Profile in the Database 158—against the Seeker's characteristics preset in the Seeker's Profile in the Database 158. Four potential Providers have indicated preferences for payment specifically in either cash or by credit card. Judy's Seeker Profile reflects her need to pay by check—not credit card nor cash. Judy assumes she isn't carrying sufficient cash and is not about to give out her credit card info to a stranger in a stadium parking lot. The System 150 rejects these four additional potential Providers. Two remaining Providers accept checks—so they pass the vetting process.
Referring to
In
When Judy sees that Jack cannot be phoned, she immediately actuates the “back” virtual button 2310 that returns her to an updated Provider proffer display—
The Fulfillment System 150 can facilitate communication between Seeker and Provider, by either providing contact information for the Provider or—as in this example—providing a facility to contact the Provider directly. In this instance, Judy telephones Linda by actuating virtual button 2320 which causes her mobile communication device to place the phone call directly. The Fulfillment System 150 is not a party in the conversation between the Seeker Judy and the URGS Ticket Seller Linda Rogers.
The Provider—see
Linda's mobile communication device rings with the call from Judy Piper—Linda pulls over, parks, and then answers. Judy immediately explains her situation including limited cash. They negotiate a total sale amount—partially to be paid in cash and partially by check. Neither Judy nor Linda are familiar with stadium land marks, but they agree to walk in each other's direction as they both can see on instances of tracking maps on their respective mobile communication devices.
In step 260, the Fulfillment System 150 starts ongoing tracking of the progress of the Provider and/or the Seeker both traveling to meet at an ad hoc rendezvous location. Referring to
The Seeker and Provider continue walking roughly towards each other—each looking around and at their respective tracking map screens. Referring to
Referring to step 270, the Fulfillment System 150 facilitates compensation by logging the transaction whereby the Seeker—Judy Piper—selected the Provider—Linda Rogers. Both Seeker and Provider can subsequently look up the Transaction Log record. Each can separately associate additional annotation with the Transaction Log. In this example, Judy will make a note of Linda's driver license number.
In step 280, the Fulfillment System 150 facilitates follow-up. Linda's Provider Profile in the Database 158 indicates “no follow-up”. Judy's Seeker Profile is set for a next day follow-up, which will turn out to be a brief but heartfelt thank you call.
The Fulfillment System 150 facilitates Loyaltization—step 290—as described above.
III. Additional Enhancements—Micro-Casting Distributed URGS Fulfillment System
A micro-casting distributed URGS fulfillment (“MCDUF”) system may typically operate as an intermediary facilitator in a distributed system that matches a seeker with an acceptable appropriate third-party provider of URGS (“Seeker” and “Provider” respectively). Micro-casting provides a highly responsive urgency-mediated regime for URGS fulfillment—directing individual system interactions with a given user (i.e., Seeker or Provider) based in part on evolving assessments of user needs, temperament, condition, and circumstance. A MCDUF system utilizes systems and methods of on-going urgency monitoring, measurement, evaluation and adjustment to provide an individually tailored experience that continually and iteratively adapts in real time to a given Seeker's sense of urgent need and/or a given Provider's business and/or other needs.
In order to succeed commercially, the MCDUF system must be satisfactory to both Seekers and Providers; accordingly, micro-casting may concurrently accommodate the requirements of both Seekers and Providers. However, that said, there may be a substantial asymmetry between the requirements, expectations and time-of-use temperaments of Seekers and Providers. To a Provider, the MCDUF system may be viewed as if it were a type of targeted advertisement and/or lead generation facility—even though it may provide much more service than that. Immediate results may have a very positive effect; yet ongoing longer-term sourcing of additional business may perhaps be more likely to cause a Provider to become not only a dedicated user, but also a positive recommender. Therefore, the MCDUF system additionally may have facilities for satisfying and retaining Providers by determining, measuring and individually fulfilling their needs. For example, scheduling and maintaining a schedule of availability may be an annoying, if not onerous, task for a busy Provider; therefore the MCDUF system provides numerous facilities for simplifying and automating availability and notifications.
To better understand embodiments of a MCDUF system, it is useful to understand the positive user experiences and behaviors such a system is intended to engender and sustain. Perhaps the most direct way of doing that is to consider first the Seeker experience, then the Provider experience and then their combined experiences in exemplary MCDUF system embodiments. In some instances, the facilities and functions of a MCDUF system may be nearly indistinguishable between user types such as Seeker and Provider. In such instances a Seeker and/or Provider may simply be referred to as a “user”. Additionally, other third party “utilizers” such as data providers (e.g., vendor rating sites) and data acquirers (e.g., credit agencies) may utilize facilities of the MCDUF system.
As a distributed system, a MCDUF system may in a multiplicity of embodiments utilize a client-server architecture, or a peer-to-peer architecture, or various hybrid combinations of both. MCDUF system client logic may operate on a variety of remote devices or systems, but perhaps most commonly on a mobile device kept in the personal possession of a user. Typically, MCDUF system client logic for a mobile device may be in the form of an application program (or in common parlance an ‘app’) that either executes natively or in a Web browser hosted on that device, i.e., a “native app” or a “web app” respectively. For simplicity, the description that follows refers to the client logic operating on a Seeker client system/device as the “Seeker device client” or just “Seeker's app”; and the equivalent Provider client logic as the “Provider device client” or “Provider's app”. Although ‘apps’ are most commonly associated with mobile devices, in the description that follows, the terms “Seeker app” and “Provider app” also apply to MCDUF system client logic running on a non-mobile device or system such as a desktop PC. In some embodiments, a MCDUF system client may be embedded in the operating logic of a device or system, but for simplicity, such embodiments are also intended to be encompassed by the term “app”.
As communication technologies rapidly evolve, a plethora of new devices running a Seeker device client 2710 and/or Provider device client 2790 may operate together in the computerized and network-interconnected MCDUF system 2700. Nonetheless, the basic characteristics of such user devices may share common features including: facilities to communicate over wide area networks 140 with the URGS fulfillment system 150; facilities to obtain input from users; and facilities to present system output to users. Furthermore, a new generation of innovation may provide measurements such as perspiration, pulse, blood pressure, blood sugar level, pupil dilation, respiration rate, skin conductivity and voice pitch that may be particularly useful as additional forms of input—particularly when assessing the status of an individual Seeker or Provider. Wearable or implanted devices are already on the market or in development—for example ‘Smart Glasses’ and ‘Smart Watches’. Overall, the trend in personal electronic devices and systems is toward being smaller; processing faster; having more and better sensors; serving a wider variety of applications; storing and processing larger data; and residing more continuously and in closer proximity to the user's body. The adaptive and user-specific nature of the MCDUF system 2700 may anticipate leveraging such improvements on a user-by-user basis as they come into use.
As described above, a number of facilities may be provided by a user's client device that may be utilized to measure the user's circumstance including the user's sense of urgency. For example, the user's client device may provide a date/time indication, which may be measured in a granularity as fine as milliseconds. Such a facility may be utilized to provide measurements such as “date/time stamping” and “elapsed response time”. Date/time stamping may for example provide information that is included in a “transaction log” by the MCDUF system 2700, wherein such a transaction log may record interaction with a given user in an information repository such as data bases(s) 158. Elapsed response time may for example be utilized to measure the difference in time between when a screen is displayed to the user and when that user enters a corresponding response such as pressing a virtual button to make a selection or entering requested information. The relative length or shortness of elapsed response time may be utilized by the MCDUF system 2700 as a measure of the user's sense of urgency. Elapsed response times may be accumulated to get an ongoing measurement of the user's sense of urgency. In some instances, the elapsed response times may shorten perhaps indicating that the user may be feeling increased urgency or other distress. Or the elapsed response times may be lengthening perhaps indicating that the user may be feeling less distress. Elapsed response times may be compared against earlier measured elapsed response times for the same user and/or against elapsed response times measured for one or more other users or perhaps against other ‘benchmark’ response time data.
In some embodiments an URGS seeker may not be human—such as an animal or a device. In some embodiments an URGS seeker may be human, but not deemed fully legally competent—such as a child or a functionally-challenged adult. Additionally, in some embodiments, an URGS seeker may be ‘proxied’ by an individual or a device acting on the URGS seeker's behalf—for example, a neighbor may arrange an urgent plumbing appointment for an elderly neighbor (the URGS seeker) who may lack the skills and/or ability to operate a Seeker client device. Such an URGS-seeker-proxying or imitating entity may be termed a “proxy-seeker”. In some embodiments, a proxy-seeker may be undetected by the MCDUF system 2700. For example, a husband (the proxy-seeker) may make an urgent appointment for his wife (the URGS seeker) interacting with the MCDUF system as if he were his wife.
In some embodiments, a proxy-seeker may utilize the MCDUF system 2700 explicitly as a proxy-seeker. For example, a computerized controller in a network-connected appliance such as an ‘intelligent’ refrigerator may detect a fault that requires urgent service; or perhaps a human house sitter discovers that the refrigerator is no longer cold. Such a proxy-seeker may utilize the MCDUF system 2700 just as a Seeker would, but perhaps identify themselves (or itself) as a proxy-seeker seeking URGS on the URGS seeker's behalf (i.e., the refrigerator owner's behalf). In some instances, this may be done transparently to the MCDUF system 2700, wherein such proxy-seeker identifying information may be communicated directly to the Provider(s). Or in some embodiments, the MCDUF system 2700 may provide facilities (not shown) for an explicit “associate account” whereby a proxy-seeker may utilize the MCDUF system 2700 explicitly as a proxy-seeker so as to request URGS via proxy-seeker specific or adapted MCDUF system facilities. In some embodiments, non-human proxy-seekers may utilize alternative MCDUF system ‘machine’ facilities rather than the MCDUF system facilities for human URGS seekers. For example, the MCDUF system 2700 may support an “automated proxy-seeker facility” dedicated to exchanging digitally encoded messages with a refrigerator, home monitoring system or other ‘intelligent’ home appliance or system. In some embodiments, a MCDUF system 2700 may support a multiplicity of device-specific automated proxy-seeker facilities (not shown).
In some embodiments, an associate account may be affiliated with a registered Seeker's account and/or may be managed by a registered Seeker. Such an affiliated Seeker may be termed a “Master Seeker”. Furthermore, in some embodiments, the associate account may be configured so that the Master Seeker may be notified by the MCDUF system 2700 should an URGS request be made utilizing the associate account. Additionally, in some embodiments, the micro-casting facilities of the MCDUF system 2700 associated with Providers may be adapted in order to so notify a Master Seeker. For example, the Master Seeker may ‘appear’ to the MCDUF system 2700 to be a “virtual provider” with a priority micro-casting ranking such that the first URGS need request may be sent by the MCDUF system 2700 to the Master Seeker. Accordingly, as a virtual provider, a Master Seeker may utilize the same MCDUF system facilities intended to mediate and route URGS needs requests for Providers. Therefore, in some embodiments a Master Seeker may use MCDUF system 2700 Provider account management facilities such as those to maintain availability schedules and specify notification message routing.
The facilities provided by the MCDUF system 2700 may unintentionally or unknowingly allow a malicious individual to pose as a Seeker or as a proxy-seeker. Accordingly, in some embodiments, the MCDUF system 2700 may utilize authentication, encryption, secure dedicated link communication, device-to-account binding and other security mechanisms to deter or foil such malicious ‘spoofing’ attempts. In some embodiments, a proxy-seeker may be subject to account access controls similar to those for a Seeker—such as a unique proxy-seeker identifier and possibly a shared secret such as a password. In some embodiments, a proxy-seeker communications may be routed through and/or certificated by a third party. As opposed to potentially fraudulent URGS requests, even legitimate proxy-seeker URGS requests may create problems, disputes or liabilities for the Master Seeker; therefore, in some embodiments an associate account may be configured so as to limit the category(s) of URGS that the proxy-seeker may request. Furthermore, for each such Master Seeker-allowed URGS category, the Master Seeker may simply pre-approve it or alternatively may require notification and explicit Master Seeker approval per associate account-initiated URGS need request incident. In some embodiments, the MCDUF system 2700 may be configured to notify the Master Seeker, but not to issue associate account-initiated URGS need requests.
A proxy-seeker may utilize the MCDUF system 2700 facilitated by a Seeker app. Alternatively, in some embodiments, a proxy-seeker may utilize proxy-seeker specific client logic, i.e., a “proxy-seeker app” (not shown). Dedicated proxy-seeker apps may be devised for specific proxy-seeker devices, for example a proxy-seeker app may be devised for an ‘intelligent’ bread-maker so as to utilize the proxy-seeker facilities of the MCDUF system 2700.
At step 2810, a Provider may be distinguished from other service classes of users/utilizers.
At step 2820, a Provider may be served in order to facilitate the Provider's utilization of the MCDUF system 2700.
At step 2830, a Seeker may be distinguished from other service classes of users/utilizers.
At step 2840, a Seeker may be served in order to fulfill that Seeker's URGS need(s).
At step 2850, the MCDUF system 2700 may fulfill the needs of additional utilizers. In some embodiments, the MCDUF system 2700 may provide services to other utilizers in addition to Seekers and Providers. For example, aggregated information about Seekers and/or Providers may be anonymized, aggregated and processed to provide useful statistical data to third parties such as trade organizations, consumer interest groups, government bodies, rating organizations, and many other parties that have interest in commercial transactions involving URGS.
Step 2860 is described further below.
At step 2920, the MCDUF system 2700 may facilitate the Provider to manage the Provider's MCDUF system account. In some embodiments, the MCDUF system 2700 may gather information about a given potential provider in order to attempt to fulfill their needs to acquire customers. (Some embodiments of “Provider account management” may be described in detail further below in this document in the context of exemplary Provider app screen shots.)
At step 2930, the MCDUF system may differentiate between types of autonomous initiation of MCDUF system operation leading to Provider interaction. In some embodiments, such autonomously initiated MCDUF system interaction with a Provider may be facilitated utilizing an indication on the Provider's client device that some ‘event’ may have occurred that requires the Provider to utilize the Provider's app. The provider may then choose to cause the app to execute on the Provider's client device. This process of ‘alerting’ a user is a standard feature supported by most network attached computing devices. On a personal computer for example, a notification virtual window may open, or an application icon on the ‘screen icon tray’ may start ‘hopping’. On many mobile devices, the effected app's icon may be highlighted in some way that draw's the user's attention. For mobile devices, the industry term for such autonomously initiated user interaction is ‘push notification’. In order to alert a Provider that a Seeker has an URGS need that the Provider may have an opportunity to fulfill, in some embodiments, the MCDUF system 2700 may utilize such notification mechanisms as described above. For the purposes of this description, such notification may be termed a “Seeker request notification”; and may be applied agnostic to the type of Provider client device.
In some embodiments, other types of autonomously initiated Provider notifications may be utilized. Referring to
Additionally, in some embodiments, notifications may also be utilized in interactions with Seekers (not shown)—for example to facilitate a ‘follow-up appointment reminder’ or perhaps to provide a ‘Seeker review posting alert’.
The ‘Seeker-to-Provider match’ service(s) provided by the MCDUF system 2700 as part of URGS fulfillment may entail concurrent interactions with a given Seeker and corresponding Provider(s)—in a ‘back and forth’ fashion—as the MCDUF system 2700 intermediates between them. Therefore, as a conceptual aid, some MCDUF system embodiments as exemplified by
To help illustrate the ‘back and forth’ intermediation of the MCDUF system 2700 in some embodiments, the following descriptions of respective flows through
Referring to
Clearly, key components that may become increasingly important if not critical in measuring Seeker urgency as well as ascertaining Seeker URGS need(s) may be the set of sensors embedded in the Seeker's device and/or other sensors temporarily or persistently near the Seeker that may be MCDUF system accessible. For example, an office seating system with bio-feedback capability may intercommunicate with the Seeker device and provide bio-metric information measured by the chair's sensors. Such sensor-based measurement of the Seeker, whether by the Seeker device or by other sensors in the Seeker's environment, may be termed “Seeker instrumentation”. A more generic term—“instrumentation”—may apply to sensor-based measuring of MCDUF users, whether Seeker or Provider.
At step 3020, the MCDUF system 2700 may incrementally “enroll” the Seeker. Enrollment may include both acquiring user descriptive information (“registration”) and user selection of service-related preferences (“personalization”). A Seeker may be queried to obtain information that uniquely identifies that user such as full name, phone number, e-mail address. Such a Seeker may be further queried to create a unique Seeker account user name and password. Such a registration process may be relatively straight forward and quick, yet a highly distressed Seeker may still find it burdensome. Consequently, in some embodiments, a Seeker may be given the option to bypass or postpone registration. In some embodiments, the MCDUF system 2700 may associate a unique identifier with the Seeker; for example, such a “Seeker ID” may be a multi-byte identifier assigned by the fulfillment server 155 (or perhaps the Seeker's app 2710) and stored for subsequent inclusion in transactions back and forth between the Seeker's app 2710 and the fulfillment server 155 of the MCDUF system 2700. In this way, a given Seeker may be distinguished from all other Seekers and yet potentially remain nominally anonymous.
Although it is useful and otherwise desirable to build a data base characterizing MCDUF system users, seemingly extraneous data gathering may annoy or even infuriate a distressed Seeker. Therefore in some embodiments, the MCDUF system 2700 may utilize various “en passant” approaches to collecting enrollment information from the Seeker. Such en-passant information gathering may include querying for specific item(s) of Seeker information when it seems directly applicable to helping immediately further meet the Seeker's URGS or other needs. Such incremental enrollment data gathering may be interspersed throughout the Seeker interaction with the MCDUF system 2700.
At step 3030, the MCDUF system 2700 may assess the Seeker's URGS need(s). Direct Seeker input may provide a primary source of URGS need information. The Seeker may be queried for a description of the needed URGS in a multiplicity of ways including, but not limited to a menu of selections, a Seeker typed description, a Seeker spoken description, as well as URGS need(s) deduced from Seeker instrumentation. Additionally, the MCDUF system 2700 may deduce a secondary set of URGS need(s) based on the Seeker's self-described URGS need(s). For example, the Seeker may indicate the urgent need for a dentist to treat a broken tooth. The MCDUF system 2700 may consequently deduce the secondary URGS need for pain medication. In some embodiments, the MCDUF system 2700 may make suggestions or recommendations to the Seeker and/or Provider based on the MCDUF system's assessment of the Seeker's URGS need(s).
In some embodiments, other facilities for identifying the Seeker's URGS need(s) may be utilized—for example, key word URGS search (not shown).
At step 3040, the MCDUF system 2700 successively proffers Providers. In some embodiments, the Seeker may be offered the choice to select and contact a specific individual Provider or to send out a ‘request for help’ to more than one Provider. A Seeker may be further facilitated in the Provider location process by a “search results map”—a map that may display the location of both the Seeker and pre-qualified Providers the Seeker may choose to contact.
At step 3050, the MCDUF system 2700 may obtain the Seeker's choice of Provider(s). In some embodiments, the MCDUF system 2700 may facilitate the Seeker to simultaneously request URGS from more than one Provider. In some embodiments, a MCDUF system-intermediated ‘back-and-forth’ between Seeker and Provider(s)—to work out details of fulfilling the Seeker's need—may follow step 3050.
Referring to
At step 2940 in some embodiments, the MCDUF system 2700—utilizing the facilities of the Provider app 2790—may ‘alert’ the Provider so as to display the Seeker's URGS(s) request.
At step 2950 in some embodiments, the MCDUF system 2700—utilizing the facilities of the Provider app 2790—may acquire the Provider's response to the Seeker's URGS(s) request.
Referring once again to
At step 3070 in some embodiments, the MCDUF system 2700—utilizing the facilities of the Seeker app 2710—may obtain the Seeker's response to a given Provider's offer of URGS.
Referring both to
In some embodiments, post-acceptance communication between the Provider and the Seeker may be facilitated by the MCDUF system 2700 acting as a ‘man-in-the-middle’ proxy. Such proxying may not only facilitate communication between the Seeker and the Provider, but may enable the MCDUF system 2700 to record details relating to such communication so as to substantiate the likelihood of a corresponding “billable moment” wherein a commercial transaction between the Seeker and Provider may be considered to have been consummated.
Referring to
Referring again to
Referring again to
The logic flow diagrams in
Referring once again to
Referring once again to
Returning to
In some embodiments, as exemplified by the description above, the MCDUF system 2700 may utilize a user interface navigation topology that is at least partially meshed—as opposed to tree-like—thus for example allowing a distressed Seeker more than one way to navigate to the same result; and thereby decreasing the likelihood that the Seeker unintentionally navigates into a ‘blind alley’ where the desired result cannot be attained. Nonetheless, a distressed Seeker may navigate into a blind alley, perhaps by ‘fat fingering’ the wrong virtual button. A ‘back’ virtual button—for example virtual button 3410 in
Referring once again to
In some embodiments, virtual buttons on screen 3600 (as well as other screens) may be instrumented to facilitate assessing the Seeker's perceived experiential urgency and potential distress.
Regardless of whether the Seeker chooses to select a specific Provider via or to reach out to multiple Providers, some specific information about the Seeker may be useful to any Provider receiving an URGS needs request. Such Seeker specific information may include, but not be limited to: the Seeker's location, the Seeker's contact information, the Seeker's URGS need(s), and the Seeker's desired timeframe for acquiring URGS.
The Seeker's self-descriptive note entered in input box 3750B may contain a multiplicity of words and phrases that may be utilized by the MCDUF system 2700 to further assess the Seeker's condition. For example, in the above example, Sam Smith entered the following terms to describe his URGS needs: ‘injured’ and ‘2 broken teeth’. In some embodiments, a natural language processing facility (not shown) may be utilized by the MCDUF system 2700 to identify and process such Seeker condition indicative words and phrases. Such information may be aggregated into the ongoing cumulative assessment of the Seeker's sense of urgency and level of stress.
In some embodiments, the appearance of a Provider icon may be visibly altered in order to convey the status of that responder—including, but not limited to, that responder receiving the Seeker's request and undertaking to respond to the Seeker's request or choosing to decline it.
In some embodiments, micro-casting may be utilized by the MCDUF system 2700 to identify and possibly rank two or more possible URGS-need(s) suitable Providers to attempt to contact on the Seeker's behalf; and further to control the order and timing of such contact attempts. In some embodiments, such contact attempts may be “triaged”, i.e., executed in successive tiers, so as to allow time for a preceding tier or tiers of Providers to receive the Seeker's URGS request and to undertake to respond to it. Such a triaging of possible Providers may be utilized to avoid disturbing Providers other than a tier of Providers adequate in number to likely generate an acceptance offer to the Seeker's URGS request; and utilizing such a tiered approach, successive tiers of Providers may be contacted if preceding tiers of contact attempts fail to result in URGS fulfillment offer(s) to the Seeker. Various “bracketing” processes may be utilized so as to provide a hysteresis that controls pausing and resuming the proffering of successive tiers of triaged Providers. In some embodiments, such a bracketing may pause proffering when a sufficient number of triaged Providers have been proffered and may resume proffering when the number of proffered triaged Providers drops below a minimum threshold due to causes such as: one or more Providers declining a Seeker's request; the Seeker declining one or Provider offers; or one or more Provider's not responding to a Seeker's URGS request within the window of a ‘time-out’ period.
In some embodiments of micro-casting, a number of factors may be utilized by the MCDUF system 2700 to determine and control how the contacting of Providers may be triaged. For example, the MCDUF system 2700 may utilize a preferential system of Provider triage whereby a Provider may be determined to be “suitable” based on factors including, but not limited to proximity, availability and Provider qualification. In some embodiments, such a preferential system may utilize a “current seeker-adaptive micro-casting triaged provider pool” (or more simply “triaged provider pool”), generated in real-time, which essentially may be a collection of Providers deemed suitable to possibly proffer to the Seeker. In some embodiments, during micro-casting, additional newly-available suitable Providers may be triaged into a given triaged provider pool. Similarly, newly-unavailable suitable Providers may be removed from a given triaged provider pool.
