WO2011146776A1 - Apparatuses,methods and systems for a voice-triggered codemediated augmented reality content delivery platform - Google Patents

Apparatuses,methods and systems for a voice-triggered codemediated augmented reality content delivery platform Download PDF

Info

Publication number
WO2011146776A1
WO2011146776A1 PCT/US2011/037247 US2011037247W WO2011146776A1 WO 2011146776 A1 WO2011146776 A1 WO 2011146776A1 US 2011037247 W US2011037247 W US 2011037247W WO 2011146776 A1 WO2011146776 A1 WO 2011146776A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
message
code
situational
Prior art date
Application number
PCT/US2011/037247
Other languages
French (fr)
Inventor
Dudley Fitzpatrick
Jason Alan Snyder
Glenn Thomas
John Cashman
Ed Jordan
Devon Strawn
Original Assignee
Dudley Fitzpatrick
Jason Alan Snyder
Glenn Thomas
John Cashman
Ed Jordan
Devon Strawn
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dudley Fitzpatrick, Jason Alan Snyder, Glenn Thomas, John Cashman, Ed Jordan, Devon Strawn filed Critical Dudley Fitzpatrick
Publication of WO2011146776A1 publication Critical patent/WO2011146776A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the present disclosure is directed generally to apparatuses, methods, and systems for marketing and information dissemination, and more particularly, to apparatuses, methods and systems for a voice-triggered code-mediated augmented reality content delivery platform.
  • This disclosure details the implementation of apparatuses, methods, and systems for a voice-triggered code -mediated augmented reality content delivery platform comprising a Graphical Code-Serving Interface and a Code Triggered Information Server (hereafter "GCSI/CTIS").
  • GCSI/CTIS provides a novel agency for connecting information encoding symbologies, and by proxy the underlying information content, to graphical display elements.
  • the GCSI/CTIS may also facilitate the provision of voice- triggered code-mediated content, whereby audio inputs may be received and interepreted, and multimedia content may be provided in response thereto.
  • the GCSI/CTIS may also facilitate the provision of requested content in an augmented reality display, which may include a variety of augmented reality interface elements, such as but not limited to overlays, three-dimensionally rendered objects, advertisements, interactive display elements and/or applications, and/or the like which may be provided in a display having persistent spatial, positional, and/or orientational relationships to a scanned code and/or elements of a media environment in which the code is provided.
  • augmented reality interface elements such as but not limited to overlays, three-dimensionally rendered objects, advertisements, interactive display elements and/or applications, and/or the like which may be provided in a display having persistent spatial, positional, and/or orientational relationships to a scanned code and/or elements of a media environment in which the code is provided.
  • the active display elements described in the present disclosure facilitate the serving of such information via deft placement of information encoding symbologies, such as matrix codes, voice-triggering cues, and/or the like, proximate to graphical elements in a wide variety of digital display contexts and media, including portable display devices, mp3 players, cell phones, digital paper, animated billboards, websites, internet or television broadcasts, software interfaces, and/or the like.
  • Information encoding symbologies such as matrix codes, voice-triggering cues, and/or the like
  • proximate to graphical elements in a wide variety of digital display contexts and media, including portable display devices, mp3 players, cell phones, digital paper, animated billboards, websites, internet or television broadcasts, software interfaces, and/or the like.
  • Users may capture images of information encoding symbologies from such displays, for example using a cell phone camera, and decode them with software applets to receive additional information, multimedia content, offers, coupons, notifications, and/or the like (
  • an information serving processor- implemented method comprising: accumulating user activity interest information comprising voice trigger inputs; accumulating user situational information; associating the user activity interest information and user situational information with a user profile; updating the user profile with the associated information in a database; analyzing accumulated information associated with the user profile; querying an information database based on the analysis of the user profile; selecting information based on the user profile to include in a message; and sending the message to a user.
  • a processor- implemented method for serving information to a mobile device comprising: receiving messages from a user comprised of user identification, mobile device identification, voice trigger inputs, time of the scan, and user geographic location at the time of the scan; associating the user identification with a user profile in a database; updating the user profile with the received messages; analyzing the accumulated messages in the user profile; determining information to serve to the user based on the received message and the user profile; selecting the information to serve to the user from a database; incorporating the selected information into a reply message; and sending the reply message to the user's mobile device.
  • an information receiving processor- implemented method comprising: accumulating user activity interest information comprising voice trigger inputs; accumulating user situational information; incorporating user activity interest information in an interest message; incorporating user situational information in a situational message; sending the interest message to a server; sending the situational message to the server; and receiving a reply based on the interest message, the situational message, and a user profile.
  • an information serving processor-implemented method comprising: accumulating user activity interest information; accumulating user situational information; associating the user activity interest information and user situational information with a user profile; updating the user profile with the associated information in a database; analyzing accumulated information associated with the user profile; querying an information database based on the analysis of the user profile; selecting information based on the user profile to include in a message; and sending the message to a user for provision in an augmented reality display.
  • a processor- implemented method for serving information to a mobile device comprising: receiving messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan; associating the user identification with a user profile in a database; updating the user profile with the received messages; analyzing the accumulated messages in the user profile; determining information to serve to the user based on the received message and the user profile; selecting the information to serve to the user from a database; incorporating the selected information into a reply message; and sending the reply message to the user's mobile device for provision in an augmented reality display.
  • an information receiving processor- implemented method comprising: accumulating user activity interest information; accumulating user situational information; incorporating user activity interest information in an interest message; incorporating user situational information in a situational message; sending the interest message to a server; sending the situational message to the server; and receiving a reply based on the interest message, the situational message, and a user profile, wherein the reply is configured for provision in an augmented reality display.
  • FIGURES la-b show combined logic and data flow block diagram illustrating a general overview of embodiments of the GCSI/CTIS
  • FIGURE 2 shows a particular, exemplary embodiment of the GCSI/CTIS, wherein contextual information and advertising is served to the user related to a news article in the business section of a media publication;
  • FIGURE 3 shows user trajectories through a network of Ad provider zones
  • FIGURE 4 shows an embodiment of the web interface for user registration
  • FIGURES 5a-d show three types of 2D barcodes that may be employed within the GCSI/CTIS and logic flow for code enhancement in some embodiments of GCSI/CTIS operation;
  • FIGURE 6 shows an illustration of one embodiment of the Scan Message data structure;
  • FIGURES 7a-b show an illustration of one embodiment of a user profile data structure and an implementation of a user profile user interface in one embodiment of GCSI/CTIS operation;
  • FIGURE 8 shows an illustration of one embodiment of the Information
  • FIGURE 9 shows a logic flow diagram of one embodiment of the user profile query heuristic
  • FIGURE 10 shows an exemplary histogram of Ad provider zone breaches
  • FIGURES l la-d show some embodiments of systems for selecting non- triggered information to serve to users
  • FIGURES 12a-b show examples of coupons provided by the GCSI/CTIS
  • FIGURE 13 shows a combined logic and data flow block diagram for an embodiment of the GCSI/CTIS wherein contextual Ads are replaced by Ads based on ambient conditions;
  • FIGURE 14 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSI/CTIS in which allergy medication Ads are served in response to a high pollen count;
  • FIGURE 15 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSI CTIS in which sunscreen Ads are served in response to heat and high UV levels;
  • FIGURE 16 shows a combined logic and data flow block diagram for an embodiment of the GCSl/CTIS wherein the selection of contextual Ads is influenced by ambient conditions;
  • FIGURE 17 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for a luxury convertible is served based on warm weather conditions, a scanned code, and the user profile;
  • FIGURE 18 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for Florida travel is served based on cold/rainy weather conditions, a scanned code, and the user profile;
  • FIGURE 19 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for an ice cream shop is served based on warm weather conditions, a scanned code, and the user profile;
  • FIGURE 20 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for ponchos and umbrellas is served based on rainy weather conditions, a scanned code, and the user profile;
  • FIGURE 21 shows a combined logic and data flow block diagram for an embodiment of the GCSl/CTIS wherein Ads are served to a User Agent device;
  • FIGURE 22 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for a sports team's season tickets is served along with a pay-per-view event supplied directly to a user's cable box;
  • FIGURE 23 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSI/CTIS in which an Ad for virus scan subscription software is served;
  • FIGURE 24 shows an implementation of a user interface manifesting
  • GCSI/CTIS functionality on a portable electronic device in one embodiment of GCSI/CTIS operation
  • FIGURE 25 shows an implementation of a user interface manifesting
  • FIGURE 26 shows an implementation of a user interface manifesting
  • FIGURE 27 shows an implementation of a user interface manifesting
  • GCSI/CTIS functionality for serving a short messaging service text message prompt in one embodiment of GCSI/CTIS operation
  • FIGURE 28 shows an implementation of a user interface manifesting
  • GCSI/CTIS functionality on a mobile phone in one embodiment of GCSI/CTIS operation
  • FIGURE 29 shows an implementation of a user interface manifesting
  • GCSI/CTIS functionality on a portable communication device in one embodiment of GCSI/CTIS operation
  • FIGURE 30 shows an implementation of logic flow for media acquisition in one embodiment of GCSI/CTIS operation
  • FIGURE 31 shows an illustration of media sampling and full media acquisition in one embodiment of GCSI/CTIS operation
  • FIGURES 32a-b show an implementation of logic flow for code scan monetization in one embodiment of GCSI/CTIS operation;
  • FIGURES 33 a-e show aspects of implementations of JagTag encoding and codes in some embodiments of GCSI CTIS operation
  • FIGURE 34 shows an implementation of an augmented reality user interface for providing requested content in one embodiment of GCSI/CTIS operation
  • FIGURE 35 shows a computer systemization of the GCSI/CTIS.
  • the disclosed GCSI/CTIS employs two basic actors:
  • the GCSI/CTIS enables the creation of two types of transactional articles: i) Scan Messages (115) and ii) Reply Messages (145).
  • the GCSI/CTIS provides context-specific Reply Messages in response to Scan Messages, which are prepared in response to the registration of activity interest by the user, in order to supply information and/or advertising to the user.
  • the GCSI/CTIS generates Reply Messages by processing Scan Message content with user profile information, containing basic profiling data as well as a history of Scan Messages supplied by a given user.
  • Reply Messages are transactional articles that heighten a provider's opportunity to supply relevant and targeted information and/or advertising to the user that is both context and user specific. Without loss of generality, we will heretofore refer to the information and/or advertising content of Reply Messages as "Ads".
  • the GCSI/CTIS may also elect to send context and user-specific Reply Messages based solely on the user profile, without the user having recently registered activity interest, if it is determined from the user's profile, particularly the history of Scan Messages, that a particular Ad is appropriate.
  • users of the GCSI/CTIS scan codes to register interest and the GCSI/CTIS acts as a portal for consumers to access information supplemental to the context in which the codes are found.
  • Users may scan codes found in media publications, on billboards or signs, on consumer products or packages, on websites or television screens, on movie screens, on clothing or accessories, on mobile device displays, and/or the like. In doing so, the users may identify themselves via an identification code specific to the mobile device and service account with which the scan is made.
  • the scanned code can be recorded, as well as the time of day and user location; such information may form the basis of consumer profiles that may be saved by the GCSI/CTIS.
  • these scans are indicative of interest in various subjects, goods, and/or services, they may serve as a basis for an individual customer tracking system. As such, advertisers can finely tune and efficiently tailor their efforts towards achieving maximum return on the advertising expenditure.
  • FIGURE la shows a combined logic and data flow block diagram illustrating a general overview of the GCSI/CTIS in one embodiment.
  • the GCSI/CTIS may be configured so that a user (100a) may scan a digital code (105) with a scanning device (100b), as for example by using a cell phone camera to scan and/or take a picture of a barcode, 2d code, matrix code, data matrix, QR code, JagTag, or other such symbology.
  • a mobile device and software capable of such code capture is the Nokia 6600 cellular telephone equipped with ConnexTo software.
  • the GCSI/CTIS may be triggered by the user selecting an internet link (such as on an internet enabled mobile device), by making decisions within a virtual world (such as a massively multiplayer online game), and/or the like.
  • the GCSI/CTIS may be triggered by the user providing a text input, such as an SMS text message, an e- mail message, and/or the like.
  • the GCSI/CTIS may be triggered by the user providing a voice or other audio input, a video input, keystroke inputs via a telephone keypad, and/or the like.
  • a user may record a particular sequence of spoken words and provide them to the GCSI/CTIS to trigger the provision of requested content.
  • code scanning The time and location (as determined by GPS, GPRS, or other such geo- positioning technologies) of the mobile device are determined (110), and a Scan Message (115) is generated containing a user identification (ID), a hardware ID that identifies the type of mobile device being used, a geocode (location of the device), a timestamp, and the scanned code (see. Fig. 4 and discussion of Scan Message below). Additional user- input information may also be supplied at this point.
  • the Scan Message is packaged and sent (120) to a server (101) that receives and recognizes it (125).
  • the user's profile is updated with the new Scan Message (i.e., it is added as a transaction to their profile transaction history) and queried (130) for information to use in the preparation of a Reply Message (140) that is also based on the content of the current Scan Message.
  • the server selects (135) the Ad content (see Fig. 7) of the Reply Message (145) from an Information Base and sends it to the user's mobile display device, which displays the pertinent content to the user (150).
  • the Scan Message and/or scanned code may be sent to the server (101) by a Multimedia Messaging Service (MMS) protocol.
  • MMS Multimedia Messaging Service
  • a wide variety of other communication protocols may be employed, including but not limited to: Short Messaging Service (SMS), instant messaging, web browser based messaging, email, Enhanced Messaging System (EMS), TCP/IP, WAP, and/or the like.
  • content associated with a captured code or other user interest registration may be sent to a data repository other than a user's mobile device.
  • a user may scan a code corresponding to media content.
  • the code scan may trigger the GCSI/CTIS to send the media content to a user's computer, an online data repository, and/or the like for storage and later retrieval by the user.
  • the GCSI/CTIS may discern a user identity from the Scan Message (1 15), query user access and/or authorization information, and use that access and/or authorization information to access an online data repository corresponding to the user to store requested media content thereon for later retrieval and/or use by the user.
  • the server (101) may be addressed by a short code, short numbers, Common Short Code (CSC), and/or the like for sending the Scan Message and/or scanned code.
  • CSC Common Short Code
  • a short code may appear alongside a code in a print publication, and a user may be informed that the scanned code should be sent to the indicated short code number in order to retrieve a Reply Message, advertisement, coupon, and/or the like.
  • other addressing means may be employed, such as an ordinary telephone number, an email address, a universal resource locater (URL), and/or the like.
  • the short code and/or other server address may be encoded within part of the code itself. When the user scans the code with his or her mobile device, the code may be partially decoded by the client device to extract the address and automatically send the rest of the code thereto.
  • Fig. lb shows an implementation of combined logic and data flow in another embodiment of GCSI/CTIS operation.
  • a code (155) is scanned by a camera phone (156), and the resulting image content is converted to an MMS format to be sent via short code (157) hrough a gateway provider (158) to the GCSI/CTIS (159) server.
  • the image information may be enhanced, manipulated, and/or otherwise processed (160) so as to aid in determining the appropriate content to serve in response.
  • the image content is read (161) and the content and format for the appropriate response is determined (162) (see, e.g., Figs. 9-1 1).
  • a response message is formed in MMS format (163) and is sent (164) back to a gateway provider (158) to be served to the user's camera phone (156).
  • the scanned code may be directly decoded on the client mobile device instead of on the server.
  • the decoded content may then be converted to MMS format and sent via short code to the server in order to retrieve the appropriate content associated with the code. That content may be returned from the server to the client mobile device by means of an MMS protocol as well.
  • the GCSI/CTIS is shown in FIGURE 2 for a particular, exemplary embodiment: providing targeted and contextual information and advertising to the user related to a news article.
  • a user employs a cell phone to scan a code associated with an article in the Business section of a media publication (207), such as by using the phone's built in camera to photograph a 2D matrix code (e.g., QR code).
  • the location of the scan (San Francisco, CA) is determined by the phone's built in GPS receiver (212), and this location is incorporated as a geocode, along with the user ID, the hardware ID of the particular type of device (e.g., cell phone) used, the time, and the code content, into a Scan Message.
  • This is sent to a server via the cell phone's data connection (e.g., wireless internet systems such as IxEV-DO), and the server queries a database of user profiles based on the supplied user ID in order to update the appropriate user profile with the content of the current Scan Message and to determine what, if any, information in the user profile may be relevant to the preparation of the current Reply Message.
  • the server recognizes that the user is 55 years of age and has recently been scanning articles and/or ads related to investments and retirement planning (232).
  • the user can supply a list of interests to be considered in addition to those culled from their scan history.
  • the server selects the appropriate Ad content to include in the Reply Message, comprised in this case of links to Finance headlines, quick links to saved stock quotes (237), and a contextual brokerage advertisement (238), including information on branch locations in San Francisco (212) near the user.
  • This reply is sent by the server to the user's mobile device which displays the appropriate message content.
  • the GCSI/CTIS can serve information to the user based on the collected knowledge of user space-time trajectories contained in the user profile, without the need for any initiating code scan.
  • This embodiment is best illustrated by example, as drawn in FIGURE 3.
  • a user rides a bus from home (300) to work (310) on four of the last five days, and takes a different bus to his doctor's office (330) on the remaining day.
  • the space-time trajectories for the four work trips (305) and the one doctor trip (325) are determined by codes that the user scans with his cell phone from a newspaper during the bus rides.
  • the user is assumed to scan a code every ten minutes starting at 7:30 AM until the destination is reached, and the geographic location of each scan is indicated by the position of the timestamp along each trajectory.
  • tracking occurs without scanning, simply by having the device send geocodes and timestamps by itself.
  • the user passes a number of Ad providers (marked with X's) with Ad content in the GCSI/CTIS Information Base, with dotted circles indicating the locus of points that are a distance of two miles from each provider.
  • Ad provider in particular (315), a gourmet coffee shop, is within two miles (320) of the user's space-time trajectory at 7:50 AM in four of the last five days.
  • the user's profile also lists "coffee” as an interest, both based on user specifications during registration and on the user's advertisement and article scan record. Consequently, on the sixth day, the server supplies the user with an advertisement for the coffee shop (315) at 7:45 AM GCSI/CTIS DETAILED OVERVIEW
  • the GCSI/CTIS is enabled by the participation of Ad providers and users.
  • Ad providers supply Ads for storage on the GCSI/CTIS server.
  • the Ads are stored on third party servers that are referenced by the GCSI/CTIS server.
  • the user experience may be enhanced by the incorporation of personal preferences and demographic information to optimize the targeting of Ad content. Consequently, one embodiment would incorporate a user registration procedure. Users may register for the GCSI/CTIS via the internet, telephone, postal mail, and/or the like. If a particular embodiment of the GCSI/CTIS requires client software for the user to install, this could be supplied upon successful user registration.
  • FIGURE 4 shows an exemplary embodiment of a user registration interface 400, wherein a user can input Basic Info 405 (e.g., member ID, password, secret question/answer, e-mail address, etc.), Device Info 410 (e.g., mobile phone carrier, phone manufacturer & model, operating system, etc.), Demographics 415 (e.g., gender, year of birth, zip code, country of residence, household income, job title, industry, etc.), and Content Preferences 420 (e.g., interests, subscriptions, content delivery options, personal history options, cache options, geo-tracking options, ad delivery options, etc.) in a plurality of fields 425.
  • a basic user identification packet e.g., a "cookie" is sent with a user's first code scan, thus establishing a basic user profile that can be filled in with greater detail at a later time.
  • Scannable codes within the GCSI/CTIS may be found in a variety of locations, including but not limited to newspaper and magazine articles, signs and billboards, flyers, store locations and kiosks, consumer products, packages, clothing, stickers, websites, software displays, television broadcasts, virtual worlds, and/or the like.
  • code and associated method with which the code can be scanned will depend to some extent on where the code is found, but among the possible types of codes are standard barcodes (e.g., UPC, EAN, Code 128, etc.), 2D matrix codes (e.g., QR code, Semacode, Data Glyphs, mCodes, etc.), user-input codes (e.g., text messages), RFID tags, pure images (e.g., an image of a sign to be analyzed by optical character recognition), website links, software inputs (such as, but not limited to, voice inputs and/or other audio and/or video inputs), and/or the like.
  • standard barcodes e.g., UPC, EAN, Code 128, etc.
  • 2D matrix codes e.g., QR code, Semacode, Data Glyphs, mCodes, etc.
  • user-input codes e.g., text messages
  • RFID tags e.g., pure images (e.g., an
  • Fig. 5a also displays a fourth matrix code called a JagTag 515.
  • the JagTag includes an aesthetically pleasing appearance and provides functionality that is more robust than other matrix codes. Further aspects of JagTag encoding are described in detail below.
  • a scanned code is received at the GCSI/CTIS server (513) and a first attempt is made to decode a received code scan (515).
  • a received code scan may take the form of a bitmap image and/or a compressed bitmap image.
  • the code is matched to associated content (525) that is ultimately destined to be served to a user. Otherwise, a determination is made as to whether enhancement should be applied to the scanned code (530). If not, then an error message and/or suggestions on how to improve the quality of the scanned code may be returned to the user (535).
  • the GCSI/CTIS may decide not to apply enhancement, for example, if enhancement has already been applied unsuccessfully to the same image before or if the quality of the image is so poor as to be clearly beyond improvement.
  • the GCSI/CTIS determines the appropriate enhancement type (540) based, for example, on the quality and character of the scanned code image and subsequently applies the enhancement (545), after which a new attempt is made to decode the scanned code.
  • multiple enhancement processes may be applied against a scanned code and the results compared in order to determine the encoded content.
  • the image Prior to enhancement, the image may be downsized if necessary for speed of processing in applying multiple enhancement against the image. Image quality may also be increased if necessary in order to more successfully apply enhancements.
  • an enhancement process may be applied to remove all extraneous information, despeckle, and/or the like.
  • an enhancement process may be applied to manipulate the contrast and/or brightness of the image in order to create a pure black and white image for cleaner decoding.
  • an enhancement process may be applied to tilt the plane of the code to create a flat plane to aid in successful decoding.
  • an enhancement process may be applied to de-rotate, deskew, and/or otherwise recreate proper rectangular pixel groupings that can be decoded.
  • an enhancement process may be applied to sharpen the image into recognizable pixel groupings.
  • the GCSI/CTIS may apply edge recognition processes to the code image to create a set of potential code images that can be processed and compared to records in a code database.
  • a partial decoding may be accomplished and serving of content achieved on that basis.
  • a partial decoding may, for example, result in a probabilistic code match without ever successfully decoding the complete code.
  • Fig. 5c shows an implementation of logic flow for partial decoding in one embodiment of GCSI/CTIS operation.
  • a scanned code image is received (548), partially decoded (550), and the partially decoded content used to query a code database to find matching codes (555).
  • a determination is made if any matches exist (560) and, if not, then the GCSI/CTIS may return an error message to the user and/or make suggestions about how to improve the image of the scanned code (565).
  • the GCSI/CTIS may consider ancillary factors (575) in attempting to isolate a single code as the most likely match to the received code.
  • ancillary factors may include, but are not limited to: the incoming phone number, the carrier, the time of day, current code traffic, the source of the code, the context of the code, the user ID, the hardware ID, the user behavioral history, the user location, and/or the like.
  • the GCSI/CTIS is thus capable of predicting the true code based on knowledge of the user scanning the code, the context of the code, ambient factors, and/or the like. Once a unique code has been identified, this is designated as the matching code (580) and the GCSI/CTIS proceeds with determining the appropriate associated content to serve to the user.
  • Fig. 5d shows an implementation of logic flow for customized repair and/or decoding of obscure or ambiguous scanned codes.
  • An ambiguous code may be received at a GCSI/CTIS system at 581, such as may be sent via a communications network from a user's mobile scanning device.
  • a scanned code may be qualified as an ambiguous code if an attempt to decode the code does not yield a single result.
  • the system may also receive code scanning conditions 582 describing any of a variety of circumstances of the code scan which may affect the quality and/or fidelity of the scanned code.
  • some relevant circumstances may include the time of day, light levels, use of flash, mobile scanning device type and/or characteristics, code size, contrast, brightness, sharpness, skew, rotation, and/or the like.
  • the ambiguous code and scan conditions may then be passed to a repair queue 583, whereby the system may analyze the ambiguous code and attempt to discern the correct decoded content.
  • a plurality of possible matching codes are determined at 584, and a code database is queried at 585 to extract code presentation conditions corresponding to each of the plurality of matching codes.
  • Code presentation conditions may describe how and where the code was displayed and may comprise a wide variety of factors, such as but not limited to medium (e.g., newspaper, glossy paper, product packaging, television display, website, billboard, and/or the like), likely obscuring factors (e.g., glass covering, tears, distance, and/or the like), and/or the like.
