Digital signage is a fast-growing business and can be used as an advertising platform. Interacting with a digital sign may make the sign more attractive to prospective advertising targets or users. An interactive sign, therefore, may be viewed as both a billboard and a vending machine for digital content.
According to an implementation of the disclosed subject matter, a digital sign that includes a wireless access point may transmit a network identifier. The wireless access point may comply with the 802.11 standard. One or more connection requests may be received. One of the connection requests may be selected as the first connection request. The unselected connection requests may be sent an indication that the digital sign is occupied or in use. In some configurations a challenge may be sent in response to the first connection request. A response to the challenge may be received and a determination may be made as to the validity of the response. A valid response may grant access to the user interface for control of the digital sign. A user interface for control of the digital sign may be provided. One or more commands may be received from a device displaying the user interface. A command may be a horizontal movement, a vertical movement, a diagonal movement, a select action, an alphanumeric input, etc. A display of the digital sign may be updated.
In an implementation, a device is provided that includes a display, a wireless access point, and a processor connected to the display and/or the wireless access point. The wireless access point may be configured to transmit a network identifier and receive a first connection request. The processor may be configured to provide a user interface for control of the digital sign. It may receive one or more commands from the user interface and update the display of the digital sign.
In an implementation, a scan for a network identifier may be performed. A network identifier may be selected from one or more network identifiers. In some configurations, a first connection request may be sent to the digital sign. A challenge may be received in response to the first connection request. A response to the challenge may be sent. A validation response from the digital sign may be received. A wireless access point associated with the network identifier and a component of a digital sign may be connected to. A user interface for control of the digital sign may be received. A command may be sent to the digital sign using the user interface for control. The command may cause a change in a display of the digital sign.
The disclosed implementations may allow a user to interact with a digital sign using an access point in the digital sign. Additional features, advantages, and implementations of the disclosed subject matter may be set forth or apparent from consideration of the following detailed description, drawings, and claims. Moreover, it is to be understood that both the foregoing summary and the following detailed description provide examples of implementations and are intended to provide further explanation without limiting the scope of the claims.
The accompanying drawings, which are included to provide a further understanding of the disclosed subject matter, are incorporated in and constitute a part of this specification. The drawings also illustrate implementations of the disclosed subject matter and together with the detailed description serve to explain the principles of implementations of the disclosed subject matter. No attempt is made to show structural details in more detail than may be necessary for a fundamental understanding of the disclosed subject matter and various ways in which it may be practiced.
A device such as a mobile phone, tablet, laptop, etc. can be connected to a digital sign using a variety of methods. Generating an intuitive connection process for an end-user while maintaining functionality of the digital sign as both a billboard and a vending machine for digital content can be difficult and/or complex. As disclosed herein, a user may associate a user device with a digital sign to enable the vending functionality while simultaneously using the user device to navigate or interact with the digital sign. For example, interaction with the digital sign may include paging left, paging right, selecting an item, and/or viewing content. Content may be downloaded to the user's device or a Universal Resource Identifier (“URI”) may be provided to the user's device.
Any suitable wireless and/or optical technology may be utilized to associate or pair two wireless devices (e.g., the user's device and the digital sign) such as Bluetooth, near-field communication (“NFC”), or a quick response (“QR”) code displayed on the sign. But many of these technologies are not simple and familiar to users. Connecting to the digital sign using Bluetooth may require a lengthy pairing process. NFC may not be supported by a large number of devices at present. A QR code may require a user device to have an application/camera with which to perform the scan and/or analysis thereof and some environments may utilize bright lighting which can hinder the scanning process.
Users are accustomed to connecting various devices to a network. Typically, a user will direct a device to scan for a wireless access point or signal and select a service set identifier (“SSID”) being broadcast by an access point with which the user would like to connect. If it is a protected service, the user will be prompted to enter a passcode to complete the connection. Some service providers permit open connection to a landing page (i.e., a web page). A user may switch to a web browser and either pay for the service or, if the user already has an account, enter the passcode on the web page.
As disclosed herein, a user may interact with a digital sign. An example of how an interaction between the digital sign and the user's device is shown in
To pair a device 330 with the digital sign 310, a user may initiate a scan for access points proximal to the device 330. As shown in
A user may be required to enter a passcode such as a Personal Identification Number (“PIN”), alphanumeric sequence, etc. to ensure that the user in front of the display is actually the user who has control of display. The digital sign may dynamically display a three digit PIN. The user may be required to enter the PIN number on the landing page before the user is provided with the user interface for the digital sign. Other security measures may be used. For example, the sign may show a line graphic that the user must reproduce. The sign may direct the user to shake the phone at particular times either to the left, right up, or down. These latter two examples may be implemented through a canvas embedded in the landing page and determining the user's device's state by obtaining accelerometer data therefrom. Once a user passes a challenge presented by the display, the user may control the digital sign using the user interface controls provided on the landing page. Thus, the sign may limit control or interaction with the digital sign to a single user.