In some embodiments, Providers evaluated for a given Seeker's triaged provider pool may be qualified and perhaps ranked utilizing a multi-dimensional gradient wherein the dimensions of the gradient may include but not be limited to “virtual proximity”, “weighted availability”, and “synthesized suitability”. The derived locus of a given Provider on such a gradient may be utilized to determine the relative ranking of that Provider against other Providers for the purpose of ordering the offering of the Providers to the Seeker. A given Provider may be significant enough of an outlier on such a gradient that the Provider may be excluded from the triaged provider pool.
In some embodiments, virtual proximity may be derived from a combination of factors including but not limited to: the Seeker's means of conveyance; mapped travel distance; traffic speed conditions; the Provider's commercial territory (e.g., tow truck service limited to a region); and the projected time of travel. Weighted availability may be derived from a combination of factors including but not limited to: the scheduled explicit availability or unavailability of the provider; the ‘freshness’ of the Provider's schedule (i.e., how recently was the schedule updated); the degree of certainty of the Provider's availability or unavailability (for example a ‘time of day preference’ unavailability vs. a ‘blocked out multi-day’ unavailability); the number of Seeker requests recently received by the Provider; and the number of the Provider's offers accepted and/or rejected by Seekers. Synthesized suitability may be derived from a combination of factors including but not limited to: the Provider's self-categorization of URGS provided; ongoing qualifying evaluation specific to an URGS category; Provider quality based on responsiveness, likelihood to accept Seeker requests, Seeker satisfaction, and third party ratings (e.g., Yelp, Angie's List, Better Business Bureau, etc.); background and performance checks; years of experience; and length of use of the MCDUF system 2700.
Referring once again to
The preceding sequence of figures provided examples of screens a Seeker might utilize in some embodiments of the MCDUF system 2700. A given Provider may also utilize a sequence of one or more screens in order to share the Provider's information with the MCDUF system and also to interact with Seekers facilitated and/or intermediated by the MCDUF system 2700.
In some embodiments, credence given by the MCDUF system 2700 to a given recommendation may be weighted more or less favorably based on the status of the recommending user. The status of a given recommending user considered in the evaluation of such a recommendation may include but not be limited to: the user's registration status (i.e., not registered, registered but with partial information, fully registered), history of MCDUF system use, reputation with MCDUF system URGS Providers, reputation with third party social network users (e.g., FaceBook, Twitter, etc.), and the qualities of any MCDUF system URGS Providers that may have been recommended previously by that user. A potential Provider may be recommended by more than one MCDUF system user. The number of user recommendations for a given potential new Provider may serve as an additional weighting factor in the process of considering such a potential new Provider. A MCDUF system user who may have used the MCDUF system 2700 as a Seeker or as a Provider in a different URGS category may in some embodiments recommend themselves as a potential new Provider.
Referring once again to
In some embodiments, acceptance of a potential provider as a Provider in a provider URGS category may be perfunctory with little or perhaps no pre-qualification other than providing information sufficiently describing the potential provider so as to facilitate proffering by the MCDUF system 2700. In other embodiments, qualification may be more complex and perhaps more selective. In some embodiments of the MCDUF system 2700, URGS needs Providers may be proffered by the MCDUF system only after pre-qualification vetting. Such an individual pre-qualification “Provider pre-vetting” may include a mixture of automated and human-mediated procedures. Also in some embodiments, Provider pre-vetting may include ongoing evaluation during a probationary acceptance period. Furthermore, qualification evaluation of a Provider may continue subsequent to full acceptance of the Provider into the MCDUF system provider resource pool. Consequently, in some embodiments, a Provider may be disqualified during pre-vetting, during any probationary period, or subsequent to full acceptance; and therefore may be removed from the MCDUF system provider resource pool and therefore may subsequently no longer be a Provider. The factors that may be used to thusly “disqualify” a Provider may include factors including but not limited to those used in pre-qualifying a Provider. In some embodiments, disqualification of a Provider may occur by stages, whereby an intermediate stage may include but not be limited to a renewed probationary trial period that may precede either re-acceptance or full disqualification.
In some embodiments, a potential new Provider may be required to have a prior history as a Seeker in order to be qualified as a Provider. In other embodiments, such a prior history may be a factor in, rather than a pre-condition for, qualification of a Provider.
A potential provider may actively seek out such an automated MCDUF system provider registration form or may receive a solicitation that directs the potential provider to such a form. Such solicitation may be automated or human mediated or both. In some embodiments, a pre-qualification process may control whether a potential provider is solicited; such a deliberately pre-qualified solicitation may be termed an “invitation”.
In some embodiments, any information provided by a user—either a Seeker or a Provider—may be recorded and perhaps subsequently utilized by the MCDUF system 2700 regardless of whether the user completes or cancels the information acquisition process. So for example, the MCDUF system 2700 may record that a potential provider started the application process and then chose to cancel it. Furthermore, as may be the case with all app screen inputs from a user who is a Seeker, any app screen inputs screens utilized by a potential provider or qualified Provider may be instrumented so as to assess their temperament, degree of patience and/or other detectable or deducible personality traits.
The information gathered for a given provider profile may vary depending on the URGS involved. For instance, a dentist may accept Delta Dental Insurance for payment whereas a plumber may not.
In some embodiments, the MCDUF system 2700 may proxy communications between a given Seeker and a correspondingly selected Provider so as to mediate, control, translate and possibly monitor the communication. For example. communications that are proxied by the MCDUF system 2700 may be subject to recording for quality control and/or other purposes. With the very real possibility, if not certainty, of being drawn into a dispute between a Seeker and a Provider, the MCDUF system 2700 may find recorded communications very useful to help mediate such situations.
Furthermore, with a proliferation of communication devices, media, technologies and providers, mismatches may occur wherein direct communication between a Seeker and a Provider may not be possible without translation. Acting as a ‘man in the middle’ communications proxy (not shown), for example, a MCDUF system 2700 may provide communication translation services such as translating between text and voice media. Furthermore, a MCDUF system 2700 may provide an enhanced service or combination of enhanced services not available to (or otherwise not subscribed to) by a given Provider and/or Seeker. So further by example, a MCDUF system 2700 may provide a Seeker with an automated message delivery and call back service (not shown) whereby a Seeker's message might be recorded, sent to one or several Providers possibly on a time delayed basis, and the Provider's responses routed back to the Seeker via one or several Seeker-specified communication facilities, e.g., voice, instant messaging and texting. Such enhanced communication services may additionally be offered to Seekers for utilization other than satisfying URGS needs.
In an another example, the MCDUF system 2700 may provide an automated electronic communication exchange capability (not shown) for a given Provider, whereby Seekers' requests may be recorded, forwarded, multi-cast, translated, rolled-over and other-wise processed in order to deliver communications to the Provider in real time or on a delayed basis. Such an automated communication exchange capability may also provide services mediated by a schedule such that, for example, communications may be routed differently depending on the time of day or day of the week—say to an office phone and an e-mail address during office hours; and to a personal cell phone and a text number after hours. Additionally, such an exchange may provide access to human-mediated communications services such as a live phone or on-line chat attendant. Such enhanced communication services may additionally be offered to Providers for utilization other than satisfying URGS needs.
Similarly, the routing of communication or the control of other services to a Provider or to a Seeker by the MCDUF system 2700 may be based on “presence”, i.e., the apparent (or deduced) location of that user. Presence may be determined in numerous ways including but not limited to: explicit or predictive scheduling; instrumentation such as smart phone or automotive GPS; cell tower utilization; home, private or public monitoring systems; as well as explicit setting by the user.
In addition to supporting and possibly augmenting a Provider's communication with Seeker's, the MCDUF system 2700 may provide services related to ‘new media’ such as social networks (not shown). So for example, the MCDUF system 2700 may aggregate consumer reviews of a given Provider that may appear on third party sites such as Yelp. Conversely, the MCDUF system may provide selected or aggregated data to third party services such as Yelp or Angie's List. So for example, the MCDUF system 2700 may provide an on-line provider reputation monitoring and enhancement service.
Referring again to
Referring again to
Furthermore, subscreen 5250 may include a textual description that may explain to the potential provider that the profile configuration process may have been successfully concluded. Near the bottom of subscreen 5250, virtual buttons 5270 and 5280 may provide the Provider with the respective options to either ‘continue’ the process to potentially become a Provider or to ‘cancel’ the process.
It may be noted, that by navigating through screens such as 4100, 4200A, 4200B, 4300, 4400A, 4400B, 4500, 4600, 4700, 4800A, 4800B, 4900, 5000, 5100, 5200 and 5300A, a new Provider may have both configured the Provider's account so that the MCDUF system 2700 may proffer that Provider to Seekers of URGS, but additionally may have in effect given the new Provider a guided tutorial for many of the screens that the Provider may utilize subsequently to maintain the Provider's account.
As mentioned above, the Provider may check the ‘24/7’ check box 5335B, thusly overriding the duration setting in input box 5330B as well as any regularly scheduled availability or unavailability; and thereby potentially making the Provider immediately and continuously available (or unavailable) until check box 5335B is unchecked or until such 24/7 availability (or unavailability) is otherwise overridden. The Provider may uncheck (or leave unchecked) check box 5335B such that the duration time setting in input box 5330B may control the duration of availability or unavailability selected utilizing one of radio buttons 5320B and 5325B.
Utilizing input box 5340B, the Provider may specify a contact number where to route Seeker calls for the duration specified by the combined operation of 5330B and 5335B. Similarly, utilizing input box 5345B, the Provider may specify a contact number where to route Seeker text messages for the same duration. In some embodiments, the Provider may utilize facilities (not shown) to specify a multiplicity of alternative contact numbers to route calls as well as a multiplicity of alternative contact texting numbers and/or email addresses to route messages.
The ‘remember’ checkbox 5350B may be checked so as to retain the settings in input box 5340B and 5345B subsequent to expiration or over-ride of the duration specified by 5330B or 5335B, otherwise 5330B and 5335B may revert to values configured via screen 4600 (or otherwise determined by default values in lieu of such configuration utilizing screen 4600). The Provider may select the ‘save’ virtual button 5355B so as to cause the settings 5320B, 5325B, 5330B, 5335B, 5340B, 5345B and 5350B to go into effect immediately. Otherwise, such settings may not go into effect and may be lost at such time as the next scheduled availability occurs, except that 5340B and 5345B may be preserved by the possible selection of the 5355B ‘remember’ checkbox.
A menu 5360B consisting of virtual buttons may appear below subscreen 5310B. Such virtual buttons may include: a ‘view callers map’ virtual button 5360B, a ‘recent callers’ virtual button 5365B and a ‘my settings’ virtual button 5370B. In some embodiments, a ‘my current availability’ virtual button (not shown) may be included in menu 5360B in lieu of subscreen 5310B such that selecting such a ‘my current availability’ virtual button may facilitate navigation to a separate screen with display content and operational utility similar and perhaps equivalent to subscreen 5310B. In some embodiments, other additional virtual button menu selections may be included. For example, such an additional virtual button may be ‘my other businesses’ (not shown) whereby a Provider may be facilitated to offer URGS in more than one URGS category from the same provider account. So for example, Keith White may thusly be proffered by the MCDUF system 2700 say as a watch repair specialist in addition to as a general dentist.
Selecting virtual button 5365B may navigate the Provider to a callers map screen 5400 similar to the callers map previously viewed by the potential provider at screen 5100, but without the explanatory subscreen overlay 5130.
Referring back to
Referring again to
Referring again to
Having configured and enabled operation of the provider account, for example as described above, the Provider may utilize the MCDUF system 2700 via one (or a combination of) Provider apps 2790 so as to receive notifications of Seeker requests. Such Seeker request notifications may seem most valuable to the Provider in instances that the Provider may be both: available to respond to such requests; and also subsequently available to provide the requested URGS in a timeframe and location that may be satisfactory to the corresponding Seeker. The reception of Seekers' URGS requests may be a mixed blessing. Get too many requests and the Provider may become frustrated by distractions that may detract rather than add to business. Or perhaps worse, get too few requests—particularly early on in the utilization of the MCDUF system 2700—and the Provider may lose interest in utilizing the system. Micro-casting may address such dilemmas by dynamically modulating the volume of URGS requests sent by the MCDUF system 2700 to any given Provider.
A number of factors may be considered individually and in concert as the MCDUF system 2700 utilizes micro-casting to modulate the transmission of Seeker requests to URGS Providers. At a high level such factors may include (but not be limited to): Seeker interests, Provider interests, the interests of the MCDUF system 2700 (i.e., system owners and operators), and possibly the interests of third parties in various combinations that may include (but not be limited to): licensing and regulatory organizations, investors, public interest groups, law enforcement, industry special interest groups, and possibly, advertisers. Furthermore, the relative importance of—and therefore the weighting assigned to—any given such factor may vary depending on additional mediating factors such as: the geographic region of the URGS search, the URGS category(s), the density of available URGS suitable Providers, the density of nominally URGS need-equivalent Seekers, external events such as bad weather, traffic jams, catastrophes, as well as predictive statistical patterns related to additional factors such as time of day, season of the year, phase of the moon, weather, holidays and other factors effecting human behavior.
Therefore, it may be understood that micro-casting may utilize densely complex algorithms. And short of listing out algorithmic source code, such algorithms may best be characterized by reduction to a set of decision guidelines wherein such guidelines may be applied in combination with respective relative weightings. Furthermore, in combining the guidelines of micro-casting, it may occur that any given micro-casting guideline may be moderated, i.e., ‘bent’ or even over-ridden by another micro-casting guideline depending on the relative weighting given to each of a set of applicable guidelines and the determining factors controlling the application of those micro-casting guidelines by the MCDUF system 2700 so as to modulate transmissions of a given Seeker's URGS request to URGS Providers.
To illustrate the utilization of micro-casting by the MCDUF system 2700, an example is provided below. As mentioned previously, micro-casting may operate so as to utilize guidelines to attempt to balance the interests of the Seeker, of Providers, of the MCDUF system 2700, and of third parties. Some such guidelines and associated determining factors are represented by the tables and associated descriptions that follow.
A multiplicity of factors and corresponding guidelines may be utilized for a given Seeker and a corresponding set of suitable Providers. The tables below summarize an example of nine potential factors and corresponding guidelines. The first three guidelines may apply to a given Seeker with a need for URGS. The exemplary guidelines related to such a Seeker may be utilized to help rank that Seeker's request for URGS against any potential competing Seeker's request. Therefore, if more than one Seeker is seeking to obtain URGS from a given Provider, the request of a higher prioritized Seeker may be sent to that Provider before the request of a lower prioritized Seeker may be sent to that Provider.
So for example, guideline 1 may be based on the urgency inherent in the type of URGS sought. Such urgency may be determined perhaps by an analysis of the Seeker's description of their needs. Screen 3700B in
Guideline 2 may be based on the Seeker's sense of urgency. As described previously, such a sense of urgency may be assessed from instrumentation of the Seeker app.
Guideline 3 may be based on the Seeker's registration status. A fully registered Seeker may perhaps be more likely to commit and therefore be more reliable to obtain the URGS from a proffered Provider.
The example guidelines 4 through 9 above may apply to a given Provider who may be suitable to provide the URGS sought by a given Seeker. The exemplary guidelines may be utilized to rank such a Provider so as to help determine whether to present a given Seeker's request to that Provider or to another suitable Provider before that Provider. So if more than one Provider is suitable to provide the URGS sought by a given Seeker, a Provider ranked higher may be sent such a request before it may be sent to a lower ranked provider.
So further by example, guideline 4 may be based on a Provider's explicitly scheduled availability or unavailability to receive Seeker requests. Screens 4700, 4800A, 4800B, 4900, 5000 as well as screen 5300B illustrate examples of how general dentist Dr. Keith White may schedule availability to receive Seeker requests. Screens 5000 and 5300B illustrate examples of how Dr. White may schedule a period of time as explicitly unavailable (as opposed to explicitly available) utilizing check box 5025 in screen 5000 and/or utilizing check box 5330B in screen 5300B.
Guideline 5 may be closely related to guideline 4. In some instances, periods of a given Provider's time may be left unscheduled—i.e., neither explicitly available nor explicitly unavailable. The MCDUF system 2700 may treat such unscheduled periods to be more likely to be periods of availability than time periods for that Provider that have been explicitly scheduled as unavailable. Guidelines 4 and 5 in combination may result in a continuity of prediction of Provider availability, wherein explicitly scheduled availability may be ascribed the highest certainty, the lack of any scheduling either way may be ascribed a lower degree of certainty, and scheduled unavailability may be ascribed the lowest certainty of availability.
Furthermore, in some embodiments, an explicit scheduling of unavailability may be over-ridden by the MCDUF system 2700 such that a Seeker's request may be sent to a given Provider who is nominally unavailable for Seeker requests. A number of factors may be considered in determining whether to over-ride a Provider's setting of scheduled unavailability—such factors may be termed “supplemental availability characteristics”. For example, if many days or maybe weeks have passed since the Provider scheduled such unavailability, such scheduling may be stale and therefore inaccurate. On the other hand, if the Provider has very recently scheduled the unavailability, it is more likely to correctly reflect the Provider's current intention. As another example, if the Provider is relatively new to the MCDUF system 2700 and perhaps has not yet received many Seeker requests, it may be reassuring to that Provider to receive some requests even if they come at times that the Provider would prefer not to respond. If the Provider wishes to enforce a scheduled unavailability, such scheduling may be updated to make the intention more explicitly current. Scheduling screens such as 5000 and 5300B may be instrumented so that the MCDUF system 2700 may take notice of a Provider's deliberate re-iteration of unavailability and therefore be less likely to over-ride it again soon. On the other hand, if a Provider responds to Seeker requests that over-ride scheduled unavailability—especially if the Provider accepts some such over-riding requests—the MCDUF system may continue to over-ride scheduled unavailability for that Provider. Again, instrumentation of Provider app screens may be utilized by the MCDUF system 2700 to determine how the Provider responds to such over-riding Seeker requests. Finally, the MCDUF system may take into account time temporal circumstances such as time of day, or day of week, in determining whether to over-ride a scheduled unavailability. For example, it may be undesirable to over-ride unavailability late at night or perhaps on a day that is commonly observed as a Sabbath day.
In some embodiments, supplemental availability characteristics may also include factors that may cause a Provider to be triaged as if ‘available’ even if neither availability nor unavailability may be explicitly scheduled for that Provider. For example, a Provider may explicitly schedule weekdays, but neglect to schedule time during week-end days as available or unavailable.
Referring again to the exemplary guideline tables above, guideline 6 is based on the proximity of the Provider's nominal location to the nominal location of a given Seeker requesting URGS. In the example of Provider general dentist Dr. Keith White, his nominal location may be taken to be at his office address as indicated by Dr. White utilizing screen 4400B. The nominal location of a Seeker such as Sam Smith may be determined automatically for example by utilizing a facility such as a GPS reading from the Seeker's mobile device. Alternatively, in some embodiments, a Seeker may explicitly specify the Seeker's nominal location—for example, utilizing screen 3900B.
Guideline 7 is based on a Provider's quality rating. Such a rating may be aggregated from the feedback of a multiplicity of Seekers who have utilized the Provider for URGS needs and therefore have first-hand experience with the Provider. For example, referring to screen 4000D, Dr. Keith White may be seen to have a very laudatory 4 out of 4 stars quality rating. In some embodiments, ratings of Seekers who have not received URGS may be aggregated into a Provider's quality rating. Such Seekers may for example been turned down by the Provider. Additionally, in some embodiments, third party ratings may be aggregated into a Provider's quality rating. A given Seeker's request may be sent to a higher quality rated Provider before it may be sent to a lower rated one. However, in some embodiments a lower rated Provider may be favored. For example, a new Provider may have had very few Seeker requests and therefore any quality rating of that Provider may be based on a small sample size and therefore be perhaps less than reliable. In some embodiments, a loyalty-inducing factor may be included in Provider rankings such that an incremental bias may to some degree favor and thus encourage new Providers to continue utilization of the MCDUF system 2700.
Referring once more to the exemplary guideline tables above, guideline 8 is based on a given Provider's likelihood to respond. A response by a Provider may be both of valued to a Seeker and to the MCDUF system 2700. For a Seeker, a Provider's response may give a very clear acknowledgement that the MCDUF System 2700 may in fact be successfully contacting Providers on the Seeker's behalf. Even if a Provider turns down a Seeker's request, the Seeker may be encouraged a momentary expression of interest and perhaps concern. For example, in turning down a Seeker's request, a Provider may still provide useful advice and/or heartfelt sympathy. A response from a Provider may also be valuable to the MCDUF system 2700 in that it may cause the MCDUF system to stop sending Seeker requests—assuming the Provider responded positively; or to continue sending out Seeker requests to additional Providers—assuming the Provider responded negatively thereby decreasing the number of outstanding Seeker requests.
Guideline 9 is based on the likelihood of a Provider accepting a Seeker's request. Just as it may be more desirable for a Seeker to receive a courteous response in the negative than no response at all, it most certainly may be more desirable—and in fact is a key goal of the MCDUF system 2700—that a Seeker receive a positive response. Accordingly, the MCDUF system 2700 may favor sending Seeker requests sooner to those Providers who are more likely to respond with an acceptance. That said, a given Provider's high acceptance rating may not always be the best indicator of a good potential match. Consider the provider with a high acceptance rating, but a poor quality rating. Conversely, a low acceptance rating may not always be a reliable indicator of a bad potential match. Many factors may play into a Provider's decision to accept or turn down a Seeker's request, therefore in some embodiments, the MCDUF system 2700 comprehensively and exhaustively analyzes Seekers requests and Provider's responses (and non-responses) to develop a multi-factor based assessment of the types of Seeker requests a given Provider is most likely to accept. In this way, the MCDUF system 2700 may increase the likelihood that any given Seeker will quickly find a Provider, and that even the more picky Providers will receive requests from Seekers that may be a good match.
In some embodiments of micro-casting, Seeker requests may be sent out using a metering facility such that a limited number of Seeker requests may be outstanding at any one time. By metering requests thusly, particularly when statistically responsive Provider's may be favored, the MCDUF system 2700 may avoid bothering Providers with requests that they may not respond to in time to obtain the Seeker's business.
In addition to considering the factors and guidelines that may contribute to the operation of micro-casting, it may be informative to consider an example of a Seeker/Provider interaction utilizing the MCDUF system 2700.
Referring once again to
Referring back to
Referring again to
In some embodiments, subscreen 5700 may include a descriptive note 5740 from the Seeker conveying the Seeker's URGS need(s) to the Provider. Such a descriptive note may have been entered by the Seeker—in this example, Sam Smith—utilizing screen 3700B. In some embodiments, the MCDUF system 2700 may automatically add a block of text 5750 identifying the Seeker.
Referring again to
Referring once again to
Referring once again to
Referring once again to
Referring further to
Referring once again to
Similarly, referring once again to
In some embodiments, the Seeker's search result map and/or the Provider's caller map may include a facility (not shown) that displays an estimated ‘time of arrival’ based on potentially predictive factors including, but not limited to: travel progress, average travel speed, time of day, traffic and weather conditions, and conveyance type.