  • the GCSI/CTIS system may then generate a code repair database query based on the presentation conditions and/or scan conditions 586 and query the repair database to extract repair schemes corresponding to the particular presentation and/or scan conditions. For example, a particular code repair scheme may be tailored for and/or correspond to codes displayed on billboards that are scanned after dark by Nokia mobile phones.
  • Extracted repair schemes corresponding to each of the possible matching codes are applied to the ambiguous code at 588, and a determination is made at 589 as to whether any one of the possible matches is now more likely to be correct than the others. This determination may be made, for example, by measuring the fidelity of codes with various repair schemes applied and selecting as the correct code that which has the highest resulting fidelity. If no remaining ambiguity exists as to the correct code, then the favored code is registered with the GCSI/CTIS system at 592. Otherwise, the GCSI/CTIS may generate a custom recommendation message 590 and send the message to a user and/or a user's mobile device 591.
  • the custom message may, for example, provide tailored recommendations on how the user may improve the fidelity of the code scan based on the possible matching codes and the associated presentation conditions and/or scan conditions. Tailored recommendations, as well as the repair schemes themselves, may be adjusted based on feedback received from users about which codes they were actually trying to scan.
  • the GCSI/CTIS may provide a query message to a user presenting a summary of content associated with alternative matching codes in order to determine which content the user was actually trying to access.
  • code analysis and/or repair may be undertaken on an code image level, alphanumeric string level, binary string level, and/or the like basis. Combinations of such bases may also be undertaken, such as by first analyzing the ambiguous code in its alphanumeric string form and then, if ambiguity remains, analyzing the code in its binary form. Further discussion on such an analysis is provided below.
  • a given matrix code may encode the string ABC 123.
  • the GCSI/CTIS system now knows that the code contains ABC 1 3 and may check this against codes in a code database to determine how many matches exist. If it finds two matching codes (e.g., ABC123 and ABC143), it may consider ancillary factors, including code presentation and/or code scan conditions, user profile information, and/or the like. For example, ABC 123 may correspond to an advertisement for a new action movie while ABC 143 corresponds to a coupon for women's cosmetics. If the user supplying the code is determined, based on a supplied user ID, to be a man with a history of scanning movie-related codes, then the GCSI/CTIS system may infer that ABC 123 is the matching code and serve the corresponding content. In one implementation, the GCSI/CTIS server may further supply a confirmation request for partially matched codes, requesting the user to affirm or deny that the supplied content is, in fact, the content that he or she was seeking.
  • ancillary factors including code presentation and/or code scan conditions, user profile information, and/or the like
  • analysis of ambiguous codes may comprise a two- stage process.
  • an encoded string comprising a number of alphanumeric characters, one or more of which may be unclear, may be compared to a database of alphanumeric strings to determine which, if any, match.
  • a Levenshtein distance metric may be employed to determine the similarity of an input string to strings existing in the database.
  • the input string may only be compared against "live" strings in the database (i.e., strings that are currently engaged in active use and/or tied to actual content).
  • a GCSI CTIS system may apply a second stage of analysis, whereby the input alphanumeric string is converted into a corresponding binary bitset array (see, e.g., Fig. 33a-b and associated discussion below) and a comparison is performed between binary values of the input string and the strings stored in the code database.
  • the most significant bits come first in the bitset array while the least significant bits come last, so priority weighting may be applied against potential value matches based on which bits match between the input and stored strings.
  • the Scan Message generated by the GCSI/CTIS is, itself, a novel data structure.
  • it contains an identification field (605) comprising a unique user ID (605 a) and a hardware ID (605b), both automatically supplied by the device used to scan and transmit the scanned code; a coordinate field (610) comprising the location geocode (610a) (e.g., GPS coordinate, latitude and longitude, city and state, etc.) and timestamp (610b) of the scan; and a code field (615) supplying the specific content of the scanned code, which may include a subject code (615a) for the code context, a source code (615b) indicating where the code was located, and a content code (615c) indicating the specific information, if any, to be supplied in response to a scan of that code.
  • an identification field comprising a unique user ID (605 a) and a hardware ID (605b), both automatically supplied by the device used to scan and transmit the scanned code
  • a coordinate field (610) comprising
  • the XML for the Scan Message takes the following form:
  • Scan Message will employ standard data transmission techniques to ensure successful transmission and to preserve data integrity (e.g., TCP/IP, lxEV-DO, etc.). This is relevant for the Scan Message, which will contain the coded information scanned by the user.
  • data integrity e.g., TCP/IP, lxEV-DO, etc.
  • Such techniques may include but are not limited to the use of standard transmission protocols, "handshaking", data compression, data encryption, and error correction.
  • the content of the user profile generated by the GCSI/CTIS is itself a novel data structure.
  • the profile (700) which is uniquely specified by the user ID, will contain a category of quasi-static user information (705) that is generally fixed over time and one of dynamic user information (730) that is updated with each successive Scan Message that the user submits.
  • the quasi-static info (the "quasi" qualifier indicates that this information may be updated, for example if a user changes their mobile device, however it does not change with each successive code scan) may include a hardware ID (710); "census” info (715) such as name, address, phone number, e-mail address, age, sex, race, marital status, number and age of children, job title, annual income, etc.; subjects of interest specified by the user (720); and information regarding allowed methods to contact the user as well as user defined privacy and/or information sharing settings (725). In one embodiment, this information could be supplied by the user when registering for the GCSI/CTIS service as, for example, on a website.
  • the dynamic info in the profile may include a scan record (735), comprising the time (740), location (745), and scan code (750) (including subject (750a), source (750b) and content (750c)); and statistics related to the scan history (755). Such statistics may include but are not limited to the most popular scan subjects, most popular scan sources, user space-time trajectories, etc.
  • the profile contains a series of identifying codes distilled from the profile content (e.g., demographic category code based on census info, subject codes, source codes, etc.) that can be compared with similar codes in the Scan Message to determine the appropriate Ad content to include in the Reply Message.
  • the profile contains identifying keywords or "tags" based on the profile content that can be compared with similar tags in the Scan Message to determine the appropriate content to include in the Reply Message.
  • the identifying labels for the user profiles may be input by GCSI/CTIS administrators or automatically generated by an appropriate computer algorithm such as stripping header labels from ad descriptions (e.g., for example, stripping the header tags from an HTML ad).
  • the XML for the User Profile may take the following form:
  • data accumulated in a plurality of user profiles may be analyzed to extract information about codes that are scanned.
  • the frequency with which a particular code is scanned may be extracted from user profiles and parsed by geographic, temporal, and/or demographic criteria to yield code profiling information.
  • This information may be stored in a code and/or Ad profile.
  • the code/Ad profile may be constructed and/or updated by the GCSI/CTIS immediately upon the receipt of a Scan Message rather than being extracted from user profiles.
  • Fig. 7b shows an implementation of a user profile user interface in one embodiment of GCSI/CTIS operation.
  • the profile page 760 may include a display of basic user information 763 and/or a user picture 766, and may provide a wide variety of other user information, including demographic information, interests, media libraries, friend lists, code scanning activities, and/or the like.
  • the displayed implementation further includes a plurality of tabs 769 allowing the user to view profile information, edit his or her profile, view photos, groups to which the user may belong, and/or edit settings, including sharing and/or privacy settings 772. Privacy settings may, for example, control access of other individuals to a user's personal information, code scanning activity, and/or the like.
  • certain information about a user may be shared with other users. For example, a user may be able to inquire, via a GCSI/CTIS affiliated system, as to what codes have been recently scanned by other users that are within a particular geographic radius of the user.
  • a user scanning a code to receive a song may also be provided with information about the code scanning activities of other users whose codes also corresponded to songs.
  • a user may be allowed to restrict which information of theirs is sent to other users and/or to restrict which information of other users is sent to them. For example, a user may have a "friends" list that has a different level of access than the general public.
  • a user may have a personal code that is associated with the user and/or a user profile. In one implementation, other users can scan the personal code to automatically join the first user's friend list.
  • a personal code my comprise a short-link to the user's profile 760, and/or to other profile pages or webpages associated with the user, such as a Facebook page, Myspace page, and/or the like.
  • the user can set a forwarding instruction on his or her GCSI/CTIS page to forward inquiries corresponding to scans of the user's personal code to another page.
  • the user may provide the personal code on other pages as a link back to the user's GCSI/CTIS profile page.
  • a user may be provided recommendations in response to a code scan. For example, the user may scan a code corresponding to a particular song by a particular musical artist. The user may then be provided a listing of other songs, artists, and/or the like having codes recently scanned by the members of the user's friends list and/or that may be further related to the song and/or artist whose code the user scanned.
  • a user's code scans may be integrated with an instant messaging, blogging, micro-blogging, and/or the like service, whereby the user's code scans are automatically rendered as descriptive summaries and displayed to other users, such as on a webpage, via SMS text messages, emails, and/or the like.
  • each code scan may have a pre-set text description associated therewith that, upon scanning of the code, is displayed on a user's Twitter.com page.
  • a user may receive an incentive payment for particular types of content that are provided to the user's friends, associates, blog subscribers, and/or the like as a result of the user's code scans.
  • a reward may be provided to the user every time the user scans a code corresponding to a particular brand of products and a message associated with those products is supplied to subscribers to the user's profile and/or blog.
  • a further reward may be provided to the user if it can be determined that one of the user's associates made a purchase based on the provided message.
  • the privacy settings in the displayed implementation include permissions for displaying "twitters", songs, videos, and purchases 775 associated with the user's code scans to various security levels for other people 778, including the general public, private/friends, and "snaps" (i.e., those who may have scanned a user's personal code and/or a code corresponding to the user's profile). Selection of a particular privacy setting may generate a sharing rule that is stored in association with the user and consulted each time a user scans a code corresponding to one of the categories shown at 775 to determine whether or not code-associated information should be provided and/or sent to any of the categories of people shown at 778.
  • the profile page 760 further includes a field 779 wherein a user may specify the location of a data storage facility to which some or all media and/or other content that the user acquires via code scans are to be sent and/or stored.
  • a user may specify an online storage facility (e.g., Apple's iDisk service) in which the user's code scan-acquired content is to be stored.
  • an online storage facility e.g., Apple's iDisk service
  • the profile page 760 further includes interface components configured to generate a personal code, in this case a JagTag 780.
  • Selection of the button at 780 causes the GCSI/CTIS system to associate a code with the user and/or the user's profile and generate a corresponding code, which is displayed for the user.
  • the user may then elect to save an image of the code to his or her computer desktop, send the code in an email, send the code in an MMS message, and/or the like via the interface elements at 781.
  • the Information Base contains the content that may be included in the
  • each Ad is associated with searchable labels.
  • the Ad (800) is comprised of the specific ad content (805) (e.g., text, images, video, etc.) and a set of identifiers (810) including subject tags (815), information characterizing the temporal character of the Ad based on which the Ad may be triggered (820) (e.g., 6 to 10 AM for a breakfast Ad), information characterizing the geographic specificity of the Ad based on which the Ad may be triggered (825), demographic specificity of the Ad (830) (e.g., an Ad for family vacations), and the hardware requirements of the Ad (835) (e.g., hardware IDs of devices capable of displaying the content of a particular Ad).
  • the Ad would also contain information identifying the source in which the Ad code is to appear.
  • the Ad would also contain code/Ad profile data, describing the history and/or statistics of scans related to the Ad.
  • the XML for an Ad may look like:
  • the GCSI/CTIS queries the user profile to determine which Ads to include from the Information Base in the Reply Message in order to tailor those Ads to the user's profile characteristics, interests, and trajectories.
  • a scanned code will yield two components in the Reply Message content: i) static content that is the same for every user who scans the code, and ii) dynamic content that depends on the context of the user and the user profile.
  • the static content (i) is determined from the scan code, while the dynamic content (ii) is determined by a combination of the scan code and the user profile, requiring a dynamic content generation heuristic to combine their respective influences.
  • the scan code and user profile is labeled with keywords or "tags" that identify the subject content of each.
  • the scan code, user profile, and Ads are labeled with identifying codes. In either case, the heuristic exhibited in FIGURE 9 first filters all Ads in the Information Base by the subject code or tag of the scanned code (900).
  • the Ads from 900 are filtered by the hardware ID (905) to ensure that the Ad content can be successfully acquired and displayed by the user.
  • the Ads from 905 are filtered into separate categories by scan location (910al), user address (910a2), user specified subject interests (91 Obi), user scan subject history (910b2), scan time (910c), or user demographic category (910d). Ads in each of these filtered categories are compared to determine which occur most commonly across 910a, b, c, & d (915).
  • the server determines if 915 has yielded a single Ad (920), and if so, it incorporates the Ad's content into the Reply Message (930). Otherwise, it chooses one Ad at random from the remaining Ads (925) for incorporation.
  • Ad filtering heuristic As an exemplary implementation of this embodiment of the Ad filtering heuristic, we consider the situation discussed above with reference to Fig. 2. Here, the user scans a code from an article on finance and investment in the business section of a media publication. Keywords associated with this code may include Business, Finance, Investment, etc. Consequently, only those Ads possessing these identifying keywords are passed at 800. In an alternative embodiment, the keywords may be ranked in order or relevance and the Ads filtered accordingly.
  • the Ads from 900 are filtered by Hardware ID; we presently assume that the user's mobile device is equipped with advanced capabilities (text, image, audio, video, internet, etc.), so that all Ads are passed at 905.
  • the Ad filter may preferentially choose those Ads that take fullest advantage of the user device's display capabilities.
  • Ads there is one for a brokerage firm that is tagged with a location code corresponding to the user's address (San Francisco, CA), the user's specified subject interests (investing, retirement), and a portion of the user's demographic profile (age 55 or older).
  • the three tag matches distinguish this Ad from the others in the Information Base, which, in this example, all have two or fewer tag matches; so this unique Ad, a brokerage firm located in San Francisco, CA with retirement services, is chosen to be served to the user's mobile device.
  • the user may respond to the Reply Message with a relevance rating. This rating may then be stored in the user profile and/or employed to refine the criteria for tailoring future Reply Messages to that user.
  • the Ads would not be filtered by hardware ID at 905.
  • the server will determine whether that Ad is properly formatted for the device specified by the hardware ID. If so, then the Ad will be included in the Reply Message as is. Otherwise, it will be converted into the required format appropriate to the user's mobile device. For example, if the selected Ad contains color images but the server determines that the user's hardware device is an early model BlackBerry that only accommodates monochromatic text, the server will implement a peripheral application to strip the text content from the Ad and incorporate only that in the Reply Message.
  • Ads served by the GCSI/CTIS are determined by codes scanned at some time in the past, it is possible for the GCSI/CTIS to serve Ads without any immediately contiguous, causal code scan.
  • a general illustration of this capability was given above in Fig. 3, where each Ad provider has specific geographic locations of operation. These are assumed to be stores/restaurants for the present purposes of illustration in this disclosure, but they may have different character for different embodiments and applications, including but not limited to kiosks, signs and billboards, offices, hospitals, real estate, shelters, emergency service providers, traffic monitors, individuals, websites, virtual world locations, and/or the like.
  • a chosen distance surrounding each Ad provider location defines a "provider zone", where the metric by which "distance" is gauged may be generalized in the case of cyberspace/virtual world locations.
  • a provider zone breach occurs when a user scans a code within a provider zone. This may be regardless of the content of the scanned code, for in this example the goal is to record the user's space-time position.
  • a provider zone breach can be registered even if a user does not scan a code within the provider zone, if the GCSI/CTIS can infer a breach from two or more code scans outside the provider zone through interpolation.
  • a special note may be incorporated into the user profile, such as in the Scan statistics module (755), indicating the time and the particular Ad provider.
  • the GCSI CTIS may be configured to automatically query a user position without scanned codes.
  • a user's mobile device may be configured to periodically register it's GPS location with the GCSI/CTIS system.
  • the GCSI/CTIS may be able to continuously monitor the position of a client mobile device based on the cell site or tower to which the device is communicatively coupled. Cell site based user location may also be registered when a user scans a code.
  • FIGURE 10 shows a histogram (1000) of provider zone breaches in 20 minute intervals for a particular user over a chosen time scale, which we will take to be two months in this example.
  • such histograms will correspond to breaches of specific Ad provider locations; while in an alternative embodiment, they will correspond to breaches of any of a plurality of locations corresponding to a specific Ad provider; while in still another embodiment, they will correspond to breaches of different locations of related but different Ad providers, chosen to target a specific collective user demographic.
  • the significant provider zone breaches are clustered around two times: one approximately centered at 9 AM (1005), and the other at 6 PM (1010).
  • This may represent, for example, a user scanning codes as he passes the same Ad provider location while riding a bus to and from work.
  • a threshold breach level (1015) is specified such that all breaches below this threshold number are ignored.
  • This threshold level should be specified with respect to the time scale of the histogram; in the present example, the threshold is 3 breaches per two month period.
  • the average peak times (1020, 1025) of the breach clusters that exceed this threshold are computed (marked by X's in Fig.
  • provider zone breaches could be sorted by scan subject, so that a histogram of the form of Fig. 10 could be constructed for a specific category of scans in order to further tailor the supplied Ad content.
  • the system may be generalized to analyze trajectories in "cyberspace-time".
  • a record of trajectories is kept of the user's activity on the world wide web as browsed, for example, on the user's internet enabled mobile device.
  • a generalized concept of "distance" may be incorporated, for example reflecting an average number of links needed to get from one website to another.
  • Provider locations become websites in this embodiment, and a zone breach may be registered when the user is a specified number of links away from the provider's website.
  • the GCSI/CTIS can anticipate user cyberspace-time trajectories and supply Ads, coupons, pop-ups, etc. related to websites that the user is approaching.
  • the GCSI/CTIS may track that a user visits web site A at 9:00 AM and web site B at 9:20 AM every day. The GCSI/CTIS may then provide ads to website A at 8:50 AM and to website B at 9: 10 that are targeted to that user.
  • the GCSI/CTIS may provide this targeting information to existing ad serving systems, which in turn may use the targeting information for timely placement of ads.
  • the aggregation of such targeting information may be useful to advertisers and website owners. For example, reports may be run on user profiles sorted by location (e.g., web sites) and time of visit.
  • This information may be supplied, along with user profile IDs, which may then be used by the advertising servers and/or websites to pre-cache ads that are relevant to the users' interest just prior to their anticipated visits to the website.
  • the GCSI/CTIS works in conjunction with certain websites to supply user-specific Ads on those sites.
  • the content of the user profile within the GCSI CTIS may be used to select Ads that the user browses using their mobile device.
  • web-based Ads may be specific to the trajectories of users in geographic space-time, since that information is included in the user profile.
  • the system may provide the user with Ads directly to their PDA or embedded in website C (because it was pre-loaded as already discussed) for the coffee shop.
  • the GCSI/CTIS provides a mechanism to provide geographically relevant ads to traditional websites.
  • the total content of the websites browsed by a user on their mobile device may be modified by the content of the user profile within the GCSI CTIS.
  • a news website may select articles for a user that are specific to the user profile, including their interests, demographics, current time and location, etc.
  • the GCSI/CTIS may analyze the user trajectories in "virtual worlds" or "synthetic realities" and serve ads accordingly.
  • An example of a virtual world is a massively multiplayer online game, such as The Sims Online, EverQuest, World of Warcraft, Second Life, and/or the like.
  • a code scan may be comprised of a particular user action or decision such as initiating or completing a game mission, clicking on an icon, saving a game, etc.
  • geographies and virtual locations may be used in employing trajectories.
  • the history of user activity within the virtual world may then be incorporated into the user profile and used by the GCSI/CTIS to serve ads within the context of the virtual world or elsewhere.
  • the GCSI/CTIS may be used as advertising delivery mechanisms.
  • Selecting the proper Ad to serve to the user in the non-triggered Ad serving embodiment of the GCSLCTIS may be accomplished using a variety of heuristics that are best tailored to suit the specific use or application. Nevertheless, we present an example of a specific embodiment in FIGURE 1 1a for illustrative purposes.
  • a weighting system may be employed to select among the Ads of a specific Ad provider once it is established that an Ad from this provider is to be served to the user based on the analysis of Fig. 10. This weighting system begins by assigning a score of 1 (1100) to all Ads in the Information Base corresponding to the provider.
  • This score is multiplied by a subject coefficient (1 105) for every match between the Ad subject and the user specified subject interest or scan subject history. That coefficient is 2 in the present example, so N matches would yield a weighting factor of 2 N .
  • the Ad score may also be multiplied by a time coefficient (1 110) if the serving time (1030 or 1035) falls within a time range specified for a particular Ad. In the present example, the time coefficient is 4, expressing the greater importance of this factor compared to a single subject match.
  • the Ad score may be multiplied by a demographic coefficient (11 15) for every match between the Ad demographic category and that of the user. That coefficient is 1.5 in the present example, reflecting the diminished importance of this factor compared to the time and subject considerations.
  • the histogram (1000) of Fig. 10 represents provider zone breaches for a fast-food restaurant that a user passes on his way to and from work.
  • An Ad in the restaurant's base of provided Ads matches the user's stated interest in gourmet coffee, and this Ad is further labeled by a time identifier indicating that it is best served between 8 AM and 10 AM. Consequently, at 30 minutes before the user's average breach time of the provider's zone, the server supplies the Ad to the user's mobile device, touting this restaurant's new line of gourmet coffee drinks.
  • the user's profile may specify that he is married with two children.
  • the GCSI/CTIS may be configured to receive and implement marketer rules for serving Ads.
  • Fig. l ib shows a schematic illustration of data structures related to establishment of a marketer rule for Ad serving in one embodiment of GCSI/CTIS operation.
  • a user profile data sets (1 147) may include a variety of data fields related to user activities, interests, characteristics, and/or the like, such as but not limited to: geographic visits (1 149), as may be recorded by code scans; time (1151) associated with code scans; interest contacts (1153), such as may be reflect the user's interests and may be based on the context and/or associated content of scanned codes; gender, age, demographic, and/or other personal information (1 155); and/or the like.
  • Server data pulls (1 157) may reference one or more data feeds to which the GCSI/CTIS server has access in order to draw information that may be pertinent to marketer rules and/or Ad serving procedures.
  • a wide variety of different types of feeds may be accessible, including but not limited to: global newsfeeds (1 159), such as associated press wire services, weather information, sports scores, political and social events, financial market data, and/or the like; category sector feeds (1 161), such as more specific and/or special interest news feeds; marketer specified feeds (1163); and/or the like.
  • a marketer rule (1165) may be established by selecting one or more fields (1 167) from the user profile data sets (1 147) and/or the server data pulls (1157) and supplying associated parameters (1165) and/or parameter values associated with those fields.
  • the rule associates a Petroleum Gazette field (1 169) with a parameter specifying more than three oil articles read per day (1 175).
  • the rule associates a gas station visitation field (1 171) with a parameter specifying more than three visits per week (1177). If both of these conditions are deemed true for a given GCSI/CTIS user, then the GCSI/CTIS may serve one or more Ads selected for and/or associated with the marketer rule. A price-per-impression (1 179) may be charged for each time that the Ad is served to a user under the circumstances specified by the rule. In one implementation, a marketer may propose a price-per-impression when he or she creates the rule, which is then submitted to the GCSI/CTIS and/or a GCSI/CTIS administrator for approval.
  • the GCSI/CTIS may automatically generate a price-per-impression based on the rule and/or the marketer. For example, a fixed charge may be applied for each additional field and associated parameter added to the rule, as this refines the specificity with which the associated Ads will be served and increases the likelihood of transactional consummation.
  • a rule Once a rule is complete, it may be entered for storage and subsequent use in a marketer rules database (1181). It should be understood that the functionality described for this embodiment of the GCSI/CTIS may be integrated or employed within any of the other GCSI/CTIS embodiments described herein.
  • the XML for the above marketer rule may take a form similar to the following:
  • the elements of Fig. l ib may form the basis of a user interface for marketer rule generation.
  • a marketer and/or other GCSI/CTIS user may be presented with lists of user profile data sets (1147) and server data pulls (1 157) that may be dragged and dropped to the marketer rule box (1 165) to generate a marketer rule.
  • the user may click OK to submit the rule and/or drag and drop the rule to a marketer rules database icon (1 181).
  • Fig. 11c shows an implementation of logic flow for generating a rule queue in one embodiment of GCSI CTIS operation.
  • a rule is instantiated (1 182), and the GCSI/CTIS server checks parameter quanta associated with the rule (1183).
  • a runtime quantum is discerned for the rule (1184) to determine the timing for applying the rule.
  • the rule is subsequently parsed to generate the appropriate query structure (1185), and the cron schedule for the rule is established based on the runtime quantum (1 186).
  • the rule may then be pushed to the cron schedule queue (1187), and a determination made as to whether there are any additional new rules to process (1188).
  • Fig. l id shows an implementation of logic flow for cron job queue management in one embodiment of GCSI/CTIS operation.