Information about the content that the user browsed while interacting with the digital sign or content vended to the user by the digital sign may be retained. A user's identity may refer to the user's name, email address, etc. A device identity may refer to a device serial number, a media access control address (“MAC”), etc. The digital sign may communicate with a remote server or database and store information about the identity of the user or user device, content displayed on the sign, and/or interaction of the user or user's device with the sign. When the user or user's device subsequently connects to the sign, the digital sign may query a database where the user's interactions with the sign have been stored to determine if the user or user device has previously contacted this particular digital sign or any digital sign. For example, if a user previously browsed mobile tower defense games on the digital sign, the digital sign may inform the user of the previous search the user conducted, the tower defense games the user browsed, the length of time the user spent browsing each game, etc.
In an implementation, an example of which is shown in
A challenge may be sent, for example to a user device, in response to the first connection request. As described earlier, the landing page may require the user to enter a PIN or other passcode or trace a pattern to ensure that the user in front of the sign has control of it. A response to the challenge may be received. For example, the sign may determine that the PIN entered by the user matches the PIN currently displayed on the digital sign. Thus, the digital sign may determine that the response is valid and grant access to the user interface for control of the digital sign.
A user interface for control of the digital sign may be provided at 430. The digital sign may provide a user interface by causing the user's web browser to navigate to or otherwise display a landing page on which the user may be presented with controls to interact with the digital sign. The commands for the user interface may include a horizontal movement, a vertical movement, a diagonal movement, a select action, an alphanumeric input, etc. A command from the user interface may be received at 440, for example, by the digital sign. The user interface may be displayed on the landing page as stated earlier and may permit the user to interact with the sign. For example, the landing page may display a directional pad that is responsive to touch inputs of the user. That is, when the user selects the left arrow or left side of the directional pad, the digital sign may move a cursor or a highlight box to the left, for example. Thus, the display of the digital sign may be updated at 450 in response to the command received from the user interface.
In an implementation, an example of which is provided in
In an implementation, an example of which is provided in
As stated above, the user's device may send a request to the digital sign to initiate the pairing process and/or to connect with the digital sign's wireless access point. The user's device may receive a challenge in response to the connection request. The device may respond to the challenge and may receive a validation response from the digital sign. The validation response may be a display of the landing page on the user's device and/or the user interface for control of the digital sign.
Implementations of the presently disclosed subject matter may be implemented in and used with a variety of component and network architectures.
The bus 21 allows data communication between the central processor 24 and the memory 27, which may include read-only memory (ROM) or flash memory (neither shown), and random access memory (RAM) (not shown), as previously noted. The RAM is generally the main memory into which the operating system and application programs are loaded. The ROM or flash memory can contain, among other code, the Basic Input-Output system (BIOS) which controls basic hardware operation such as the interaction with peripheral components. Applications resident with the computer 20 are generally stored on and accessed via a computer readable medium, such as a hard disk drive (e.g., fixed storage 23), an optical drive, floppy disk, or other storage medium 25.
The fixed storage 23 may be integral with the computer 20 or may be separate and accessed through other interfaces. A network interface 29 may provide a direct connection to a remote server via a telephone link, to the Internet via an internet service provider (ISP), or a direct connection to a remote server via a direct network link to the Internet via a POP (point of presence) or other technique. The network interface 29 may provide such connection using wireless techniques, including digital cellular telephone connection, Cellular Digital Packet Data (CDPD) connection, digital satellite data connection or the like. For example, the network interface 29 may allow the computer to communicate with other computers via one or more local, wide-area, or other networks, as shown in
Many other devices or components (not shown) may be connected in a similar manner (e.g., document scanners, digital cameras and so on). Conversely, all of the components shown in
More generally, various implementations of the presently disclosed subject matter may include or be implemented in the form of computer-implemented processes and apparatuses for practicing those processes. Implementations also may be implemented in the form of a computer program product having computer program code containing instructions implemented in non-transitory and/or tangible media, such as floppy diskettes, CD-ROMs, hard drives, USB (universal serial bus) drives, or any other machine readable storage medium, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing implementations of the disclosed subject matter. Implementations also may be implemented in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer, or transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing implementations of the disclosed subject matter. When implemented on a general-purpose microprocessor, the computer program code segments configure the microprocessor to create specific logic circuits. In some configurations, a set of computer-readable instructions stored on a computer-readable storage medium may be implemented by a general-purpose processor, which may transform the general-purpose processor or a device containing the general-purpose processor into a special-purpose device configured to implement or carry out the instructions. Implementations may be implemented using hardware that may include a processor, such as a general purpose microprocessor and/or an Application Specific Integrated Circuit (ASIC) that implements all or part of the techniques according to implementations of the disclosed subject matter in hardware and/or firmware. The processor may be coupled to memory, such as RAM, ROM, flash memory, a hard disk or any other device capable of storing electronic information. The memory may store instructions adapted to be executed by the processor to perform the techniques according to implementations of the disclosed subject matter.
The foregoing description, for purpose of explanation, has been described with reference to specific implementations. However, the illustrative discussions above are not intended to be exhaustive or to limit implementations of the disclosed subject matter to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The implementations were chosen and described in order to explain the principles of implementations of the disclosed subject matter and their practical applications, to thereby enable others skilled in the art to utilize those implementations as well as various implementations with various modifications as may be suited to the particular use contemplated.