Referring once again to
It may be apparent from the foregoing discussion of micro-casting that efficacy of the MCDUF system 2700 relies substantially on a detailed and accurate assessment of Seekers' needs and Providers' likelihood to accept Seeker's requests and satisfy Seeker's needs. Any and all information that may be gathered relating to any Seeker's request and also any Provider's response (or lack thereof) and subsequent delivery of URGS may be recorded for subsequent analysis and ongoing aggregation and reanalysis. The operation of micro-casting may be highly dynamic and adaptive based on ongoing measurement, recording and thorough analysis of Seeker and Provider interactions. Not only may the data acquired and recorded from Seeker and Provider inputs be valued, but also information that may be gleaned from instrumentation of Seeker apps and Provider apps may provide the MCDUF system with a seeming intuitive like quality that statistically improves the likelihood of both Seeker and Provider satisfaction.
In some embodiments, the MCDUF system 2700 may utilize micro-casting with the goals of: satisfactorily matching as many Seekers as possible as quickly as possible with suitable Providers who accept the Seeker's requests and subsequently satisfy the Seekers' URGS needs; or in instances where they cannot or choose not to attend to Seekers' URGS needs, they respond so as to make the Seekers feel valued. Additionally, micro-casting may be utilized so as to achieve the foregoing while causing as little inconvenience as possible to Providers and to Seekers such that both Providers and Seekers have on balance a positive experience utilizing the MCDUF system 2700; and further are motivated to utilize it on an ongoing basis as well as to recommend it to others.
IV. Additional Enhancements—Systemic Incentivized Loyaltization Coupled with a Micro-Casting Distributed URGS Fulfillment System
Systemic incentivized loyaltization coupled with a micro-casting distributed URGS fulfillment (“MCDUF”) system—i.e., “SILCM”—may typically operate as a facilitator that may engender “loyaltization binding”, which comprises an association of mutual trust and benefit between users of the MCDUF system.
Furthermore, the SILCM system may facilitate “plural-partite loyaltization binding”—i.e., the SILCM system may engender loyaltization bindings among URGS Seekers, URGS Providers and the MCDUF system. This is not to say that the SILCM system binds only among those three, but rather they may be the primary participants in the SILCM system. Other third party participants subject to loyaltization binding by the SILCM system may be MCDUF/SILCM system utilizers—for example financial institutions and rating services that may acquire information and/or services from the MCDUF/SILCM system. Additional third parties such as vendors may also be participants subject to loyaltization binding by the SILCM system. Examples of such vendors may include computer hardware and software vending and servicing entities.
To facilitate discussion,
A primary function of the SILCM system 6500 may be to engender loyaltization binding between an URGS Seeker and an URGS Provider—as opposed to the primary purpose of a traditional loyalty system, which is to engender loyalty of a user to the system itself. That said, the SILCM system 6500 may also engender the loyaltization binding of a user to the MCDUF system 2700 and the SILCM system 6500, but in most embodiments as a secondary purpose.
Unlike loyalty systems incorporating or operating with computerized systems, the SILCM system 6500 may minimize and stream-line computer-to-human interaction in favor of facilitating and improving human-to-human interaction. The responsiveness and utility of the MCDUF system 2700 and the SILCM system 6500 to Seekers with URGS needs may in part derive from providing as ‘thin’ and transparent a layer as possible in that human-to-human interaction. Simply put, it is nearly impossible for interaction with a computer to engender the same sort of binding in a human that a relationship with another human may.
A further differentiator between the SILCM system 6500 and a traditional loyalty system is the fundamental role that urgency plays in loyaltization binding. The SILCM system 6500 may bind Seekers 6510 with Providers 6590—and perhaps secondarily with itself—by facilitating easy, quick, dependable and nearly transparent matching of such Seekers to such Providers that may expeditiously fulfill the Seeker's urgent need(s).
Human behavior may be too variable to perhaps pinpoint or rank the most efficacious elements of the SILCM system 6500. Nonetheless, urgency and human-to-human interaction may play key roles in the Provider-Seeker loyaltization binding as well as plural-partite loyaltization binding facilitated by the SILCM system 6500; and therefore, urgency and human-to-human interaction and their roles are emphasized in the discussion that follows.
In some embodiments, the Seeker 6510 may be loyaltized utilizing voucher options 6530 and corresponding vouchers 6550 as incentives—i.e., as a participant in a “morphable voucher program” (not shown). In some embodiments, such a morphable voucher program may include distributing to two or more Seekers 6510 two or more “morphable” voucher options 6530 that may be “morphed” into vouchers 6550 that may potentially be redeemed in exchange for discounts from participating Providers 6590.
Correspondingly, in some embodiments, a Provider 6590 may be loyaltized utilizing morphable voucher programs (not shown) that may in turn incentivize Seekers 6510 to seek out and obtain URGS from such a Provider participating in morphable voucher program(s) in order for such Seekers to receive corresponding payment discounts. A key incentive, therefore, for Providers 6590 to participate in such morphable voucher programs may be attracting additional Seekers 6510 incentivized by vouchers 6550 to obtain URGS from such participating Providers and increasing such Providers' revenues and/or profits.
The utilization of voucher options 6530—as separate and distinct from redeemable vouchers 6550—may serve to ensure that a given corresponding voucher 6550 may be redeemed for the benefit of an intended “voucher option beneficiary”, or by a Seeker 6510 that otherwise may be authorized and/or qualified to morph the voucher option 6530 so as to redeem the corresponding voucher 6550. Such a separate and distinct voucher option 6530 may serve to increase the difficulty of counterfeiting—or of otherwise unauthorizedly inflating the quantity of corresponding vouchers—by potentially de-coupling the quantity of voucher options 6530 from the quantity of corresponding redeemable vouchers 6550. Consequently, it may be possible to have an equal quantity of vouchers 6550 and corresponding voucher options 6530, or a lesser quantity of voucher options relative to corresponding vouchers 6550; but it may also be possible (and perhaps more likely) to have a greater quantity of voucher options 6530 than vouchers 6550.
In some embodiments, the SILCM system 6500 may facilitate two or more morphable voucher programs concurrently. Other systems and methods may be utilized for incentivized loyatization that may be similar to, or substantially different from, systems and methods relating to voucher options 6530 and/or vouchers 6550. For example, the SILCM system 6500 may facilitate a program for donating to charity for each new Seeker 6510 acquiring a Seeker app 2710 and enrolling utilizing the Seeker app. A variety of systems and methods of incentivized loyatization may be facilitated concurrently by the SILCM system 6500.
At step 6610, in some embodiments. the SILCM system 6500 may differentiate between users/utilizers so as to distinguish a given user of user-type Seeker 6510 for loyaltization.
At step 6620, in some embodiments. the SILCM system 6500 may loyaltize the Seeker 6510.
At step 6810, in some embodiments the SILCM system 6500 facilitates enrollment of Providers 6590 in a morphable voucher program—i.e., a SILCM system 6500 facility whereby prospective recruited seekers or other voucher option beneficiaries may be “gifted”, “issued” or otherwise distributed voucher options 6530 that may be configured so as to incentivize such recruited seekers and other voucher option beneficiaries to become enrolled Seekers 6510 in the MCDUF system 2700 and the SILCM system 6500; and further enabling the enrolled Seeker(s) to morph voucher option(s) 6530 into a corresponding voucher 6550 that may potentially be redeemed for discount and/or payment by one of a plurality of Providers 6590 that may be enrolled in a corresponding morphable voucher program. The Provider 6590 may enroll in a given morphable voucher program as part of the process of enrolling as a MCDUF system 2700 URGS Provider 6590; or may enroll subsequently utilizing morphable voucher program specific provider account management facilities (not shown) of the Provider app 2790. In some embodiments, enrollment in a given morphable voucher program may require explicitly ‘opting in’ by the Provider 6590; whereas in other embodiments such enrollment may be automatic for Providers 6590 and may therefore require explicitly ‘opting out’. In some embodiments, a Provider 6590 may be enrolled in the SILCM system 6500 as one of a group of associated or affiliated providers—for example a franchise or partnership—wherein a group administrator may opt-in or opt-out for all Providers in such a group. In some embodiments, an individual Provider 6590 within such a group, may over-ride the morphable voucher program opt-in or opt-out selected by such a group administrator. In some embodiments, a Provider 6590 may be enrolled in two or more morphable voucher programs; or may be enrolled in a single voucher program that facilitates two or more voucher categories; or both.
Additionally, in some embodiments of morphable voucher programs, voucher options 6530 may be concurrently applicable to two or more categories of URGS Providers 6590. So for example, such an “agnostic” morphable voucher program may utilize voucher options 6530 that may potentially be morphed and the corresponding voucher 6550 redeemed in exchange for a discount from a dentist Provider or potentially for a discount from a plumber Provider. Furthermore, such an agnostic morphable voucher program may utilize voucher options 6530 that may be morphed into vouchers 6550 for different discounts from different Providers 6590. So for example, the discount for a participating tow truck Provider may be $50 off, whereas the discount for a participating tailor Provider may be 10% off. In some embodiments, the discount may potentially vary between participating Providers 6590 in a given Provider category possibly down to a per-Provider specificity.
In some embodiments, two or more Providers 6590 of two or more different URGS category types (e.g., dentist and plumber) may participate in a given morphable voucher program. In some embodiments, different categories of Providers 6590 may participate in separate URGS-category-segregated morphable voucher programs, so for example there may be a morphable voucher program for dentists that may be segregated from a separate morphable voucher program for plumbers. In some embodiments, such categorized morphable voucher programs may be supported by voucher options 6530 that may be “morphable voucher program agnostic”. So for example, such a morphable voucher program agnostic voucher option 6530 may be morphable to a voucher 6550 appropriate for the voucher program that the Provider 6590 may participate in. So further by example, a morphable voucher program agnostic voucher option 6530 may be morphable to one of a plurality of voucher program categories such as dentist, plumber, tow truck, etc. Such a morphable voucher program agnostic voucher option 6530 may morph to a morphable voucher program-appropriate voucher. So for example, such a morphable voucher program agnostic voucher option 6530 may be equally morphable to category segregated dentist, plumber, and tow truck morphable voucher programs. In some embodiments, such a voucher program agnostic voucher option 6530 may morph to the morphable voucher programs-appropriate voucher 6550 based on the category of the Seeker's Provider 6590. In some embodiments, URGS-category-segregated morphable voucher programs that utilize agnostic voucher options 6530 may be a form of agnostic morphable voucher program.
In some embodiments, a given voucher option 6530 may have a physical form—for example have the form of a printed QR code—or may be embodied in a physical entity of some sort (e.g., a ‘token’) that may be utilized subsequently to morph the voucher option 6530 into the corresponding voucher 6550.
In some embodiments, a given voucher option 6530 may be a “virtualized” voucher option—i.e., it may have one or more than one virtual representations in place of, or in addition to a physical form—including but not limited to: verbal, visual, symbolic, tactile (e.g., Braille), analog, and digital form(s).
In some embodiments, the voucher option 6530 may have an associated “redemption limit”, perhaps indicating the maximum amount of discount or payment the corresponding voucher 6550 may potentially be utilized for. In some embodiments, the redemption limit associated with a voucher option that has physical form may visibly appear on that voucher option 6530 as a ‘face value’. For voucher options in virtual form and for voucher options with physical form as well, the redemption limit associated with the voucher option 6530 may be recorded as a “virtual face value” by the SILCM system 6500.
In some embodiments, the voucher option 6530 may be “temporally morphable”—i.e., have an associated “expiration event” wherein upon the occurrence of the expiration event the voucher option 6530 may no longer be morphable. In some embodiments, an expiration event may be composed of a combination of sub-events. For example, a voucher option 6530 may have the following expiration event composed of sub-events: ‘expiration occurs on Jan. 1, 2016, or when 100 voucher options have been morphed and the corresponding vouchers redeemed, whichever occurs first.’ In some embodiments, the voucher option 6530 may lack an associated expiration event and may therefore be “immortally morphable”. In some embodiments, some voucher options 6530 may be temporally morphable and some voucher options 6530 may be immortally morphable. Further in some embodiments, a given morphable voucher program may utilize temporally morphable voucher options 6530, immortally morphable voucher options 6530, or a mix of both.
At step 6820, in some embodiments the SILCM system 6500 may facilitate creating a “SILCM voucher tranche” (not shown)—i.e., a set of vouchers 6550 morphed via voucher options 6530 that may have a common “expiration event” (or the lack thereof). In some embodiments, the voucher options 6530 corresponding to a SILCM voucher tranche may share additional common characteristics including, but not limited to: the set of authorized issuers; the set of applicable MCDUF system URGS Provider categories; and the set of voucher redemption discount/payment amount limits corresponding to the set of applicable MCDUF system URGS Provider categories. In some embodiments, there may be a limit to the quantity of voucher options 6530 that may be issued for the SILCM voucher tranche, whereas in some embodiments the quantity of voucher options 6530 that may be issued may be unlimited. Similarly, in some embodiments, the quantity of redeemable vouchers 6550 in a given voucher tranche may be capped, specifically set, unlimited, or maybe left unset. In some embodiments, a given morphable voucher program may be configured without utilizing SILCM voucher tranche(s).
In some embodiments of morphable voucher programs, there may be a “provider split” value wherein the provider split specifies how much of the payment amount or discount credited to the Seeker 6510 for the voucher 6550 redeemed by the Provider 6590 participating in the morphable voucher program may be absorbed by the Provider. The remainder of the split (“SILCM matching share”) may be credited by the SILCM system 6500 to the Provider's MCDUF system provider payments account (not shown) so as to offset a portion of the cost of the payment amount or discount credited to the Seeker 6510. So for example, the Seeker 6510 may redeem a voucher 6550 for a $50 discount corresponding perhaps to a SILCM voucher tranche where the provider split is 60%—resulting in the MCDUF system crediting the Provider $20 (i.e., 40% of $50) and the Provider absorbing the remaining $30 discount (i.e., 60% of $50).
In some embodiments, the utilization of voucher options 6530—as separate and distinct from redeemable vouchers 6550—may serve to incentivize both the Seeker 6510 and the Provider 6590 to respectively report morphing the voucher option 6530 and redeeming the corresponding voucher 6550 such that the SILCM system 6500 may determine and enforce that the Seeker 6510 morphing the voucher option 6530 may also be the Seeker 6510 presenting the corresponding voucher 6550 to the Provider 6590 leading to successful redemption. The Seeker 6510 may so report or the voucher option 6530 may not be morphed; and the Provider 6590 may so report or the voucher 6550 may not be successfully redeemed and the corresponding SILCM matching share may not be credited. Furthermore, such incentivized reporting facilitates the tracking by the SILCM system 6500 every successful morphing of voucher options 6530 and the successful redemption of corresponding vouchers 6550. Furthermore, the SILCM system 6500 may detect patterns of a Provider or Provider's 6590 not honoring redeemable vouchers 6550 based on discrepancies between the morphing of voucher options 6530 and redemption of voucher options 6550.
In some embodiments, the SILCM system 6500 may follow-up (not shown) via the Seeker app 2710 with a given voucher option beneficiary Seeker 6510 that successfully morphs a voucher option 6530 that subsequently remains unredeemed. Such follow-up may be utilized by the SILCM system 6500 to determine if the voucher 6550 was received by the Seeker 6510; accepted by the Provider 6590; and how the Provider 6590 may have explained and/or handled any difficulty that may have occurred prevented successful redemption of the voucher 6550. Such follow-up may enforcement by the SILCM system 6500 of voucher program agreements with Providers 6550 and/or improvements to the SILCM system 6500 so as to minimize avoidable unsuccessful voucher 6550 redemptions.
At step 6830, in some embodiments the SILCM system 6500 may authorize “issuers”—i.e., individuals or organizations authorized to distribute at least one of a plurality of voucher options 6530. Issuers (not shown) may be selected from MCDUF system users—Seekers 6510 and/or Providers 6590. Additionally, in some embodiments, non-user third parties may be authorized to be issuers. In some embodiments, voucher options 6530 issued by MCDUF system users are termed “gifts” and those issued by paid or otherwise compensated third parties may be termed “promotions”. In some embodiments, voucher options issued by the SILCM system 6500 or by Provider(s) 6590 may be termed “bonus” voucher options 6530. In some embodiments, gift, promotion, and/or bonus voucher options 6530 may require separate SILCM voucher tranches; whereas in other embodiments, gift, promotion and/or bonus voucher options 6530 may be issued from the same tranche or without a tranche.
In some embodiments, the issuer may have a relationship to a given Seeker 6530, prospective recruited seeker or other voucher option beneficiary by one or more of numerous means including but not limited to: previous introduction, paid introduction, promotion/advertising, word of mouth, social networking, chance encounter, and recommendation. In addition to being gifted or possibly exchanged for something of value, the voucher option 6530 received by a recruited Seeker 6510 may be solicited or unsolicited. In some embodiments, issuers may report to the SILCM system 6500 the issuance of voucher options 6530 so as to associate a given prospective recruited seeker or other voucher option beneficiary with the corresponding voucher option(s) 6530 they may have been issued. For example, an issuer may report the names, telephone numbers and/or email addresses of voucher option beneficiaries. In some embodiments, the issuer may so report utilizing a photograph, video, audio recording and/or biometric measurement of a given voucher option beneficiary. In some embodiments, the Seeker 6510 associated with a given voucher option 6530 may also be associated by the SILCM system 6500 with the corresponding voucher 6550 that may be morphed from that voucher option. In some embodiments, issuers may be incentivized with bonus voucher option(s) 6530 (or other rewards) provided by the SILCM system 6500 perhaps in some way proportional to the recruitment of new seekers and the redemption of vouchers 6550 resulting from the issuer's issuance efforts. In some embodiments, issuers may be rewarded with higher nominal value voucher options to issue and/or to utilize personally.
In some embodiments, “gift issuers” and/or “promotion issuers” may be separately registered with the SILCM system 6500 as MCDUF system utilizers as opposed to Seeker 6510 and/or Provider 6590 MCDUF system users. In some embodiments, a gift issuer may be required to be a Seeker 6510 or a Provider 6590. In some embodiments, a gift issuer may be identified by the issuer's email address registered with the SILCM system 6500 as a “gift ID”. Similarly, a promotion issuer may be identified by a unique identifier (which may also be the issuer's email address) registered with the SILCM system 6500 as a “promo ID”.
In some embodiments, a given issuer may be limited to issuing voucher options 6530 solely from one voucher tranche or one morphable voucher program. In others, the issuer may distribute voucher options 6530 for more than one tranche and/or voucher program. In some embodiments, the issuer's gift ID or promo ID may be utilized as a virtual form of voucher option 6530. For example. Nick Smith may be registered with the SILCM system 6500 with an issuer's gift ID set to his email address of saintnick@brandx.net, and therefore the voucher options 6530 that he may issue may simply be the same as his email address, i.e., ‘saintnick@brandx.net’. Such a gift ID (or promo ID) that may be utilized as a virtualized voucher option 6530 may be termed a “option ID”. By using a option ID that may be very easy to recall, an issuer may easily issue virtualized voucher options 6530 verbally, simply by reciting the option ID from memory. Additionally, such an issuer-identifying option ID—utilizable as a voucher option 6530—may serve to remind the voucher option beneficiary who it was that gifted or otherwise issued that voucher option and thereby engender loyaltization binding between the issuer and the voucher option beneficiary.
More generally, in some embodiments, the issuer may utilize one or more option IDs—perhaps assigned or otherwise managed by the SILCM system—that may correspond to one or more morphable voucher programs. In some embodiments, a given option ID may correspond to a specific SILCM tranche or tranches. For example, voucher options 6530 may be issued in the virtual form of a option ID that may be an email address at a domain that may resolve to the SILCM system 6500. Or perhaps the option ID is a unique handle utilized with a third party networking facility account(s)—for example, Twitter—that may be administered via the SILCM system 6500. In some embodiments, the voucher option beneficiary may subsequently contact the issuer by utilizing the option ID that had been issued as the Seeker's voucher option 6530. In this way perhaps, a Seeker 6510 may send a ‘thank you’ and/or ask for an additional voucher option 6530 for the voucher option beneficiary Seeker 6510 or for maybe someone else—thereby further engendering and extending loyaltization binding.
At step 6840, in some embodiments the SILCM system 6500 may facilitate the distribution (and/or re-distribution) of voucher options 6530. For example, the gift issuer or promotion issuer may utilize facilities of the SILCM system 6500 to communicate the issuance of the voucher option 6530 to a given prospective recruited seeker or other voucher option beneficiary. In some embodiments, a voucher option beneficiary may re-distribute or “re-gift” a voucher option 6530 to someone else who may either be a Seeker 6510 or who may subsequently register as a MCDUF system Seeker 6510 so as to utilize the voucher option 6530. Such a “re-gifter” may therefore facilitate additional voucher option distribution and additional loyaltization binding as an unofficial ‘virtual issuer’.
In some embodiments, a voucher option beneficiary Seeker 6510 may “bank” a voucher option 6530 with the SILCM system 6500—i.e., register the voucher option with the SILCM system so as to utilize facilities for associating the voucher option(s) 6530 with the voucher beneficiary Seeker 6510 as well as recording, tracking, monitoring, combining, exchanging, trading, and otherwise managing the voucher option(s). Such banking of voucher option(s) 6530 may not alter the Seeker's ability to subsequently morph a voucher option into a corresponding redeemable voucher 6550, but may allow the SILCM system 6530 to keep track of any voucher options the Seeker 6510 banks and to remind the Seeker to utilize such voucher options 6530. For example, the SILCM system 6500 may alert the Seeker prior to a voucher option expiring. Additionally, the SILCM system 6500 may provide facilities to combine voucher options 6530, extend the expiration of a voucher option, and perhaps to trade voucher options with other Seekers who may also bank their voucher options 6530 with the SILCM system 6500. Furthermore, the SILCM system 6500 may provide facilities to re-gift voucher options 6530.
In some embodiments. the voucher option 6530 may potentially be a “fungible” voucher option—e.g., traded as a sort of synthetic currency—depending on whether and how the voucher option 6530 may be transferable. In some embodiments, whether a voucher option 6530 may be transferable, and the ways and degree to which a voucher option may be transferable, may be facilitated and controlled by the SILCM system 6500 including voucher option banking facilities for recording, tracking, validating and morphing voucher options 6530. In some embodiments, voucher options 6530 may be nominally denominated similar to currency. In some embodiments, voucher options may be named so as to suggest their potential and/or inherent value to recruited Seekers 6530 and other voucher option beneficiaries—for example, “HelpBuck$”.
In some embodiments, the SILCM system 6500 may require registering the re-gifting of the voucher option 6530 with the SILCM system 6500. In this way, the SILCM system 6500 may track the re-gifting of voucher options 6530 as well as accumulating information about issuers, Seekers 6510, and prospective recruited seekers and other voucher option beneficiaries. For example, in registering a voucher option, the SILCM system 6500 may request information about the voucher option beneficiary, the issuer, the relationship of the voucher option beneficiary to the issuer, and perhaps gather information as well on the Seeker 6510 or prospective recruited seeker that the voucher option beneficiary may want to re-gift the voucher option 6530 to. In some embodiments, the SILCM system 6500 may provide a facility whereby a voucher option beneficiary may directly utilize the SILCM system 6500 to re-gift a voucher option 6530 to a Seeker 6510 or prospective recruited seeker or perhaps request a separate voucher option 6530 be issued to such a beneficiary. Additionally, in some embodiments, the SILCM system 6500 may require a ‘re-gifter’ to register with the SILCM system 6500 as an issuer in order to re-gift a voucher option 6530; and in this way new issuers may possibly be identified and more effectively utilized.