  • the GCSI CTIS may monitor the cron job queue and, for each queued cron job associated with a rule that is next in the queue (1 189), the GCSI/CTIS may determine whether or not it is time for that particular cron job to run (1 190). If not, then the GCSI CTIS passes to the next cron job in the queue (1 191). On the other hand, if it is time to run, then the appropriate databases specified in the rule are queried, and the particular cron job is dequeued (1 192).
  • Ad selection modules may be passed to Ad selection modules in order to choose an Ad to supply to the user.
  • the marketer rule itself may uniquely determine an Ad to serve.
  • the marketer rule may determine a set or class of Ads to serve, from which a unique Ad may then be randomly selected.
  • as Ad may be selected from the marketer rule determined set or class of Ads based on a user profile.
  • the GCSI/CTIS provides a targeted information serving system that may be applied to a wide variety of marketing and information dispensation applications.
  • the GCSI/CTIS creates enhanced ads with content that cannot be included in a print ad.
  • additional content pertaining to the automobile such as detailed images, video, audio, reviews, and links to additional information.
  • the GCSI/CTIS may provide a list of local dealerships and pricing.
  • the GCSI/CTIS may suggest other automobiles by the same manufacturer that are popular with customers that share the same income bracket, geographic address, number of children, etc. as the user.
  • the GCSI/CTIS provides targeted coupons to consumers.
  • a user may be provided with a coupon code for a store or establishment near the location where the scan took place, thereby increasing the likelihood that the coupon would be used.
  • Choosing the coupon based on the contents of the user profile may further increase the likelihood of a consummated transaction.
  • FIGURES 12a and 12b show two examples wherein the GCSI/CTIS supplies coupons and/or discount info to a user.
  • Fig 12a shows an advertisement 1205 for hay fever medication that contains a scan code.
  • the user's cell phone is supplied with a coupon 1210 for 25% off the advertised medication, along with a nearby store at which to redeem the coupon.
  • the coupon 12b shows an article related to events and nightlife in New York City 1215 that contains a scan code.
  • the user may also be provided with a contextual advertisement for a local bar 1220, including an announcement of happy hour discount prices based on the time of the scan.
  • the coupon could be provided to the user based on an anticipated provider zone breach rather than a contiguous, causal code scan.
  • coupons may be supplied to a user's mobile device with digital rights management (DRM) software included to prevent or discourage coupon copying, sharing, and/or the like.
  • DRM digital rights management
  • no DRM software is included with the coupon.
  • the GCSI CTIS allows for reduced use of printed space in media publications.
  • an ordinary printed article or advertisement may be supplanted by a 2D matrix code that supplies the content directly to the user's mobile display device.
  • the supplied content may be dressed with additional content that is specifically chosen for the user based on his/her profile or current location, thus increasing the value and utility of the content while still utilizing significantly reduced print space.
  • This increased content value coupled with the reduction in print space, may translate to significantly increased advertising revenue for media publications.
  • scan codes may be placed in web-based ads so that users may scan those ads with their mobile device.
  • scan codes may be placed in television-based ads.
  • the GCSI/CTIS provides a means to supply urgent or breaking information.
  • a breaking news story that arrives too late to be included as a printed article can still be incorporated into a publication via a 2D matrix code.
  • Publications could even have a permanent code in each issue that users can scan in order to access timely breaking and/or supplemental news for which there was a lack of space or time to include in the printed publication.
  • the GCSI/CTIS provides a means of disseminating targeted information over a large scale. For example, during a widespread emergency, a single 2D matrix code could be broadcast on television. When users scan the code, they are supplied with regional information/instructions, shelter locations, maps, etc. Certain users may be provided even more specific instructions if, for example, their profile lists their occupation as some form of emergency personnel.
  • the GCSI/CTIS can provide targeted information to any or all users expected to be in the vicinity of a particular area or event based on their history of space- time trajectories.
  • a prior warning to avoid the area can be broadcast to the users' mobile devices.
  • traffic alerts can be broadcast to the mobile devices of users projected to be in the vicinity of a high-traffic area before they are stuck there.
  • the GCSI/CTIS may supply targeted Ads, including coupons, for nearby businesses, restaurants, coffee shops, etc. to these users for them to solicit while they wait for traffic to disperse.
  • Ad provider locations e.g., Ad provider locations
  • the GCSI/CTIS may serve Ads based on prevailing ambient conditions or climate at users' space-time positions. For example, this may occur when the relevance score for contextual Ads is low.
  • FIGURE 13 An illustration of the logic and data flow in this embodiment is provided in FIGURE 13, wherein the contextual Ads selected from the Information Base on the basis of code scan and user profile are supplanted in favor of Ads chosen on the basis of prevailing ambient conditions at 1340. Exemplary embodiments are provided in FIGURES 14 and 15.
  • an Ad for allergy medication is provided 1447 in lieu of weak contextual ad options 1442 in response to a code scan from the weather section of a media publication 1407 in conjunction with ambient weather information, including pollen count, queried at the server 1412.
  • Fig. 14 An Ad for allergy medication is provided 1447 in lieu of weak contextual ad options 1442 in response to a code scan from the weather section of a media publication 1407 in conjunction with ambient weather information, including pollen count, queried at the server 1412.
  • Fig. 14 An Ad for allergy
  • an Ad for sunscreen is provided 1547 in lieu of weak contextual Ad options 1542 in response to a code scan from the front page section of a media publication 1507 in conjunction with ambient weather information, including humidity and UV index, queried directly by the user's mobile device 1512.
  • ambient weather information including humidity and UV index
  • certain ambient conditions such as UV levels, humidity, download/upload speeds, and/or the like may be detected by the user's mobile device itself, while in other embodiments, ambient conditions are separately supplied to a database used in conjunction with the GCSI/CTIS.
  • the GCSI/CTIS may serve contextual Ads with content enhanced by reference to prevailing ambient conditions.
  • FIGURE 16 An illustration of the logic and data flow in this embodiment is provided in FIGURE 16 wherein the contextual Ads selected from the information base at 1635 are further refined by the ambient condition information at 1640.
  • Exemplary embodiments are provided in FIGURES 17- 20.
  • a code is scanned from the Business section of a media publication 1707 and the GCSI/CTIS selects luxury car Ads for display 1739 based on the scanned code, user location, and user profile 1732, and these Ads are further refined based on the ambient weather conditions provided to the server at 1712.
  • a code is scanned from the Travel section of a media publication 1807 and the GCSI/CTIS selects travel Ads for display 1839 based on the scanned code and user profile 1832, which includes recent scan code transactions pertaining to travel and Miami sports scores.
  • the GCSI/CTIS consequently queries the prevailing ambient weather conditions, comprised of cold and rainy weather, and supplies an Ad for Miami travel opportunities.
  • a code is scanned from the Weekend section of a media publication 1907 and the GCSI/CTIS selects a contextual Ad for eating out 1939 from the Information base 1935 to serve based on the scanned code and the prevailing ambient weather conditions, which are hot and sunny 1912.
  • This Ad is further refined by the user profile contents 1932 indicating a college student interested in comics and entertainment, and an Ad for an ice cream shop is finally supplied 1947.
  • a code is scanned from a baseball team schedule within a media publication 2007. Based on the prevailing ambient weather conditions, including scattered showers 2012, the scanned code, and the recent activity in the user profile 2032, an Ad is supplied for ponchos and golf umbrellas 2042.
  • a GCSI/CTIS server may query, store, and/or consider data pertaining to media demographics associated with a particular medium in which a code is published; the subject content associated with a code; the type of information requested by scanning a code; and/or the like.
  • a user scanning a code associated with a product review for a hybrid sports utility vehicle (SUV) in a men's magazine may trigger a GCSI/CTIS system to draw and/or analyze data pertaining to media demographics associated with the men's magazine, subject content associated with hybrid vehicles (i.e., environmentally conscious consumers), subject content associated with SUVs (i.e., outdoor activity or families), and product reviews.
  • the GCSI/CTIS may be configured to consider both the subject of a user's inquiry, the source of the inquiry, the type of inquiry, and/or the like.
  • the GCSI/CTIS may serve Ads based on a wide variety of different ambient and/or situational conditions that may be detected by the client mobile device, provided by internal or third party databases or information feeds, and/or the like.
  • Some non-limiting examples of potential ambient and/or situational conditions that may be considered and/or employed in selecting information to serve are temperature, weather, light levels, UV levels, pollen count, humidity, air quality, prices of commodities and/or consumer goods, stock and/or financial index prices, global and/or local news events, internet activities, sports scores, entertainment news, security warnings, and/or the like.
  • a marketer rule within the GCSI CTIS may specify that an Ad for participating bars that includes a coupon for a particular brand of beer be served to all male users between the ages of 21 and 40 with a history of scanning baseball-related codes within three hours of any time that the local baseball team wins a game.
  • a marketer rule within the GCSI/CTIS may specify that an Ad for hybrid vehicles be served to all mothers with young children who have a history of scanning codes in Time magazine whenever the local price of gasoline is greater than $2.50/gallon and they scan a code in an issue of Time that contains articles on both global warming and the Iraq War.
  • Such hyper-targeted information serving enabled by the GCSI/CTIS, may prove very valuable to marketers and, in fact, to a wide variety of information dissemination applications. Advertisers may be able to purchase Ad time and/or impressions that are conditional on events, people, time, place, ambient conditions, and/or combinations thereof, and/or the like.
  • a premium may be charged to advertisers for each Ad served, and that premium may increase with the number of factors considered in serving the Ad (i.e., the degree to which the Ad serving is targeted).
  • a different price may be charged per impression depending on the characteristics of the individual to which the Ad is served. For example, the hybrid car Ad described above may cost an advertiser $0.75 for an impression to a mom with adult children but $ 1.00 for an impression to a mom with young children.
  • graded pricing schemes may be specified within a marketing rule data structure.
  • Ads may be served based on internet "climate", such as serving Ads for virus detection software during an outbreak or serving Ads for high-speed broadband internet service on days of high internet traffic. Conditions for specific websites (i.e., cyberspace-time positions) could even be taken into account. For example, an Ad for high-speed broadband internet service could be supplied to visitors of a website experiencing particularly high traffic.
  • the GCSI/CTIS may interface with various customer information databases, customer relationship management databases, and/or any other third party data sources in order to extract information that may be used to further target and/or refine Ad selection for a given user.
  • a marketer may supply the GCSI CTIS with access to a given marketer-specific database and/or data feed, in order to allow the GCSI/CTIS to access the information therein during Ad selection processes. It should be understood that the functionality described for this embodiment of the GCSI/CTIS may be integrated or employed within any of the other GCSI/CTIS embodiments described herein.
  • the GCSI/CTIS can interface with and optimize Ads for various User Agent devices, which may include PCs, laptops, PDAs, DVRs, cable boxes, internet-coupled media devices, and generally with programmable electronic devices possessing external data transfer capabilities and/or the like.
  • FIGURE 21 provides an illustration of the logic and data flow in one embodiment.
  • the Scan Message content further incorporates an optional Send to Device info, which specifies the destination User Agent device for a particular Ad.
  • the Ad content selected by the GCSI/CTIS is configured and/or optimized for the User Agent device. Exemplary embodiments are provided in FIGURES 22 and 23. In Fig.
  • a code from a sports publication is scanned by a cell phone 2207, and a set-top-box/cable box/DVR User Agent device is specified in the optional Send to Device information of the Scan Message 2217. Consequently, in addition to contextual Ads supplied to the user's cell phone containing article/video links 2237 and season ticket offers 2239, additional content is configured and sent to the User Agent device, such as authorization to descramble a pay- per-view sporting event.
  • the user's mobile device would provide a signal to the User Agent device to cause it to send a Request for Info to the GCSI/CTIS.
  • the GCSI/CTIS could send an appropriately configured signal to the User Agent device without the need for a Request for Info signal.
  • a code is scanned from the Tech section of a media publication using a cell phone 2307, and the optional Send to Device info in the Scan Message specifies to send to a PC laptop 2317.
  • the GCSI/CTIS gauges the ambient conditions associated with the device and determines that there has been a recent outbreak of a particular computer virus over the internet 2322. Consequently, the GCSI/CTIS supplies an offer for Virus Scan software subscriptions 2344, and may send Virus Scan software directly to the specified PC laptop based on user response.
  • the GCSI/CTIS provides a mechanism of instituting plans for large-scale coordination of personnel using a single coded broadcast.
  • High-level officials could determine which of a number of coordination plans to institute, each being associated with a unique 2D matrix code.
  • the code is broadcast (such as over television or the internet) and lower-level employees scan the code to obtain instructions, diagrams, maps, etc. that are tailored to the employees' specific profile contents (i.e., job, skills, location, etc.).
  • authorization information included in the employee profiles that determines whether they are allowed to decode the broadcast.
  • additional codes could be provided to the employee to scan, both to update their tasks and to track their progress, space-time trajectories, etc.
  • the GCSI/CTIS provides a means of employee tracking.
  • tasks are supplied to employees in the form of 2D matrix codes.
  • the scan is recorded in the employee's profile and the employee is provided with instructions specific to that task and their position within the organization.
  • the employee is provided with a completion code that, when scanned, records the employee's successful completion of that task and provides instructions for the next task and/or reward information.
  • a completion code that, when scanned, records the employee's successful completion of that task and provides instructions for the next task and/or reward information.
  • a statistical record of an employee's experience by subject matter may also be generated and included in his/her profile using the GCSI/CTIS.
  • the GCSI/CTIS can connect users based on user profiles. For example, in analogy to the "provider zone" breaches discussed above, the GCSI/CTIS may also track the intersection of user space-time trajectories. In particular, if one user is within a specified distance of the projected space-time trajectory of another user with whom the first user is associated, a message may be sent to one or both users notifying them of their potential proximity. Further consideration of user profiles may also be utilized in such notifications.
  • the GCSI CTIS can be used to provide information regarding consumer products that cannot be included on the product packaging.
  • the user By scanning a code printed on a consumer product package, the user could be provided with nutritional information, ingredients, website links, coupons, etc. Additional advertisements could also be served based on the nature of the product scanned and the user profile. For example, a user who scans a container of mustard and has "grilling" listed among his/her interests may be served an advertisement and/or coupon for hot dogs in addition to the mustard information.
  • the GCSI/CTIS provides an efficient mechanism of serving real estate listings. For example, when a user scans a code related to real estate listings, the GCSI/CTIS supplies him/her with advertisements and/or listings that are close to their geographic location and appropriate to their demographic profile (i.e., income, marital status, number of children, etc.). In addition, the GCSI/CTIS may provide additional listings to the user based on projected breaches of zones corresponding to available homes or apartments that suit the user's profile. [00131 ] In another embodiment, the GCSI/CTIS expedites software downloads to a user's mobile device.
  • the user can automatically download the ringtone to the cell phone with which they scan the code.
  • the transaction is recorded in the user profile and may result in the display of an advertisement related to the latest album by the artist who recorded the ringtone song, or an album by a related artist, at some future time.
  • the GCSI/CTIS may allow users to instantly subscribe to and/or enroll in services, loyalty programs, discount programs, and/or the like by scanning codes associated therewith. For example, a user may subscribe to receive weather updates by scanning a weather-linked code. In another example, a user may enroll in a brand-affiliated coupon program by scanning a code associated with that program. Selection of a subscription and/or enrollment code may cause the GCSI CTIS to submit a user's personal information to an integrated subsystem and/or third-party system for subscription registration. In some implementations, the GCSI/CTIS may require a verification from the user, separate from the code scan itself, that the user wishes to enroll and/or subscribe to the associated service.
  • a user may submit trigger specifications and/or conditions for enrolled service notifications. For example, a user may specify that he or she only wishes to receive weather updates associated with heavy rain or thunderstorms. In another example, a user may specify that he or she only wishes to receive coupons for products from a particular grocery store and not from other grocery stores. Scanning of a code associated with a subscription program wherein specification of triggers and/or conditions is permitted may cause a GCSI CTIS system to retrieve and display a user interface screen to the user that is tailored to the particular subscription and/or enrollment service and configured to receive trigger and/or condition specifications.
  • the GCSI/CTIS may be configured to track and/or implement a rewards program.
  • a user may scan a code every time he or she purchases a particular item (e.g., a sandwich from the local sandwich shop) in order to register each purchase and store a record thereof in association with the user. The user may then receive a discount, free item, and/or the like after a pre-designated number of purchases and associated scans are registered, after which the record of scans is reset to start anew.
  • a user may continue to register additional purchases and associated code scans to receive larger and/or more significant benefits, discounts, and/or the like.
  • the GCSI/CTIS may be configured to implement contests and/or prize awards.
  • a user may enroll in a contest by scanning a code associated with the contest, causing personal information, user identifiers, and/or the like to be submitted to a contest subsystem.
  • Such contests may comprise instant-win and/or other types of lotteries, auctions, raffles, and/or the like and/or may enroll the user in a contest program through which they may receive further instructions, possibly including additional codes for scanning, in the future.
  • the GCSI/CTIS may be configured as a voting facility.
  • a user may register a vote for a particular candidate, ballot initiative, viewpoint, survey result, and/or anything else for which a vote may be registered by scanning a code associated with the user's choice.
  • a user identifier may be discerned and submitted with the vote in order to prevent repeat voting, to correlate with voter registration, and/or the like.
  • voter identifying information may be stripped from a scan message prior to the message being provided to particular agencies or individuals, in order to preserve a secret-ballot style of voting.
  • the GCSI/CTIS may be configured as a facility to effectuate purchases of goods and/or services.
  • a message may be sent to a GCSI/CTIS system identifying the good or service associated with the code as well as identifying the user, such as based on a mobile device identifier.
  • the GCSI/CTIS system may then automatically generate a bill for the user, charge a specified credit account, deduct a payment from a debit account, and/or the like to effectuate payment for the good or service.
  • the GCSI/CTIS may return a payment confirmation, such as to the user's mobile device and/or a retailer's point-of-sale device to confirm that the user has provided adequate payment.
  • the GCSI/CTIS may be configured to facilitate communications.
  • a code may correspond to a particular telephone number, IP address, and/or the like. Scanning of the code by a communications-enabled mobile device may cause the mobile device to automatically establish a connection with the address to which the code corresponds.
  • the connection may be established directly by an on-board applet loaded on the mobile device.
  • the connection may be established by an instruction sent to the mobile device by a GCSI/CTIS subsystem in response to a received code scan.
  • FIGURES 24-29 illustrate some implementations of code serving interfaces in embodiments of the GCSI/CTIS system.
  • a graphical display and/or interface initially presents a first visual token for display.
  • This first visual token may comprise virtually any image, picture, drawing, emblem, icon, logo, animation, and/or the like.
  • This first visual token may then be animated to reveal a second visual token comprising encoded information, such as a QR code, matrix code, bar code, and/or the like.
  • Animation of the first visual token may, for example, comprise rotation of the first visual token to reveal the second visual token on a proximate side of the first visual token.
  • a two-dimensional picture in the graphical display may rotate in the third dimension to reveal a matrix code on the back of the picture.
  • Other forms of animation may also be employed within different implementations.
  • the first visual token may dissolve, morph, disassemble and reassemble, and/or the like to reveal the second visual token.
  • the animation of the first visual token to reveal the second visual token may occur only in response to some user interaction with the first visual token.
  • a computer screen may display a first visual token persistently until a user clicks on the first visual token with a mouse pointer, at which time the first visual token may rotate to reveal the second visual token on its back.
  • an electronic billboard may persistently show an advertisement until a motion sensor detects someone walking by, at which time the advertisement dissolves to reveal a matrix code underneath.
  • an electronic sign may display a particular image until a detector coupled to the sign detects a signal and/or an authorization code from a compatible, portable electronic device near the detector, at which time the image may morph into a barcode.
  • the first visual token displayed on a touch-sensitive display may flip over to reveal a code when a user touches it with a finger or runs a finger over it to simulate a flipping motion.
  • Fig. 24 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a portable electronic device in one embodiment of GCSI/CTIS operation.
  • a wide variety of different portable devices may execute and/or coordinate with GCSI/CTIS functionality, such as but not limited to portable media players, cellular telephones, blackberries, PDAs, and/or the like.
  • a portable media player displays album information, including an image of the album cover, on a graphical display, where the displayed information corresponds to music being played on the player 2401.
  • a user may click on or otherwise select the album cover image, causing it to increase in size 2405 and rotate 2410-2415 to reveal a matrix code on the image 2420.
  • Fig. 25 shows an implementation of a user interface manifesting GCSI/CTIS functionality on digital paper in one embodiment of GCSI/CTIS operation.
  • an image is included in one area of an article displayed on the paper 2501. Either by itself or in response to some user action, the image flips 2505 to reveal the code on its other side 2510.
  • Fig. 26 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a digital billboard in one embodiment of GCSI/CTIS operation.
  • a public, electronic billboard display shows an advertisement comprising a product logo 2601.
  • the product logo rotates 2605 to reveal a matrix code on its opposite side 2610. Flipping of the logo may occur periodically or aperiodically, upon detection of a nearby viewer, upon detection of a portable device capable of decoding the matrix code, and/or the like.
  • Fig. 27 shows an implementation of a user interface manifesting GCSI/CTIS functionality for serving an SMS text message prompt in one embodiment of GCSI/CTIS operation.
  • a first visual token 2701 shows an image and text, such as may correspond to an advertisement, logo, and/or the like.
  • the token may appear in a wide variety of contexts, such as on a website, in a virtual world, on a cell phone or other portable communications and/or media device (e.g., Blackberry, iPhone, iPod, and/or the like), on an electronic billboard, on broadcast television or recorded video content, and/or the like.
  • the first visual token may be animated, such as by flipping, rotating, revolving, and/or the like (2705, 2710), to reveal encoded content on a proximate side thereof.
  • a message appears along with an SMS code that a user may key in to an SMS enabled communication device to receive associated content.
  • other types of codes and/or code communication protocols may be displayed and/or employed for communication with GCSI/CTIS systems, such as but not limited to: MMS, instant messaging, web browser based messaging, email, Enhanced Messaging System (EMS), TCP/IP, WAP, and/or the like.
  • a first visual token may be animated to reveal an email address, website address, instant message nickname, and/or the like on a proximate side to enable a user to connect to and/or communicate with a GCSI/CTIS system and/or affiliated entity for the receipt of information, coupons, offers, advertisements, media, and/or the like.
  • Fig. 28 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a mobile phone 2801 in one embodiment of GCSI CTIS operation.
  • a first visual token comprising an image, advertisement, logo, and/or the like 2805 is displayed on a mobile phone display screen.
  • the first visual token may be animated 2810, such as in response to a user interaction (e.g., pressing a button on the mobile telephone, clicking on the first visual token with a pointer widget, and/or the like).
  • the first visual token may be automatically animated and/or animate without the need for any user interaction.
  • the animated first visual token flips to reveal a second visual token comprising a message and an SMS text message prompt on a proximate side 2815.
  • the user may manually key in the text message and/or destination address to receive the associated content.
  • the GCSI/CTIS interface may supply a selectable link that, when selected, will automatically generate an SMS text message to retrieve the associated content.
  • the user may be allowed to automatically generate and/or send the SMS text message from the second visual token by pressing a "Send" button on the mobile phone, clicking and/or otherwise interacting with the second visual token, and/or the like.
  • a user may receive a coupon and/or coupon code in response to an interaction with the second visual token, sending of an SMS text and/or other message in response to the second visual token, and/or the like.
  • a user may receive a numerical coupon code in response to a sent SMS text message, wherein the numerical coupon code may be presented to a retailer, entered into a website, and/or the like to receive discounts, free items, special offers, and/or the like.
  • the user may receive a scannable code, such as a QR code, matrix code, and/or the like in response to a sent SMS text message, wherein the scannable code may be scanned by a retailer in order for the user to receive the associated benefits, discounts, and/or the like.
  • the scannable code may appear on a user's mobile phone display screen and may be scannable therefrom to provide the user with the benefits associated thereto.
  • the user may receive an e-mail message in response to interaction with a graphical code-serving interface, the message containing requested content and/or links thereto, scannable codes, coupon codes, and/or the like.
  • a first visual token may comprise a "poster" image corresponding to a full-length movie, movie preview, video clip, television show, and/or the like.
  • the second visual token revealed on a proximate side of the first visual token may then enable a user to retrieve the full video content associated with the poster image. For example, a user may scroll through a series of poster images corresponding to a series of full-length movies.
  • a movie he or she desires to retrieve, watch, download, and/or the like
  • he or she may select the corresponding poster image, which may then be animated to reveal a second visual token, such as an SMS instruction, message, delivery address, phone number, and/or the like, whereby the user may interact with a GCSI/CTIS system and/or affiliated entity to retrieve the desired movie content.
  • a second visual token such as an SMS instruction, message, delivery address, phone number, and/or the like
  • a series of first visual tokens may be displayed as scrollable thumbnails, within a cinematic presentation, as an immersive slideshow, and/or the like.