In some embodiments, the voucher option beneficiary of a voucher option 6530 may endeavor to acquire URGS from a morphable voucher program participating Provider 6590 who redeems corresponding vouchers 6550; or may choose instead to transfer the voucher option to yet another voucher option beneficiary. Of course, in some circumstances, a voucher option beneficiary may let a voucher option 6530 expire. The SILCM system 6500 may utilize recorded information relative to issuance and transfer to contact such a voucher option beneficiary or otherwise endeavor to determine why such a voucher option 6530 may be allowed to go unused and perhaps replace it with a new voucher option 6530.
At step 6850, in some embodiments the SILCM system 6500 may facilitate the Seeker 6510 who may be a voucher option beneficiary to identify and locate an URGS Provider(s) 6590 that redeems vouchers 6550. For example, the search result map displayed by the Seeker app 2710 may utilize a distinctive icon to differentiate Providers 6590 who redeem vouchers 6550. Additionally, or alternatively, the Seeker app 2710 may facilitate identifying Providers 6590 that redeem vouchers 6550 via, for example, a label, symbol and/or link in that Provider's description. A Seeker 6510 who may not currently be a voucher option beneficiary, may be made curious about voucher options 6530 and subsequently endeavor to acquire voucher options 6530. In some embodiments, the SILCM system 6500 may offer a voucher option to a Seeker who may currently not have a voucher option 6530. In some embodiments, the Seeker App 2710 may facilitate the Seeker 6510 to input (not shown) a voucher option ID(s) such that the SILCM system 6500 may facilitate the voucher option beneficiary Seeker 6510 to identify and locate an URGS Provider(s) 6590 that participates and redeems vouchers 6550 in a voucher program(s) corresponding to the Seeker's voucher option(s). In some embodiments, the Seeker 6510 need not so input voucher option IDs that may already be banked with the SILCM system 6500 as they may be automatically included by the SILCM system 6500 with any additional voucher option ID(s) input by the Seeker 6510 for utilization to locate and identify such a participating redeeming Provider(s) 6590.
In some embodiments, a given morphable voucher program(s) may be facilitated by the SILCM system 6500 in cooperation with a third-party payer for URGS—such as an insurance company—such that vouchers 6550 may be redeemed as co-payment and/or deductible payment accepted by such a third-party payer. In some embodiments, a Provider 6590 that receives payment from such a third-party payer, may automatically be enrolled in corresponding morphable voucher program(s) accepted by that third-party payer. Such “cooperative morphable voucher programs” may be given ‘brand’ names so as to be explicitly associated with a third-party payer. For example, a morphable voucher program may be named ‘Delta Dental voucher program’. Consequently, payer utilizers of the MCDUF system 2700—as well as Seekers 6510 and Providers 6590—may be subject to loyaltization binding by the SILCM system 6500.
Referring again to
In some embodiments, the quantity of morphable voucher options 6530 corresponding to a morphable voucher program may be “variable”—i.e., different morphable voucher programs may have differing quantities of voucher options 6530. Furthermore, in some embodiments, the quantity of voucher options 6530 corresponding to a given morphable voucher program may be dynamic. In some embodiments, the potentially variable quantity of voucher options 6530 for a given morphable voucher program may be set, limited or otherwise bounded by the SILCM system 6500. In some embodiments, the quantity of such voucher options 6530 may be unlimited by the SILCM system 6500. Additionally, as mentioned previously, the quantity of morphable voucher options 6530 may differ from the corresponding quantity of redeemable vouchers 6550—perhaps substantially exceeding the quantity of redeemable vouchers 6550. Such a substantial differential may serve to increase the ubiquity of voucher options as well as result in an incentive for expedited utilization of a given voucher option 6530 by a voucher option beneficiary Seeker 6510, i.e., while the voucher option 6530 may still be morphed for the substantially scarcer voucher 6550 (as well as before possible cessation of the corresponding morphable voucher program). For voucher programs wherein the quantity of voucher options 6530 may exceed the quantity of corresponding vouchers 6550, attempting to morph the ‘excess’ voucher options 6530 may be unsuccessful. Unsuccessful morphing may occur for other and/or additional reasons—for example the voucher option 6530 may be expired. In some embodiments, the Provider 6590 may utilize the Provider app 2710 to request an “over-ride” of the unsuccessful voucher option morphing (not shown). Such an over-ride may be made or declined by the SILCM system 6500. Should the Provider 6590 succeed with such an over-ride, the Seeker 6510 may be grateful to the Provider for helping morph the voucher option 6530 and redeem the corresponding voucher 6550. Conversely, should the Provider 6590 not succeed with such an over-ride, the Seeker 6510 may be appreciative of the Provider's attempt. Regardless, the Seeker 6510 may be made aware that vouchers 6550 may be scarce and that voucher options 6530 may best be utilized expeditiously. In some embodiments, the Provider 6590 utilizing the Provider app 2790 may request of the SILCM system 6500 the immediate issuance of a bonus voucher option 6530 (not shown) to the Seeker 6510 so as to substitute for the unsuccessfully morphed voucher option 6530.
In some embodiments, subsequent to morphing the voucher option 6530, the corresponding voucher 6550 may have a “time-to-live” such that such a voucher may expire so as to no longer be redeemable by the SILCM system 6500 after having been previously redeemable. Such a time to live—especially if it may perhaps be on the order of minutes or a few hours—may serve as a deterrent for Seekers 6510 expeditiously morphing a newly received voucher option 6530 into a voucher 6550 with the intention of redeeming it much later or possibly not at all. Such vouchers 6550 that have a time-to-live or that may otherwise subsequently go from redeemable to unredeemable may be termed “potentially redeemable vouchers” 6550.
In some embodiments, the morphing of a given voucher option 6530 may be denied by the SILCM system 6500 regardless of the redeemability of the corresponding voucher 6550. For example, the given voucher option 6530 may be temporally morphable, but past its expiration. Or the voucher event may be un-expired, but the entirety of the corresponding vouchers 6550 in the voucher tranche or in the voucher program may have been issued such that there may be no voucher 6550 to morph the voucher option 6530 into. Or the voucher program may have ceased—the entire program or possibly a tranche or tranches including the voucher tranche corresponding to the voucher option 6530. Or the voucher option ID or other representation of the voucher option may be unrecognizable due to a transcribing error or some other problem. In some embodiments, the voucher option 6530 may be successfully morphed into a corresponding potentially redeemable voucher 6550 that may subsequently become unredeemable if not redeemed expeditiously. In some embodiments, the voucher option 6530 may be morphed into a corresponding potentially redeemable voucher 6550 that may be configured so as to remain redeemable indefinitely or have such a long time-to-live as to be effectively an “immortal” voucher 6550. In some embodiments, potentially redeemable vouchers and/or immortal vouchers may be made unredeemable by cessation of the corresponding voucher program.
In some embodiments, the Seeker's voucher 6550 may be redeemed by the participating URGS Provider 6590 for a maximum amount of discount and/or payment. Such maximum amount may be the redemption limit associated with the voucher option 6530, or may be otherwise associated with the voucher option 6530, the corresponding voucher 6550, the Provider 6590, the MCDUF system URGS category of the URGS provided by the Provider to the Seeker, or some entity or abstraction relating to or associated with the Provider 6590, the Seeker 6510 or the URGS provided by the Provider to the Seeker.
In some embodiments, the voucher option 6530 may have an associated redemption limit that may be less than, equal to, or greater than the maximum voucher redemption amount allowed by the SILCM system 6500 for the Provider's URGS category. If such a redemption limit may be less than the maximum voucher redemption amount, the Seeker 6510 may morph a voucher option into a voucher 6550 redeemable for the full redemption limit. If the redemption limit may be equal to the maximum voucher redemption amount, again the Seeker 6510 may morph into a voucher for that full amount. In some embodiments, if the redemption limit may be greater than the maximum voucher redemption amount for the Provider 6590, the Seeker 6510 may morph into a voucher 6550 only for the portion of the redemption limit equal to the maximum voucher redemption amount; but may subsequently utilize the voucher option 6530 again later with a correspondingly reduced redemption limit lessened by the actual amount redeemed. In other embodiments, such un-utilized portions of the redemption limit of a voucher option (i.e., in excess of the maximum voucher redemption amount for the Provider) may be forfeit. In some embodiments, the Seeker 6510 may be facilitated to redeem a voucher for a ‘selectable redemption amount’ that may be less than maximum allowable amount—i.e., less than the lesser of the redemption limit associated with the voucher option 6530 and the maximum voucher redemption amount. In other words, a Seeker may be provided the option to utilize a selectable portion of the allowable amount of the voucher option 6530. Any ‘held-back’ amount so selected to be left unredeemed by the voucher option beneficiary may be included in the residual redemption limit associated with the voucher option and may be available to be utilized subsequently by the Seeker 6510. In some embodiments, such ‘held-back’ residual redemption limit amounts may be protected from voucher option forfeiture.
Referring again to
Referring again to
Referring again to
At step 6730 the SILCM system 6500 may periodically assess and adapt to Seeker urgency. (Assessing and adapting to Seeker urgency is discussed above in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System.) The Seeker's urgency may be productive and useful when it drives the Seeker 6510 to focus and to act effectively. However, urgency may be counterproductive should it drive the Seeker 6510 towards panic, frustration, and non-helpful reactions—either over-reacting or under-reacting. The SILCM system 6500 by adapting to assessed urgency may facilitate the Seeker 6510 to effectively focus and act to fulfill the Seeker's URGS needs while avoiding and calming Seeker panic and frustration. For example, the utilization of assessed urgency as a ranking factor in micro-casting the Seeker's request for help may result in expeditiously matching a well-suited Provider 6590, which may therefore have a strong calming and loyaltizing effect on the Seeker 6510.
At step 6740 the SILCM system 6500 may determine the Seeker's URGS need(s), since doing so—both easily and correctly—may be essential to fulfilling the Seeker's URGS need(s) and to loyaltizing the Seeker 6510. (Determining the Seeker's URGS need(s) is discussed above—including in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System.) Facilitating the Seeker's navigation of the MCDUF system 2700 and quickly narrowing needs categories down to a match so as to expeditiously determine the Seeker's may help loyaltize the Seeker. Whereas sluggish, confusing, overly-wordy and/or inconclusive navigation may annoy or upset and perhaps alienate a Seeker 6510.
Nonetheless, relative to loyaltization, even misnavigation of the Seeker app 2710 by a given Seeker 6510 may more broadly serve the purpose of loyaltization by exposing opportunities to improve the Seeker app 2710 for subsequent Seekers' utilization. To benefit from such opportunities, the SILCM system 6500 may utilize “app-flow tracking and analysis”—an ongoing system of self-measurement and analysis of the MCDUF system 2700 by the SILCM system 6500. App-flow tracking and analysis may utilize instrumentation of the Seeker 6510 at each Seeker-MCDUF system interaction point in the Seeker's utilization of the Seeker app 2710—assessing both the Seeker's urgency and progress navigating the Seeker app. Furthermore, by aggregating the Seeker app utilization experiences of a multiplicity of Seekers, App-flow tracking and analysis may support rapid incremental improvements and enhancements to the MCDUF system 2700.
In some embodiments, App-flow tracking and analysis, in addition to leading to improvements in Seeker loyaltization, may also be utilized to enhance Provider 6590 loyaltization by providing existing Providers 6590 and potential providers a data-driven ‘picture’ of MCDUF system 2700 and SILCM system 6500 operation.
At step 6745 the SILCM system 6500 may mediate potential introduction of an URGS facilitator. As alluded to above, some Seekers 6510 may have difficulty utilizing the Seeker app 2710. Or the MCDUF system, although utilized well by the Seeker, may not be producing a successful URGS Provider match in a timely fashion. Regardless, of the cause, some Seekers 6510 may need some “additional facilitation” to achieve a match with an URGS Provider 6590. In some embodiments, such additional facilitation may be automated utilizing a computerized facilitator. In some embodiments, additional facilitation may be provided by a human facilitator 6560; and in some embodiments, additional facilitation may be both automated and human-provided. In the case of the latter, initial additional facilitation may for example be automated, but may escalate to a human facilitator 6560 should automated additional facilitation seem inadequate. Furthermore, in some embodiments, a human facilitator 6560 may monitor and mediate additional facilitation and may make the decision to take over the additional facilitation. Automated additional facilitation may be facilitated by the fulfillment server(s) 155 and/or Seeker app 2710. In some embodiments, a human facilitator may be a third-party, perhaps located at a remote call center.
In some embodiments, the SILCM system 6500 may anticipate and provide additional facilitation for users (Seekers 6510 and Providers 6590) with special needs based on MCDUF system account configuration information that may be entered by a given user and/or upon real-time monitoring and assessment. For example, an additional facilitator may facilitate communication between Seeker and Provider—say if the Seeker 6510 is a Tagalog speaker and the Provider 6590 is most fluent in Hindi. That help by the SILCM system 6500 may transform the seemingly near impossible situation into a successful match and satisfied users outcome—loyaltizing the Seeker 6510 and the Provider 6590 in doing so.
Regardless of whether the additional facilitation is automated or provided by a human facilitator 6560, the SILCM system 6500 may utilize additional facilitation to provide ‘extra help’ for struggling Seekers. So for example, if the Seeker 6510 may be having difficulty selecting an URGS category, the additional facilitator may query the Seeker 6510 about their URGS need(s) to determine if the MCDUF system 2700 may support a corresponding URGS category. If the appropriate category may not currently be supported, the facilitator may for example suggest an alternative search strategy to the Seeker 6510. Conversely, if the appropriate category is supported by the MCDUF system 2700, the facilitator may assist the Seeker 6510 to utilize the Seeker app 2710 to select that category or may otherwise navigate the MCDUF system 2700 for the Seeker 6510.
Additional facilitation—depending on the embodiment—may use one or more media to facilitate the Seeker's successful utilization of the MCDUF system 2700. Such media may include but not be limited to: image, text, chat, voice and video. The additional facilitation may be pre-produced or live or a combination of both. Live additional facilitation may be human-enacted or machine-synthesized or a combination of both. Regardless of the components in the additional facilitation ‘tool-kit’, an essential capability of the SILCM system 6500 may be to assess a given Seeker's experience utilizing the MCDUF system 2700 in a timely way so as to provide additional facilitation that may be determined to be appropriate for that given Seeker 6510 and the difficulties they may be determined to be experiencing in utilizing the Seeker app 2710. Such assessment may be provided by app-tracking and analysis by the SILCM system 6500 as described previously above. In some embodiments, additional facilitation may be introduced without being solicited by the Seeker 6510. In some embodiments, additional facilitation may intentionally be requested the Seeker 6510 via facilities such as a ‘help’ virtual button located in a given Seeker app screen.
At step 6750 the SILCM system 6500 may match the Seeker 6510 to an URGS category-appropriate Provider 6590. (Matching the Seeker to a URGS Provider(s) is discussed above—including in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System.) The expeditiousness (as well as the eventual success) of such matching may be quite important in the loyaltization of the Seeker 6510. First of all, such expeditiousness provides the Seeker 6510 some sense of successful progress towards attaining the URGS needed by the Seeker. Furthermore, it may provide the opportunity for the Seeker 6510 to interact with one or more Provider(s) 6590 thus, importantly for the SILCM system 6500, facilitating Seeker to Provider loyaltization binding. That such matching may be accomplished expeditiously may have the added benefit of helping loyaltize the Seeker 6510 to the MCDUF system 2700.
At step 6760 the SILCM system 6500 may facilitate communication between the Seeker 6510 and the matched Provider 6590. (Facilitating communication between Seeker and matched Provider is discussed above—including in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System.) The MCDUF system 2700 may facilitate virtually direct communication that otherwise may be shunned. We may all have had the experience of calling our doctor and getting the nurse; calling the dentist and getting the receptionist; calling the taxi driver and getting the dispatcher; calling our lawyer and getting the paralegal assistant; calling our customer service representative and getting the automated voice messaging system. It is a fact of modern life that many professionals may actively avoid having direct conversations with their customers. But with the MCDUF system 2700 as intermediary, the Seeker 6510 may send help requests to a matched Provider 6590 via the MCDUF system 2700; and the matched Provider 6590 may respond with an offer via the MCDUF system 2700; and the Seeker may accept the Provider's offer via the MCDUF system 2700. They may transact the match without seemingly ever directly interacting—and yet virtually, they may in fact be. Or for those who may want more personal interaction, the MCDUF system 2700, may for example facilitate a phone conversation. Additionally, the MCDUF system 2700 may be better at finding the matched Provider 6590 than a human—such as a receptionist—may be able to do. Bottom line, the SILCM system 6500 may loyaltize Seekers (and Providers too) by facilitating near-direct and/or direct communication between Seeker 6510 and matched Provider 6590 while perhaps giving both a greater sense of control, and of results, than if they were attempting to communicate directly.
At step 6765 in some embodiments, the SILCM system 6500 may facilitate the providing of URGS to the Seeker 6510. (Facilitating the providing of URGS to the Seeker 6510 is discussed above—including in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System.) For example, the MCDUF system 2700 may facilitate the meeting of the Seeker 6510 and the Provider 6590 via respective Seeker's search result and Provider's caller maps. Facilitating the Seeker to acquire the needed URGS—subsequent to the Seeker 6510 accepting the matched Provider 6590—may serve to loyaltize both the Seeker 6510 and Provider 6590. But additionally, by providing the Seeker 6510 and the matched Provider 6590 status updates regarding each other (e.g., via search results maps and caller maps respectively) they may also actively assist each other. For example, if a Seeker 6510 is driving to a Provider 6590 but may be stuck in freeway traffic, the Provider may perhaps contact the Seeker via the MCDUF system 2700 and suggest an alternative travel route. Such helpful collaboration between the Seeker 6510 and the Provider 6590 may engender loyaltization binding between them. An appreciation of the SILCM system 6500 as a facilitator may also engender loyaltization to the MCDUF system 2700 and SILCM system 6500.
In some embodiments, such an alternative route may be displayed via the search results maps and caller maps. Furthermore, in some embodiments the MCDUF system 2700 may facilitate determining possible alternative routes which may be displayed via respective maps utilizing the Seeker app 2710 and Provider app 2790.
Much may go awry between the acceptance of a matched Provider 6590 by the Seeker 6510 and the eventual fulfillment of the URGS need(s). App-tracking and analysis facilitated by the SILCM system 6500 may record the progress of fulfillment. For example, say again that the Seeker with a toothache may be traveling to the dentist matched Provider 6590. GPS location measurements via the Seeker app 2710 may periodically be recorded by the SILCM system 6500. Additionally, communications facilitated by the MCDUF system 2700 between Seeker 6510 and Provider 6590 may be recorded. Furthermore, in some embodiments, the SILCM system 6500 may detect a travel delay—for example the Seeker is stuck in traffic—and send an alert (perhaps including an updated ‘ETA’) to the traveler's counterpart—in this example, the Provider 6590. Such recordings may be useful in avoiding upset and disappointment; and if need be, may be utilized in resolving disputes between Seekers 6510 and Providers 6590 and/or between users and the MCDUF system 2700. By aggregating and analyzing a multiplicity of MCDUF system records resulting from app-tracking and analysis corresponding to a multiplicity of attempted and successful URGS fulfillments, the SILCM system 6500 may facilitate the prediction of the progress and outcome of a given URGS fulfillment attempt.
At step 6770 in some embodiments, the SILCM system 6500 may facilitate the Provider 6590 to loyaltize the Seeker 6510. For example, the SILCM system 6500 may facilitate the Provider 6590 to issue a voucher option 6530 to the Seeker 6510.
In some embodiments, a Provider 6590 may issue a bonus voucher option 6530 to a Seeker 6510 that may be morphed into a voucher 6550 that may only be redeemed for URGS from that Provider. In some embodiments, a Seeker 6510 may utilize a voucher for acquiring—from an URGS Provider 6590—goods and/or services that may not be URGS. So perhaps the Seeker 6510 in the example above, may utilize the voucher option 6530 issued by Provider 6590 Dr. White to acquire a service of whitening the Seeker's teeth. Such a broader utilization of vouchers may further loyaltization binding between Seekers and Providers and may motivate additional business for Providers 6590 and make additional URGS and perhaps other goods and/or services more affordable and therefore more desirable for Seekers 6510.
Referring again to
At step 6780 in some embodiments, the SILCM system 6500 may facilitate the Provider 6590 to follow-up with the Seeker 6510. For example, the SILCM system 6500 may communicate an alert (not shown) via the Provider app 2790 to inform the Provider that some amount of time (perhaps also displayed) has passed subsequent to a match with a given Seeker 6510. In some embodiments, the SILCM system 6500 via the Provider app 2790 may facilitate the Provider 6590 to communicate with the Seeker 6510—perhaps asking after the Seeker and maybe suggesting a follow-up appointment. Furthermore, in some embodiments, the SILCM system 6500 may facilitate the Provider 6590 to issue a bonus voucher option 6530 as a ‘thank you’ gift rewarding such a Seeker 6510 subsequent to the Provider 6590 redeeming the voucher 6550 corresponding to the voucher option 6530 successfully morphed by the Seeker 6510.
At step 6790 in some embodiments, the SILCM system 6500 may facilitate the Seeker 6510 to input a review of the Seeker's experience with, and evaluation of, the matched Provider 6590 that may have fulfilled the Seeker's URGS need(s). Additionally, in some embodiments, the SILCM system 6500 may solicit the Seeker's 6510 feedback regarding the Seeker's experience utilizing the MCDUF system 2700 and the SILCM system 6500 (as well as, perhaps, anything else the Seeker may choose to communicate). In some embodiments, such feedback information may be utilized by the SILCM system 6500 to identify and prioritize MCDUF system 2700 and/or SILCM system 6500 enhancements, including but not limited to enhancements to the Seeker app 2710. The SILCM system 6500 may solicit such feedback reviews from the Seeker 6510 utilizing an alert via the Seeker app 2710. Such an alert may include an incentive to input a review—perhaps such a review may be ‘highlighted’ to other Seekers 6510 and/or perhaps a voucher option 6530 may be issued to the reviewing Seeker 6510 (potentially with the disclaimer that the review need not be ‘slanted’ for the voucher option to be issued).
Referring again to
At step 6640, in some embodiments. the SILCM system 6500 may loyaltize the Provider 6590.
In some embodiments, a given new Provider 6590 may for example be motivated to enroll by one or more factors including but not limited to: an expectation to attract more Seekers and other clients, a desire to have a broader presence on-line, an intention to better match the ‘mobile app’ habits of ‘gen-Xers’, ‘gen-Yers’ and ‘millennials’ who may be younger and more technically savvy than say ‘baby-boomers’. Many more factors may be recited, but the key underlying common thread in many instances may be that the Provider 6590 wants more clients and/or higher paying clients so as to increase revenue and/or profitability. Potentially, a Provider 6590 may shift away from other promotional venues—such as ‘Google words’—and towards a greater reliance on the MCDUF system 2700 and SILCM system 6500.
The MCDUF system 2700 and SILCM system 6500 may facilitate a potential provider to enroll as a new Provider 6590. (Enrolling a new Provider is discussed above in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System and is illustrated in some embodiments by exemplary screens 4200A, 4200B, 4300, 4400A, 4400B, 4500, 4600, 4700, 4800A, 4800B, 4900, 5000, 5100, 5200 and 5300A.) In some embodiments, the SILCM system 6500 via the provider enrollment facilities of the MCDUF system 2700 may loyaltize the new Provider 6590 by facilitating an ‘easy-to-understand’ and ‘quick-to-complete’ enrollment that may both guide the new Provider 6590 through the enrollment, but may also inform the new Provider 6590 how to use facilities that may be utilized both for enrollment and ‘day-to-day’ account management. The Provider 6590 may thereby be loyaltized as a consequence of the Provider appreciating the efficiency of the simultaneous enrollment and training of the Provider 6590 by the MCDUF system 2700 and the SILCM system 6500.