  • Fig. 29 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a portable communication device in one embodiment of GCSI/CTIS operation.
  • the portable communication device 2901 shown in the illustrated implementation may represent a blackberry, iPhone, PDA, and/or the like.
  • a first visual token 2905 is animated 2910 to reveal a message and a selectable hyperlink on a proximate side 2915, in this case a URL connecting to content, information, offers, coupons, and/or the like.
  • a user may be permitted to directly select the hyperlink from the displayed image using interface elements of the device in order to retrieve content, view a webpage, interact with a GCSI/CTIS and/or affiliated system, and/or the like.
  • a central GCSI/CTIS server may enable content providers to supply first and/or second visual tokens, associated SMS and/or MMS codes, and/or any other information necessary to connect users to supplied content.
  • the central GCSI/CTIS server may then outfit the supplied tokens and/or other information with HTML markup information allowing the code-serving interface to be embedded in any webpage or other display media.
  • the HTML markup information may further include a link to one or more downloadable applets that may be required to enable a user to view and/or interact with the code-serving interface.
  • a content provider may be provided with an embeddable link, URL, and/or the like that may be cut and pasted into a web page HTML to embed the code-serving interface therein.
  • a content provider may submit just a first visual token and response content and/or a means of addressing said content, and a GCSI/CTIS server may generate a corresponding code-serving interface, a dial-in code and/or SMS and/or MMS address, hyperlink, and/or the like to allow users to interact with the first visual token to receive the response content.
  • the generated code-serving interface may include HTML markup information enabling it to be embeddable on any webpage. A fee may be charged to the content provider, such as on a pay-per-click basis, for user interactions with the generated code-serving interface.
  • a webpage or other display area may include a generic placeholder for code-serving interfaces that may be filled by code- serving interfaces and/or associated content supplied from one or more advertisement servers and/or GCSI/CTIS servers.
  • the supplied code-serving interfaces may be selected based on webpage content, contextual cues, and/or the like and/or based on the goals of content providers and/or code-serving interface creators. For example, an advertiser may wish to place a particular code-serving interface associated with a new action movie on any webpage having a generic placeholder that mentions extreme sports. A fee may be charged to an advertiser for such targeted and/or contextual placement, such as on a bid- per-keyword basis. Fees may also be charged on a pay-per-click basis (i.e., levying a charge whenever a user clicks a code-serving interface to reveal the code, communication address, and/or the like on a proximate side).
  • a pay-per-click basis i.e., levying
  • the GCSI/CTIS may be configured to supply media content, music, images, video, and/or the like to users based on the scanning of codes as described above. Acquisition of full media content may, in some implementations, be preceded by acquisition of media samples that may be reviewed by an acquiring user to determine whether or not to proceed with acquisition of the full content.
  • a billboard may display the Billboard Top 20 songs with a separate code for each song on the list. Consumers, in this example, may scan codes corresponding to each song in the list for which they have interest using a mobile scanning device and receive a sample of each song.
  • a sampling user may further be provided with an opportunity to purchase and/or otherwise acquire the full media content once the sample has been received and/or reviewed.
  • media may be acquired by a user via MMS messaging, while in another implementation, media may be acquired by means of an integrated media service (IMS).
  • IMS integrated media service
  • the IMS may, in one implementation, comprise an on-demand media service wherein users may maintain accounts, sample and/or purchase media, download and/or upload media, and/or the like.
  • An example of an IMS is Apple's iTunes Store.
  • FIGURE 30 shows an implementation of logic flow for media sampling and full media acquisition in one embodiment of GCSI/CTIS operation.
  • a code may be scanned by a user 3001, such as via a mobile device.
  • the scanned code information, as well as hardware information identifying the device, the user, and/or the like may then be received by GCSI/CTIS from the mobile device, such as via a communications network.
  • the GCSI CTIS may then make a determination, such as may be based on the hardware information, user information, a user profile, and/or the like, as to whether the mobile device is configured with an IMS 3005. If the mobile device is configured with an IMS, the GCSI/CTIS may issue an instruction to the mobile device to connect to the IMS 3010, allowing the user to engage IMS functionality such as the sampling, purchasing, downloading, viewing/playing, and/or the like of media files 3015.
  • the GCSI/CTIS may send a message to the device, such as an SMS text message 3020, to determine if the user desires to receive a sample of the requested media 3025.
  • the GCSI/CTIS may first interact with a media service to determine if a sample is available before offering the sample to the user. If a sample is desired, the GCSI/CTIS may sent a media sample to the user's mobile device, such as in the form of an MMS message.
  • the sample may, in various implementations, comprise a clipped and/or low-quality version of an audio file, image file, video file, publication, and/or the like.
  • the GCSI CTIS may first acquire the sample from a music service in order to provide it to the user's mobile device.
  • the GCSI/CTIS may itself generate a sample from an original copy of a media file, such as may be acquired from a media service.
  • the GCSI CTIS may then generate and send a query, such as via SMS text message 3035, to determine if the user would like to purchase the media associated with the scanned code 3040. If not, the GCSI/CTIS may exit the routine associated with the acquisition of the current media file, present alternative and/or related media files for user consideration, and/or the like 3045. If, on the other hand, the user indicates a desire to purchase the media file in question, the GCSI/CTIS may query the user, such as via an SMS text message, as to which of a selection of pricing and/or download options the user would like to pursue 3050.
  • the user may be provided with options as to the quality and/or format of media files acquired, the method of acquisition, accessibility and/or rental options, and/or the like.
  • the user may be presented with an option as to the method of media acquisition.
  • a determination may be made as to whether or not the media is to be acquired directly by the user's mobile device 3055.
  • the determination is based on a user preference, however in alternative implementations, the determination may be made, in whole or in part, based on a variety of other factors, such as detected capabilities of the user's mobile device, available network bandwidth, pre-set profile settings, and/or the like.
  • the GCSI/CTIS may charge a price corresponding to an indirect delivery mode and conduct the media file to an intermediary storage facility for later retrieval 3065.
  • the GCSI/CTIS may instruct a media service to allocate the media file to a user account for later retrieval by the user.
  • the GCSI/CTIS may acquire the media file and/or email the file to a user email account for later retrieval.
  • a user may be directly requested to enter payment information (e.g., credit card number, checking account number, etc.) at the time of purchase. The entered information may be verified before the media is made available to the user and/or the user's mobile device.
  • payment information e.g., credit card number, checking account number, etc.
  • a user may enter payment information into a user profile and have a corresponding account automatically charged when the user directs the GCSI/CTIS to acquire media.
  • FIGURE 31 shows an illustration of media acquisition in one embodiment of GCSI/CTIS operation.
  • a printed publication 3101 displays an advertisement for a new release by a recording artist 3105, the advertisement including a scannable matrix code that facilitates the acquisition of media associated with the new release by a user.
  • an animated user interface may present a scannable code on a proximate side of a first image, such as on a video billboard, website, television program, and/or the like.
  • the media may, for example, comprise an entire album, a single, a ringtone, a video, an image, and/or the like.
  • the media provided may depend on the scanned code in conjunction with a user profile containing user preferences, a history of user behavior and/or prior scanned codes, and/or the like.
  • the user may engage the media content by scanning the code with his or her mobile device 31 10, after which the GCSI CTIS may query the user, such as via an SMS text message, as to whether or not he or she wishes to sample and/or purchase the requested media 31 15.
  • the user may respond, in one implementation, by sending a reply text message to be relayed to the GCSI/CTIS.
  • the GCSI/CTIS may subsequently provide, stream, upload, and/or the like the requested media directly to the user's mobile device for storage and/or playback 3120.
  • the GCSI/CTIS may provide the requested media to an intermediary storage facility, such as a user's media service account, an email server, an ftp server, and/or the like.
  • the user may then subsequently procure the media from the intermediary storage facility, transfer the media to a mobile device, and/or the like 3125 at a later time.
  • FIGURES 32a-b show an implementation of logic flow for code scan monetization in one embodiment of GCSI/CTIS operation.
  • a code is scanned at 3201.
  • the code may be found on a physical item that is subject to purchase and may be found in a retail establishment.
  • a compact disc (CD) in a music store may be embellished with a scannable code that, when scanned, may provide a sample of the music stored on the CD, deliver a ringtone to the user's mobile scanning device, provide artist information, images, concert dates, a coupon, and/or the like.
  • the item for purchase may not be physical but rather may be provided online, such as on a website, and an associated code may be provided on the page on which the item is offered for purchase.
  • a determination may be made as to whether the retailer providing the item is subscribed to a GCSI/CTIS service 3205.
  • the retailer may be discerned based on a geographic position provided to the GCSI/CTIS by a code message sent from the user's mobile device that may, for example, be compared to records of retailer locations. The geographic position may be determined, for example, by an onboard GPS unit on the user's mobile device or based on geographic information contained in the scanned code.
  • Subscription to the service may, for example, entail licensing to embellish items with GCSI/CTIS affiliated codes in exchange for a fee, such as a onetime or periodic fee and/or a per-scan fee, such as illustrated in the implementation shown in Fig. 32.
  • the GCSI/CTIS may register a retailer payment 3210.
  • registering payment may comprise noting the fee in a fee record.
  • the GCSI/CTIS may automatically deduct the fee from a pre-designated account.
  • a determination may also be made as to whether the manufacturer, publisher, distributor, and/or the like of the item in question is a subscriber 3215.
  • the "manufacturer" may comprise a record label. If the manufacturer is determined to be a subscriber, then a manufacturer payment is registered at 3220.
  • Discernment of retailer, competitor, and/or manufacturer identities may be accomplished by a variety of different schemes in various implementations and/or embodiments of GCSI/CTIS operation.
  • a unique subset of codes may be reserved for a particular manufacturer, retailer, and/or the like, such that a scan message corresponding to any code of the unique subset may be associated by a GCSI/CTIS system with the particular manufacturer, retailer, and/or the like.
  • retailers associated with a given scanned code may be discerned based on a geoposition of the mobile scanning device at the time of code scanning.
  • Fig. 32b provides an illustration of an implementation of logic flow for discerning retailers in one embodiment of GCSI/CTIS operation.
  • SDK mobile device software development kit
  • the GCSI/CTIS system may then query position records based on the position discerned at 3270 to seek retailers matching that position 3273. A determination is madet at 3276 as to whether any matching retailers are found. If no retailers match the discerned mobile device position, or if the mobile device lacks position sensitivity at 3267, the GCSI/CTIS system may query code records based on the scanned code received from the mobile device to seek retailers matching the scanned code 3279. A determination is made at 3282 if any retailers are code discernible and, if not, then the GCSI/CTIS may return an error message and/or record that no matching retailer was found 3285. If any matches are find either by position or code discernment, then a determination may be made as to whether there exist multiple retailer matches 3288.
  • the unique matching retailer may be recorded, provided to facilitate subsequent code scan monetization, and/or the like 3294.
  • the GCSI CTIS system may apply one or more retailer ambiguity resolution schemes 3291 in order to narrow down the results to a unique retailer match.
  • a wide variety of ambiguity resolution schemes may be employed within different implementations and/or embodiments of GCSI/CTIS operation.
  • a GCSI CTIS system may consult a user profile associated with the user who's mobile device issued the code scan to determine whether the user's code scan history indicates a preference for a particular retailer, retailer type, and/or the like which may assist in further discerning the unique retailer associated with the current code scan.
  • the GCSI/CTIS system may provide a plurality of possible retailer matches in a message (e.g., an SMS message) to a user's mobile device and request feedback as to which retailer is the correct one in whose establishment the code was scanned.
  • a message e.g., an SMS message
  • the GCSI/CTIS may monitor activity on a credit card associated with a user account once that user has registered a code scan. A subsequent purchase using the associated credit card may then register a conversion with the GCSI/CTIS. If no conversion is detected, such as within a pre-designated period of time, then the code scan monetization is complete for the particular code scan 3230. If, on the other hand, a conversion is registered, the a determination may be made as to whether the manufacturer is subscribed to pay further fees upon item conversion 3235. If so, then the additional manufacturer payment for conversion is registered at 3240.
  • the conversion i.e., the purchase of the code-associated item
  • a competitor may be permitted to supply a message (e.g., an SMS text message, and/or the like) to a user's mobile device when the user scans codes associated with particular items at particular retail locations in order to entice the user to purchase the item from the competitor instead of at the particular retail location in which the code was scanned.
  • the competitor message may, for example, include a coupon and/or other discount on the sale price of the code-associated item.
  • the competitor may be charged a separate fee for being allowed to supply such messages, such as a per-message fee, a one-time or periodic fee, and/or the like.
  • fees charged to manufacturers, retailers, and/or competitors may be substantially the same. In alternative implementations, different fees may be charged to manufacturers, retailers, and/or competitors.
  • FIGURES 33 a-e show aspects of implementations of JagTag encoding and codes in some embodiments of GCSI/CTIS operation.
  • Fig. 33a shows an implementation of logic flow for JagTag encoding in one embodiment of GCSI/CTIS operation.
  • An alphanumeric string may be associated with content to which a JagTag code is ultimately to be associated 3301. In one implementation, a five character string is employed. Each character of the alphanumeric string may then be converted into a corresponding integer, such as may be based on a correspondence table 3302.
  • 33b shows an implementation of such a corresponding table relating decoded characters, including lowercase letters 3313, numbers 3314, and uppercase letters 3315, to encoded values 3316 comprising integers between 0 and 62.
  • decoded characters including lowercase letters 3313, numbers 3314, and uppercase letters 3315
  • encoded values 3316 comprising integers between 0 and 62.
  • To convert the alphanumeric string into a JagTag code each character in the string is converted into a corresponding integer between 0 and 62 using the table in Fig. 33b.
  • a determination may then be made as to whether any of the characters comprise punctuation marks or other unrecognizable or uncovertable characters 3303. If so, those characters are set to blanks or zeros in the resulting string of integers 3304.
  • a determination may also be made as to whether the number of characters in the alphanumeric string exceeds a pre-designated maximum number 3305 (e.g., 5 characters). If so, additional characters are ignored 3306.
  • Each resulting integer may then be converted to a corresponding binary value 3307, and a determination may be made as to whether there are a sufficient number of "on" bits (i.e., bits equal to 1) 3308.
  • the GCSI/CTIS may require the existence of at least some minimum number (e.g., 9) of on bits. If not, then the system may return an error message and/or recommend that the user try a different initial alphanumeric string 3309. Otherwise, the GCSI/CTIS system may concatenate the string of binary numbers to yield a single 32 bit long bitset array 3310.
  • the system may then generate aJagTag bit representation 3311, as described below, nd output the resulting JagTag to a physical display and/or storage (e.g., storing an image formatted JagTag in a database, printing the JagTag, displaying the JagTag on a display screen, and/or the like) 3312.
  • aJagTag bit representation 3311 as described below
  • nd output the resulting JagTag to a physical display and/or storage (e.g., storing an image formatted JagTag in a database, printing the JagTag, displaying the JagTag on a display screen, and/or the like) 3312.
  • the first bit of the bitset array may be considered a most-significant bit and the last bit of the bitset array may be considered a least-significant bit.
  • the 32 bit binary bitset array may be converted into a JagTag code representation.
  • Fig. 33c further illustrates JagTag encoding in one implementation.
  • the JagTag may include an L-shaped component 3318 that may, in one implementation, promote orientational and/or size discrimination of the JagTag, such as by a scanning or analyzing device.
  • the JagTag may further include four circular elements 3319 that may also serve to promote orientational and/or size discrimination.
  • the most significant bit of the bitset array may be encoded as a circle at the position indicated by the crossed circle at 3320, with a white circle (owing to the dark background of the L-shaped component 3318) indicating a 1 and no circle indicating a 0.
  • the next most significant bit of the bitset array may be encoded as a circle at the position indicated by the crossed circle at 3325.
  • the numbering scheme indicated at 3330 shows how the circles (or lack of circles) at positions numbered from 0 to 31 correspond to the bits in the 32-bit bitset array, with 0 the most significant bit and 31 the least significant bit. If the bit falls on the L-shaped component 3318, a white circle is drawn for a bit value of 1, and otherwise a dark circle is drawn for a bit value of 1.
  • a shell script may be configured to accept an alphanumeric string comprising characters to be encoded and to return a JagTag in an image format, such as a PNG, JPG, GIF, BMP, and/or the like file format.
  • the shell script may be further configured to receive a color specification (e.g., an HTML-style RGB triplet).
  • a color for the JagTag code may be selected to as to have high contrast with the background color.
  • a high number of "on" bits i.e., bits equal to 1 may also improve code recognition, as discussed above. Accordingly, in one implementation, resulting JagTag codes having fewer than a minimum number of on bits may be rejected.
  • Other measures that may be taken in various implementations to improve JagTag recognition may include maximizing code dimensions, ensuring that the code is surrounded by a substantial margin (e.g., at least 25% of the code's width and height), and ensuring fidelity of the code by eliminating any obscuring interferences.
  • JagTag codes may be configured for a wide variety of physical manifestations, including printing on magazine pages, billboards, newspapers, and/or the like, displaying on video display screens, television broadcasts, websites, and/or the like. JagTags may also be configured into different shapes or display configurations in various implementations.
  • Fig. 33d shows one non-limiting embodiment of data loss resilient codes 3331, with characteristics that include: reducing errors based on "bleeding" of encoded data points by using circles/dots rather than squares that touch each other (this combats fuzziness of image as well as reduced light conditions); using a stronger identifier to discover processing directionality (rotation, skew, slant) - this is the black line with white dots shown in the figure; including data points within the identifier in order to maximize encoded data as well as allow for reduction in size of code; using equidistant lengths on identifier to process for skew and slant; using constant data points within the directional identifier to process for skew and slant— this may be top left, bottom right and bottom left white dots (not indicated in figure 33d); reducing the amount of data encoded in the code— most likely 5-8 characters— in order to allow for size reduction of the code; developing code characteristics so partial decoding allows for matching code to correct data on the server
  • the dots most likely to be lost in an image may be assessed and the least useful information encoded appropriately based on that assessment.
  • An interesting opportunity for this code is that it allows for some logos to potentially replace the dots. For example, an Alltel logo can be used nearly as well as the dots, or a Nike logo is decodable with some server side code modifications.
  • the codes have an additional benefit in that they are in and of themselves, aesthetically pleasing, and as such offer significant advantages over previous codes.
  • the ability in one embodiment, to vary the colors of the code, allows it to better integrate and look better in marketing contexts.
  • Fig. 33e shows some implementations of alternative JagTag display configurations, including circular 3335, triangular 3340, modified squares (3345, 3350, 3365), rectangular 3370, letter shaped (J shapes shown at 3355 and 3360), and/or the like. JagTags may also be displayed in proximity to and/or integrated with other codes, logos, insignias, and/or the like, such as shown at 3375.
  • the GCSI/CTIS may admit voice inputs; recorded, generated and/or downloaded audio inputs; video inputs; telephone tree and/or interactive voice response (IVR) selection inputs; keystroke inputs to a telephone keypad or keyboard engaging a softphone and/or VOIP phone; and/or the like as input codes triggering the provision of requested multimedia content to a user device, such as may be selected in connection with a user profile and/or a user history of requested content and/or code inputs.
  • IVR interactive voice response
  • an advertisement, kiosk, website, and/or any other code provision platform may provide a user with a code specification, comprising a sequence of words the user should speak into his or her mobile device, and an address (e.g., a telephone number) to which the spoken content should be directed (e.g., "To get a free ringtone from Acme, call (XXX)XXX-XXXX and say ⁇ want a free Acme ringtone!'").
  • a code specification comprising a sequence of words the user should speak into his or her mobile device, and an address (e.g., a telephone number) to which the spoken content should be directed (e.g., "To get a free ringtone from Acme, call (XXX)XXX-XXXX and say ⁇ want a free Acme ringtone!'").
  • a user may be required or requested to speak a code number, password, company name, location name, and/or the like as part of his or her code input in order to further clarify and/or tailor the nature of the requested content and/or to provide additional information to the GCSI/CTIS for storage in association with the user, such as in a user profile.
  • Speech recognition and/or speech-to-text functionality may be implemented via a wide variety of software packages, such as CMU Sphinx, Julius, VoxForge speech corpus tools, Microsoft Speech API, and/or the like.
  • the text output of employed speech recognition software may be provided to the GCSI/CTIS for comparison with stored code information, such as a direct comparison of the resulting text string with a stored text string to find a match.
  • alternative strings, common string errors, and/or the like may be stored in association with a code string and compared with speech-to-text output to determine whether an approximate match exists.
  • the GCSI/CTIS may extract user and/or user device identifying information, such as a telephone number, user hardware ID, and/or the like, in order to access a user profile and/or other user-connected information and/or to know where requested content should be provided.
  • the GCSI/CTIS may employ a caller number identification telephone service to discern the user's telephone number and to identify the user, query a user profile and/or user code input and/or content request history, reply to the user and/or provide requested content, and/or the like.
  • a user profile may be discerned and accessed based on the determined user telephone number, a secondary user address (e.g., an e-mail address) queried from the user profile, and requested content may then be provided to the secondary address.
  • a secondary user address e.g., an e-mail address
  • the GCSI/CTIS may perform further analyses of provided audio information, such as to attempt to authenticate a user and/or to identify a user so as to access user information to tailor provided content.
  • the GCSI/CTIS may instruct the performance of a spectral analysis, fast fourier transform, and/or the like of provided audio information (e.g., by any of a variety of audio analysis software packages, such as but not limited to WaveSurfer, BRP-PACU, and/or the like), and may compare the results of this analysis (e.g., the frequency values corresponding to prominent peaks of the fourier transform) to stored information.
  • the comparison may be performed with information known to be associated with a particular
  • a code may be implemented as pre-recorded audio content that a user may input into his or her mobile device and provide therefrom to a GCSI/CTIS system to receive multimedia content in response thereto.
  • a user may dial a phone number specified by the code or a code context (e.g., a website where the code is found), and then may hold the phone's receiver up to a speaker playing the prerecorded content. The phone may then relay the played audio information to the GCSI/CTIS system via the dialed phone number, which may recognize the pre-recorded audio code and may provide multimedia content in response thereto.
  • the GCSI/CTIS may employ speech recognition and/or speech-to-text software to decode, recognize, and/or evaluate the provided audio information.
  • the GCSI/CTIS and/or an affiliated system may perform other types of audio analysis (e.g., fast fourtier transform and/or other spectral analyses) on the provided audio content, such as to discern non-speech code components. Examples of software packages that include such audio analysis capabilities are WaveSurfer and BRP-PACU.
  • a code may be implemented as a sequence of selections in an IVR system, telephone tree, and/or the like.
  • a user may call a GCSI CTIS connected system, such as based on a phone number provided in an advertisement, television commercial, article, website, billboard, and/or the like.
  • the user may call a general number and enter a code, such as by speaking it or keying it into a telephone keypad, to identify a particular advertisement, television commercial, article, website, billboard, and/or the like.
  • voice and/or keypad entry of the code may be sufficient input for selection and provision of multimedia content to the user (the GCSI/CTIS system may further receive a user identifier, such as based on a hardware identifier of a user's mobile device, and provide content based on contents of a user profile).
  • the GCSI/CTIS may direct the provision of a series of selectable options to the user in accordance with a pre-set IVR system, telephone tree, and/or the like.
  • the sequence of options selected may comprise a code that, in conjunction with aspects of a user profile, may be employed to select multimedia content, such as an audio recording, for playback to the user.
  • user selections in an IVR system, telephone tree, and/or the like may initiate the provision of multimedia content to a separate device from that with which the user made his or her selections (e.g., a user may employ a telephone to interact with an IVR system to initiate the selection of multimedia content to a user's television, the content being selected based on selections during the IVR system interaction, a user profile and/or history of code inputs, IVR system interactions, and/or the like).
  • a code may be implemented as a sequence of keystroke inputs to a telephone keypad, keyboard engaging a softphone and/or VOIP phone, and/or the like.
  • An entered code may comprise a series of numbers, corresponding letters, non-alphanumeric symbols (e.g., #, *, and/or the like), and/or the like.
  • a code input may be sent to a GCSI CTIS equipped system via an SMS message, MMS message, e-mail, and/or the like.
  • a user may dial a telephone number to access a GCSI/CTIS equipped system and directly enter the keystroke sequence during the call, which is received and interpreted by the GCSI/CTIS system to determine the requested content to provide in response.
  • a user mobile device may be provided with an audio signal generator, such as may generate audio information encoding GCSI/CTIS codes.
  • an audio signal generator such as may generate audio information encoding GCSI/CTIS codes.
  • a user may provide information to the audio signal generator, such as a number, code, or other information that may be found in association with an advertisement, website, and/or the like related to desired multimedia content.
  • the audio signal may then generate a custom audio signal specific to the requested content, which signal may then be provided to the GCSI CTIS (e.g., via a telephone connection and/or as a recorded file provided by an MMS message, e-mail, and/or the like).
  • the GCSI/CTIS may then employ audio analysis software such as that described above to decode the provided audio code and provide requested content based on the decoded information.
  • a GCSI CTIS system may engage an augmented reality interface (e.g., a display of a real -world environment merged with virtual computer-generated imagery into a single display) to generate codes and/or provide requested content to users.
  • an augmented reality interface e.g., a display of a real -world environment merged with virtual computer-generated imagery into a single display
  • a user may point a mobile device video camera at a QR code, JagTag code, barcode, and/or the like.
  • the device may detect the presence of the code and serve a virtual image of requested content, an associated application, and/or the like in the display screen, such as adjacent to the code and/or to a product, advertisement, website, television program, magazine article, and/or the like associated therewith.
  • a user may point a mobile device video camera at a code displayed in an aisle of the supermarket and, in response, a GCSI/CTIS system and/or associated application may augment a video display of products in that aisle with highlights to indicate that they are subject to a discount.
  • the highlighted products may be selected based on the code and/or on a user profile, which may include a history of codes engaged by that particular user and/or his or her mobile device.
  • a billboard may contain a code that, when captured by the video camera of a mobile device, causes an augmented reality display to be generated, such as an advertisement displayed on or near the billboard when viewed on the mobile device display.
  • the virtual portion of an augmented reality display may be generated and/or displayed to the user by a device that is separate and distinct from the user's mobile device and/or the device used to capture the code.
  • a user may scan and/or capture a code with a mobile device camera and submit the code to a GCSI/CTIS system.
  • the system may cause an augmented reality display to be generated on a secondary display device, such as a monitor in a grocery store.
  • the GCSI CTIS system may cause a projector to project an image of the virtual portion of the augmented reality display onto one or more physical objects (e.g., projecting a spotlight on a product in a grocery store aisle).
  • capturing a code by a video camera of a mobile device may cause the GCSI CTIS system to deliver an application to the display screen of the mobile device that appears to exist in three dimensions.
  • the user may, in some implementations, engage the application using the mobile device. For example, if the mobile device is equipped with touchscreen capabilities, the user may engage the application by touching the display screen where the application is displayed.
  • the type and/or configuration of the application delivered to the user may, in some implementations, be based on the code captured by the video camera and/or on a user profile, such as may include a history of captured and/or scanned codes.
  • FIGURE 34 shows an implementation of an augmented reality user interface for providing requested content in one embodiment of GCSI/CTIS operation.
  • a scannable code in this case a JagTag 3401, may be provided to a user, such as within a print publication, on a website, in a television commercial, and/or the like.
  • the user may scan the code via a mobile device 3403, such as by capturing the code via an integrated video camera to display the code on the display screen of the mobile device.
  • the capturing of the code may engage a GCSI/CTIS system to augment the display with user interface overlays (3405, 3410), three-dimensionally rendered objects/images (3412), requested content, advertisements (3415, 3420), and/or the like.
  • user interface overlays may admit and/or react to user interaction, such as by acting as touchscreen interface elements of an interactive application.
  • augmented reality interface components such as overlays, may be transparent, selectively transparent, and/or semi-transparent to show aspects of the underlying media or environment in which the scannable code is presented.
  • the scannable code 3401 may appear in an augmented reality interface display with a demarcation, such as a highlighted border 341 1.
  • the border and/or one or more other components of the scannable code may be employed in a border-locking capacity to accept and/or identify the code and/or to orient other objects or images in the augmented reality display.
  • a scannable code may be positioned within a media display such that elements of an augmented reality display, such as overlays, are positioned and/or oriented in a desired manner with respect to other components of the media display (e.g., a video about an advertised product is displayed in proximity to an ad for the product adjacent to the scannable code).
  • augmented reality interface elements such as overlays, ads, interactive interface components, and/or the like may be configured for persistent positioning with respect to the scannable code and/or other objects in the code environment.
  • the border of a scannable code and/or other reference elements of the code may be employed to persistently position and/or orient augmented reality interface elements with respect thereto.
  • augmented reality interface elements may move on the mobile device display in such a way as to maintain a persistent position and/or orientation with respect to the reference elements of the code and/or other objects in the code environment.
  • the overlay at 3405 and ad at 3415 may move to the corresponding overlay at 3410 and ad at 3420 when the device is moved from right to left with respect to the code and/or the magazine article in which the code is displayed.
  • multiple and/or different content may be delivered to and/or displayed by the mobile device in response to the scanning of a particular code.
  • scanning a single code in a media environment may cause the provision and display of more than one type of content on the mobile device display, such as a coupon code in one part of the display and a multimedia video in another part of the display.
  • multiple display elements provided in response to a scanned code may be configured for display in proximity to particular elements of the media environment in which the code is provided (e.g., a coupon code for a product provided next to an advertisement of that product in a magazine in which the code is provided, as well as a video about a topic provided next to an article about the same topic in the same magazine page).
  • a GCSI/CTIS system and/or associated mobile device may be configured to automatically provide augmented reality interface elements in a preset position relative to a scanned code.
  • a GCSI/CTIS system and/or associated mobile device may be configured to detect and/or analyze aspects of the code environment beyond the scannable code itself, and to utilize these other aspects in the querying, selection, and/or display of content provided to the mobile device display.
  • a single code may be provided in a single media environment that, when scanned, may provide various content in different positions of an augmented reality display based on other elements of the media environment detected by the mobile device.
  • Such other aspects may include, but are not limited to, other scannable codes (e.g., other JagTag codes, barcodes, QR codes, datamatrices, and/or the like), text (e.g., such as may be detected and/or analyzed via optical character recognition), images, and/or the like.
  • the same code may be provided in multiple different media environments and yield different content to a user depending on other elements of the media environment that may be detected by the user's mobile device. For example, a single code may be generated to instruct the provision of a particular class of video content. When this code is provided in proximity to an advertisement for a car (wherein the advertisement includes additional detectable components, such as recognizable text), a video of a commercial for the car may be provided. When the same code is provided in proximity to an advertisement for a restaurant, a video of a commercial for the restaurant may be provided.
  • other scannable codes e.g., other JagTag codes, barcodes, QR codes, datamatrices, and/or the like
  • text
  • FIGURE 35 of the present disclosure illustrates inventive aspects of a GCSI/CTIS controller 3501 in a block diagram.
  • the GCSI/CTIS controller 3501 may serve to aggregate, process, store, search, serve, identify, instruct, generate, match, and/or update Scan Messages, Reply Messages, Ads, user profiles, and/or other related data.
  • CPUs central processing units
  • a common form of processor is referred to as a microprocessor.
  • CPUs use communicative signals to enable various operations. Such communicative signals may be stored and/or transmitted in batches as program and/or data components facilitate desired operations. These stored instruction code signals may engage the CPU circuit components to perform desired operations.
  • a common type of program is a computer operating system, which, commonly, is executed by CPU on a computer; the operating system enables and facilitates users to access and operate computer information technology and resources.
  • Common resources employed in information technology systems include: input and output mechanisms through which data may pass into and out of a computer; memory storage into which data may be saved; and processors by which information may be processed.
  • Information technology systems are used to collect data for later retrieval, analysis, and manipulation, commonly, which is facilitated through a database program.
  • Information technology systems provide interfaces that allow users to access and operate various system components.
  • the GCSI/CTIS controller 3501 may be connected to and/or communicate with entities such as, but not limited to: one or more users from user input devices 351 1; peripheral devices 3512; a cryptographic processor device 3528; and/or a communications network 3513.
  • entities such as, but not limited to: one or more users from user input devices 351 1; peripheral devices 3512; a cryptographic processor device 3528; and/or a communications network 3513.
  • Networks are commonly thought to comprise the interconnection and interoperation of clients, servers, and intermediary nodes in a graph topology.
  • server refers generally to a computer, other device, program, or combination thereof that processes and responds to the requests of remote users across a communications network.
  • Servers serve their information to requesting "clients.”
  • client refers generally to a computer, other device, program, or combination thereof that is capable of processing and making requests and obtaining and processing any responses from servers across a communications network.
  • a computer, other device, program, or combination thereof that facilitates, processes information and requests, and/or furthers the passage of information from a source user to a destination user is commonly referred to as a "node.”
  • Networks are generally thought to facilitate the transfer of information from source points to destinations.
  • a node specifically tasked with furthering the passage of information from a source to a destination is commonly called a "router.”
  • networks such as Local Area Networks (LANs), Pico networks, Wide Area Networks (WANs), Wireless Networks (WLANs), etc.
  • LANs Local Area Networks
  • WANs Wide Area Networks
  • WLANs Wireless Networks
  • the Internet is generally accepted as being an interconnection of a multitude of networks whereby remote clients and servers may access and interoperate with one another.
  • the GCSI/CTIS controller 3501 may be based on common computer systems that may comprise, but are not limited to, components such as: a computer systemization 3502 connected to memory 3529.
  • a computer systemization 3502 may comprise a clock 3530, central processing unit (CPU) 3503, a read only memory (ROM) 3506, a random access memory (RAM) 3505, and/or an interface bus 3507, and most frequently, although not necessarily, the foregoing are all interconnected and/or communicating through a system bus 3504.
  • the computer systemization may be connected to an internal power source 3586.
  • a cryptographic processor 3526 and/or a global positioning system (GPS) component 3575 may be connected to the system bus.
  • the system clock typically has a crystal oscillator and provides a base signal. The clock is typically coupled to the system bus and various clock multipliers that will increase or decrease the base operating frequency for other components interconnected in the computer systemization.
  • the clock and various components in a computer systemization drive signals embodying information throughout the system. Such transmission and reception of signals embodying information throughout a computer systemization may be commonly referred to as communications. These communicative signals may further be transmitted, received, and the cause of return and/or reply signal communications beyond the instant computer systemization to: communications networks, input devices, other computer systemizations, peripheral devices, and/or the like. Of course, any of the above components may be connected directly to one another, connected to the CPU, and/or organized in numerous variations employed as exemplified by various computer systems.
  • the CPU comprises at least one high-speed data processor adequate to execute program components for executing user and/or system-generated requests.
  • the CPU may be a microprocessor such as AMD's Athlon, Duron and/or Opteron; IBM and/or Motorola's PowerPC; IBM's and Sony's Cell processor; Intel's Celeron, Itanium, Pentium, Xeon, and/or XScale; and/or the like processor(s).
  • the CPU interacts with memory through signal passing through conductive conduits to execute stored signal program code according to conventional data processing techniques. Such signal passing facilitates communication within the GCSI/CTIS controller and beyond through various interfaces. Should processing requirements dictate a greater amount speed, parallel, mainframe and/or super-computer architectures may similarly be employed. Alternatively, should deployment requirements dictate greater portability, smaller Personal Digital Assistants (PDAs) may be employed.
  • PDAs Personal Digital Assistants
  • the power source 3586 may be of any standard form for powering small electronic circuit board devices such as the following power cells: alkaline, lithium hydride, lithium ion, lithium polymer, nickel cadmium, solar cells, and/or the like. Other types of AC or DC power sources may be used as well. In the case of solar cells, in one embodiment, the case provides an aperture through which the solar cell may capture photonic energy.
  • the power cell 3586 is connected to at least one of the interconnected subsequent components of the GCSI/CTIS thereby providing an electric current to all subsequent components.
  • the power source 3586 is connected to the system bus component 3504.
  • an outside power source 3586 is provided through a connection across the I/O 3508 interface. For example, a USB and/or IEEE 1394 connection carries both data and power across the connection and is therefore a suitable source of power.
  • Interface bus(ses) 3507 may accept, connect, and/or communicate to a number of interface adapters, conventionally although not necessarily in the form of adapter cards, such as but not limited to: input output interfaces (I/O) 3508, storage interfaces 3509, network interfaces 3510, and/or the like.
  • I/O input output interfaces
  • cryptographic processor interfaces 3527 similarly may be connected to the interface bus.
  • the interface bus provides for the communications of interface adapters with one another as well as with other components of the computer systemization.
  • Interface adapters are adapted for a compatible interface bus.
  • Interface adapters conventionally connect to the interface bus via a slot architecture.
  • Conventional slot architectures may be employed, such as, but not limited to: Accelerated Graphics Port (AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (Extended) (PCI(X)), PCI Express, Personal Computer Memory Card International Association (PCMCIA), and/or the like.
  • AGP Accelerated Graphics Port
  • Card Bus Card Bus
  • E Industry Standard Architecture
  • MCA Micro Channel Architecture
  • NuBus NuBus
  • PCI(X) Peripheral Component Interconnect Express
  • PCMCIA Personal Computer Memory Card International Association
  • Storage interfaces 3509 may accept, communicate, and/or connect to a number of storage devices such as, but not limited to: storage devices 3514, removable disc devices, and/or the like.
  • Storage interfaces may employ connection protocols such as, but not limited to: (Ultra) (Serial) Advanced Technology Attachment (Packet Interface) ((Ultra) (Serial) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, fiber channel, Small Computer Systems Interface (SCSI), Universal Serial Bus (USB), and/or the like.
  • connection protocols such as, but not limited to: (Ultra) (Serial) Advanced Technology Attachment (Packet Interface) ((Ultra) (Serial) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, fiber channel, Small Computer Systems Interface (SCSI), Universal Serial Bus (USB), and/or the like.
  • Network interfaces 3510 may accept, communicate, and/or connect to a communications network 3513. Through a communications network 3513, the GCSI/CTIS controller is accessible through remote clients 3533b (e.g.,, computers with web browsers) by users 3533a.
  • Network interfaces may employ connection protocols such as, but not limited to: direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), Token Ring, wireless connection such as IEEE 802.1 la-x, and/or the like.
  • a communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); a Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g.,, employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like.
  • a network interface may be regarded as a specialized form of an input output interface.
  • multiple network interfaces 3510 may be used to engage with various communications network types 3513. For example, multiple network interfaces may be employed to allow for the communication over broadcast, multicast, and/or unicast networks.
  • I/O 3508 may accept, communicate, and/or connect to user input devices 351 1, peripheral devices 3512, cryptographic processor devices 3528, and/or the like.
  • I/O may employ connection protocols such as, but not limited to: Apple Desktop Bus (ADB); Apple Desktop Connector (ADC); audio: analog, digital, monaural, RCA, stereo, and/or the like; IEEE 1394a-b; infrared; joystick; keyboard; midi; optical; PC AT; PS/2; parallel; radio; serial; USB; video interface: BNC, coaxial, composite, digital, Digital Visual Interface (DVI), RCA, RF antennae, S-Video, VGA, and/or the like; wireless; and/or the like.
  • ADB Apple Desktop Bus
  • ADC Apple Desktop Connector
  • audio analog, digital, monaural, RCA, stereo, and/or the like
  • IEEE 1394a-b infrared
  • joystick keyboard
  • midi optical
  • PC AT PC AT
  • PS/2 parallel
  • radio serial
  • USB video
  • a common output device is a television set, which accepts signals from a video interface.
  • a video display which typically comprises a Cathode Ray Tube (CRT) or Liquid Crystal Display (LCD) based monitor with an interface (e.g.,, DVI circuitry and cable) that accepts signals from a video interface, may be used.
  • the video interface composites information generated by a computer systemization and generates video signals based on the composited information in a video memory frame.
  • the video interface provides the composited video information through a video connection interface that accepts a video display interface (e.g., an RCA composite video connector accepting an RCA composite video cable; a DVI connector accepting a DVI display cable, etc.).
  • User input devices 351 1 may be card readers, dongles, finger print readers, gloves, graphics tablets, joysticks, keyboards, mouse (mice), remote controls, retina readers, trackballs, trackpads, and/or the like.
  • Peripheral devices 3512 may be connected and/or communicate to I/O and/or other facilities of the like such as network interfaces, storage interfaces, and/or the like.
  • Peripheral devices may be audio devices, cameras, dongles (e.g.,, for copy protection, ensuring secure transactions with a digital signature, and/or the like), external processors (for added functionality), goggles, microphones, monitors, network interfaces, printers, scanners, storage devices, video devices, video sources, visors, and/or the like.
  • the GCSI/CTIS controller may be embodied as an embedded, dedicated, and/or monitor-less (i.e.,, headless) device, wherein access would be provided over a network interface connection.
  • Cryptographic units such as, but not limited to, microcontrollers, processors 3526, interfaces 3527, and/or devices 3528 may be attached, and/or communicate with the GCSI/CTIS controller.
  • a MC68HC16 microcontroller commonly manufactured by Motorola Inc., may be used for and/or within cryptographic units. Equivalent microcontrollers and/or processors may also be used.
  • the MC68HC16 microcontroller utilizes a 16-bit multiply-and-accumulate instruction in the 16 MHz configuration and requires less than one second to perform a 512-bit RSA private key operation.
  • Cryptographic units support the authentication of communications from interacting agents, as well as allow for anonymous transactions.
  • Cryptographic units may also be configured as part of CPU.
  • Other commercially available specialized cryptographic processors include VLSI Technology's 33 MHz 6868 or Semaphore Communications' 40 MHz Roadrunner 184.
  • any mechanization and/or embodiment allowing a processor to affect the storage and/or retrieval of information is regarded as memory 3529.
  • memory is a fungible technology and resource, thus, any number of memory embodiments may be employed in lieu of or in concert with one another.
  • the GCSI/CTIS controller and/or a computer systemization may employ various forms of memory 3529.
  • a computer systemization may be configured wherein the functionality of on-chip CPU memory (e.g., registers), RAM, ROM, and any other storage devices are provided by a paper punch tape or paper punch card mechanism; of course such an embodiment would result in an extremely slow rate of operation.
  • memory 3529 will include ROM 3506, RAM 3505, and a storage device 3514.
  • a storage device 3514 may be any conventional computer system storage. Storage devices may include a drum; a (fixed and/or removable) magnetic disk drive; a magneto-optical drive; an optical drive (i.e.,, CD ROM/RAM/Recordable (R), Rewritable (RW), DVD R/RW, etc.); an array of devices (e.g.,, Redundant Array of Independent Disks (RAID)); and/or other devices of the like.
  • RAID Redundant Array of Independent Disks
  • the memory 3529 may contain a collection of program and/or database components and/or data such as, but not limited to: operating system component(s) 3515 (operating system); information server component(s) 3516 (information server); user interface component(s) 3517 (user interface); Web browser component(s) 3518 (Web browser); database(s) 3519; mail server component(s) 3521; mail client component(s) 3522; cryptographic server component(s) 3520 (cryptographic server); the GCSI/CTIS component(s) 3535; and/or the like (i.e., collectively a component collection). These components may be stored and accessed from the storage devices and/or from storage devices accessible through an interface bus.
  • operating system component(s) 3515 operating system
  • information server component(s) 3516 information server
  • user interface component(s) 3517 user interface
  • Web browser component(s) 3518 Web browser
  • database(s) 3519 mail server component(s) 3521; mail client component(s) 3522; cryptographic server component(s) 3520
  • non-conventional program components such as those in the component collection, typically, are stored in a local storage device 3514, they may also be loaded and/or stored in memory such as: peripheral devices, RAM, remote storage facilities through a communications network, ROM, various forms of memory, and/or the like.
  • the operating system component 3515 is an executable program component facilitating the operation of the GCSI/CTIS controller.
  • the operating system facilitates access of I/O, network interfaces, peripheral devices, storage devices, and/or the like.
  • the operating system may be a highly fault tolerant, scalable, and secure system such as Apple Macintosh OS X (Server), AT&T Plan 9, Be OS, Linux, Unix, and/or the like operating systems.
  • Apple Macintosh OS Microsoft DOS, Microsoft Windows 2000/2003/3.1/95/98/CE/Millenium/NT/Vista/XP (Server), Palm OS, and/or the like.
  • An operating system may communicate to and/or with other components in a component collection, including itself, and/or the like. Most frequently, the operating system communicates with other program components, user interfaces, and/or the like. For example, the operating system may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses. The operating system, once executed by the CPU, may enable the interaction with communications networks, data, I/O, peripheral devices, program components, memory, user input devices, and/or the like. The operating system may provide communications protocols that allow the GCSI/CTIS controller to communicate with other entities through a communications network 3513. Various communication protocols may be used by the GCSI/CTIS system controller as a subcarrier transport mechanism for interaction, such as, but not limited to: multicast, TCP/IP, UDP, unicast, and/or the like. Information Server
  • An information server component 3516 is a stored program component that is executed by a CPU.
  • the information server may be a conventional Internet information server such as, but not limited to Apache Software Foundation's Apache, Microsoft's Internet Information Server, and/or the.
  • the information server may allow for the execution of program components through facilities such as Active Server Page (ASP), ActiveX, (ANSI) (Objective-) C (++), C#, Common Gateway Interface (CGI) scripts, Java, JavaScript, Practical Extraction Report Language (PERL), Python, WebObjects, and/or the like.
  • the information server may support secure communications protocols such as, but not limited to, File Transfer Protocol (FTP); HyperText Transfer Protocol (HTTP); Secure Hypertext Transfer Protocol (HTTPS), Secure Socket Layer (SSL), and/or the like.
  • FTP File Transfer Protocol
  • HTTP HyperText Transfer Protocol
  • HTTPS Secure Hypertext Transfer Protocol
  • SSL Secure Socket Layer
  • the information server provides results in the form of Web pages to Web browsers, and allows for the manipulated generation of the Web pages through interaction with other program components.
  • DNS Domain Name System
  • a request such as http://123.124.125.126/myInformation.html might have the IP portion of the request "123.124.125.126” resolved by a DNS server to an information server at that IP address; that information server might in turn further parse the http request for the "/mylnformation.html” portion of the request and resolve it to a location in memory containing the information "mylnformation.html.”
  • other information serving protocols may be employed across various ports, e.g.,, FTP communications across port 21, and/or the like.
  • An information server may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the information server communicates with the GCSI/CTIS database 3519, operating systems, other program components, user interfaces, Web browsers, and/or the like.
  • Access to the GCSI/CTIS database may be achieved through a number of database bridge mechanisms such as through scripting languages as enumerated below (e.g.,, CGI) and through inter-application communication channels as enumerated below (e.g.,, CORBA, WebObjects, etc.). Any data requests through a Web browser are parsed through the bridge mechanism into appropriate grammars as required by the GCSI CTIS.
  • the information server would provide a Web form accessible by a Web browser. Entries made into supplied fields in the Web form are tagged as having been entered into the particular fields, and parsed as such. The entered terms are then passed along with the field tags, which act to instruct the parser to generate queries directed to appropriate tables and/or fields.
  • the parser may generate queries in standard SQL by instantiating a search string with the proper join/select commands based on the tagged text entries, wherein the resulting command is provided over the bridge mechanism to the GCSI/CTIS as a query.
  • the results are passed over the bridge mechanism, and may be parsed for formatting and generation of a new results Web page by the bridge mechanism. Such a new results Web page is then provided to the information server, which may supply it to the requesting Web browser.
  • an information server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • GUIs Graphical user interfaces
  • Apple Macintosh Operating System's Aqua a baseline and means of accessing and displaying information graphically to users.
  • a user interface component 3517 is a stored program component that is executed by a CPU.
  • the user interface may be a conventional graphic user interface as provided by, with, and/or atop operating systems and/or operating environments such as Apple Macintosh OS, e.g.,, Aqua, G USTEP, Microsoft Windows ( T/XP), Unix X Windows (KDE, Gnome, and/or the like), mythTV, and/or the like.
  • the user interface may allow for the display, execution, interaction, manipulation, and/or operation of program components and/or system facilities through textual and/or graphical facilities.
  • the user interface provides a facility through which users may affect, interact, and/or operate a computer system.
  • a user interface may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the user interface communicates with operating systems, other program components, and/or the like.
  • the user interface may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • a Web browser component 3518 is a stored program component that is executed by a CPU.
  • the Web browser may be a conventional hypertext viewing application such as Microsoft Internet Explorer or Netscape Navigator. Secure Web browsing may be supplied with 128bit (or greater) encryption by way of HTTPS, SSL, and/or the like.
  • Some Web browsers allow for the execution of program components through facilities such as Java, JavaScript, ActiveX, and/or the like. Web browsers and like information access tools may be integrated into PDAs, cellular telephones, and/or other mobile devices.
  • a Web browser may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like.
  • the Web browser communicates with information servers, operating systems, integrated program components (e.g.,, plug-ins), and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • information servers operating systems, integrated program components (e.g.,, plug-ins), and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • a combined application may be developed to perform similar functions of both.
  • the combined application would similarly affect the obtaining and the provision of information to users, user agents, and/or the like from the GCSI/CTIS enabled nodes.
  • the combined application may be nugatory on systems employing standard Web browsers.
  • a mail server component 3521 is a stored program component that is executed by a CPU 3503.
  • the mail server may be a conventional Internet mail server such as, but not limited to sendmail, Microsoft Exchange, and/or the like.