At step 6920 in some embodiments the SILCM system 6500 may facilitate a Provider 6590 to manage the Provider's MCDUF system 2700 account. (Managing a MCDUF system 2700 provider account is discussed above in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System and is illustrated in some embodiments by exemplary screens 4400A, 4400B, 4500, 4600, 4700, 4800A, 4800B, 4900, 5000 and 5300B.) The Provider 6590 may be loyaltized as a consequence of the Provider appreciating the ‘ease-of-use’ of the MCDUF system 2700 and the SILCM system 6500—for example as they may facilitate management of the provider descriptive information (illustrative screen 4500) and availability schedule (illustrative screens 4700, 4800A, 4800B, 4900 and 5000). In some embodiments, the Provider Day Schedule Screen (illustrative screen 5000) may be used often by the Provider 6590 to make quick updates to the Provider's availability schedule. The convenience of such an important facility may facilitate loyaltization of the Provider 6590 to the MCDUF system 2700 and the SILCM system 6500.
In some embodiments, the MCDUF system 2700 and SILCM system 6500 may facilitate ‘batch’ account management for a related group of Providers 6590. Such a related group of Providers 6590 for example may be franchise owners in a regional franchise business chain that may be administered centrally by the franchiser organization (not shown). For example, such a regional franchise business chain may be an associated group of Roto-Rooter franchises in Livermore Calif. In some embodiments, an authorized group administrator for Roto-rooter may have provider account management access for each of the Livermore Roto-rooter franchises. Furthermore, in some embodiments, such an authorized group administrator may utilize MCDUF system 2700 facilities to make “cloned” settings or updates simultaneously to two or more of such group related accounts. In some embodiments, an authorized group administrator may utilize the Provider app 2790. In other embodiments, an authorized may utilize a separate “administrator” app (not shown).
Returning to
In some embodiments, MCDUF system 2700 and SILCM system 6500 facilities for ‘batch’ account management of a related group of Providers 6590 may simplify the task of provider account management for the authorized group administrator. Such ‘batch’ facilities may motivate related groups of Providers such as franchise chains to enroll in the MCDUF system 2700. The SILCM system 6500 may utilize the value of such ‘batch’ facilities to such related groups of Providers and such authorized group administrators so as to loyaltize bind related groups of Providers 6590 with the authorized group administrator; and to bind the related groups of Providers and the authorized group administrator to the MCDUF system 2700 and the SILCM system 6500.
At step 6930 in some embodiments the SILCM system 6500 may facilitate a matching of Seekers 6510 to the Provider 6590. (Matching a Seeker to a Provider is discussed above including in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System and is illustrated in some embodiments by exemplary screens 5700, 6300 and 5400). In some embodiments, loyaltization of the Provider 6590 may be very strongly facilitated by the MCDUF system 2700 matching Seekers 6510 to the Provider 6590 such that the Seekers may select the Provider to fulfill their URSG needs. Getting the Provider 6590 business that otherwise may have gone to some other competitor may very likely have a strong loyaltization effect—binding the Provider 6590 to the MCDUF system 2700 and SILCM system 6500. Such loyaltization may be strengthened further by repeat business from such matched Seekers 6510—perhaps incentivized by voucher options gifted by the Provider 6590 utilizing the SILCM system 6500.
At step 6940 in some embodiments the SILCM system 6500 may facilitate management of promotions for the Provider 6590. The Provider 6590 may utilize the Provider app 2790 to manage participation in morphable voucher program(s). As described previously above (i.e., in discussing Seeker 6510 incentivization from the Seeker's perspective (see
The SILCM system 6590 may facilitate the increased promotional exposure of the Provider 6590 significantly beyond what the Provider otherwise may be doing (or capable of doing) so as to promote the Provider's business; and thereby incentivize and motivate additional Seekers 6510 to fulfill their URGS needs with the Provider 6590. Such business from additional Seekers incentivized and motivated by promotional activities facilitated by the SILCM system 6500 may not be directly distinguishable from other Seekers matched with the Provider by the MCDUF system 2700. However, the Seeker 6510 may mention such promotions to the Provider 6590; the Provider may ask the Seeker about such promotions; the SILCM system 6500 may survey Seekers such that the Provider may subsequently consider such survey results and analytics; or the Provider 6590 may redeem a voucher corresponding to a voucher option 6530 morphed by a given Seeker 6510 who may be thusly incentivized by the SILCM system 6500. Seeker 6510 match and fulfillment activity that may be readily apparent and/or discernable attributable to such SILCM system 6500 facilitated promotion may facilitate Provider loyaltization to the MCDUF system 2700 and the SILCM system 6500.
At step 6945 in some embodiments the SILCM system 6500 may facilitate Providers 6590 to work together, i.e., “partner” so as to jointly or serially fulfill Seekers' 6510 URGS needs, Furthermore, the SILCM system 6500 may facilitate cooperative promotions wherein two or more Providers 6590 may participate together—for example in a morphable voucher program. In some embodiments, third parties, for example one or more MCDUF system 2700 utilizers or perhaps vendors, may be facilitated by the SILCM system 6500 to join in cooperative promotions with one or more Providers 6590. Such partnering and cooperative promotion facilitated by the SILCM system 6500 may facilitate loyaltization binding between Providers 6590. Furthermore, such cooperative promotion may facilitate loyaltization binding between any two or more of: Provider 6590, Seeker 6510, MCDUF system utilizer, MCDUF system vendor, MCDUF system 2700 and SILCM system 6500.
At step 6950 in some embodiments the SILCM system 6500 may facilitate the managing and updating of the MCDUF system 2700 provider payment account (not shown), which may in some embodiments be recorded in the data base(s) 158. The SILCM matching share—i.e., the portion of a given voucher redemption amount ‘covered’ by the SILCM system 6500—may be credited by the SILCM system 6500 to the Provider's MCDUF system provider payments account. Furthermore, in some embodiments, such an account may be utilized for other rebates or payments made by the SILCM system 6500 to the Provider 6590. The payment of the SILCM matching share into the provider payments account (not shown) may represent to the Provider 6590 the MCDUF system commitment to, and active participation in morphable voucher programs thus loyaltizing the Provider 6590 to the MCDUF system 2700 and the SILCM system 6500.
At step 6960 in some embodiments the SILCM system 6500 may facilitate follow-up interaction with the Seeker 6510 by, or on behalf, of the Provider 6590. A given URGS Provider may be very busy and therefore find it difficult to find time, or even the recollection, to follow-up with Seekers 6510 previously fulfilled by the Provider 6590. For example, making follow-up phone calls may be extremely time consuming for the Provider 6590—perhaps with the Provider ‘trapped’ on the phone. A Provider 6590 may undertake to follow-up with Seekers 6510 from time to time and may perhaps utilize the Provider app 2790 to facilitate such follow-up. In some embodiments, the SILCM system 6500 may automatically facilitate following up with a given Seeker 6510, for example by alerting the Provider 6590—via the Provider app 2790—some time period subsequent to fulfilling the Seeker's needs. So further by example, in some embodiments the provider App may display a provider follow-up screen (not shown) wherein the Provider 6590 may have the option of inputting a message for the Seeker 6510 or perhaps leaving it to the SILCM system 6500 to generate a message derived from MCDUF system 2700 records of the Seeker's URGS search. In some embodiments, the SILCM system 6500 may be configured to automatically follow-up with Seekers 6510 on the Provider's 6590 behalf without disturbing the Provider 6590.
In addition to loyaltizing the Seeker 6510 to the Provider 6590, such a follow-up perhaps displayed to the Seeker 6510 by the Seeker app 2710 may in some embodiments query the Seeker to determine any additional needs fulfillment. An affirmative response may be facilitated by the MCDUF system 2700 so as to match the Seeker 6510 up with the Provider 6590 for additional needs fulfillment. Such follow-up derived additional business facilitated by the SILCM system 6500 may further loyaltize bind the Seeker 6510 and Provider 6590 as well as increase the Provider's loyaltization to the MCDUF system 2700 and the SILCM system 6500.
In some embodiments, a third party—facilitated by the SILCM system 6500—may follow-up with a given Seeker 6510. Such a third party may for example survey the Seeker relating to the Seeker's URGS requirements or relating to other subjects. In some embodiments, information so acquired from a Seeker 6510 may be recorded by the SILCM system 6500 and perhaps subsequently analyzed.
At step 6970 in some embodiments the SILCM system 6500 may facilitate a given Provider 6590 or a given Seeker 6510 to refer a Seeker 6510 or new potential seeker to a Provider 6590. The SILCM system 6500 may facilitate such referrals via the Provider app 2790 and the Seeker app 2710. The SILCM system 6500 may incentivize such referrals by issuing a voucher option to a referring Seeker 6510 and perhaps crediting a ‘referral fee’ to the provider payments account of a referring Provider 6590. Such referrals may include a notification of the referral to the referred Provider from the SILCM system 6500 whereby the SILCM system may identify the referring Seeker 6510 or Provider 6590 to the referred Provider 6590, and perhaps facilitate a ‘thank you’ message from the referred Provider 6590 back to the referring user. Such a “referral program” facilitated by the SILCM system 6500 may engender loyaltization binding between the referred Provider 6590 and the referring Seeker 6510 or Provider 6590.
At step 6980 in some embodiments the SILCM system 6500 may facilitate the utilization of the MCDUF system 2700—and perhaps also the business—of a given Provider 6590 with statistics and analytics (not shown). For example, such statistics and analytics may enable the Provider 6590 to determine how and to what extent the MCDUF system 2700 and SILCM system 6500 may augment the Provider's business. Additionally, such statistics and analytics may enable the Provider 6590 to determine how other businesses may utilize the MCDUF system 2700 and SILCM system 6500 and how such businesses may be comparable to or differ from the Provider's business. Such statistics and analytics facilities may assist the Provider 6590 to improve the Provider's business. Such assistance, particularly as reflected by statistics and analytics, may loyaltize the Provider 6590 to the MCDUF system 2700 and SILCM system 6500.
At step 6990 in some embodiments, the SILCM system 6500 may facilitate the Provider 6590 to input a review of the Provider's experience with, as well as an evaluation of, a given Seeker 6510 matched to that Provider. Additionally, in some embodiments, the SILCM system 6500 may solicit the Provider's 6590 feedback regarding the Provider's experience utilizing the MCDUF system 2700 and the SILCM system 6500 (as well as, perhaps, anything else the Provider may choose to communicate). In some embodiments, such provider feedback may be utilized by the SILCM system 6500, but perhaps not published for other Providers 6590 or Seekers 6510 to view. In some embodiments, such provider feedback information may be utilized by the SILCM system 6500 to identify and prioritize MCDUF system 2700 and/or SILCM system 6500 enhancements, including but not limited to enhancements to the Provider app 2790 and/or the Seeker app 2710. The SILCM system 6500 may notify and thank the Provider 6590 regarding such feed-back relating to such an enhancement. Furthermore, in some embodiments, the SILCM system may perhaps credit an ‘appreciation credit’ to the Provider's 6590 provider payments account (not shown) for feedback deemed to be particularly valuable to the MCDUF system 2700.
In some embodiments, the SILCM system 6500 may facilitate loyaltization of Seekers 6510 and Providers 6590 by engendering “investment” in the MCDUF system 2700—i.e., a sense of loyaltization binding resulting from or otherwise relating to: time, money, information, effort, reputation or other resources—tangible or intangible—that a MCDUF system 2700 “invested user” may have invested, or otherwise contributed to, the MCDUF system 2700. For example, a Seeker 6910 may contribute a review of a Provider that may be published by the SILCM system 6500 such that it may be viewed by other MCDUF system 2700 users. As another example, a Provider 6590 may have worked with one or several voucher issuers such that the vouchers they issue may be helping a number of needy individuals. It should be noted that investment differs from incentivization in that there may be no direct tangible inducement or incentive engendering investment in the Seeker 6510 or the Provider 6590.
Some embodiments of the SILCM system 6500 may leverage user investment in the MCDUF system 2700 in a multiplicity of ways. For example, the SILCM system 6500 may display a list via the Seeker app 2710 and/or Provider app 2790 of other potential new seekers or potential new providers that a given invested user may have induced to utilize the MCDUF system 2700 along with displaying various attributes or properties for each of the potential new seekers or potential new providers. For example, such various attributes or properties may be denoted by graphical indicators (e.g., downloaded the app; enrolled in the MCDUF system 2700; morphed voucher options issued by the invested user). Additionally, in some embodiments, the SILCM system 6500 may assign each MCDUF system 2700 user a comparative ranking (not shown) that may be displayed and viewed by other MCDUF system users—both Seekers 6510 and Providers 6590. Such rankings may have associated numeric values, or symbols; or names—e.g., ‘Samaritan’, ‘Hero’, and ‘Champ’—which may be based on an aggregate evaluation of a plurality of behaviors. Such behaviors may be widely varied.
For example, say a given Seeker 6510 may bank several voucher options 6530 and subsequently may re-gift such banked voucher options to other Seekers 6510 or potential new seeker. Such a beneficial act may raise such a re-gifting Seeker's comparative ranking. Furthermore, in some embodiments, within displays of such comparative rankings, the MCDUF system user that induced the Seeker 6510 to enroll in the MCDUF system 2700 may be prominently displayed as an on-going honor. Such an apparent honor may encourage the Seeker 6510 to endeavor to be similarly prominently displayed as an honor as displayed to other MCDUF system 2700 users.
Some embodiments of the SILCM system 6500 may facilitate the “unmorphing” of a voucher 6550 back into the corresponding voucher option 6530, so that that voucher option 6530 may be utilized subsequently. So for example, a Seeker 6510 may morph a voucher option 6530 to the corresponding voucher 6550 while sitting in the waiting room for a dental appointment with the URGS Provider dentist who is a participant in the corresponding morphable voucher program. Apologetically the receptionist may inform the Seeker 6510 that the Provider 6590 had to leave unexpectedly due to a personal emergency and that a new appointment is available on a subsequent day. By unmorphing the voucher, the Seeker 6510 may avoid effectively forfeiting it; and may be able to use the unmorphed voucher option 6530 and corresponding voucher 6550 for the re-scheduled appointment or some other USRG need. In some embodiments, unmorphing may be preformed or authorized by the Provider 6590 on the Seeker's behalf. In some embodiments, such unmorphing by the Provider 6590 may utilize facilities similar to those utilized for the redemption of vouchers 6550.
Some embodiments of the SILCM system 6500 may facilitate the morphing of the Seeker's 6510 voucher option 6530 and the redemption by the Provider 6590 of the corresponding potentially redeemable voucher 6550 by ‘tapping’ together the Seeker's and the Provider's respective client devices. Such ‘tapping’ may perhaps require only physical proximity allowing inter-device communication and not actual physical contact (as is the case today using say NFC). Such a ‘tapping’ morphing/redemption may be automated such that the SILCM system 6500 transacts the entire process electronically—perhaps with all debiting and/or crediting of funds being transacted on the Seeker's and/or Provider's behalf by the SILCM system 6500 possibly in cooperation with third-party(s) such as a payments card processor(s) with only appropriate confirmation required of the Provider 6590 and possibly the Seeker 6510. Additionally, physical proximity may be measured individually for each of the Seeker and Provider such that they may be determined to have physically rendezvoused—perhaps with a confirmation provided by the Provider 6590 and possibly the Seeker 6510. Such a streamlined morphing/redemption process may still utilize the voucher option morphing process but may eliminate the need for option ID entry by the Seeker 6510 and corresponding voucher code entry by the Provider 6590. In some embodiments, the SILCM system 6500 may be the front-end for or may be otherwise coupled with or integrated into a payments network(s).
Some embodiments of the SILCM system 6500 may facilitate a Seeker 6510 to share media content—such as a digital photograph, a video segment, or an audio recording—with an URGS Provider 6590. Such media content may be utilized to assist the Provider to better comprehend the Seeker's URGS need(s) and perhaps also the degree of urgency associated with such URGS need(s) and may be termed “URGS need contextual media content”. The Seeker App 2710 may include facilities to record, upload and share URGS need contextual media content utilizing for example the camera and microphone of Seeker's mobile device. The SILCM system 6500 may provide secured limited access storage and sharing of URGS need contextual media content so as to protect the Seeker's privacy. Additionally, the SILCM system 6500 may facilitate copying, sharing and/or otherwise accessing URGS need contextual media content from third party media content sites such as Flickr or Youtube. Furthermore, the SILCM system 6500 may facilitate copying, sharing and/or otherwise transferring URGS need contextual media content from the SILCM system 6500 to third party media content sites such as Flickr or Vimeo or Gmail as directed and controlled by the Seeker 6510 via the Seeker App 2710 and subject to SILCM system 6500 privacy policies and controls. Complementarily, the SILCM system 6500 may facilitate the Provider 6590 utilizing the Provider App 6590 to similarly capture, upload, store and share URGS need contextual media content with the Seeker 6510 and possibly third party media content sites subject also to SILCM system 6500 privacy policies and controls.
In some embodiments, automated additional facilitation by the SILCM system 6500 and/or an optional human facilitator 6560 may serve to facilitate, moderate and curate URGS need contextual media content—e.g., select, edit, transfer, highlight, narrate, caption and/or otherwise enhance, manage, simplify, order and/or analyze such content so as to facilitate and possibly improve communication between Seeker 6510 and Provider 6590 and possibly third parties. Such URGS need contextual media content may be cataloged, linked, copied and/or stored by the SILCM system 6500 for subsequent access by the Seeker 6510 or Provider 6590 or possibly sharing with third party media content sites or other third parties subject also to SILCM system 6500 privacy policies and controls. Such subsequent SILCM system 6500 facilitated subsequent access to URGS need contextual media content may for example be utilized to document and/or substantiate the Seeker's urgent need for a third party such as an insurance company. In addition to directly facilitating communication between Seeker 6510 and Provider 6590 and appropriately interested third parties, SILCM system 6500 facilities for storing and managing URGS need contextual media content may facilitate plural-partite loyaltization of such parties as well as other third parties. For example, the Seeker 6510 may share ‘before and after’ images on one or several social networking sites so as to recommend and promote the Provider 6590. The SILCM system 6500 may facilitate additional subsequent copying and management of stored copies of URGS need contextual media content such that the Seeker 6510, Provider 6590 and appropriate third parties may to some extent control, ‘curate’ and share with other third parties such copied stored content.
IV. Additional Enhancements—Co-Clientization of Adjuncted Device Clients for Access to Urgent Need Fulfillment Service
An adjuncting co-clientizing distributed URGS fulfillment system (AKA an “ACDUF” system) may perhaps be viewed as an enhanced embodiment of an URGS fulfillment system such as a MCDUF system (as described in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System). Furthermore, in some embodiments, an ACDUF system may include the facilities of a SILCM system (as described above in Section IV. ADDITIONAL ENHANCEMENTS—Systemic Incentivized Loyaltization Coupled with a Micro-Casting Distributed URGS Fulfillment System).
In the discussion above and that follows, terms may be bracketed by single quotes so as to connote commonly used technical terms (e.g., ‘log-in’) whose meaning may be well understood by one skilled in the art. Single quotes may also be utilized to bound quoted phrases or sentences—as may be apparent when so utilized.
The terms “urgent”, “urgently and “urgency”, as commonly understood as well as utilized previously herein and as follows, refer to a state or situation requiring prompt action or attention. Further by example, medical care provider Kaiser Permanente's web site defines urgency: ‘An urgent care need is one that requires prompt medical attention, usually within 24 to 48 hours, but is not an emergency medical condition.’ Additionally to distinguish urgency from emergency, Kaiser Permanente defines emergency: ‘An emergency medical condition is a medical or psychiatric condition that manifests itself by acute symptoms of sufficient severity (including severe pain) such that you could reasonably expect the absence of immediate medical attention to result in any of the following: serious jeopardy to your health; serious impairment in your bodily functions; serious dysfunction of any bodily organ or part.’ As discussed previously, URGS Seekers are typically under duress and therefore much less patient or tolerant of being delayed and/or under-served.
The term “adjunct” may be defined as ‘a thing added or combined with something else as a supplementary or auxiliary part as opposed to an essential part’. In the context of the present invention, the term relates to combining the facilities of a given device client with those of an URGS fulfillment system so as to supplement the access facilities of an URGS fulfillment system; and in doing so, supplement device client facilities for user/utilizers so as to access and utilize that URGS fulfillment system's services. Accordingly, the term “adjuncting” may be used as an adjective referring to an URGS fulfillment system that may facilitate the enhancement of a given device client such that it may become adjunct to that URGS fulfillment system. Additionally, “adjuncting” may be used as a gerund referring to the occurrence of enhancement such that a given device client may become adjunct to an URGS fulfillment system. The term “adjunctable” and may be used as an adjective referring to a given device client that may have the potential to become adjunct to an URGS fulfillment system. The term “adjuncted” and may be used as an adjective referring to a given device client that may have become adjunct to an URGS fulfillment system. The adjective “non-adjunctive” may refer to a given facility or functionality of a given device client that may be unrelated in purpose or function to the facilities of the adjuncting URGS fulfillment system. For example, a given adjuncted device client's non-adjunctive facilities and/or functionalities may include those that may have existed prior to that device client becoming adjuncted.
An ACDUF system may incentivize and facilitate “sources” (e.g., owners, operators and/or vendors) of device clients (e.g., ‘web sites’, ‘web apps’ and/or ‘native apps’) to enhance the facilities of their device clients by incorporating ACDUF system client logic. Such ACDUF system client logic, which may be embodied so as to facilitate incorporation with a given device client, may be termed a “co-client”; and such incorporation of a given co-client with an adjunctable device client may be termed “co-clientizing”. Such a “co-clientized” device client adjuncted by an ACDUF system may be leveraged so as to potentially reach and serve a broader audience of seekers and providers of URGS needs as well as possibly normal (i.e., non-urgently required) goods and/or services thereby potentially loyaltizing existing and new user/utilizers including new providers and new seekers.
The co-client logic incorporated in an adjuncted device client may perhaps be likened to a client within a client. By the incorporation of ACDUF system adjuncting co-client logic in a given adjuncted device client (that otherwise would lack the functionality of ACDUF system clients and/or URGS fulfillment system clients), the users of that adjuncted device client may gain access to some or all of the URGS fulfillment services of the adjuncting ACDUF system. Such an adjuncting distributed URGS fulfillment system may additionally have other non-adjuncted device clients (e.g. Seeker device clients and Provider device clients) as well as fulfillment server system(s) as previously described (in Section IV. ADDITIONAL ENHANCEMENTS—Systemic Incentivized Loyaltization Coupled with a Micro-Casting Distributed URGS Fulfillment System).
A potential source of an adjuncted device client may for example be an internet technology vendor and/or developer—i.e., an “app vendor”—who may develop, maintain and/or host electronic device and network enabled technology for merchants, service providers and other business people.
A multiplicity of web browser-enabled adjuncted device clients may potentially be individually crawled and ranked by search engines (e.g., Google and Yahoo). They may thus be associated with the ACDUF system service and with other adjuncted device clients; and thereby concomitantly improve the search ranking of themselves and the ACDUF system service; and perhaps increase the likelihood that potential new seekers and providers may discover and try out the URGS fulfillment services (not shown) facilitated by the ACDUF system. In this way, the ACDUF system including its URGS fulfillment services as well as corresponding branding may reach a broader audience. In other words, the incorporation of adjuncting co-client logic in an adjuncted device client may have a synergistic effect enhancing the adjuncted device client and increasing utilization of the ACDUF system—thereby benefiting both the typical users and the source(s) of the adjuncted device client as well benefiting the users/utilizers and operators of the ACDUF system. Furthermore, since merchants and service providers and app vendors may on occasion survey their competitors' web sites and/or apps, adjuncted device clients may serve effectively as advertisements that may attract and recruit additional parties to source their web sites, apps and other device clients to be co-clientized and thusly adjuncted by the ACDUF system. The ACDUF system 8600 may additionally utilize social media and networking facilities to advertise and otherwise promote adjuncted device client 8620, the sources (not shown) of adjuncted device clients, adjunct providers 8690 as well as the ACDUF system 8600. Additionally, the ACDUF system 8600 may utilize the facilities of a given media or social networks (e.g., Twitter) to facilitate communication between a given adjunct seeker 8610 and adjunct provider 8690.