  • the mail server may allow for the execution of program components through facilities such as ASP, ActiveX, (ANSI) (Objective-) C (++), CGI scripts, Java, JavaScript, PERL, pipes, Python, WebObjects, and/or the like.
  • the mail server may support communications protocols such as, but not limited to: Internet message access protocol (IMAP), Microsoft Exchange, post office protocol (POP3), simple mail transfer protocol (SMTP), and/or the like.
  • IMAP Internet message access protocol
  • POP3 post office protocol
  • SMTP simple mail transfer protocol
  • the mail server can route, forward, and process incoming and outgoing mail messages that have been sent, relayed and/or otherwise traversing through and/or to the GCSI/CTIS.
  • Access to the GCSI/CTIS mail may be achieved through a number of APIs offered by the individual Web server components and/or the operating system.
  • a mail server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses.
  • a mail client component 3522 is a stored program component that is executed by a CPU 3503.
  • the mail client may be a conventional mail viewing application such as Apple Mail, Microsoft Entourage, Microsoft Outlook, Microsoft Outlook Express, Mozilla Thunderbird, and/or the like.
  • Mail clients may support a number of transfer protocols, such as: IMAP, Microsoft Exchange, POP3, SMTP, and/or the like.
  • a mail client may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like.
  • the mail client communicates with mail servers, operating systems, other mail clients, and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses.
  • the mail client provides a facility to compose and transmit electronic mail messages.
  • a cryptographic server component 3520 is a stored program component that is executed by a CPU 3503, cryptographic processor 3526, cryptographic processor interface 3527, cryptographic processor device 3528, and/or the like.
  • Cryptographic processor interfaces will allow for expedition of encryption and/or decryption requests by the cryptographic component; however, the cryptographic component, alternatively, may run on a conventional CPU.
  • the cryptographic component allows for the encryption and/or decryption of provided data.
  • the cryptographic component allows for both symmetric and asymmetric (e.g.,, Pretty Good Protection (PGP)) encryption and/or decryption.
  • PGP Pretty Good Protection
  • the cryptographic component may employ cryptographic techniques such as, but not limited to: digital certificates (e.g.,, X.509 authentication framework), digital signatures, dual signatures, enveloping, password access protection, public key management, and/or the like.
  • the cryptographic component will facilitate numerous (encryption and/or decryption) security protocols such as, but not limited to: checksum, Data Encryption Standard (DES), Elliptical Curve Encryption (ECC), International Data Encryption Algorithm (IDEA), Message Digest 5 (MD5, which is a one way hash function), passwords, Rivest Cipher (RC5), Rijndael, RSA (which is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman), Secure Hash Algorithm (SHA), Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (HTTPS), and/or the like.
  • DES Data Encryption Standard
  • ECC El
  • the GCSI/CTIS may encrypt all incoming and/or outgoing communications and may serve as node within a virtual private network (VPN) with a wider communications network.
  • the cryptographic component facilitates the process of "security authorization" whereby access to a resource is inhibited by a security protocol wherein the cryptographic component effects authorized access to the secured resource.
  • the cryptographic component may provide unique identifiers of content, e.g.,, employing an MD5 hash to obtain a unique signature for a digital audio file.
  • a cryptographic component may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like.
  • the cryptographic component supports encryption schemes allowing for the secure transmission of information across a communications network to enable the GCSI/CTIS component to engage in secure transactions if so desired.
  • the cryptographic component facilitates the secure accessing of resources on the GCSI/CTIS and facilitates the access of secured resources on remote systems; i.e.,, it may act as a client and/or server of secured resources.
  • the cryptographic component communicates with information servers, operating systems, other program components, and/or the like.
  • the cryptographic component may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • the GCSI CTIS database component 3519 may be embodied in a database and its stored data.
  • the database is a stored program component, which is executed by the CPU; the stored program component portion configuring the CPU to process the stored data.
  • the database may be a conventional, fault tolerant, relational, scalable, secure database such as Oracle or Sybase.
  • Relational databases are an extension of a flat file. Relational databases consist of a series of related tables. The tables are interconnected via a key field. Use of the key field allows the combination of the tables by indexing against the key field; i.e.,, the key fields act as dimensional pivot points for combining information from various tables. Relationships generally identify links maintained between tables by matching primary keys. Primary keys represent fields that uniquely identify the rows of a table in a relational database. More precisely, they uniquely identify rows of a table on the "one" side of a one-to-many relationship.
  • the GCSI/CTIS database may be implemented using various standard data-structures, such as an array, hash, (linked) list, struct, structured text file (e.g.,, XML), table, and/or the like. Such data-structures may be stored in memory and/or in (structured) files.
  • an object-oriented database may be used, such as Frontier, ObjectStore, Poet, Zope, and/or the like.
  • Object databases can include a number of object collections that are grouped and/or linked together by common attributes; they may be related to other object collections by some common attributes.
  • Object-oriented databases perform similarly to relational databases with the exception that objects are not just pieces of data but may have other types of functionality encapsulated within a given object.
  • the GCSI/CTIS database is implemented as a data- structure, the use of the GCSI CTIS database 3519 may be integrated into another component such as the GCSI CTIS component 3535.
  • the database may be implemented as a mix of data structures, objects, and relational structures. Databases may be consolidated and/or distributed in countless variations through standard data processing techniques. Portions of databases, e.g.,, tables, may be exported and/or imported and thus decentralized and/or integrated.
  • the database component 3519 includes several tables 3519a,b.
  • a user profile table 3519a includes fields such as, but not limited to: a user ID, name, email address, address, demographic profile, hardware ID, scan history record, scan statistics, and/or the like.
  • the user profile table may support and/or track multiple entity accounts on a GCSI/CTIS.
  • An Information Base table 3519b includes fields such as, but not limited to: Ad provider ID, Ad ID, Ad content, Ad labels, geographic tags, temporal tags, subject tags, Ad ratings, Ad statistics, and/or the like.
  • the GCSI/CTIS database may interact with other database systems.
  • queries and data access by OLBS modules may treat the combination of the GCSI/CTIS database, an integrated data security layer database as a single database entity.
  • user programs may contain various user interface primitives, which may serve to update the GCSI/CTIS.
  • various accounts may require custom database tables depending upon the environments and the types of clients the GCSI/CTIS may need to serve. It should be noted that any unique fields may be designated as a key field throughout.
  • these tables have been decentralized into their own databases and their respective database controllers (i.e., individual database controllers for each of the above tables). Employing standard data processing techniques, one may further distribute the databases over several computer systemizations and/or storage devices. Similarly, configurations of the decentralized database controllers may be varied by consolidating and/or distributing the various database components 3519a,b.
  • the GCSI CTIS may be configured to keep track of various settings, inputs, and parameters via database controllers.
  • the GCSI/CTIS database may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the GCSI CTIS database communicates with the GCSI CTIS component, other program components, and/or the like. The database may contain, retain, and provide information regarding other nodes and data.
  • the GCSI/CTIS component 3535 is a stored program component that is executed by a CPU.
  • the GCSI/CTIS affects accessing, obtaining and the provision of information, services, transactions, and/or the like across various communications networks.
  • the GCSI/CTIS component enables the identification, generation, and aggregation of Scan Messages and Reply Messages, and the provision of encoded symbologies in association with and/or proximity to other display elements, graphical features, and/or visual tokens.
  • the GCSI/CTIS component enabling access of information between nodes may be developed by employing standard development tools such as, but not limited to: (ANSI) (Objective-) C (++), Apache components, binary executables, database adapters, Java, JavaScript, mapping tools, procedural and object oriented development tools, PERL, Python, shell scripts, SQL commands, web application server extensions, WebObjects, and/or the like.
  • the GCSI/CTIS server employs a cryptographic server to encrypt and decrypt communications.
  • the GCSI/CTIS component may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like.
  • the GCSI/CTIS component communicates with the GCSI/CTIS database, operating systems, other program components, and/or the like.
  • the GCSI/CTIS may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • any of the GCSI/CTIS node controller components may be combined, consolidated, and/or distributed in any number of ways to - I l l - facilitate development and/or deployment.
  • the component collection may be combined in any number of ways to facilitate deployment and/or development. To accomplish this, one may integrate the components into a common code base or in a facility that can dynamically load the components on demand in an integrated fashion.
  • the component collection may be consolidated and/or distributed in countless variations through standard data processing and/or development techniques. Multiple instances of any one of the program components in the program component collection may be instantiated on a single node, and/or across numerous nodes to improve performance through load-balancing and/or data-processing techniques. Furthermore, single instances may also be distributed across multiple controllers and/or storage devices; e.g., databases. All program component instances and controllers working in concert may do so through standard data processing communication techniques.
  • the configuration of the GCSI/CTIS controller will depend on the context of system deployment. Factors such as, but not limited to, the budget, capacity, location, and/or use of the underlying hardware resources may affect deployment requirements and configuration. Regardless of if the configuration results in more consolidated and/or integrated program components, results in a more distributed series of program components, and/or results in some combination between a consolidated and distributed configuration, data may be communicated, obtained, and/or provided. Instances of components consolidated into a common code base from the program component collection may communicate, obtain, and/or provide data.
  • intra-application data processing communication techniques such as, but not limited to: data referencing (e.g., pointers), internal messaging, object instance variable communication, shared memory space, variable passing, and/or the like.
  • component collection components are discrete, separate, and/or external to one another, then communicating, obtaining, and/or providing data with and/or to other component components may be accomplished through inter-application data processing communication techniques such as, but not limited to: Application Program Interfaces (API) information passage; (distributed) Component Object Model ((D)COM), (Distributed) Object Linking and Embedding ((D)OLE), and/or the like), Common Object Request Broker Architecture (CORBA), process pipes, shared files, and/or the like.
  • API Application Program Interfaces
  • DCOM Component Object Model
  • CORBA Common Object Request Broker Architecture
  • a grammar may be developed by using standard development tools such as lex, yacc, XML, and/or the like, which allow for grammar generation and parsing functionality, which in turn may form the basis of communication messages within and between components. Again, the configuration will depend upon the context of system deployment.
  • Additional embodiments may include:
  • An information serving processor-implemented method comprising: accumulating user activity interest information
  • the user activity interest information further comprises a code scanned by a mobile device.
  • a processor- implemented method for serving information to a mobile device comprising: receiving messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan;
  • An information receiving processor-implemented method comprising: accumulating user activity interest information
  • the user activity interest information further comprises a code scanned by a mobile device.
  • An information serving apparatus comprising:
  • processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to:
  • the user activity interest information further comprises a code scanned by a mobile device.
  • An apparatus for serving information to a mobile device comprising: a memory;
  • a processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to: receive messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan;
  • An information receiving apparatus comprising:
  • processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to:
  • the user activity interest information further comprises a code scanned by a mobile device.
  • An information serving processor-accessible medium comprising:
  • the user activity interest information further comprises a code scanned by a mobile device.
  • a processor-accessible medium for serving information to a mobile device comprising: a plurality of processing instructions stored in the medium and issuable by a processor to:
  • An information receiving processor-accessible medium comprising: a plurality of processing instructions stored in the medium and issuable by a processor to:
  • the user activity interest information further comprises a code scanned by a mobile device.
  • An information serving processor-implemented system comprising:
  • the system of claim 60 wherein the user situational information includes geographic location at a given time.
  • the user activity interest information further comprises a code scanned by a mobile device.
  • a processor-implemented system for serving information to a mobile device comprising:
  • An information receiving processor-implemented system comprising: means to accumulate user activity interest information;
  • the user activity interest information further comprises a code scanned by a mobile device.

Abstract

The present disclosure details apparatuses, methods, and systems for a voice-triggered code-mediated augmented reality content delivery platform comprising a Graphical Code-Serving Interface and a Code Triggered Information Server ("GCSI/CTIS"). The GCSI/CTIS connects information encoding symbologies to graphical interface elements, thus expanding the useful information content and interactivity of graphical displays, advertisements, publications, broadcasts, and/or the like. GCSI/CTIS components facilitate wide ranging functionality, including generation of robust encoding symbologies, error-correction, media sampling and purchasing, social networking, and sales promotion programs.

Description

APPARATUSES, METHODS, AND SYSTEMS FOR A VOICE- TRIGGERED CODE-MEDIATED AUGMENTED REALITY CONTENT
DELIVERY PLATFORM
PRIORITY CLAIMS AND RELATED APPLICATIONS
[0001 ] Applicant hereby claims priority under 35 USC § 1 19 for United States provisional patent application serial no. 61/346,313 filed May 19, 2010, entitled
"Apparatuses, Methods and Systems for a Voice-Triggered Code-Mediated Content
Delivery Platform," attorney docket no. 17896-006PV3.
[0002 ] Applicant hereby claims priority under 35 USC § 1 19 for United States provisional patent application serial no. 61/346,335 filed May 19, 2010, entitled "Apparatuses, Methods and Systems for a Code-Mediated Augmented Reality Content Delivery Platform," attorney docket no. 17896-006PV4.
[0003 ] This is a Continuation in Part of prior application serial no. 12/267,470, filed November 7, 2008, entitled, "Apparatuses, Methods and Systems for a Code- Mediated Content Delivery Platform," (Attorney Docket no. 17896-006CP2), to which priority under 35 U.S.C. § 120 is claimed, which in turn is a Non-Provisional and claims priority under 35 U.S.C. § 119 of prior Provisional application serial no. 61/014,015, filed December 14, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR A DATA LOSS RESILIENT CODE," (Attorney Docket No. 17896-007PV) to which priority under 35 U.S.C. § 1 19 is claimed;
[0004] and also a Continuation in Part and claims priority under 35 U.S.C. § 120 of prior application serial no. 12/264,642, filed November 4, 2008, entitled, "Apparatuses, Methods and Systems for a Code-Mediated Content Delivery Platform," (Attorney Docket No. 17896-006CP1); which in turn is a Non-Provisional and claims priority under 35 U.S.C. § 1 19: of prior Provisional application serial no. 61/054,083, filed May 16, 2008, entitled, "Apparatuses, Methods, and Systems for a Graphical Code-Serving Interface," (Attorney Docket No. 17896-006PV1); and of prior Provisional application serial no. 61/1 10,968, filed November 3, 2008, entitled, "Apparatuses, Methods, and Systems for a Graphical Code-Serving Interface," (Attorney Docket No. 17896-006PV2);
[0005] and also a Continuation in Part and claims priority under 35 U.S.C. § 120: of prior application serial no. 12/278, 131, filed August 1, 2008, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR A GRAPHICAL CODE- SERVING INTERFACE," (Attorney Docket No. 17896-006US1), which in turn is a National Stage Entry of and claims priority under 35 U.S.C. §§ 365 and 371 to PCT Application No. PCT/US08/54423, filed February 20, 2008, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR A GRAPHICAL CODE-SERVING INTERFACE," (Attorney Docket No. 17896-006PC), which in turn claims priority to:
[0006] U.S. Provisional application serial no. 60/890,820, filed February 20,
2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR A GRAPHICAL CODE-SERVING INTERFACE," (Attorney Docket No. 17896-006PV);
[0007] and U.S. Non-Provisional application serial no. 11/864,745, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896-004US1) which in turn claims priority under 35 U.S.C, § 119 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE-TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896-004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7);
[0008] and U.S. Non-Provisional application serial no. 11/864,758, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004US2) which in turn claims priority under 35 U.S.C., § 1 19 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE- TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896-004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7);
[0009] and U.S. Non-Provisional application serial no. 11/864,772, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004US3) which in turn claims priority under 35 U.S.C., § 119 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE-TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896-004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7);
[0010] and U.S. Non-Provisional application serial no. 11/864,790, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004US4) which in turn claims priority under 35 U.S.C., § 119 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE-TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896- 004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7); [0011 ] and U.S. Non-Provisional application serial no. 11/864,799, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004US5) which in turn claims priority under 35 U.S.C., § 119 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE-TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896- 004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7);
[0012 ] and U.S. Non-Provisional application serial no. 11/864,807, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004US6) which in turn claims priority under 35 U.S.C., § 1 19 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE- TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896-004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7);
[0013] and U.S. Non-Provisional application serial no. 11/864,814, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004US7) which in turn claims priority under 35 U.S.C., § 119 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE- TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896-004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7);
[0014] and U.S. Non-Provisional application serial no. 11/864,821, filed
September 28, 2007, entitled, "APPARATUSES, METHODS AND SYSTEMS FOR AMBIGUOUS CODE-TRIGGERED INFORMATION QUERYING AND SERVING ON MOBILE DEVICES," (Attorney Docket No. 17896-004US8) which in turn claims priority under 35 U.S.C., § 119 to: U.S. Provisional application serial no. 60/827,381, filed September 28, 2006, entitled, "APPARATUSES, METHODS, AND SYSTEMS FOR CODE-TRIGGERED INFORMATION QUERYING AND SERVING," (Attorney Docket No. 17896-004PV), and to U.S. Provisional application serial no. 60/828,959, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON AMBIENT CONDITIONS," (Attorney Docket No. 17896-004PV1), and to U.S. Provisional application serial no. 60/828,962, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV2), and to U.S. Provisional application serial no. 60/828,970, filed October 10, 2006, entitled, "METHOD FOR ANTICIPATORY INFORMATION QUERYING AND SERVING ON MOBILE DEVICES BASED ON PROFILES," (Attorney Docket No. 17896-004PV3), and to U.S. Provisional application serial no. 60/828,969, filed October 10, 2006, entitled, "METHOD FOR COORDINATING PERSONNEL BASED ON PROFILES," (Attorney Docket No. 17896-004PV4), and to U.S. Provisional application serial no. 60/828,967, filed October 10, 2006, entitled, "METHOD FOR DETERMINING AND ANNOUNCING PROXIMITY BETWEEN TRAJECTORIES," (Attorney Docket No. 17896-004PV5), and to U.S. Provisional application serial no. 60/828,968, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING IN A VIRTUAL WORLD BASED ON PROFILES," (Attorney Docket No. 17896-004PV6), and to U.S. Provisional application serial no. 60/828,965, filed October 10, 2006, entitled, "METHOD FOR INFORMATION QUERYING AND SERVING ON THE INTERNET BASED ON PROFILES," (Attorney Docket No. 17896-004PV7).
[0015] The entire contents of the aforementioned applications are herein expressly incorporated by reference.
FIELD
[0016] The present disclosure is directed generally to apparatuses, methods, and systems for marketing and information dissemination, and more particularly, to apparatuses, methods and systems for a voice-triggered code-mediated augmented reality content delivery platform.
BACKGROUND
[0017] In recent years, large quantities of information have been converted to digital format and made available via electronic channels such as the internet. Advances in data transmission and electronics technology have also enabled the proliferation of portable electronic devices equipped with internet capabilities. In addition, various advertising systems, such as Google's AdSense, allow advertisers to place advertisements in contexts with which consumers are interested. Information encoding symbologies, such as barcodes, data matrices, JagTags, or Radio Frequency Identification (RFID) tags, as well as the technology to decode them have come about.
SUMMARY
[0018] This disclosure details the implementation of apparatuses, methods, and systems for a voice-triggered code -mediated augmented reality content delivery platform comprising a Graphical Code-Serving Interface and a Code Triggered Information Server (hereafter "GCSI/CTIS"). The GCSI/CTIS provides a novel agency for connecting information encoding symbologies, and by proxy the underlying information content, to graphical display elements. The GCSI/CTIS may also facilitate the provision of voice- triggered code-mediated content, whereby audio inputs may be received and interepreted, and multimedia content may be provided in response thereto. The GCSI/CTIS may also facilitate the provision of requested content in an augmented reality display, which may include a variety of augmented reality interface elements, such as but not limited to overlays, three-dimensionally rendered objects, advertisements, interactive display elements and/or applications, and/or the like which may be provided in a display having persistent spatial, positional, and/or orientational relationships to a scanned code and/or elements of a media environment in which the code is provided. There is increasing popular demand for quick and convenient access to information, particularly information that is targeted to an individual's profile, interests, and/or contextual surroundings and that is portable and/or made available in unexpected physical locations. The active display elements described in the present disclosure facilitate the serving of such information via deft placement of information encoding symbologies, such as matrix codes, voice-triggering cues, and/or the like, proximate to graphical elements in a wide variety of digital display contexts and media, including portable display devices, mp3 players, cell phones, digital paper, animated billboards, websites, internet or television broadcasts, software interfaces, and/or the like. Users may capture images of information encoding symbologies from such displays, for example using a cell phone camera, and decode them with software applets to receive additional information, multimedia content, offers, coupons, notifications, and/or the like (e.g., such as may be provided in augmented reality displays).
[0019] In one embodiment, an information serving processor- implemented method is disclosed, comprising: accumulating user activity interest information comprising voice trigger inputs; accumulating user situational information; associating the user activity interest information and user situational information with a user profile; updating the user profile with the associated information in a database; analyzing accumulated information associated with the user profile; querying an information database based on the analysis of the user profile; selecting information based on the user profile to include in a message; and sending the message to a user.
[0020] In another embodiment, a processor- implemented method for serving information to a mobile device is disclosed, comprising: receiving messages from a user comprised of user identification, mobile device identification, voice trigger inputs, time of the scan, and user geographic location at the time of the scan; associating the user identification with a user profile in a database; updating the user profile with the received messages; analyzing the accumulated messages in the user profile; determining information to serve to the user based on the received message and the user profile; selecting the information to serve to the user from a database; incorporating the selected information into a reply message; and sending the reply message to the user's mobile device.
[0021 ] In another embodiment, an information receiving processor- implemented method is disclosed, comprising: accumulating user activity interest information comprising voice trigger inputs; accumulating user situational information; incorporating user activity interest information in an interest message; incorporating user situational information in a situational message; sending the interest message to a server; sending the situational message to the server; and receiving a reply based on the interest message, the situational message, and a user profile.
[0022 ] In another embodiment, an information serving processor-implemented method is disclosed, comprising: accumulating user activity interest information; accumulating user situational information; associating the user activity interest information and user situational information with a user profile; updating the user profile with the associated information in a database; analyzing accumulated information associated with the user profile; querying an information database based on the analysis of the user profile; selecting information based on the user profile to include in a message; and sending the message to a user for provision in an augmented reality display.
[0023 ] In another embodiment, a processor- implemented method for serving information to a mobile device is disclosed, comprising: receiving messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan; associating the user identification with a user profile in a database; updating the user profile with the received messages; analyzing the accumulated messages in the user profile; determining information to serve to the user based on the received message and the user profile; selecting the information to serve to the user from a database; incorporating the selected information into a reply message; and sending the reply message to the user's mobile device for provision in an augmented reality display.
[0024] In another embodiment, an information receiving processor- implemented method is disclosed, comprising: accumulating user activity interest information; accumulating user situational information; incorporating user activity interest information in an interest message; incorporating user situational information in a situational message; sending the interest message to a server; sending the situational message to the server; and receiving a reply based on the interest message, the situational message, and a user profile, wherein the reply is configured for provision in an augmented reality display.