For the sake of brevity, unless stated explicitly otherwise, the term “client” may be taken to connote “device client” and an “URGS fulfillment system” may be taken to connote a “distributed URGS fulfillment system”. Also unless stated explicitly otherwise, an “adjuncted device client” and an “adjuncted client” may both be taken to connote a “co-clientized adjuncted device client”.
An ACDUF system may be embodied so as to include an URGS fulfillment system. Furthermore, as described previously above (in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System), such an URGS fulfillment system may include micro-casting facilities and/or other facilities such that it may embody a MCDUF system 2700. Additionally, as described above (in Section IV. ADDITIONAL ENHANCEMENTS—Systemic Incentivized Loyaltization Coupled with a Micro-Casting Distributed URGS Fulfillment System), a SILCM system 6500 may be embodied in association with such a MCDUF system 2700 such that, for example, the SILCM system 6500 may facilitate loyaltization binding between users of the MCDUF system—particularly between Seekers and Providers—as well as between such users and the MCDUF and SILCM systems (i.e., tri-partite loyaltization). Therefore, in the discussion that follows, embodiment(s) of the ACDUF system may include facilities of a MCDUF system 2700 and/or a SILCM system 6500. However, the present invention may additionally be embodied to be utilized in association with facilities of an URGS fulfillment system other than a MCDUF system 2700. Furthermore, the present invention may additionally be embodied to be utilized in association with facilities of an URGS fulfillment system with loyaltization other than and/or in addition to: none, some or all loyaltization facilities of a SILCM system 6500.
The ACDUF system may distinguish between several types of user/utilizer of the ACDUF system and may facilitate a corresponding class of services for each. So for example, an ACDUF system may distinguish the following user/utilizer types and corresponding “service classes”: “Seeker” (AKA “URGS Seeker”), “Provider” (AKA “URGS Provider”) and “third party utilizer”. These three user/utilizer types were previously described above relative to a MCDUF URGS fulfillment system (in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System). Additionally an ACDUF system as opposed to say a MCDUF system may distinguish several additional types of user/utilizer including but not limited to “adjunct provider” and “adjunct seeker”. An adjunct provider may be somewhat analogous to an URGS Provider (in the sense of providing goods and/or service) and an adjunct seeker may be somewhat analogous to an URGS Seeker (in the sense of seeking goods and/or service). Both are described in greater detail further below.
The ACDUF system co-client that may be incorporated in an adjuncted device client may be termed an “adjuncting co-client”. In some embodiments, a given adjunct provider may also be facilitated by the ACDUF system to utilize a corresponding device client (i.e., an “adjunct provider device client”) to access ACDUF system services. In some embodiments, an ACDUF system may distinguish an additional type of user/utilizer: a “co-client administrator”—or “co-client admin” for short. The co-client admin utilizing a corresponding “co-client admin device client” may configure and otherwise administer facilities of the adjuncting co-client incorporated in the adjuncted device client. The co-client admin may for example be the source of the adjuncted device client or the co-client admin may be a party otherwise appointed. In some embodiments, a plurality of co-client admins may be appointed for a given adjuncting co-client 8630.
To facilitate discussion,
Referring again to
To help distinguish between a Seeker 6510 and an adjunct seeker 8610, an adjunct seeker 8610 may be any given user utilizing an adjuncting co-client 8630 incorporated in an adjuncted device client 8620 so as access the services of an ACDUF system 8600 to find and possibly acquire goods and/or services. Similar to a Seeker 6510, a given adjunct seeker 8610 may urgently require the sought after goods and/or services, but it may also be possible that the adjunct seeker's requirement may be other than urgent. As a consequence, an ACDUF system 8600 may utilize and adapt URGS fulfillment facilities more broadly so as to fulfill non-URGS as well as URGS needs for adjunct seekers 8610.
Therefore for example, a Seeker 6510, who may utilize the URGS fulfillment services of the ACDUF system 8600 via the Seeker device client 2710, may separately also be an adjunct seeker 8610 by utilizing the ACDUF system 8600 via the adjuncting co-client 8630 incorporated in the adjuncted device client 8620. However, conversely, a given adjunct seeker 8610 may lack an URGS need and/or may forgo acquiring or utilizing a Seeker device client 2710 and therefore not be a Seeker 6510. Many adjunct seekers 8610 may be candidates for recruitment to become Seekers 6510 as nearly everyone has an urgent need from time to time. In some embodiments, the loyaltization facilities of the ACDUF system 8600 may include recruitment of a given adjunct seeker 8610 so as to motivate and/or facilitate acquiring a Seeker device client 2710 and becoming a Seeker 6510.
In some embodiments, the adjunct seeker 8610 may utilize the adjuncting co-client 8630 to access ACDUF system services. Incorporation of the ACDUF system adjuncting co-client 8630 in the adjuncted device client 8620 may for example be facilitated directly by utilizing ‘in-line’ incorporation of the co-client logic; and/or virtually by re-directing or forking to the co-client logic that may for the most part be hosted separately (for example, using an HTML ‘Redirect’ command incorporated in an adjuncted device client that may be a web app). In some embodiments, app vendors, adjuncted device client sources and/or third parties may develop an adjuncting co-client 8630 that may utilize an ACDUF system ‘API’ and branding. Accordingly, a given adjuncting co-client 8630 utilized to co-clientize the adjuncted device client 8620 may perhaps be supplied by parties other than the operators of the corresponding ACDUF system 8600.
In some embodiments, the adjuncted device client 8620 may be a native app or a web app devised specifically to run on a mobile device with a smaller screen than a traditional PC or laptop, accordingly, the corresponding adjuncting co-client 8630 may like-wise facilitate utilization of such smaller screens—perhaps by auto-detecting them and dynamically adjusting display characteristics as appropriate for such smaller screens.
Referring further to
In some embodiments, a given ACDUF system user/utilizer may ‘log-in’ utilizing a given device client appropriate to that user/utilizer type so as to dynamically associate that device client with that user/utilizer. For example, a given adjunct provider 8690 may ‘log-in’ utilizing a given adjunct provider device client 8680 so as to dynamically associate that adjunct provider device client 8680 with that adjunct provider 8690. In some embodiments, a given user/utilizer type appropriate device client may be pre-associated with a given ACDUF system user/utilizer so as to obviate the need for such a log-in.
Referring further to
To facilitate discussion,
In some embodiments the co-client admin 8870 perhaps utilizing a corresponding co-client admin device client 8860 may configure and otherwise administer facilities of the ACDUF system 8600 associated with the adjuncting co-client 8630 and accessed utilizing that adjuncting co-client 8630 incorporated in the corresponding adjuncted device client 8620. Furthermore, in some embodiments, the co-client admin 8870 may co-clientize one or more additional thusly adjuncted device client 8620. So for example, such a co-client admin 8870 may operate a web-site for an antique car club as well as a corresponding mobile device web app for that antique car club—both of which may be co-clientized by incorporating respective adjuncting co-clients 8630. Accordingly, in some embodiments, the ACDUF system 8600 may facilitate a co-client admin 8870 to separately configure and otherwise administer each adjuncting co-client 8630 for which that co-client admin 8870 has ACDUF system facilitated co-client administrative access. In some embodiments, the ACDUF system 8600 may facilitate access to utilization statistics and metrics corresponding to a given adjuncting co-client 8630. Such co-client utilization statistics, metrics and projections may be accessed by the co-client admin 8870 and in some embodiments may be accessed by adjunct providers 8690.
In some embodiments, the “style” of a given adjuncting co-client 8630 may be configured such that it may have a ‘look and feel’ resembling the appearance and operational characteristics of the adjuncted device client 8620 incorporating that adjuncting co-client 8630. For example, for the ‘look and feel’ of a web site adjuncted device client 8620, a cascading style sheet may be configured for the adjuncting co-client 8630.
In some embodiments, a given adjuncting co-client 8630 may be configured for subsequent “assignment” to a given “assigned-to” adjunct provider 8690 (and to the corresponding adjunct provider profile (not shown) for that assigned-to adjunct provider 8690). Such subsequent assignment may for example be configured by the co-client admin 8870 of the thusly configured adjuncting co-client 8630. In some embodiments, a given adjuncting co-client 8630 may be configured for subsequent assignment to one or a plurality of adjunct provider(s) 8690. Furthermore, in some embodiments, the configuration of subsequent assignment and corresponding “realization” of such subsequent assignment may be temporally separated happenings. For convenience in the discussion that follows, unless stated explicitly otherwise, the terms “assigned” and “subsequent assignment” may be taken to mean such a “realized assignment” as opposed to the configuration resulting subsequently in such a realized assignment. In some embodiments, the subsequent assignment of a thusly configured adjuncting co-client 8630 to corresponding assigned-to adjunct provider(s) 8690 may provide a given adjunct seeker 8610 access—via the adjuncting co-client 8630 facilitated by the ACDUF system 8600—to information from the assigned-to adjunct provider(s)′ adjunct provider profile(s) (not shown) pertaining to the assigned-to adjunct provider(s) 8690; and possibly in some embodiments such assignment may additionally enable potential communication between such a given adjunct seeker 8610 utilizing that adjuncting co-client 8630 and at least one such assigned-to adjunct provider 8690.
In some embodiments, the co-client admin 8870 for the adjuncting co-client 8630 incorporated in the adjuncted device client 8620—as well as an adjunct provider 8690 that the adjuncting co-client 8630 incorporated in the adjuncted device client 8620 may be subsequently assigned to—may be the same party (i.e., an “adjunct provider/admin”). Such an adjunct provider/admin (not shown) may for example be a tow truck driver and the corresponding adjuncted device client 8620 may be the tow truck driver's towing service web site. Further by example, the tow truck driver may both configure and otherwise administer the adjuncting co-client 8630 incorporated in his web site as well as being the adjunct provider 8690 assigned to the adjuncting co-client 8630 incorporated in his web site. In some embodiments, a ‘unified’ “adjunct provider/admin device client” (not shown) may be utilized by such an adjunct provider/admin (not shown). In some embodiments, such an adjunct provider/admin device client (not shown) may be an enhanced adjunct provider device client 8680 that additionally includes the facilities of a co-client admin device client 8860; or perhaps an enhanced co-client admin device client 8860 that additionally includes the facilities of an adjunct provider device client 8680. In any such embodiment, access to such additional facilities, may for example be controlled utilizing a ‘log-in’ facility.
In some embodiments, the ACDUF system 8600 system may facilitate a ‘unified’ “adaptive provider/admin device client” (not shown) that may be utilized by adjunct providers 8690 and by co-client admins 8870 and by adjunct provider/admins (not shown) so as to access the ACDUF system services specific to each such type of user/utilizer. In some embodiments, an adaptive provider/admin device client (not shown) may also facilitate utilization of the ACDUF system 8600 by URGS Providers 6590—i.e., by facilitating services equivalent to those of a Provider device client 2790. Such a single unified adaptive provider/admin device client (not shown), which may include facilities for both adjunct providers 8690 and URGS Providers 6590, may be useful in recruiting adjunct providers 8690 to become URGS Providers 6590 (without acquiring a separate new Provider device client 2790).
In some embodiments, the facilities provided by an adaptive provider/admin device client (not shown) may be determined by identification of the corresponding user/utilizer and the user/utilizer type(s) associated with that identification. So for example, log-in credentials provided by a user/utilizer may thusly identify that user/utilizer and their corresponding user/utilizer type to the ACDUF system 8600. Further by example, our tow truck driver may log-in via his adaptive provider/admin device client (not shown) utilizing his user name and password and thereby be identified by the ACDUF system 8600 and also be determined to be of user/utilizer type adjunct provider/admin. Consequent to such a log-in, the ACDUF system 8600 may facilitate utilization of adjunct provider/admin facilities via the tow truck driver's adaptive provider/admin device client (not shown).
For simplicity, in the preceding discussion as well as in the discussion that follows, descriptions of ACDUF system facilities and utilization pertaining to a co-client admin 8870 may apply equally to an adjunct provider/admin (not shown) utilizing a adjunct provider/admin device client (not shown) or an adaptive provider/admin device client (not shown) to configure or otherwise administer an adjuncting co-client 8630. In some embodiments, a given adjuncting co-client 8630 may be configured and/or otherwise administered by a plurality of co-client admin(s) 8870 and/or adjunct provider/admin(s) (not shown).
In some embodiments, the co-client admin 8870 of the adjuncted device client 8620 may be a party other than any of the adjunct provider(s) 8690 that the adjuncting co-client 8630 incorporated in the adjuncted device client 8620 may be assigned to. For example, the adjuncted device client 8620 may be a web site for an antique car club; the adjunct providers (say two or more) 8690 may be members of that club and the co-client admin 8870 may be an app vendor hired by the club to develop, manage and enhance the car club's web site. In this example, a plurality of car club members may be adjunct providers 8690. Furthermore, the tow truck driver of the previous example may be a car club member and one of the adjunct providers 8690 for the car club's adjuncted web site (in addition to separately being an adjunct provider 8690 for his own adjuncted towing service web site). In some embodiments, a plurality of adjuncting co-clients 8630 may be assigned to a given adjunct provider 8690—such as in the example of the tow truck driver above.
In some embodiments, the source (not shown) of the adjuncted device client 8620, the co-client admin 8870 for the adjuncting co-client 8630 incorporated in the adjuncted device client 8620—as well as an adjunct provider 8690 the adjuncting co-client 8630 incorporated in the adjuncted device client 8620 may be assigned to—may all be the same party.
In some embodiments, the subsequent assignment of an adjuncting co-client 8630 may have at least two possible “assignment modalities”: “pre-assignment” and “dynamic assignment”. Each of these two assignment modalities will be described in the discussions that follow.
In some embodiments, a given adjuncting co-client 8630 may be “pre-assigned” to just one adjunct provider 8690 such that for any given utilization of that adjuncting co-client 8630 by a given adjunct seeker 8610, the ACDUF system 8600 may facilitate that adjunct seeker 8610 to access information pertaining to that just one adjunct provider 8690 that the adjuncting co-client 8630 may be pre-assigned to. In some embodiments, a given adjuncting co-client 8630 may be pre-assigned to a plurality of adjunct providers 8690 such that for any utilization of that adjuncting co-client 8630 by a given adjunct seeker 8610, the ACDUF system 8600 may facilitate that adjunct seeker 8610 to access information pertaining to that plurality of adjunct providers 8690 that the adjuncting co-client 8630 may be pre-assigned to. In some embodiments, pre-assignment may be configured—perhaps by the appropriate co-client admin 8870 or adjunct provider/admin (not shown)—or possibly automatically by the ACDUF system 8600.
In some embodiments, a given adjuncting co-client 8630 may be “dynamically assigned” to one or a plurality of assigned-to adjunct providers 8690 dynamically determined—facilitated by the ACDUF system 8600—from a set of one or a plurality of assigned-to adjunct providers 8690. Such a given dynamically determined assigned-to adjunct provider 8690 may for example be included in such a set—i.e., a “dynamic assignment pool”—as the result of a configured subsequent assignment of that adjuncting co-client 8630 to that assigned—to adjunct provider 8690; i.e., each such configured subsequent assignment may add the corresponding assigned—to adjunct provider 8690 to such a dynamic assignment pool. Furthermore, in some embodiments, each subsequent adjunct seeker 8610 utilizing a given dynamically assigned adjuncting co-client 8630 may access information specific to one or perhaps more adjunct provider(s) 8690 that that adjuncting co-client 8630 may be dynamically assigned to. In some embodiments, dynamic assignment may be configured—perhaps by the appropriate co-client admin 8870 or adjunct provider/admin (not shown)—or possibly automatically by the ACDUF system 8600.
In some embodiments, each subsequent adjunct seeker 8610 utilizing a given assigned adjuncting co-client 8630 may access information specific to one or perhaps more than one adjunct provider 8690 that the adjuncting co-client 8630 may be assigned to. In some embodiments, a given adjuncting co-client 8630 incorporated in an adjuncted device client 8620 may be dynamically assigned (rather than statically pre-assigned) to an adjunct provider 8690—wherein that adjunct provider (and corresponding adjunct provider profile) may for example be selected randomly or based on one or more criteria. Therefore, which adjunct provider 8690 the adjuncting co-client 8630 may be dynamically assigned to may potentially change between subsequent successive utilizations during the course of a plurality of utilizations of the adjuncting co-client 8630 by adjunct seekers 8610. As a consequence, a plurality of adjunct providers 8690 may effectively share such an adjuncting co-client 8630 so as to display information from their respective adjunct provider profiles to such successive adjunct seekers 8610.
As stated above, in some embodiments, a given adjuncting co-client 8630 incorporated in an adjuncted device client 8620 may be dynamically assigned to an adjunct provider 8690—wherein the adjunct provider (and the corresponding adjunct provider profile) may perhaps be selected randomly or based on one or more criteria. For example, such dynamic assignment criteria may be the perceived or implied characteristics of the adjunct seeker 8610 that may correlate to the adjunct provider profile of the adjunct provider 8690. So for example, assuming an adjunct seeker 8610 may be perceived to require road-side assistance, the adjuncting co-client 8630 may be dynamically assigned to the adjunct provider profile of the tow truck driver out of the group of antique car club adjunct providers 8690. Further by example, if two car club adjunct providers 8690 have towing services, the towing service provider profile that the adjuncting co-client 8630 may be dynamically assigned to (and therefore which towing service may be displayed to the adjunct seeker 8610) may perhaps be algorithmically selected based on the shortest adjunct provider response time as derived from the adjunct seeker's geo-location.
In some embodiments, a given adjuncting co-client 8630 may be concurrently assigned to a plurality of adjunct providers 8690 such that information pertaining to each of such a plurality of adjunct providers 8690 may be accessed concurrently by the adjunct seeker 8610 utilizing the adjuncting co-client 8630 incorporated in the adjuncted device client 8620. So continuing with our antique car club example, a plurality of the antique car club members may be adjunct providers 8690 who may be assigned to the adjuncting co-client 8630 incorporated in the club's adjuncted web site such that information relative to one or more than one of such antique car club member adjunct providers 8690 may be accessible to an adjunct seeker 8610 utilizing that adjuncting co-client 8630. So further by example, an adjunct seeker 8610 with a blown-out tire may access information about say three different tire services, each of whom as members of the antique car club may be adjunct providers 8690.
In some embodiments, wherein an adjuncting co-client 8630 may be assigned to one or more adjunct providers 8690 and there may be two or more such assignments to that adjuncting co-client 8630, such assignment may be termed “sequential”. In some embodiments, wherein an adjuncting co-client 8630 may be assigned to one or more adjunct providers 8690 that may differ between any two given assignments to that adjuncting co-client 8630, such assignment may be termed “diverse”. In some embodiments, wherein an adjuncting co-client 8630 may be assigned to one or more adjunct providers 8690 such that the one or more adjunct providers 8690 differ between two assignments in sequence to that adjuncting co-client 8630, such assignment may be termed “successive”. In some embodiments, wherein an adjuncting co-client 8630 may be assigned to two more adjunct providers 8690 in relation to a single utilization of that adjuncting co-client 8630 by a given adjunct seeker 8610, such assignment may be termed “concurrent”. In some embodiments, wherein two or more copies of an adjuncting co-client 8630 may be executing concurrently and a given adjunct provider 8690 assigned individually to at least two of those concurrently executing copies may be the same adjunct provider 8690, such assignment of that same adjunct provider 8690 may be termed “simultaneous”.
In some embodiments, the adjunct provider 8690 to whom a given adjuncting co-client 8630 may be assigned may be a party other than the co-client admin 8870 of that adjuncting co-client 8630; or the adjunct provider/admin (not shown) of that adjuncting co-client; or the source (not shown) of the adjuncted device client the adjuncting co-client 8630 is incorporated in.
In some embodiments, the adjunct provider 8690 to whom an adjuncting co-client 8630 may be assigned may also be the party sourcing the adjuncted device client 8620 incorporating that assigned adjuncting co-client 8630. So for example, such an adjunct provider 8690 may be our tow truck driver and the corresponding assigned adjuncting co-client 8630 may be incorporated in the adjuncted web site for the tow truck driver's towing service. An adjunct seeker 8610 (perhaps a stranded driver) utilizing the adjuncted towing service web site may for example utilize the adjuncting co-client 8630 to help arrange getting road-side assistance. The adjuncting co-client 8630 may perhaps provide access to information from the tow truck driver's adjunct provider profile (not shown) regarding availability of the towing service's tow truck. Further by example, the assigned adjuncting co-client 8630 may provide a facility to communicate with the corresponding adjunct provider 8690—i.e., the tow truck driver—via perhaps the tow truck driver's adjunct provider device client 8680.
In some embodiments, a given adjuncting co-client 8630 may be identified by the ACDUF fulfillment server(s) system 8650—utilizing a “co-client ID”—so as, for example, to facilitate assignment of a given adjuncting co-client 8630 to adjunct provider(s) 8690. Further by example, the ACDUF system 8600 may utilize co-client IDs to facilitate the collection and generation of analytics (and perhaps payments) related to the utilization of the set of adjuncting co-clients 8630 of the ACDUF system 8600. In some embodiments, a given co-client ID may be a unique ID that may generated (or ‘pre-vetted’ for uniqueness) by the ACDUF system 8600 so as to nominally uniquely identify the corresponding adjuncting co-client 8630. In some embodiments, there may be many copies of an adjuncting co-client 8630 that may be utilized concurrently. For example, several dozen users—each using separate access devices—may be concurrently accessing the antique car club web site; and therefore each may be utilizing a separate copy of the adjuncting co-client 8630 incorporated in the antique car club web site and downloaded to each user's separate access device (perhaps as HTML and/or other browser-interpreted code). Consequently, the ACDUF system 8600 may facilitate concurrent utilization of a plurality of copies of a given adjuncting co-client 8630. In some embodiments, the ACDUF fulfillment server(s) system 8650 may associate the co-client ID with additional adjuncting co-client 8630 identifying information (e.g., IP address and TCP connection information) in order to uniquely identify a given individual copy out of a plurality of concurrently utilized copies of a given adjuncting co-client 8630. Such additional “co-client copy ID” identification information—perhaps generated dynamically—may be utilized by the ACDUF system 8600 to disambiguate identification and concurrent communication with such a plurality of concurrently utilized copies of a given adjuncting co-client 8630.
In some embodiments, the ACDUF system 8600 may require an adjuncting co-client 8630 to be configured to be subsequently assigned to at least one adjunct provider 8690 prior to incorporating that adjuncting co-client 8630 in the corresponding adjuncted device client 8620.
Returning again to
In some embodiments, adjunct providers and adjunct seekers may utilize their respective device clients (8680 and 8630) for differing purposes and therefore each may have their own corresponding adjunct services (not shown)—i.e., “adjunct provider's services” and “adjunct seeker's services” respectively.