BRIEF DESCRIPTION OF THE DRAWINGS
[0025] The accompanying appendices and/or drawings illustrate various non- limiting, example, inventive aspects in accordance with the present disclosure:
[0026] FIGURES la-b show combined logic and data flow block diagram illustrating a general overview of embodiments of the GCSI/CTIS;
[0027] FIGURE 2 shows a particular, exemplary embodiment of the GCSI/CTIS, wherein contextual information and advertising is served to the user related to a news article in the business section of a media publication;
[0028] FIGURE 3 shows user trajectories through a network of Ad provider zones;
[0029] FIGURE 4 shows an embodiment of the web interface for user registration;
[0030] FIGURES 5a-d show three types of 2D barcodes that may be employed within the GCSI/CTIS and logic flow for code enhancement in some embodiments of GCSI/CTIS operation; [0031 ] FIGURE 6 shows an illustration of one embodiment of the Scan Message data structure;
[0032 ] FIGURES 7a-b show an illustration of one embodiment of a user profile data structure and an implementation of a user profile user interface in one embodiment of GCSI/CTIS operation;
[0033 ] FIGURE 8 shows an illustration of one embodiment of the Information
Base (Ad) data structure;
[0034] FIGURE 9 shows a logic flow diagram of one embodiment of the user profile query heuristic;
[0035] FIGURE 10 shows an exemplary histogram of Ad provider zone breaches ;
[0036] FIGURES l la-d show some embodiments of systems for selecting non- triggered information to serve to users;
[0037] FIGURES 12a-b show examples of coupons provided by the GCSI/CTIS;
[0038] FIGURE 13 shows a combined logic and data flow block diagram for an embodiment of the GCSI/CTIS wherein contextual Ads are replaced by Ads based on ambient conditions;
[0039] FIGURE 14 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSI/CTIS in which allergy medication Ads are served in response to a high pollen count;
[0040] FIGURE 15 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSI CTIS in which sunscreen Ads are served in response to heat and high UV levels; [0041 ] FIGURE 16 shows a combined logic and data flow block diagram for an embodiment of the GCSl/CTIS wherein the selection of contextual Ads is influenced by ambient conditions;
[0042 ] FIGURE 17 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for a luxury convertible is served based on warm weather conditions, a scanned code, and the user profile;
[0043 ] FIGURE 18 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for Florida travel is served based on cold/rainy weather conditions, a scanned code, and the user profile;
[0044] FIGURE 19 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for an ice cream shop is served based on warm weather conditions, a scanned code, and the user profile;
[0045] FIGURE 20 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for ponchos and umbrellas is served based on rainy weather conditions, a scanned code, and the user profile;
[0046] FIGURE 21 shows a combined logic and data flow block diagram for an embodiment of the GCSl/CTIS wherein Ads are served to a User Agent device;
[0047] FIGURE 22 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSl/CTIS in which an Ad for a sports team's season tickets is served along with a pay-per-view event supplied directly to a user's cable box; [0048] FIGURE 23 shows a combined logic and data flow block diagram for a particular exemplary embodiment of the GCSI/CTIS in which an Ad for virus scan subscription software is served;
[0049] FIGURE 24 shows an implementation of a user interface manifesting
GCSI/CTIS functionality on a portable electronic device in one embodiment of GCSI/CTIS operation;
[0050] FIGURE 25 shows an implementation of a user interface manifesting
GCSI/CTIS functionality on digital paper in one embodiment of GCSI/CTIS operation;
[0051 ] FIGURE 26 shows an implementation of a user interface manifesting
GCSI/CTIS functionality on a digital billboard in one embodiment of GCSI/CTIS operation;
[0052 ] FIGURE 27 shows an implementation of a user interface manifesting
GCSI/CTIS functionality for serving a short messaging service text message prompt in one embodiment of GCSI/CTIS operation;
[0053 ] FIGURE 28 shows an implementation of a user interface manifesting
GCSI/CTIS functionality on a mobile phone in one embodiment of GCSI/CTIS operation;
[0054] FIGURE 29 shows an implementation of a user interface manifesting
GCSI/CTIS functionality on a portable communication device in one embodiment of GCSI/CTIS operation;
[0055] FIGURE 30 shows an implementation of logic flow for media acquisition in one embodiment of GCSI/CTIS operation;
[0056] FIGURE 31 shows an illustration of media sampling and full media acquisition in one embodiment of GCSI/CTIS operation; [0057] FIGURES 32a-b show an implementation of logic flow for code scan monetization in one embodiment of GCSI/CTIS operation;
[0058] FIGURES 33 a-e show aspects of implementations of JagTag encoding and codes in some embodiments of GCSI CTIS operation;
[0059] FIGURE 34 shows an implementation of an augmented reality user interface for providing requested content in one embodiment of GCSI/CTIS operation; and
[0060] FIGURE 35 shows a computer systemization of the GCSI/CTIS.
[0061 ] The leading number of each reference number within the drawings indicates the figure in which that reference number is introduced and/or detailed. As such, a detailed discussion of reference number 101 would be found and/or introduced in Figure 1. Reference number 201 is introduced in Figure 2, etc.
DETAILED DESCRIPTION
[0062 ] In one embodiment, the disclosed GCSI/CTIS employs two basic actors:
(i) a user (100a) capable of registering interest in an activity, transmitting and receiving data, and displaying information; and (ii) a server (101) capable of communicating with the user, storing/updating user profiles, and selecting information to serve to the user. In addition to the two basic actors, the GCSI/CTIS enables the creation of two types of transactional articles: i) Scan Messages (115) and ii) Reply Messages (145). The GCSI/CTIS provides context-specific Reply Messages in response to Scan Messages, which are prepared in response to the registration of activity interest by the user, in order to supply information and/or advertising to the user. The GCSI/CTIS generates Reply Messages by processing Scan Message content with user profile information, containing basic profiling data as well as a history of Scan Messages supplied by a given user. As such, Reply Messages are transactional articles that heighten a provider's opportunity to supply relevant and targeted information and/or advertising to the user that is both context and user specific. Without loss of generality, we will heretofore refer to the information and/or advertising content of Reply Messages as "Ads". The GCSI/CTIS may also elect to send context and user-specific Reply Messages based solely on the user profile, without the user having recently registered activity interest, if it is determined from the user's profile, particularly the history of Scan Messages, that a particular Ad is appropriate.
[0063 ] In one embodiment, users of the GCSI/CTIS scan codes to register interest and the GCSI/CTIS acts as a portal for consumers to access information supplemental to the context in which the codes are found. Users may scan codes found in media publications, on billboards or signs, on consumer products or packages, on websites or television screens, on movie screens, on clothing or accessories, on mobile device displays, and/or the like. In doing so, the users may identify themselves via an identification code specific to the mobile device and service account with which the scan is made. At the same time, the scanned code can be recorded, as well as the time of day and user location; such information may form the basis of consumer profiles that may be saved by the GCSI/CTIS. As these scans are indicative of interest in various subjects, goods, and/or services, they may serve as a basis for an individual customer tracking system. As such, advertisers can finely tune and efficiently tailor their efforts towards achieving maximum return on the advertising expenditure.
GCSI/CTIS BASIC OVERVIEW
[0064] FIGURE la shows a combined logic and data flow block diagram illustrating a general overview of the GCSI/CTIS in one embodiment. The GCSI/CTIS may be configured so that a user (100a) may scan a digital code (105) with a scanning device (100b), as for example by using a cell phone camera to scan and/or take a picture of a barcode, 2d code, matrix code, data matrix, QR code, JagTag, or other such symbology. An example of a mobile device and software capable of such code capture is the Nokia 6600 cellular telephone equipped with ConnexTo software. Alternatively, the GCSI/CTIS may be triggered by the user selecting an internet link (such as on an internet enabled mobile device), by making decisions within a virtual world (such as a massively multiplayer online game), and/or the like. In yet another implementation, the GCSI/CTIS may be triggered by the user providing a text input, such as an SMS text message, an e- mail message, and/or the like. In still another implementation, the GCSI/CTIS may be triggered by the user providing a voice or other audio input, a video input, keystroke inputs via a telephone keypad, and/or the like. For example, in one implementation, a user may record a particular sequence of spoken words and provide them to the GCSI/CTIS to trigger the provision of requested content. Without loss of generality, all such forms of interest-registering GCSI/CTIS triggering will be referred to as "code scanning". The time and location (as determined by GPS, GPRS, or other such geo- positioning technologies) of the mobile device are determined (110), and a Scan Message (115) is generated containing a user identification (ID), a hardware ID that identifies the type of mobile device being used, a geocode (location of the device), a timestamp, and the scanned code (see. Fig. 4 and discussion of Scan Message below). Additional user- input information may also be supplied at this point. The Scan Message is packaged and sent (120) to a server (101) that receives and recognizes it (125). The user's profile, specific to the supplied user ID, is updated with the new Scan Message (i.e., it is added as a transaction to their profile transaction history) and queried (130) for information to use in the preparation of a Reply Message (140) that is also based on the content of the current Scan Message. The server selects (135) the Ad content (see Fig. 7) of the Reply Message (145) from an Information Base and sends it to the user's mobile display device, which displays the pertinent content to the user (150).
[0065] In one implementation, the Scan Message and/or scanned code may be sent to the server (101) by a Multimedia Messaging Service (MMS) protocol. In other implementations, a wide variety of other communication protocols may be employed, including but not limited to: Short Messaging Service (SMS), instant messaging, web browser based messaging, email, Enhanced Messaging System (EMS), TCP/IP, WAP, and/or the like.
[0066] In an alternative implementation, content associated with a captured code or other user interest registration may be sent to a data repository other than a user's mobile device. For example, a user may scan a code corresponding to media content. Rather than triggering the GCSI CTIS to send the media content to the mobile device with which the code was scanned, the code scan may trigger the GCSI/CTIS to send the media content to a user's computer, an online data repository, and/or the like for storage and later retrieval by the user. For example, the GCSI/CTIS may discern a user identity from the Scan Message (1 15), query user access and/or authorization information, and use that access and/or authorization information to access an online data repository corresponding to the user to store requested media content thereon for later retrieval and/or use by the user.
[0067] In one implementation, the server (101) may be addressed by a short code, short numbers, Common Short Code (CSC), and/or the like for sending the Scan Message and/or scanned code. For example, a short code may appear alongside a code in a print publication, and a user may be informed that the scanned code should be sent to the indicated short code number in order to retrieve a Reply Message, advertisement, coupon, and/or the like. In other implementations, other addressing means may be employed, such as an ordinary telephone number, an email address, a universal resource locater (URL), and/or the like. In another implementation, the short code and/or other server address may be encoded within part of the code itself. When the user scans the code with his or her mobile device, the code may be partially decoded by the client device to extract the address and automatically send the rest of the code thereto.
[0068] Fig. lb shows an implementation of combined logic and data flow in another embodiment of GCSI/CTIS operation. A code (155) is scanned by a camera phone (156), and the resulting image content is converted to an MMS format to be sent via short code (157) hrough a gateway provider (158) to the GCSI/CTIS (159) server. At the server, the image information may be enhanced, manipulated, and/or otherwise processed (160) so as to aid in determining the appropriate content to serve in response. After enhancement, the image content is read (161) and the content and format for the appropriate response is determined (162) (see, e.g., Figs. 9-1 1). A response message is formed in MMS format (163) and is sent (164) back to a gateway provider (158) to be served to the user's camera phone (156).
[0069] In an alternative implementation, the scanned code may be directly decoded on the client mobile device instead of on the server. The decoded content may then be converted to MMS format and sent via short code to the server in order to retrieve the appropriate content associated with the code. That content may be returned from the server to the client mobile device by means of an MMS protocol as well.
[0070] For illustration, the GCSI/CTIS is shown in FIGURE 2 for a particular, exemplary embodiment: providing targeted and contextual information and advertising to the user related to a news article. Here, a user employs a cell phone to scan a code associated with an article in the Business section of a media publication (207), such as by using the phone's built in camera to photograph a 2D matrix code (e.g., QR code). The location of the scan (San Francisco, CA) is determined by the phone's built in GPS receiver (212), and this location is incorporated as a geocode, along with the user ID, the hardware ID of the particular type of device (e.g., cell phone) used, the time, and the code content, into a Scan Message. This is sent to a server via the cell phone's data connection (e.g., wireless internet systems such as IxEV-DO), and the server queries a database of user profiles based on the supplied user ID in order to update the appropriate user profile with the content of the current Scan Message and to determine what, if any, information in the user profile may be relevant to the preparation of the current Reply Message. Here, the server recognizes that the user is 55 years of age and has recently been scanning articles and/or ads related to investments and retirement planning (232). In one embodiment, the user can supply a list of interests to be considered in addition to those culled from their scan history. The server selects the appropriate Ad content to include in the Reply Message, comprised in this case of links to Finance headlines, quick links to saved stock quotes (237), and a contextual brokerage advertisement (238), including information on branch locations in San Francisco (212) near the user. This reply is sent by the server to the user's mobile device which displays the appropriate message content.
[0071 ] In one embodiment, the GCSI/CTIS can serve information to the user based on the collected knowledge of user space-time trajectories contained in the user profile, without the need for any initiating code scan. This embodiment is best illustrated by example, as drawn in FIGURE 3. Here, a user rides a bus from home (300) to work (310) on four of the last five days, and takes a different bus to his doctor's office (330) on the remaining day. The space-time trajectories for the four work trips (305) and the one doctor trip (325) are determined by codes that the user scans with his cell phone from a newspaper during the bus rides. In this example, the user is assumed to scan a code every ten minutes starting at 7:30 AM until the destination is reached, and the geographic location of each scan is indicated by the position of the timestamp along each trajectory. In one embodiment, tracking occurs without scanning, simply by having the device send geocodes and timestamps by itself. Along the way to his destinations, the user passes a number of Ad providers (marked with X's) with Ad content in the GCSI/CTIS Information Base, with dotted circles indicating the locus of points that are a distance of two miles from each provider. One Ad provider in particular (315), a gourmet coffee shop, is within two miles (320) of the user's space-time trajectory at 7:50 AM in four of the last five days. The user's profile also lists "coffee" as an interest, both based on user specifications during registration and on the user's advertisement and article scan record. Consequently, on the sixth day, the server supplies the user with an advertisement for the coffee shop (315) at 7:45 AM GCSI/CTIS DETAILED OVERVIEW
User and Ad provider participation
[0072 ] The GCSI/CTIS is enabled by the participation of Ad providers and users.
In one embodiment, Ad providers supply Ads for storage on the GCSI/CTIS server. In an alternative embodiment, the Ads are stored on third party servers that are referenced by the GCSI/CTIS server. The user experience may be enhanced by the incorporation of personal preferences and demographic information to optimize the targeting of Ad content. Consequently, one embodiment would incorporate a user registration procedure. Users may register for the GCSI/CTIS via the internet, telephone, postal mail, and/or the like. If a particular embodiment of the GCSI/CTIS requires client software for the user to install, this could be supplied upon successful user registration. FIGURE 4 shows an exemplary embodiment of a user registration interface 400, wherein a user can input Basic Info 405 (e.g., member ID, password, secret question/answer, e-mail address, etc.), Device Info 410 (e.g., mobile phone carrier, phone manufacturer & model, operating system, etc.), Demographics 415 (e.g., gender, year of birth, zip code, country of residence, household income, job title, industry, etc.), and Content Preferences 420 (e.g., interests, subscriptions, content delivery options, personal history options, cache options, geo-tracking options, ad delivery options, etc.) in a plurality of fields 425. In an alternative embodiment, a basic user identification packet (e.g., a "cookie") is sent with a user's first code scan, thus establishing a basic user profile that can be filled in with greater detail at a later time.
Code capture (105)
[0073 ] Scannable codes within the GCSI/CTIS may be found in a variety of locations, including but not limited to newspaper and magazine articles, signs and billboards, flyers, store locations and kiosks, consumer products, packages, clothing, stickers, websites, software displays, television broadcasts, virtual worlds, and/or the like. The nature of the code and associated method with which the code can be scanned will depend to some extent on where the code is found, but among the possible types of codes are standard barcodes (e.g., UPC, EAN, Code 128, etc.), 2D matrix codes (e.g., QR code, Semacode, Data Glyphs, mCodes, etc.), user-input codes (e.g., text messages), RFID tags, pure images (e.g., an image of a sign to be analyzed by optical character recognition), website links, software inputs (such as, but not limited to, voice inputs and/or other audio and/or video inputs), and/or the like. These codes may be located on any medium (e.g., on newspapers, magazines, books, video content, computer screens, embedded in objects (e.g., RFID tags on clothes, etc.), and/or the like). One embodiment employs 2D matrix codes, examples of which are provided in FIGURE 5a, due to their large data capacity, ease of scanning, and resilience to damage or error. These examples include QR codes 500, Mcodes 505, Semacodes 510, and/or the like. Fig. 5a also displays a fourth matrix code called a JagTag 515. The JagTag includes an aesthetically pleasing appearance and provides functionality that is more robust than other matrix codes. Further aspects of JagTag encoding are described in detail below.
[0074] In scanning a code, the code image may not always be recorded faithfully and/or in an ideal and/or suitable condition for decoding and/or matching to associated content. Consequently, the GCSI7CTIS may be configured to enhance and/or otherwise process a code image in order to better recognize the code. Figs. 5b-c show implementations of logic flow for processing and/or managing non-ideal code scans in embodiments of GCSI7CTIS operation. In Fig. 5b, a scanned code is received at the GCSI/CTIS server (513) and a first attempt is made to decode a received code scan (515). In one implementation, a received code scan may take the form of a bitmap image and/or a compressed bitmap image. If the decoding is successful (520), then the code is matched to associated content (525) that is ultimately destined to be served to a user. Otherwise, a determination is made as to whether enhancement should be applied to the scanned code (530). If not, then an error message and/or suggestions on how to improve the quality of the scanned code may be returned to the user (535). The GCSI/CTIS may decide not to apply enhancement, for example, if enhancement has already been applied unsuccessfully to the same image before or if the quality of the image is so poor as to be clearly beyond improvement. If enhancement is to be applied, then the GCSI/CTIS determines the appropriate enhancement type (540) based, for example, on the quality and character of the scanned code image and subsequently applies the enhancement (545), after which a new attempt is made to decode the scanned code.
[0075] In some implementations, multiple enhancement processes may be applied against a scanned code and the results compared in order to determine the encoded content. Prior to enhancement, the image may be downsized if necessary for speed of processing in applying multiple enhancement against the image. Image quality may also be increased if necessary in order to more successfully apply enhancements. For code images having extraneous information and/or noise, an enhancement process may be applied to remove all extraneous information, despeckle, and/or the like. For code images having shades of gray and/or shadows obscuring the encoded content, an enhancement process may be applied to manipulate the contrast and/or brightness of the image in order to create a pure black and white image for cleaner decoding. For code images that are tilted and/or not taken flat in a plane, an enhancement process may be applied to tilt the plane of the code to create a flat plane to aid in successful decoding. For code images that are rotated or skewed, an enhancement process may be applied to de-rotate, deskew, and/or otherwise recreate proper rectangular pixel groupings that can be decoded. For code images that are taken out of focus, an enhancement process may be applied to sharpen the image into recognizable pixel groupings. Additionally, the GCSI/CTIS may apply edge recognition processes to the code image to create a set of potential code images that can be processed and compared to records in a code database.
[0076] In some cases in which full decoding of a scanned code image is impossible, a partial decoding may be accomplished and serving of content achieved on that basis. A partial decoding may, for example, result in a probabilistic code match without ever successfully decoding the complete code. Fig. 5c shows an implementation of logic flow for partial decoding in one embodiment of GCSI/CTIS operation. A scanned code image is received (548), partially decoded (550), and the partially decoded content used to query a code database to find matching codes (555). A determination is made if any matches exist (560) and, if not, then the GCSI/CTIS may return an error message to the user and/or make suggestions about how to improve the image of the scanned code (565). If a match is found, however, then a determination is made as to whether there are multiple matches (570). If so, then the GCSI/CTIS may consider ancillary factors (575) in attempting to isolate a single code as the most likely match to the received code. Such ancillary factors may include, but are not limited to: the incoming phone number, the carrier, the time of day, current code traffic, the source of the code, the context of the code, the user ID, the hardware ID, the user behavioral history, the user location, and/or the like. In considering ancillary factors, the GCSI/CTIS is thus capable of predicting the true code based on knowledge of the user scanning the code, the context of the code, ambient factors, and/or the like. Once a unique code has been identified, this is designated as the matching code (580) and the GCSI/CTIS proceeds with determining the appropriate associated content to serve to the user.
[0077] Fig. 5d shows an implementation of logic flow for customized repair and/or decoding of obscure or ambiguous scanned codes. An ambiguous code may be received at a GCSI/CTIS system at 581, such as may be sent via a communications network from a user's mobile scanning device. In one implementation, a scanned code may be qualified as an ambiguous code if an attempt to decode the code does not yield a single result. In one implementation, the system may also receive code scanning conditions 582 describing any of a variety of circumstances of the code scan which may affect the quality and/or fidelity of the scanned code. For example, some relevant circumstances may include the time of day, light levels, use of flash, mobile scanning device type and/or characteristics, code size, contrast, brightness, sharpness, skew, rotation, and/or the like. The ambiguous code and scan conditions may then be passed to a repair queue 583, whereby the system may analyze the ambiguous code and attempt to discern the correct decoded content. A plurality of possible matching codes are determined at 584, and a code database is queried at 585 to extract code presentation conditions corresponding to each of the plurality of matching codes. Code presentation conditions may describe how and where the code was displayed and may comprise a wide variety of factors, such as but not limited to medium (e.g., newspaper, glossy paper, product packaging, television display, website, billboard, and/or the like), likely obscuring factors (e.g., glass covering, tears, distance, and/or the like), and/or the like. The GCSI/CTIS system may then generate a code repair database query based on the presentation conditions and/or scan conditions 586 and query the repair database to extract repair schemes corresponding to the particular presentation and/or scan conditions. For example, a particular code repair scheme may be tailored for and/or correspond to codes displayed on billboards that are scanned after dark by Nokia mobile phones. Extracted repair schemes corresponding to each of the possible matching codes are applied to the ambiguous code at 588, and a determination is made at 589 as to whether any one of the possible matches is now more likely to be correct than the others. This determination may be made, for example, by measuring the fidelity of codes with various repair schemes applied and selecting as the correct code that which has the highest resulting fidelity. If no remaining ambiguity exists as to the correct code, then the favored code is registered with the GCSI/CTIS system at 592. Otherwise, the GCSI/CTIS may generate a custom recommendation message 590 and send the message to a user and/or a user's mobile device 591. The custom message may, for example, provide tailored recommendations on how the user may improve the fidelity of the code scan based on the possible matching codes and the associated presentation conditions and/or scan conditions. Tailored recommendations, as well as the repair schemes themselves, may be adjusted based on feedback received from users about which codes they were actually trying to scan. In one implementation, the GCSI/CTIS may provide a query message to a user presenting a summary of content associated with alternative matching codes in order to determine which content the user was actually trying to access. It should be noted that code analysis and/or repair may be undertaken on an code image level, alphanumeric string level, binary string level, and/or the like basis. Combinations of such bases may also be undertaken, such as by first analyzing the ambiguous code in its alphanumeric string form and then, if ambiguity remains, analyzing the code in its binary form. Further discussion on such an analysis is provided below.
[0078] In an illustrative example of partial decoding, a given matrix code may encode the string ABC 123. In multiple processes, it may be determined that the code contains A 1_3 (where the blanks represent unknown values), CI , and AB .
Through these multiple processes, the GCSI/CTIS system now knows that the code contains ABC 1 3 and may check this against codes in a code database to determine how many matches exist. If it finds two matching codes (e.g., ABC123 and ABC143), it may consider ancillary factors, including code presentation and/or code scan conditions, user profile information, and/or the like. For example, ABC 123 may correspond to an advertisement for a new action movie while ABC 143 corresponds to a coupon for women's cosmetics. If the user supplying the code is determined, based on a supplied user ID, to be a man with a history of scanning movie-related codes, then the GCSI/CTIS system may infer that ABC 123 is the matching code and serve the corresponding content. In one implementation, the GCSI/CTIS server may further supply a confirmation request for partially matched codes, requesting the user to affirm or deny that the supplied content is, in fact, the content that he or she was seeking.
[0079] In one implementation, analysis of ambiguous codes may comprise a two- stage process. In a first stage, an encoded string comprising a number of alphanumeric characters, one or more of which may be unclear, may be compared to a database of alphanumeric strings to determine which, if any, match. In one implementation, a Levenshtein distance metric may be employed to determine the similarity of an input string to strings existing in the database. In one implementation, the input string may only be compared against "live" strings in the database (i.e., strings that are currently engaged in active use and/or tied to actual content). If ambiguity remains about which code has been scanned after this character-based analysis, a GCSI CTIS system may apply a second stage of analysis, whereby the input alphanumeric string is converted into a corresponding binary bitset array (see, e.g., Fig. 33a-b and associated discussion below) and a comparison is performed between binary values of the input string and the strings stored in the code database. The most significant bits come first in the bitset array while the least significant bits come last, so priority weighting may be applied against potential value matches based on which bits match between the input and stored strings.
Scan Message data structure (115) [0080] The Scan Message generated by the GCSI/CTIS is, itself, a novel data structure. In one embodiment that is illustrated in FIGURE 6, it contains an identification field (605) comprising a unique user ID (605 a) and a hardware ID (605b), both automatically supplied by the device used to scan and transmit the scanned code; a coordinate field (610) comprising the location geocode (610a) (e.g., GPS coordinate, latitude and longitude, city and state, etc.) and timestamp (610b) of the scan; and a code field (615) supplying the specific content of the scanned code, which may include a subject code (615a) for the code context, a source code (615b) indicating where the code was located, and a content code (615c) indicating the specific information, if any, to be supplied in response to a scan of that code.
[0081 ] In one embodiment, the XML for the Scan Message takes the following form:
<Scan_Message>
<ID>
<User ID> 012345 </User ID>
<Hardware ID> Nokia 660 </Hardware ID>
</ID>
<Coordinates>
<Geocode> GPS 40 46.516 -73 57.98 </Geocode>
<Timestamp> 08/21/2006 13 :45:28 </Timestamp>
</Coordinates>
<Code>
<Subject> entertainment; movies; comedy </Subject>
<Source> New York Times </Source>
<Content> Showtimes for latest popular comedy movie
</Content>
</Code>
</Scan_Message>
Data Transmission (120. 125. 145. 150) [0082 ] In one embodiment, sending and receiving the Scan Message and Reply
Message will employ standard data transmission techniques to ensure successful transmission and to preserve data integrity (e.g., TCP/IP, lxEV-DO, etc.). This is relevant for the Scan Message, which will contain the coded information scanned by the user. Such techniques may include but are not limited to the use of standard transmission protocols, "handshaking", data compression, data encryption, and error correction.