In some embodiments, adjunct provider's services may include but not be limited to: configuring a adjunct provider profile that may record information pertaining to a given adjunct provider 8690; configuring adjunct provider immediate availability; configuring adjunct provider scheduled availability; enabling/disabling display of adjunct provider location, monitoring the adjunct provider's rating by adjunct seekers 8610; communicating with a given adjunct seeker 8610, redeeming an adjunct seeker's voucher option 6530; and rating a given adjunct seeker 8610. In some embodiments, a given adjunct provider may be facilitated by the ACDUF system to utilize or otherwise access adjunct provider's services via an adjunct provider device client 8680 or an adjunct provider/admin device client or an adaptive provider/admin device client (not shown) or perhaps an ACDUF system ‘virtual device client’ (as may be described further below).
In some embodiments, adjunct seeker's services (not shown) may include but not be limited to: displaying adjunct provider profile; displaying adjunct provider immediate availability; displaying adjunct provider scheduled availability; displaying adjunct provider location, displaying adjunct provider rating by other adjunct seekers 8610; communicating with adjunct provider 8690, issuing a voucher option 6530 that may be redeemed by an adjunct provider 8690; and rating an adjunct provider 8690.
In some embodiments, the adjunct seeker's services available via a given adjuncted device client's adjuncting co-client 8630 may differ from those from some other adjuncted device client's adjuncting co-client 8630. In some embodiments, the set of adjunct seeker's services available at a given adjuncted device client's adjuncting co-client 8630 may be determined dynamically. In some embodiments, the set of the adjunct seeker's services available at a given adjuncted device client's adjuncting co-client 8630 may be determined and/or limited in some way by the underlying native facilities of the seeker's device (not shown). For example, an adjuncting co-client 8630 incorporated in an iPhone native app may facilitate communicating a geo-position for the adjunct seeker 8610 to the corresponding adjunct provider 8690. However, an adjuncting co-client 8630 incorporated in an iPhone web app perhaps may not support such a geo-location facility due to the limitations of the iPhone's web browser (not shown).
In some embodiments of an ACDUF system 8600, an assortment of adjuncting co-clients 8630 may be embodied such that each such adjuncting co-client may have a fixed unique set of adjunct seeker's services (not shown). Each such adjuncting co-client 8630 with such a fixed unique set of adjunct seeker's services may be termed a “bundled service co-client”. In some embodiments, a given co-client admin 8870 for an adjuncting co-client 8630 incorporated in an adjuncted device client 8620 may select or otherwise configure that adjuncting co-client 8630 to be a bundled service co-client. In some embodiments, the ACDUF system 8600 may provide a selection of bundled service co-client options for a co-client admin 8870 to choose from so as to configure an adjuncting co-client 8630.
In some embodiments, an adjuncting co-client's set of adjunct seeker's services (not shown) may be ‘hard-coded’, i.e., fully determined by the logic of the adjuncting co-client 8630 itself. However, in some embodiments, an adjuncting co-client's set of adjunct seeker's services may be determined at least in part by external facilities—for example by a configuration data base within the ACDUF fulfillment server(s) system 8650 which may enable or disable service(s) from a set of potential services ‘hard-coded’ in the adjuncting co-client 8630. In some such “soft co-client”—i.e., external-facility-configured—embodiments, the ACDUF system 8600 may facilitate the potential dynamic derivation of a plurality of ‘virtual’ bundled service co-clients from a remotely configurable adjuncting co-client 8630.
In some embodiments, a set of adjunct seeker's services (i.e., a “service personality”) may be configured for a given adjuncting co-client 8630, which may be a soft co-client, such that those adjunct seeker's services may be subsequently “expressed”, i.e., accessed, via that adjuncting co-client 8630. In some embodiments, a given co-client admin 8870 may configure a service personality for a given adjuncting co-client 8630.
In some embodiments, a service personality may be configured corresponding to a given adjunct provider 8690 such that subsequent assignment of a given adjuncting co-client to that assigned-to adjunct provider 8690 may express that corresponding service personality. So for example, consider again the antique car club's adjuncting co-client 8630, which in this example may be a soft co-client. Furthermore, for this example, the ACDUF system 8600 may dynamically assign varying adjunct providers 8690 to that adjuncting co-client 8630. In this example, successive utilizations—by successive adjunct seekers 8610—of the antique car club's adjuncting co-client 8630 may result in expressing substantially varying service personalities with corresponding differing displays and utilization.
In some embodiments, for each successive dynamic assigning of a given soft co-client to a given assigned-to adjunct provider 8690 and their respective service personality, the service personality configured for a given assigned-to adjunct provider 8690 corresponding to a given such assignment may be expressed so as to dynamically reconfigure the soft co-client. A given soft co-client may thusly be utilized to provide a succession of adjunct seeker's services facilitated by the ACDUF system 8600 utilizing the service personalities of differing assigned-to adjunct providers 8690. So further by example, the soft co-client embodied in the antique car club web site's adjuncting co-client 8630 may express an ACDUF system 8600 facilitated availability service that may display the tow truck driver's availability information. Subsequently, that soft co-client may be ‘soft’ reconfigured to express an ACDUF system 8600 facilitated contact feature that may display an auto parts store owner's contact information.
In some embodiments, a given assigned-to adjunct provider 8690 may partially or fully configure the service personality of the corresponding adjuncting co-client 8630 subsequently assigned to that assigned-to adjunct provider 8690. In some embodiments, the service personality expressed via a given adjuncting co-client 8630 may be configured for that adjuncting co-client 8630 in lieu of or in addition to a service personality configured for a given assigned-to adjunct provider 8690 that that adjuncting co-client 8630 may be assigned to. In some embodiments, wherein a plurality of assigned-to adjunct providers 8690 may be concurrently assigned to a given adjuncting co-client 8630, the ACDUF system may combine any service personalities as may have been configured for that adjuncting co-client 8630 by such assigned-to adjunct providers 8690—along the service personality (if any) that may have been configured by the co-client admin 8870 of that adjuncting co-client 8630—so as express a reconciled ‘unified’ service personality.
In some embodiments, the service personality(s) associated with a given adjuncting co-client 8630 may configure, limit, or otherwise control some or all of the facilities and ACDUF system services that may accessed via that adjuncting co-client 8630. Such facilities and ACDUF system services may be thusly configured, limited, or otherwise controlled by such service personality(s) effective at the adjuncting co-client 8630 (e.g., a soft co-client) or effective at the ACDUF fulfillment server(s) system 8650 or perhaps distributed in effect at and/or between the two. Additionally, in some embodiments, such configuring, limiting, or otherwise controlling such facilities and ACDUF system services may additionally be subject additionally to configurations, limitations and/or controls related to execution on the specific client device hosting that adjuncting co-client 8630.
In some embodiments, the seeker's service set expressed via a given adjuncting co-client 8630 may be static such that the service set may be the same regardless of which adjunct provider 8690 may be assigned to that adjuncting co-client 8630 (or which adjunct seeker 8610 may be utilizing it). So, in addition to the assigning of an adjuncting co-client 8630 to adjunct provider(s) 8690 to (i.e., the who) potentially being static or dynamic, the expression of the corresponding service personality by the adjuncting co-client 8630 (i.e., the what) may also potentially be static or dynamic. Furthermore, in some embodiments, the ACDUF system 8600 may automatically perform some or all of the adjuncting co-client administrative services that may otherwise be performed by a co-client admin 8870 or adjunct provider/admin (not shown). So for example, a sole proprietor adjunct provider 8690, in co-clientizing her web page, may not want to deal with configuring assignment, service personalities, etc., and may benefit from the ACDUF system 8600 performing such co-client administrative services automatically.
In some embodiments, a given adjunct provider 8690 may initiate or otherwise cause the configuration of a specific adjuncting co-client 8630 for subsequent assignment to that adjunct provider 8690. In some embodiments, an adjunct provider 8690 may be facilitated by the ACDUF system 8600 to so configure such a specific adjuncting co-client 8630. In some embodiments, the ACDUF system 8600 may vet such and an adjunct provider 8690 so as to determine whether to allow such a configuration. In some embodiments, such vetting may alternatively or additionally be performed by an co-client admin 8870 for such a specific adjuncting co-client 8630.
To facilitate discussion,
In some embodiments, the ACDUF system 8600 may facilitate an “adjunct provider mode” whereby a Provider 6590 utilizing the Provider device client 2790 may utilize the adjunct provider facilities accessed by an adjunct provider device client 8680 (or an provider/admin device client (not shown)) and utilize such facilities of the ACDUF system 8600 as a ‘virtual’ adjunct provider. In some embodiments, the Provider's device client's adjunct provider mode may replicate some or all of the ACDUF system facilities accessed by an adjunct provider 8690 via an adjunct provider device client 8680 (or an provider/admin device client (not shown)). Furthermore, in some embodiments, the adjunct provider mode facilities of the Provider device client 2790 may substantially resemble or replicate the facilities of the URGS mode of the Provider device client 2790, such that the differences between interoperating with an adjuncting co-client 8630 and interoperating with a Seeker device client 2710 are minimized for a Provider 6590. In some embodiments, for example, the Provider 6590 may utilize the adjunct provider mode of the Provider device client 2790 to interact as an adjunct provider/admin with an adjuncting co-client 8630—perhaps self-assigning and configuring the service personality of a soft co-client incorporated in that Provider's adjuncted device client 8620. So referring again to the example of the dentist Dr. Keith White (exemplified previously in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System), URGS Provider Dr. White may for example co-clientize his own web site; and perhaps utilizing the adjunct provider mode of the Provider device client 2790 as an adjunct provider/admin, Dr. White may self-assign and configure the adjuncting co-client 8630 via the Provider device client 2790. In some embodiments, a given URGS Provider 6590 perhaps with an earlier version of the Provider device client 2790, may be ‘soft upgraded’ to an adaptive provider/admin device client (not shown). In some embodiments, such a soft upgrade may perhaps be automatic as well as perhaps ‘transparent’ to that Provider—i.e., a “transparent auto-update”.
Referring again to
In some embodiments, as discussed above, there may be substantial similarity or over-lap in facilities between an adjunct provider device client 8680 and a Provider device client 2790. Both such clients are associated with corresponding types of providers (i.e., adjunct provider 8690 and URGS Provider 6590). In contrast, in some embodiments, a Seeker device client 2710 and an adjuncting co-client 8630 may differ more significantly as the Seeker device client 2710 may be associated with a specific Seeker 6510, whereas the adjuncting co-client 8630 may potentially be utilized by any number of users—successively and/or concurrently. Furthermore in some embodiments—whereas the Seeker 6510 may have logged-in to the Seeker device client 2710 and therefore may have an identity that may at least in part be exposed to a matched Provider 6590—a given adjunct seeker 8610 may in contrast potentially be virtually anonymous. Unlike a Seeker 6510 associated with a Seeker device client 2710, a given adjunct seeker 8610 may lack any pre-existing association with the adjuncting co-client 8630 utilized by that adjunct seeker 8610. So for example, by way of comparative analogy, a Seeker device client 2710 may be to an adjuncting co-client 8630 like a home phone is to a payphone.
In some embodiments, a given adjunct seeker 8610 may be enrolled by the ACDUF system 8600 and may be indentified—for example by log-in or association with a specific access device—in the utilization of an adjuncting co-client 8630 by such an enrolled adjunct seeker 8610.
In some embodiments, “incremental enrollment” facilities (discussed previously in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System) may be utilized to motivate a given adjunct seeker 8610 to provide self-identifying information. For example, the adjuncting co-client 8630 incorporated in the adjuncted device client 8620 may request a name and a call back phone number or email address so that the adjunct provider 8690 or Provider 6590 may contact the adjunct seeker 8610. Such self-identifying information provided by a given adjunct seeker 8610 may be recorded in an ACDUF fulfillment server(s) system 8650 data base such as the adjunct data base(s) 8858 and utilized subsequently for activities such as loyaltization.
Although a given adjuncting co-client 8630 may lack a dedicated adjunct seeker 8610 (e.g., an exclusive user), the adjuncting co-client 8630 may utilize facilities of a Seeker device client 2710 or perhaps may have a ‘look and feel’ wherein the facilities of the adjuncting co-client 8630 may be similar or perhaps identical to those of the Seeker device client 2710. Furthermore, in some embodiments, the ACDUF system may facilitate an URGS Seeker 6510 logging-in via an adjuncting co-client 8630 and utilizing the adjuncting co-client 8630 as a ‘portal’ device client with some or all of the facilities of a Seeker device client 2710. So for example, such an adjuncting co-client 8630 with a log-in facility for Seekers 6510 may be incorporated in the web site (not shown) of an URGS Provider 6590. So for example, such an “ACDUF service portal” included in the adjuncting co-client 8630 incorporated in the adjuncted web site of a Provider 6590 may facilitate access to respective ‘virtual device client’ facilities for adjunct seekers 8610 and Seekers 6510. Some embodiments of such an ACDUF service portal may perhaps additionally provide such ‘virtual device client’ facilities for adjunct providers 8690, adjunct provider/admins (not shown), co-client admins 8870 and Providers 6590.
To facilitate discussion,
In some embodiments, the ACDUF system 8600 may facilitate URGS fulfillment services for various service classes of users/utilizers that may include but not be limited to: adjunctable device client source (not shown), co-client admin 8870, adjunct provider 8690, and adjunct seeker 8610. However, in some embodiments, such URGS fulfillment services may be limited or otherwise differing in some way from URGS fulfillment services for Seekers 6510 and Providers 6590 so as to incentivize and possibly recruit user/utilizers of such limited or otherwise different fulfillment services to potentially become Seekers 6510 and/or Providers 6590.
The set of adjunct seekers 8610 may potentially be very large—only limited by awareness of, access to, and basic technical skills to utilize an adjuncted device client 8620 and incorporated adjuncting co-client 8630. At the nominal limit, the set of adjunct seekers 8610 may perhaps be bounded by the population of planet Earth. Furthermore, some adjunct seekers 8610 may be unaware they may be adjunct seekers 8610—just as many internet users may be oblivious to the many underlying systems and commercial relationships that they may utilize and that may make the internet possible.
In some embodiments, a given party may belong to a plurality of user/utilizer service classes. So for example, someone who may utilize the ACDUF system 8600 as an adjunct seeker 8610 may separately utilize the ACDUF system 8600 as an adjunct provider 8690 or as a co-client admin 8870. Additionally, the set of adjunct providers 8690 may have substantial overlap with the set of adjunct seekers 8610, but may differ in population size. Also, an adjunct provider 8690 may perhaps also be a co-client admin 8870. Bottom line, each user/utilizer service class of ACDUF system 8600 user may nominally lack any exclusion from other classes of ACDUF system 8600 user/utilizer; although a given class of user/utilizer may require a corresponding device client to access ACDUF facilities specific to that class. However, in some embodiments, a given individual may be excluded from becoming a co-client admin 8870 or an adjunct provider 8690. For example, in some embodiments, a potential co-client admin 8870 as well as a potential adjunct provider 8690 may be required to enroll in the ACDUF system 8600 as a specific service class of user/utilizer (e.g., co-client admin or adjunct provider) and perhaps consequently be subjected to vetting—appropriate to that enrolled user/utilizer service class—that may result in rejection of such enrollment.
Referring to
At step 9115A, an adjunctable device client source (not shown) may be recruited to co-clientize the source's adjunctable device client (not shown) so as to adjunct the adjunctable device client (not shown) to the ACDUF system 8600.
Referring to
The ACDUF system 8600 may provide facilities for managing and facilitating the recruitment of potential sources (not shown) of an adjuncted device client(s) 8620. Such facilities—perhaps akin to customer relationship management (“CRM”) systems or perhaps utilizing a third party CRM system(s) (not shown)—may facilitate accumulating descriptive information regarding potential sources of adjuncted device client(s). Such descriptive information may be imported or otherwise adapted for inclusion perhaps in the adjunct data base(s) 8858 for example to facilitate incremental enrollment of a co-client admin 8870 and/or an adjunct provider 8690 from a given potential adjuncted device client(s) source.
At step 9220 in some embodiments, the ACDUF system 8600 may facilitate vetting of a potential source of adjuncted device client(s) as well as vetting the corresponding device client(s) such a source may endeavor to co-clientize. Such vetting may serve to exclude a potential source that may be ill-suited to being associated with the ACDUF system services or that may have corresponding potential adjuncted device client(s) that may be ill-suited for such association. As part of such a vetting process, the ACDUF system 8600 may utilize electronically-accessible third party facilities such as credit rating services, business rating services, social networks and business directories to obtain information that may be used to vet a given potential source (not shown) of adjuncted device client(s) and/or corresponding potential adjuncted device client(s). Additionally, the corresponding potential adjuncted device client(s) may be vetted by automated means—for example electronically ‘crawling’ a web site looking for malware or other threats as well as undesirable content and/or links. Also, third party computer network security and/or vetting services may be utilized for such vetting. Electronically-accessible device client rating sources—for example on-line app stores—may also be consulted to assist in vetting a given potential source and/or potential adjuncted device client(s). Additional evaluation of a given potential source and/or corresponding potential adjuncted device client(s) may be conducted external to the ACDUF system 8600—perhaps manually—with the results of such evaluation(s) perhaps subsequently entered into the adjunct data base(s) 8858 so as to further assist vetting by the ACDUF system 8600. In some embodiments, the failure to pass vetting of either the potential adjuncted device client(s) source or the corresponding device client(s) of that source may result in that potential source (not shown) of adjunctable device client(s) (not shown) being rejected. In some embodiments, the ACDUF system 8600 system may facilitate communicating recommendations for vetting-related changes to a given potential source (not shown) of adjunctable device client(s) (not shown) who may have been rejected in the vetting process. Perhaps such a ‘coached’ potential source may be encouraged to make changes and re-attempt and possibly subsequently pass vetting by the ACDUF system 8600.
In some embodiments, the ACDUF system 8600 may forgo vetting potential sources (not shown) and corresponding potential adjunctable device client(s) (not shown). Therefore, in such embodiments forgoing vetting by the ACDUF system 8600, a given potential source and corresponding potential adjuncted device client(s) may be assumed to be vetted successfully.
In some embodiments, the ACDUF system 8600 may facilitate ‘self-vetting’ by a given potential source of adjuncted device client(s), wherein such a given potential source may make the vetting decision in lieu of (or in supplement of) the ACDUF system 8600. So for example, the ACDUF system may facilitate displaying ‘terms of use’ that may indicate unacceptable behaviors or characteristics of a given potential source and/or their corresponding potential adjuncted device client(s). Furthermore, the ACDUF system 8600 may indicate consequences of breach of the terms of use that may include for example expulsion or being barred from utilization of the ACDUF system 8600. As a consequence, a given potential source may self-vet such that they may cease any attempt at co-clientization and adjuncting by the ACDUF system 8600, perhaps because they or their potentially adjuncted device client(s) may fail to satisfy the terms of use. A given potential source may for example self-vet by accepting or declining the terms of use, thereby resulting in passing vetting or rejection respectively.
At step 9230 in some embodiments, a successfully vetted potential source (not shown) of adjunctable device client(s) (not shown) may be distinguished from a potential source rejected by vetting.
At step 9240 in some embodiments, a successfully vetted potential source (not shown) of adjunctable device client(s) (not shown) may be enrolled by the ACDUF system 8600 as a co-client admin 8870. In some embodiments, such a successfully vetted source may download an ACDUF system co-client admin device client 8860 to that co-client admin's computer(s) and/or mobile device(s). Co-client admin enrollment by the ACDUF system 8600 may perhaps automatically utilize enrollment information that may have been obtained previously during recruitment and/or vetting steps described above. In some embodiments, enrollment may include creating a user name and password (or other identifier/credential) that may subsequently be utilized to log-in to the ACDUF system 8600 as co-client admin 8870. In some embodiments, the newly enrolled co-client admin 8870 may be further recruited to become an adjunct provider 8690 as part of the loyaltization facilities of the ACDUF system 8600.
In some embodiments, a successfully vetted potential source (not shown) of adjunctable device client(s) (not shown) may be enrolled by the ACDUF system 8600 as an adjunct/provider admin (not shown).
For simplicity, in the discussions that follow, the term (and slight variants thereof) “adjuncted device client 8620” may be understood to additionally refer to an “adjunctable device client (not shown)” that has been successfully vetted to become an adjuncted device client 8620. Similarly, the term (and slight variants thereof) “source (not shown) of adjuncted device client 8620” may be understood to additionally refer to a “source (not shown) of adjunctable device client (not shown)” that has been successfully vetted to become a source (not shown) of an adjuncted device client 8620.
In some embodiments, the co-client admin 8870 for a given adjuncted device client 8620 may be other than the source (not shown) of the adjuncted device client 8620. For example, the source (not shown) of adjuncted device client 8620 may recruit a party to become the co-client admin 8870. Further by example, such a recruited co-client admin 8870 may acquire a co-client admin device client 8860 and log-in utilizing log-in credentials acquired from the source (not shown) of adjuncted device client 8620 (or otherwise acquired). In some embodiments, the source (not shown) of adjuncted device client 8620 may utilize the facilities of the ACDUF system 8600 to thusly recruit and appoint a party to become the co-client admin 8870.
Referring again to
At step 9125A, a co-client admin 8870 may be facilitated to utilize co-client admin facilities of an ACDUF system 8600.
Referring to
At step 9350 in some embodiments, the ACDUF system 8600 may facilitate the configuration and build of an adjuncting co-client 8630 for subsequent incorporation in the thusly adjuncted device client 8620 (as may be well understood by one skilled in the arts). In some embodiments, a co-client ID may be associated with the adjuncting co-client 8630, wherein such co-client ID may be subsequently utilized to associate one or more adjunct provider(s) 8690 with the adjuncting co-client 8630 during the assignment of that adjuncting co-client 8630 to such adjunct provider(s) 8690. Such a co-client ID may perhaps be generated automatically by the ACDUF system 8600 so as to ensure the co-client ID's uniqueness. In some embodiments, the ACDUF system 8600 may enable the co-client admin 8870 to enter a co-client ID, which the ACDUF system 8600 may vet for uniqueness. For example, the co-client admin 8870 may utilize an email address as the co-client ID.
In some embodiments, the configuring and building of an adjuncting co-client 8630 may be partially or fully automated by the ACDUF system 8600—for example with the co-client admin 8870 initiating such a configuration and build by entering descriptive information regarding the subsequently adjuncted device client 8620. In some embodiments, source-code for the prospective adjuncted device client 8620 may perhaps be imported, analyzed and/or modified by the ACDUF system 8600.
In some embodiments, the co-client admin 8870 may subsequently configure and build additional adjuncting co-clients 8630—each such co-client perhaps corresponding to and subsequently incorporated in one or more additional ACDUF-adjuncted device client 8620. For example, our tow truck driver—as co-client admin 8870—may utilize the ACDUF system 8600 to facilitate the configuring and build of two adjuncting co-clients 8630—an adjuncting co-client 8630 for incorporation in a towing service web site and also an adjuncting co-client 8630 for incorporation in a towing service mobile app.
At step 9360 in some embodiments, the ACDUF system 8600 may facilitate incorporation of the adjuncting co-client 8630 in the thusly adjuncted device client 8620. In some embodiments, such incorporation may be automated by the ACDUF system 8600. In some embodiments, such incorporation may be effected manually and may perhaps be facilitated utilizing instruction, tutorial, FAQ, and/or guideline document(s) accessed for example via the ACDUF system co-client admin device client 8860. In some embodiments, such incorporation may be effected utilizing a combination of such automation as well as such manual efforts.
At step 9370 in some embodiments, the ACDUF system 8600 may facilitate testing of the operation of the adjuncting co-client 8630 incorporated in the adjuncted device client 8620. In some embodiments, such testing may at least in part be manually conducted facilitated perhaps by test guide documentation perhaps accessed via the adjuncting co-client 8630, the ACDUF system co-client admin device client 8860 or possibly via a non-ACDUF-associated device client such as a laptop computer web browser. In some embodiments, the incorporated adjuncting co-client 8630 may be tested by the ACDUF system 8600 in the course of ‘normal utilization’ by an adjunct seeker 8610 thus lessening or eliminating the need for manual testing. Such automated testing may for example determine if information records in the adjunct data base(s) that should be accessed by the utilization of the adjuncting co-client 8630 may in fact be accessed.
At step 9380 in some embodiments, the ACDUF system 8600 may facilitate the co-client admin 8870 to configure and otherwise administer the incorporated adjuncting co-client 8630. In some embodiments, the co-client admin 8870 may be facilitated to configure assignment of the adjuncting co-client 8630 to one or a plurality of adjunct providers 8690. Additionally, in some embodiments, the co-client admin 8870 may configure the service personality of an adjuncting co-client 8630 that may be a soft co-client. Furthermore, the co-client admin 8870 may be facilitated and/or automatically assisted to recruit adjunct provider(s) 8690. For example, the ACDUF system 8600 may facilitate an ‘invite’ facility whereby a given adjunct provider 8690 may be facilitated with the option to have a specific adjuncting co-client (or set of adjuncting co-clients) 8630 assigned to that adjunct provider 8690. Additionally, a given adjunct provider 8690 may be facilitated to request such an ‘invite’ corresponding to a specific adjuncting co-client (or set of adjuncting co-clients) 8630.
In some embodiments, the co-client admin 8870 may be facilitated to access utilization reports from the ACDUF system 8600 detailing adjunct seeker 8610 utilization of the adjuncting co-client 8630 and implied utilization of the corresponding adjuncted device client 8620. In some embodiments, this may be the only instrumentation facility corresponding to the adjuncted device client 8620 that the co-client admin 8870 may have access to. Additionally, such utilization reports may also document corresponding payments and/or incentives awarded by the ACDUF system 8600 to the co-client admin 8870 and/or to the source (not shown) of the adjuncted device client. In some embodiments, the co-client admin 8870 may be facilitated to enable, disable and/or update the adjuncting co-client 8630. In some embodiments, the adjuncting co-client 8630 may be updated automatically, for example utilizing automated network down-loading of updated adjuncting co-client logic (not shown).
At step 9390 in some embodiments, the ACDUF system 8600 may facilitate loyaltization of the source of the adjuncted device client 8620 and/or the co-client admin 8870. In some embodiments, such loyaltization may result from increased and/or improved utilization of the adjuncted device client 8620 by adjunct seekers 8610 as attributable to the incorporation of the adjuncting co-client 8630. Payments and/or incentives (not shown) awarded by the ACDUF system 8600 to the adjuncted device client source and/or the co-client admin 8870 may also facilitate loyaltization. In some embodiments, the ACDUF system 8600 may facilitate acquiring a customizable ‘turn-key’ adjuncted device client. So for example, the co-client admin 8870 of the antique car club web site may utilize the ACDUF system 8600 to acquire a customizable ‘turn-key’ adjuncted device client for the iPhone (i.e., a co-clientized iPhone app). In some embodiments, the ACDUF system 8600 may facilitate customizing such a ‘turn-key’ adjuncted device client—for example including but not limited to entering contact information and adding pictures and/or a logo.
Referring again to
At step 9140A, an adjunct provider 8690 may be facilitated to utilize adjunct provider's services of the ACDUF system 8600 accessed perhaps via the adjunct provider device client 8680.
Referring to
The ACDUF system 8600 may provide facilities for managing, facilitating and possibly automating the recruitment of potential adjunct providers. Such ACDUF system facilities—for example akin to CRM systems or perhaps utilizing a third party CRM system(s) (not shown)—may facilitate accumulating descriptive information regarding potential adjunct providers. Such descriptive information may perhaps be entered by the co-client admin 8870. Additionally, such descriptive information may be imported or otherwise adapted for inclusion in the adjunct data base(s) 8858 perhaps so as to facilitate incremental enrollment in addition to recruitment. Furthermore, such recruitment facilities may include facilities for contacting and soliciting potential adjunct providers on behalf of and perhaps under the control of the co-client admin 8870. In some embodiments, the co-client admin 8870 may input a list of potential adjunct providers that may be solicited. In some embodiments, the ACDUF system 8600 may automatically facilitate or otherwise assist the creation and management of such a list of potential adjunct providers that may be solicited as well as perhaps automating the recruitment of potential adjunct providers.
At step 9420 in some embodiments, the ACDUF system 8600 may facilitate vetting of a potential adjunct provider. Such vetting may serve to exclude potential adjunct providers that may be ill-suited to being associated with the ACDUF system services. As part of the vetting process, the ACDUF system 8600 may utilize electronically-accessible third party facilities such as credit rating services, business rating services, social networks and business directories to obtain information that may be used to vet a given potential adjunct provider. Additional evaluation of a given potential adjunct provider may be conducted external to the ACDUF system 8600—perhaps manually—with the results of such evaluation(s) perhaps subsequently entered into the adjunct data base(s) 8858 so as to further facilitate vetting of the potential adjunct provider by the ACDUF system 8600. In some embodiments, the vetting failure of a given potential adjunct provider may result in that given potential adjunct provider being rejected. In some embodiments, the ACDUF system 8600 system may facilitate communicating recommendations for vetting-related changes to a given potential adjunct provider who may have been rejected in the vetting process. Perhaps such a ‘coached’ potential adjunct provider may be encouraged to make such changes and re-attempt and subsequently potentially pass vetting by the ACDUF system 8600.
In some embodiments, the ACDUF system 8600 may forgo facilities to vet potential adjunct providers. Therefore, in such embodiments forgoing vetting by the TCPCIL system 8600, a potential adjunct provider may be assumed to be vetted successfully.
In some embodiments, the ACDUF system 8600 may facilitate self-vetting by a given potential adjunct provider, wherein such a given potential adjunct provider may make the vetting decision in lieu of (or in supplement of) the ACDUF system 8600. So for example, the ACDUF system may facilitate displaying ‘terms of use’ that may indicate unacceptable behaviors or characteristics of a given potential adjunct provider. Furthermore, the ACDUF system 8600 may indicate consequences of breach of the terms of use that may for example include expulsion or barring from utilization of the ACDUF system 8600 as an adjunct provider. As a consequence, a given potential adjunct provider may self-vet such that they may cease any attempt of utilization of the ACDUF system 8600 as an adjunct provider, perhaps because they may fail to satisfy the terms of use. A given potential adjunct provider may for example self-vet by accepting or declining the terms of use, thereby resulting in successful vetting or rejection respectively.
At step 9430 in some embodiments, a successfully vetted potential adjunct provider may be distinguished from a potential adjunct provider rejected by vetting. For a potential adjunct provider rejected by vetting, the steps 9440, 9450, 9460, 9470, 9480 and 9490 may be forgone.
At step 9440 in some embodiments, a successfully vetted potential adjunct provider may be enrolled as an adjunct provider 8690. In some embodiments, such a successfully vetted potential adjunct provider may download an adjunct provider device client 8680 to that adjunct provider's computer(s) and/or mobile device(s). Adjunct provider enrollment by the ACDUF system 8600 may perhaps automatically utilize enrollment information that may have been obtained previously during recruitment and/or vetting steps described above. In some embodiments, enrollment may include creating a user name and password (or other unique identifier/credential) that may subsequently be utilized to log-in to the ACDUF system 8600 as an adjunct provider 8690 via an adjunct provider device client 8680 or perhaps an adaptive provider/admin device client (not shown). A unique identifier for a given adjunct provider 8690—i.e., an “adjunct provider ID” may be utilized by the ACDUF system 8600 to associate that adjunct provider 8690 with the corresponding adjunct provider profile (not shown) as well as with a given adjuncting co-client 8630 that may be configured for subsequent assignment to that adjunct provider 8690. In some embodiments, the newly enrolled adjunct provider 8690 may be further recruited to become an URGS Provider 6590.
At step 9450 in some embodiments, the ACDUF system 8600 may facilitate configuration of an adjunct provider profile (not shown) by the adjunct provider 8690. Such configuration of an adjunct provider profile (not shown) may include recording in a data base—e.g., the adjunct data bases(s) 8858—information pertaining to the adjunct provider 8690 that may subsequently be accessed by a given adjunct seeker 8610 facilitated by the ACDUF system 8600 via an adjuncting co-client 8630 assigned to that adjunct provider 8690. For example, an adjunct provider profile (not shown) may include but not be limited to: adjunct provider description; adjunct provider goods and/or service(s) description; adjunct provider contact information; adjunct provider immediate availability; adjunct provider scheduled availability; enabling/disabling display of adjunct provider location; and enabling/disabling communication with adjunct seekers 8610. In some embodiments, an adjunct provider description (not shown) within an adjunct provider profile (not shown) may for example include details such as qualifications and specializations, education and training, credentials and licenses, professional memberships and associations, career histories, work philosophies, and perhaps languages that they may speak. In some embodiments, information entered by the adjunct provider 8690 during enrollment may be included in the adjunct provider profile (not shown). Additionally, in some embodiments, information provided by one or more third parties may be included in the adjunct provider profile (not shown)—for example, consumer ratings.
In some embodiments, the ACDUF system 8600 may monitor and inspect a given adjunct provider profile (not shown) on an ongoing basis so as to detect suspicious or objectionable alterations to that adjunct provider profile. Some or all adjunct provider profile(s) may be subject to such monitoring and inspection by the ACDUF system 8600 on an ongoing basis. Such monitoring and inspection may for example help exclude exploitive media and hate speech. In some embodiments, the ACDUF system 8600 may automatically configure, update or otherwise modify a given adjunct provider profile (not shown). In some embodiments, the ACDUF system 8600 may facilitate a co-client admin 8870 to configure, update or otherwise modify a given adjunct provider profile (not shown).
At step 9460 in some embodiments, the ACDUF system 8600 may facilitate the assignment of one or a plurality of adjuncting co-client(s) 8630 to a given adjunct provider 8690. And thereby, subsequently, a given adjunct seeker 8610 utilizing such an assigned adjuncting co-client 8630 may access information pertaining to that assigned-to adjunct provider 8690. In some embodiments, the assignment of a given adjuncting co-client 8630 to the adjunct provider 8690 may be separately configured by the co-client admin 8870 for that adjuncting co-client 8630. However, in some embodiments, for example when the adjunct provider 8690 may be an adjunct provider/admin (not shown) for that adjuncting co-client 8630, that adjunct provider/admin (not shown) may configure subsequent assignment of the adjuncting co-client 8630 to themselves—i.e., self-assign.
In some embodiments, a given adjuncting co-client 8630 may be assigned utilizing a pre-assignment facility of the ACDUF system 8600. In some embodiments, a given adjuncting co-client 8630 may be assigned utilizing a dynamic assignment facility of the ACDUF system 8600. In some embodiments, for a plurality of adjuncting co-clients 8630 assigned to a given adjunct provider 8690, a given adjuncting co-client 8630 thusly assigned may be pre-assigned or dynamically assigned independent of the assignment modality of a different adjuncting co-client 8630 from said plurality. In some embodiments assignment, whether pre-assigned or dynamically assigned, may be facilitated automatically by the ACUDF system 8600—perhaps determined by configuration by the co-client admin 8870 of the assigned adjuncting co-client 8630.
In some embodiments, the adjuncting co-client 8630 that may be assigned to the adjunct provider 8690 may be a soft co-client. Such a soft co-client may be facilitated by the ACDUF system 8600 to express a service personality corresponding to the assignment of the adjuncting co-client 8630 to the adjunct provider 8690.
At step 9470 in some embodiments, the ACDUF system 8600 may facilitate service personality(s) configuration. In some embodiments, one or a plurality of service personalities may be configured wherein each such service personality may correspond to a given adjuncting co-client 8630 which may be configured to be subsequently pre-assigned or dynamically assigned to that adjunct provider 8690.
At step 9480 in some embodiments, the ACDUF system 8600 may facilitate testing of the operation of a given adjuncting co-client 8630 incorporated in an adjuncted device client 8620 that may be assigned to the adjunct provider 8690. Additionally, in some embodiments, the ACDUF system 8600 may facilitate testing of the expression of a given service personality by an adjuncting co-client 8630 incorporated in the adjuncted device client 8620 and assigned to the adjunct provider 8690. In some embodiments, one or a plurality of such adjuncting co-client(s) 8630 configured for assignment to the adjunct provider 8690 may be thusly tested.
In some embodiments, such testing may at least in part be manual and may be facilitated perhaps by test guide documentation that may perhaps be accessed via the adjuncting co-client 8630, the adjunct provider device client 8680 or possibly via a third party device client such as a laptop computer web browser. In some embodiments, the incorporated adjuncting co-client 8630 may be tested by the ACDUF system 8600 in the course of ‘normal utilization’ by an adjunct seeker 8610 thus lessening or eliminating the need for manual testing. Such automated testing may for example determine if information records in the adjunct data base(s) that should be accessed by the utilization of the adjuncting co-client 8630 may in fact be accessed.
At step 9490 in some embodiments, the ACDUF system 8600 may facilitate loyaltization of the adjunct provider 8690. In some embodiments, such loyaltization may result from adjunct seekers 8610 accessing information about, contacting and doing business with the adjunct provider 8690 as facilitated by the ACDUF system 8600. Payments and/or incentives (not shown) may be awarded by the ACDUF system 8600 to the adjunct provider 8690 so as to additionally facilitate loyaltization. In some embodiments, the ACDUF system 8600 may facilitate the adjunct provider 8690 to acquire a customizable ‘turn-key’ adjuncted device client. So for example, our tow truck driver may utilize the ACDUF system 8600 to acquire a customizable ‘turn-key’ adjuncted device client for the iPhone (i.e., a co-clientized iPhone app). In some embodiments, the ACDUF system 8600 may facilitate customizing such a ‘turn-key’ adjuncted device client—for example including but not limited to entering contact information and adding pictures and/or a logo.
Referring again to
At step 9160A, in some embodiments an adjunct seeker 8610 may be facilitated to utilize adjunct seeker's services of the ACDUF system 8600 accessed via the adjuncting co-client 8630.
Referring to
At step 9520 in some embodiments, the ACDUF System 8600 may facilitate expression of the service personality corresponding to the adjunct provider assigned to the adjuncting co-client 8630 as described previously. In some embodiments, the adjunct provider(s) 8690 that the adjuncting co-client 8630 may be assigned to may change for successive utilizations of the adjuncting co-client 8630 by adjunct seekers 8610. Additionally, in some embodiments, the service personality of the adjuncting co-client 8630 may also change for successive utilizations of the adjuncting co-client 8630.
At step 9530 in some embodiments, the ACDUF System 8600 may facilitate utilization by the adjunct seeker 8610 of ACDUF system facilities corresponding to the service personality expressed by the adjuncting co-client 8630. For example, the ACDUF system 8600 may facilitate the exchange of textual messages between the adjunct seeker 8610 utilizing the ACDUF system 8600 via the adjuncting co-client 8630 and an adjunct provider 8690 that the adjuncting co-client 8630 may be assigned to.
At step 9540, in some embodiments a user/utilizer log-in may be distinguished from other utilizations of the adjuncting co-client 8630 by the adjunct seeker 8610.
At step 9550, in some embodiments an adjunct seeker may be facilitated by the ACDUF system 8600 to log-in so as to utilize the adjuncting co-client 8630 as a ‘virtual device client’—for example an ACDUF service portal (as described previously)—corresponding to the service class of the user/utilizer as determined perhaps by the log-in sequence. Such a user/utilizer who may log-in to utilize a ‘virtual device client’ may be enrolled in the ACDUF system 8600 thereby obviating the need for step 9560 for said enrolled user/utilizer.
At step 9560, in some embodiments an adjunct seeker that may forgo logging-in to utilize a ‘virtual device client’ (i.e., step 9550 above) may be incrementally enrolled. Incremental enrollment may include the recording of self-descriptive information provided by the adjunct seeker 8610 in the normal course of utilization of the adjuncting co-client 8630. So for example, a given adjunct seeker 8610 may enter their email address and/or phone number so that an adjunct provider 8690 may contact them.
At step 9570, in some embodiments an adjunct seeker 8610 may be loyaltized by the ACDUF system 8600. Perhaps the most direct loyaltization may result from facilitating the adjunct seeker 8610 to learn about, contact, communicate with, and/or do business with an adjunct provider 8690. In embodiments of an ACDUF system 8600 that may include a SILCM system 6500 (see Section IV. ADDITIONAL ENHANCEMENTS—Systemic Incentivized Loyaltization Coupled with a Micro-Casting Distributed URGS Fulfillment System), the adjunct seeker may be issued a voucher option(s) 6530. Additionally, the ACDUF system 8600 may recruit the adjunct seeker 8610 to become a Seeker 6510.
At step 9175B, an URGS Seeker 6510 may be facilitated to utilize URGS Seeker facilities of an ACDUF system 8600. In some embodiments, the ACDUF system 8600 may facilitate a given URGS Seeker 6510 with URGS fulfillment facilities—for example the URGS fulfillment facilities of a MCDUF system 2700 (as described previously in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System). In some embodiments, the ACDUF system 8600 may facilitate a given URGS Seeker 6510 with loyaltization facilities—for example with the facilities of a SILCM system 6500 (see Section IV. ADDITIONAL ENHANCEMENTS—Systemic Incentivized Loyaltization Coupled with a Micro-Casting Distributed URGS Fulfillment System). In some embodiments, the ACDUF system 8600 may facilitate a given URGS Seeker 6510 with additional facilities in addition to URGS fulfillment facilities. For example, the ACDUF system 8600 may facilitate a given URGS Seeker 6510 to utilize an adjuncting co-client 8630 as an ACDUF service portal (not shown) so as to access the URGS fulfillment services of the ACDUF system 8600. Such an ACDUF service portal as well as other enhanced access facilities facilitated by the ACDUF system 8600 may further loyaltize a given URGS Seeker 6510.
At step 9180B an URGS Provider 6590 may be distinguished from other service classes of other users/utilizers.
At step 9185B, an URGS Provider 6590 may be facilitated to utilize URGS Provider facilities of an ACDUF system 8600. In some embodiments, the ACDUF system 8600 may facilitate a given URGS Provider with URGS fulfillment facilities—for example the URGS fulfillment facilities of a MCDUF system 2700 (as described previously in Section III. ADDITIONAL ENHANCEMENTS—Micro-Casting Distributed URGS Fulfillment System). In some embodiments, the ACDUF system 8600 may facilitate a given URGS Provider 6590 with loyaltization facilities—for example with the facilities of a SILCM system 6500 (see Section IV. ADDITIONAL ENHANCEMENTS—Systemic Incentivized Loyaltization Coupled with a Micro-Casting Distributed URGS Fulfillment System). In some embodiments, the ACDUF system 8600 may facilitate a given URGS Provider 6590 with additional facilities in addition to URGS fulfillment facilities. For example, the ACDUF system 8600 may facilitate a given URGS Provider 6590 to utilize an adjuncting co-client 8630 as an ACDUF service portal (not shown) so as to access the URGS fulfillment services of the ACDUF system 8600. Such an ACDUF service portal as well as other enhanced access facilities facilitated by the ACDUF system 8600 may further loyaltize a given URGS Provider 6590. Additionally, an ACDUF system 8600 may facilitate a given adjunct seeker 8610 to locate, contact and perhaps do business with a given URGS Provider 6590, thus perhaps facilitating a URGS Provider 6590 to grow their business and/or revenue.
At step 9190B, in some embodiments a third party utilizer (not shown) may be distinguished from other service classes of other users/utilizers.
At step 9195B, a third party utilizer (not shown) may be facilitated to utilize the ACDUF system 8600. Such a third party utilizer may for example be a data provider or a data acquirer. Therefore, such utilization may involve appropriate entry of information into the ACDUF system 8600 and/or extraction of information from the ACDUF system 8600 subject to constraints such as an ACDUF system ‘privacy policy’.
In sum, the present invention provides systems and methods for co-clientizing a device client so as to adjunct it as a device client for access to the facilities and services of the ACDUF system. In this way, the ACDUF system may rapidly and efficiently acquire numerous additional adjuncted device clients and through those adjuncted device clients access and recruit numerous additional seekers and providers. The advantages of such a system may include the ability to provide access to the facilities and services ACDUF system including its URGS fulfillment services to a broader population of potential seekers and providers. Additionally, the ACDUF system by enhancing the adjuncted device client may recruit and loyaltize the source of that adjuncted device client. Furthermore, seekers that discover the facilities and services of the ACDUF system as they utilize the adjuncted device client may be recruited and loyaltized.
While this invention has been described in terms of several embodiments, there are alterations, modifications, permutations, and substitute equivalents, which fall within the scope of this invention. Although sub-section titles have been provided to aid in the description of the invention, these titles are merely illustrative and are not intended to limit the scope of the present invention.
It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, modifications, permutations, and substitute equivalents as fall within the true spirit and scope of the present invention.
This non-provisional application is a Continuation-in-Part and claims the benefit of provisional appln. No. 62/086,671, filed Dec. 2, 2014, which application is incorporated herein in its entirety by this reference. This Continuation-in-Part application claims priority to non-provisional application Ser. No. 14/329,931, filed on Jul. 12, 2014, entitled “Systems and Methods of Loyalitization for Incentivizing, Facilitating and Reporting Urgent Needs Fulfillment”, which is a Continuation-in-Part application and claims priority to non-provisional application Ser. No. 14/217,014, filed on Mar. 17, 2014, entitled “Systems and Methods for Micro-Casting in Urgent Needs Fulfillment Matching” which applications are incorporated herein in their entirety by this reference. This Continuation-in-Part application claims priority to non-provisional application Ser. No. 14/217,014, filed on Mar. 17, 2014, entitled “Systems and Methods for Micro-Casting in Urgent Needs Fulfillment Matching” which also claims the benefit of the below six listed application, which applications are incorporated herein in their entirety by this reference. This Continuation-in-Part application also claims priority to non-provisional application Ser. No. 13/910,812, filed on Jun. 5, 2013, which claims the benefit of provisional appln. No. 61/657,013 filed on Jun. 7, 2012, both entitled “Systems and Methods for Screening and Proffering Providers of an Urgent Goods or Service”, which applications are incorporated herein in their entirety by this reference. This Continuation-in-Part application additionally claims priority to non-provisional application Ser. No. 13/910,825, filed on Jun. 5, 2013, which claims the benefit of provisional appln. No. 61/657,015 filed on Jun. 7, 2012, both entitled “Systems and Methods for Matching a Seeker with a Proffered Provider of an Urgent Goods or Service”, which applications are incorporated herein in their entirety by this reference. Lastly, this Continuation-in-Part application claims priority to non-provisional application Ser. No. 13/910,831, filed on Jun. 5, 2013, which claims the benefit of provisional appln. No. 61/657,018 filed on Jun. 7, 2012, both entitled “Systems and Methods for Facilitating Transactions Between a Seeker and a Proffered Provider of an Urgent Goods or Service”, which applications are incorporated herein in their entirety by this reference.
Number | Date | Country | |
---|---|---|---|
62086671 | Dec 2014 | US | |
61657015 | Jun 2012 | US | |
61657013 | Jun 2012 | US | |
61657018 | Jun 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14329931 | Jul 2014 | US |
Child | 14956310 | US | |
Parent | 14217014 | Mar 2014 | US |
Child | 14329931 | US | |
Parent | 14217014 | Mar 2014 | US |
Child | 14217014 | US | |
Parent | 13910825 | Jun 2013 | US |
Child | 14217014 | US |