User profile structure (130)
[0083 ] The content of the user profile generated by the GCSI/CTIS is itself a novel data structure. In one embodiment illustrated in FIGURE 7a, the profile (700), which is uniquely specified by the user ID, will contain a category of quasi-static user information (705) that is generally fixed over time and one of dynamic user information (730) that is updated with each successive Scan Message that the user submits. The quasi-static info (the "quasi" qualifier indicates that this information may be updated, for example if a user changes their mobile device, however it does not change with each successive code scan) may include a hardware ID (710); "census" info (715) such as name, address, phone number, e-mail address, age, sex, race, marital status, number and age of children, job title, annual income, etc.; subjects of interest specified by the user (720); and information regarding allowed methods to contact the user as well as user defined privacy and/or information sharing settings (725). In one embodiment, this information could be supplied by the user when registering for the GCSI/CTIS service as, for example, on a website. The dynamic info in the profile may include a scan record (735), comprising the time (740), location (745), and scan code (750) (including subject (750a), source (750b) and content (750c)); and statistics related to the scan history (755). Such statistics may include but are not limited to the most popular scan subjects, most popular scan sources, user space-time trajectories, etc. In one embodiment, the profile contains a series of identifying codes distilled from the profile content (e.g., demographic category code based on census info, subject codes, source codes, etc.) that can be compared with similar codes in the Scan Message to determine the appropriate Ad content to include in the Reply Message. In an alternative embodiment, the profile contains identifying keywords or "tags" based on the profile content that can be compared with similar tags in the Scan Message to determine the appropriate content to include in the Reply Message. In both cases, the identifying labels for the user profiles may be input by GCSI/CTIS administrators or automatically generated by an appropriate computer algorithm such as stripping header labels from ad descriptions (e.g., for example, stripping the header tags from an HTML ad).
[0084] In one embodiment, the XML for the User Profile may take the following form:
<User>
<Quasi-static info>
<User_ID>123-45-6789</User_ID>
<Hardware ID> Nokia 660 </Hardware ID>
<Census info> John Smith; 123 Maple Dr., Smalltown,
CA 92676; (123)456-7890;
jsmith@email.com; 55 years; male; white; married; 2 children;
etc.
</Census info>
<Interests> camping; fishing; classic cars; movies; etc.
</Interests>
<Contact restrictions> Weekdays 8 AM - 7 PM only
</Contact restrictions>
</Quasi-static info>
<Dynamic info>
<Scan record>
<Scan_#l>
<Time> 08/21/2006 13:45:28 </Time>
<Geocode> GPS 40 46.516 -73 57.98
</Geocode> <Code>
<Subject> entertainment; movies; comedy
</Subject>
<Source> New York Times </Source>
<Content> Showtimes for latest popular
comedy movie
</Content>
</Code>
</Scan_#l>
<Scan_#2>
etc...
</Scan_#2>
etc...
</Scan record>
<Scan statistics>
<Popular subjects> entertainment; cars; travel; etc.
</Popular subjects>
<Popular sources> New York Times; Car and
Driver; CNN.com; etc.
<Popular sources>
<Trajectories> Data files listing time and geocode
coordinates, computed average trajectories, likely
locatons, etc.
</Trajectories>
etc...
</Scan statistics>
</Dynamic info>
<Code>
<Subject> entertainment; movies; comedy </Subject>
<Source> New York Times </Source>
<Content> Showtimes for latest popular comedy movie
</Content>
</Code>
</User>
[0085] In one embodiment, data accumulated in a plurality of user profiles may be analyzed to extract information about codes that are scanned. For example, the frequency with which a particular code is scanned may be extracted from user profiles and parsed by geographic, temporal, and/or demographic criteria to yield code profiling information. This information may be stored in a code and/or Ad profile. In an alternative embodiment, the code/Ad profile may be constructed and/or updated by the GCSI/CTIS immediately upon the receipt of a Scan Message rather than being extracted from user profiles.
[0086] Fig. 7b shows an implementation of a user profile user interface in one embodiment of GCSI/CTIS operation. The profile page 760 may include a display of basic user information 763 and/or a user picture 766, and may provide a wide variety of other user information, including demographic information, interests, media libraries, friend lists, code scanning activities, and/or the like. The displayed implementation, further includes a plurality of tabs 769 allowing the user to view profile information, edit his or her profile, view photos, groups to which the user may belong, and/or edit settings, including sharing and/or privacy settings 772. Privacy settings may, for example, control access of other individuals to a user's personal information, code scanning activity, and/or the like. In some implementations, certain information about a user, in particular regarding codes that a user has scanned and/or the content associated with those scans, may be shared with other users. For example, a user may be able to inquire, via a GCSI/CTIS affiliated system, as to what codes have been recently scanned by other users that are within a particular geographic radius of the user. In another example, a user scanning a code to receive a song may also be provided with information about the code scanning activities of other users whose codes also corresponded to songs.
[0087] In one implementation, a user may be allowed to restrict which information of theirs is sent to other users and/or to restrict which information of other users is sent to them. For example, a user may have a "friends" list that has a different level of access than the general public. [0088] In one implementation, a user may have a personal code that is associated with the user and/or a user profile. In one implementation, other users can scan the personal code to automatically join the first user's friend list. In another implementation, a personal code my comprise a short-link to the user's profile 760, and/or to other profile pages or webpages associated with the user, such as a Facebook page, Myspace page, and/or the like. In one implementation, the user can set a forwarding instruction on his or her GCSI/CTIS page to forward inquiries corresponding to scans of the user's personal code to another page. In another implementation, the user may provide the personal code on other pages as a link back to the user's GCSI/CTIS profile page.
[0089] In one implementation, a user may be provided recommendations in response to a code scan. For example, the user may scan a code corresponding to a particular song by a particular musical artist. The user may then be provided a listing of other songs, artists, and/or the like having codes recently scanned by the members of the user's friends list and/or that may be further related to the song and/or artist whose code the user scanned.
[0090] In one implementation, a user's code scans may be integrated with an instant messaging, blogging, micro-blogging, and/or the like service, whereby the user's code scans are automatically rendered as descriptive summaries and displayed to other users, such as on a webpage, via SMS text messages, emails, and/or the like. For example, each code scan may have a pre-set text description associated therewith that, upon scanning of the code, is displayed on a user's Twitter.com page. In one implementation, a user may receive an incentive payment for particular types of content that are provided to the user's friends, associates, blog subscribers, and/or the like as a result of the user's code scans. For example, a reward may be provided to the user every time the user scans a code corresponding to a particular brand of products and a message associated with those products is supplied to subscribers to the user's profile and/or blog. A further reward may be provided to the user if it can be determined that one of the user's associates made a purchase based on the provided message.
[0091 ] The privacy settings in the displayed implementation include permissions for displaying "twitters", songs, videos, and purchases 775 associated with the user's code scans to various security levels for other people 778, including the general public, private/friends, and "snaps" (i.e., those who may have scanned a user's personal code and/or a code corresponding to the user's profile). Selection of a particular privacy setting may generate a sharing rule that is stored in association with the user and consulted each time a user scans a code corresponding to one of the categories shown at 775 to determine whether or not code-associated information should be provided and/or sent to any of the categories of people shown at 778.
[0092 ] The profile page 760 further includes a field 779 wherein a user may specify the location of a data storage facility to which some or all media and/or other content that the user acquires via code scans are to be sent and/or stored. For example, the user may specify an online storage facility (e.g., Apple's iDisk service) in which the user's code scan-acquired content is to be stored.
[0093 ] The profile page 760 further includes interface components configured to generate a personal code, in this case a JagTag 780. Selection of the button at 780 causes the GCSI/CTIS system to associate a code with the user and/or the user's profile and generate a corresponding code, which is displayed for the user. The user may then elect to save an image of the code to his or her computer desktop, send the code in an email, send the code in an MMS message, and/or the like via the interface elements at 781.
Information Base (135) [0094] The Information Base contains the content that may be included in the
Reply Message sent to the user and may be stored on the GCSI/CTIS central server or on third party servers accessed by the GCSI/CTIS. In one embodiment, each Ad is associated with searchable labels. The Ad content together with its labels, collectively referred to here as an Ad, forms a novel data structure. In one embodiment illustrated in FIGURE 8, the Ad (800) is comprised of the specific ad content (805) (e.g., text, images, video, etc.) and a set of identifiers (810) including subject tags (815), information characterizing the temporal character of the Ad based on which the Ad may be triggered (820) (e.g., 6 to 10 AM for a breakfast Ad), information characterizing the geographic specificity of the Ad based on which the Ad may be triggered (825), demographic specificity of the Ad (830) (e.g., an Ad for family vacations), and the hardware requirements of the Ad (835) (e.g., hardware IDs of devices capable of displaying the content of a particular Ad). In one embodiment, the Ad would also contain information identifying the source in which the Ad code is to appear. In another embodiment, the Ad would also contain code/Ad profile data, describing the history and/or statistics of scans related to the Ad.
[0095] In one embodiment, the XML for an Ad may look like:
<Ad>
<Ad_ID>123</Ad_ID>
<Ad content>
textual movie showtime listings ( or images, audio,
video, URLs, etc.)
</Ad content>
<Identifiers>
<Subject> entertainment; movies; comedy </Subject>
<Temporal> 08/21/2006; 12:00:00 to 14:00:00 </Temporal>
<Geographic> Smalltown, CA 92676 </Geographic>
<Demographic> 17 years and older </Demographic> <Hardware> any (text only) </Hardware>
</Identifiers>
</Ad>
User profile query (130)
[0096] The GCSI/CTIS queries the user profile to determine which Ads to include from the Information Base in the Reply Message in order to tailor those Ads to the user's profile characteristics, interests, and trajectories. In one embodiment, a scanned code will yield two components in the Reply Message content: i) static content that is the same for every user who scans the code, and ii) dynamic content that depends on the context of the user and the user profile. The static content (i) is determined from the scan code, while the dynamic content (ii) is determined by a combination of the scan code and the user profile, requiring a dynamic content generation heuristic to combine their respective influences. While a variety of such heuristic are possible and contemplated as being within the scope of this disclosure, and the specific heuristic employed in a given realization will likely depend on the precise application and intention, we discuss one embodiment of this heuristic here for illustrative purposes with reference to FIGURE 9. In one embodiment, the scan code and user profile is labeled with keywords or "tags" that identify the subject content of each. In an alternative embodiment, the scan code, user profile, and Ads are labeled with identifying codes. In either case, the heuristic exhibited in FIGURE 9 first filters all Ads in the Information Base by the subject code or tag of the scanned code (900). The Ads from 900 are filtered by the hardware ID (905) to ensure that the Ad content can be successfully acquired and displayed by the user. The Ads from 905 are filtered into separate categories by scan location (910al), user address (910a2), user specified subject interests (91 Obi), user scan subject history (910b2), scan time (910c), or user demographic category (910d). Ads in each of these filtered categories are compared to determine which occur most commonly across 910a, b, c, & d (915). The server determines if 915 has yielded a single Ad (920), and if so, it incorporates the Ad's content into the Reply Message (930). Otherwise, it chooses one Ad at random from the remaining Ads (925) for incorporation. It must be emphasized again that this is but a single, specific embodiment of the user profile query heuristic intended for illustrative purposes. The heuristic is highly flexible and can be finely tuned for the specific application at hand. Some other possible methods may include alternative ordering of filters, addition or removal of filters, weighted filtering, complex conditional trees, and/or the like.
[0097] As an exemplary implementation of this embodiment of the Ad filtering heuristic, we consider the situation discussed above with reference to Fig. 2. Here, the user scans a code from an article on finance and investment in the business section of a media publication. Keywords associated with this code may include Business, Finance, Investment, etc. Consequently, only those Ads possessing these identifying keywords are passed at 800. In an alternative embodiment, the keywords may be ranked in order or relevance and the Ads filtered accordingly. The Ads from 900 are filtered by Hardware ID; we presently assume that the user's mobile device is equipped with advanced capabilities (text, image, audio, video, internet, etc.), so that all Ads are passed at 905. In an alternative embodiment, the Ad filter may preferentially choose those Ads that take fullest advantage of the user device's display capabilities. Of the remaining Ads, there is one for a brokerage firm that is tagged with a location code corresponding to the user's address (San Francisco, CA), the user's specified subject interests (investing, retirement), and a portion of the user's demographic profile (age 55 or older). The three tag matches (location, subject, and demographic) distinguish this Ad from the others in the Information Base, which, in this example, all have two or fewer tag matches; so this unique Ad, a brokerage firm located in San Francisco, CA with retirement services, is chosen to be served to the user's mobile device.
[0098] In one embodiment, the user may respond to the Reply Message with a relevance rating. This rating may then be stored in the user profile and/or employed to refine the criteria for tailoring future Reply Messages to that user.
[0099] In one embodiment, the Ads would not be filtered by hardware ID at 905.
Rather, when a final Ad has been selected for inclusion in the Reply Message following filtration under the other relevant criteria, the server will determine whether that Ad is properly formatted for the device specified by the hardware ID. If so, then the Ad will be included in the Reply Message as is. Otherwise, it will be converted into the required format appropriate to the user's mobile device. For example, if the selected Ad contains color images but the server determines that the user's hardware device is an early model BlackBerry that only accommodates monochromatic text, the server will implement a peripheral application to strip the text content from the Ad and incorporate only that in the Reply Message.
Non-triggered Ad serving
[00100] Though Ads served by the GCSI/CTIS are determined by codes scanned at some time in the past, it is possible for the GCSI/CTIS to serve Ads without any immediately contiguous, causal code scan. A general illustration of this capability was given above in Fig. 3, where each Ad provider has specific geographic locations of operation. These are assumed to be stores/restaurants for the present purposes of illustration in this disclosure, but they may have different character for different embodiments and applications, including but not limited to kiosks, signs and billboards, offices, hospitals, real estate, shelters, emergency service providers, traffic monitors, individuals, websites, virtual world locations, and/or the like. A chosen distance surrounding each Ad provider location defines a "provider zone", where the metric by which "distance" is gauged may be generalized in the case of cyberspace/virtual world locations. A provider zone breach occurs when a user scans a code within a provider zone. This may be regardless of the content of the scanned code, for in this example the goal is to record the user's space-time position. In an alternative embodiment, a provider zone breach can be registered even if a user does not scan a code within the provider zone, if the GCSI/CTIS can infer a breach from two or more code scans outside the provider zone through interpolation. When such a provider zone breach occurs, a special note may be incorporated into the user profile, such as in the Scan statistics module (755), indicating the time and the particular Ad provider.
[00101 ] In an alternative implementation, the GCSI CTIS may be configured to automatically query a user position without scanned codes. For example, a user's mobile device may be configured to periodically register it's GPS location with the GCSI/CTIS system. In another implementation, the GCSI/CTIS may be able to continuously monitor the position of a client mobile device based on the cell site or tower to which the device is communicatively coupled. Cell site based user location may also be registered when a user scans a code.
[00102 ] From an accumulated record of these breaches, data of the form of FIGURE 10 can be determined. FIGURE 10 shows a histogram (1000) of provider zone breaches in 20 minute intervals for a particular user over a chosen time scale, which we will take to be two months in this example. In one embodiment, such histograms will correspond to breaches of specific Ad provider locations; while in an alternative embodiment, they will correspond to breaches of any of a plurality of locations corresponding to a specific Ad provider; while in still another embodiment, they will correspond to breaches of different locations of related but different Ad providers, chosen to target a specific collective user demographic. In this exemplary histogram, the significant provider zone breaches (those exceeding the threshold) are clustered around two times: one approximately centered at 9 AM (1005), and the other at 6 PM (1010). This may represent, for example, a user scanning codes as he passes the same Ad provider location while riding a bus to and from work. In one embodiment, a threshold breach level (1015), indicated in Fig. 10 by a horizontal dotted line, is specified such that all breaches below this threshold number are ignored. This threshold level should be specified with respect to the time scale of the histogram; in the present example, the threshold is 3 breaches per two month period. The average peak times (1020, 1025) of the breach clusters that exceed this threshold are computed (marked by X's in Fig. 9), and a time is chosen prior to those averages (1030, 1035) to serve an appropriate Ad to the user. In one embodiment, provider zone breaches could be sorted by scan subject, so that a histogram of the form of Fig. 10 could be constructed for a specific category of scans in order to further tailor the supplied Ad content.
[00103 ] In another embodiment, the system may be generalized to analyze trajectories in "cyberspace-time". In this embodiment, a record of trajectories is kept of the user's activity on the world wide web as browsed, for example, on the user's internet enabled mobile device. A generalized concept of "distance" may be incorporated, for example reflecting an average number of links needed to get from one website to another. Provider locations become websites in this embodiment, and a zone breach may be registered when the user is a specified number of links away from the provider's website. Then, just as before, the GCSI/CTIS can anticipate user cyberspace-time trajectories and supply Ads, coupons, pop-ups, etc. related to websites that the user is approaching. For example, the GCSI/CTIS may track that a user visits web site A at 9:00 AM and web site B at 9:20 AM every day. The GCSI/CTIS may then provide ads to website A at 8:50 AM and to website B at 9: 10 that are targeted to that user. In an alternative embodiment, the GCSI/CTIS may provide this targeting information to existing ad serving systems, which in turn may use the targeting information for timely placement of ads. The aggregation of such targeting information, in particular, may be useful to advertisers and website owners. For example, reports may be run on user profiles sorted by location (e.g., web sites) and time of visit. This information may be supplied, along with user profile IDs, which may then be used by the advertising servers and/or websites to pre-cache ads that are relevant to the users' interest just prior to their anticipated visits to the website. As such, the GCSI/CTIS works in conjunction with certain websites to supply user-specific Ads on those sites. As a result, the content of the user profile within the GCSI CTIS may be used to select Ads that the user browses using their mobile device. In an alternative embodiment, web-based Ads may be specific to the trajectories of users in geographic space-time, since that information is included in the user profile. For example, if a user is known to be passing by a coffee shop at a specific location and time every day (e.g., a coffee shop on 123 Main Street, NY, NY at 9:00 AM), and is also know to visit a specific website at that time (e.g., at 9:00 AM the user visits website C reading the daily news on their walk to work), then the system may provide the user with Ads directly to their PDA or embedded in website C (because it was pre-loaded as already discussed) for the coffee shop. As such, the GCSI/CTIS provides a mechanism to provide geographically relevant ads to traditional websites. In yet another embodiment, the total content of the websites browsed by a user on their mobile device may be modified by the content of the user profile within the GCSI CTIS. For example, a news website may select articles for a user that are specific to the user profile, including their interests, demographics, current time and location, etc. [00104] In another embodiment, the GCSI/CTIS may analyze the user trajectories in "virtual worlds" or "synthetic realities" and serve ads accordingly. An example of a virtual world is a massively multiplayer online game, such as The Sims Online, EverQuest, World of Warcraft, Second Life, and/or the like. In such a virtual environment, a code scan may be comprised of a particular user action or decision such as initiating or completing a game mission, clicking on an icon, saving a game, etc. In such virtual worlds, geographies and virtual locations may be used in employing trajectories. The history of user activity within the virtual world may then be incorporated into the user profile and used by the GCSI/CTIS to serve ads within the context of the virtual world or elsewhere. For example, in games like Second Life, virtual televisions, billboards, etc. may be used as advertising delivery mechanisms.
[00105] Selecting the proper Ad to serve to the user in the non-triggered Ad serving embodiment of the GCSLCTIS may be accomplished using a variety of heuristics that are best tailored to suit the specific use or application. Nevertheless, we present an example of a specific embodiment in FIGURE 1 1a for illustrative purposes. In this embodiment, a weighting system may be employed to select among the Ads of a specific Ad provider once it is established that an Ad from this provider is to be served to the user based on the analysis of Fig. 10. This weighting system begins by assigning a score of 1 (1100) to all Ads in the Information Base corresponding to the provider. This score is multiplied by a subject coefficient (1 105) for every match between the Ad subject and the user specified subject interest or scan subject history. That coefficient is 2 in the present example, so N matches would yield a weighting factor of 2N. The Ad score may also be multiplied by a time coefficient (1 110) if the serving time (1030 or 1035) falls within a time range specified for a particular Ad. In the present example, the time coefficient is 4, expressing the greater importance of this factor compared to a single subject match. Finally, the Ad score may be multiplied by a demographic coefficient (11 15) for every match between the Ad demographic category and that of the user. That coefficient is 1.5 in the present example, reflecting the diminished importance of this factor compared to the time and subject considerations. M demographic category matches will yield a weighting factor of 1.5M. Once all of the Ad provider's Ads are scored in this fashion, those Ads with the highest scores for that provider may be selected over the rest (1120). Similarly, the highest scoring Ads from other providers are selected and the highest scoring Ads over all providers can be selected to serve for a particular time interval (1125). Finally, the proper time to serve the Ad (e.g., 30 minutes prior to the expected average provider zone breach time) is established (1130) and, if there is no further ambiguity (1 135), the proper Ad is served at that time (1145). Any residual ambiguity may be resolved by selecting randomly from the remaining Ads.
[00106] As a specific example of how this might work, we assume that the histogram (1000) of Fig. 10 represents provider zone breaches for a fast-food restaurant that a user passes on his way to and from work. An Ad in the restaurant's base of provided Ads matches the user's stated interest in gourmet coffee, and this Ad is further labeled by a time identifier indicating that it is best served between 8 AM and 10 AM. Consequently, at 30 minutes before the user's average breach time of the provider's zone, the server supplies the Ad to the user's mobile device, touting this restaurant's new line of gourmet coffee drinks. Alternatively, the user's profile may specify that he is married with two children. This matches the demographic category of an Ad in the provider's base which is also labeled by a time identifier indicating that it is best served between 5 PM and 8 PM. As a result, 30 minutes before the user breaches the provider's zone on his way home from work, the server supplies the Ad to the user's mobile device, touting their family-pack of hamburgers. [00107] In an alternative embodiment, the GCSI/CTIS may be configured to receive and implement marketer rules for serving Ads. Fig. l ib shows a schematic illustration of data structures related to establishment of a marketer rule for Ad serving in one embodiment of GCSI/CTIS operation. A user profile data sets (1 147) may include a variety of data fields related to user activities, interests, characteristics, and/or the like, such as but not limited to: geographic visits (1 149), as may be recorded by code scans; time (1151) associated with code scans; interest contacts (1153), such as may be reflect the user's interests and may be based on the context and/or associated content of scanned codes; gender, age, demographic, and/or other personal information (1 155); and/or the like. Server data pulls (1 157) may reference one or more data feeds to which the GCSI/CTIS server has access in order to draw information that may be pertinent to marketer rules and/or Ad serving procedures. A wide variety of different types of feeds may be accessible, including but not limited to: global newsfeeds (1 159), such as associated press wire services, weather information, sports scores, political and social events, financial market data, and/or the like; category sector feeds (1 161), such as more specific and/or special interest news feeds; marketer specified feeds (1163); and/or the like. A marketer rule (1165) may be established by selecting one or more fields (1 167) from the user profile data sets (1 147) and/or the server data pulls (1157) and supplying associated parameters (1165) and/or parameter values associated with those fields. In the illustrated implementation, the rule associates a Petroleum Gazette field (1 169) with a parameter specifying more than three oil articles read per day (1 175). In addition, the rule associates a gas station visitation field (1 171) with a parameter specifying more than three visits per week (1177). If both of these conditions are deemed true for a given GCSI/CTIS user, then the GCSI/CTIS may serve one or more Ads selected for and/or associated with the marketer rule. A price-per-impression (1 179) may be charged for each time that the Ad is served to a user under the circumstances specified by the rule. In one implementation, a marketer may propose a price-per-impression when he or she creates the rule, which is then submitted to the GCSI/CTIS and/or a GCSI/CTIS administrator for approval. In another implementation, the GCSI/CTIS may automatically generate a price-per-impression based on the rule and/or the marketer. For example, a fixed charge may be applied for each additional field and associated parameter added to the rule, as this refines the specificity with which the associated Ads will be served and increases the likelihood of transactional consummation. Once a rule is complete, it may be entered for storage and subsequent use in a marketer rules database (1181). It should be understood that the functionality described for this embodiment of the GCSI/CTIS may be integrated or employed within any of the other GCSI/CTIS embodiments described herein.
[00108] In one embodiment, the XML for the above marketer rule may take a form similar to the following:
<Rule>
<Rule_ID> 123 </Rule_ID>
<Rule_name> Oil Rule </Rule_name>
<Rule_owner> Ads R Us </Rule_owner>
<Conditionl>
<Fieldl> Petroleum Gazette </Fieldl>
<Parameterl> 4 or more oil articles/day </Parameterl>
</Conditionl>
<Condition2>
<Field2> Gas Station </Field2>
<Parameter2> 4 or more visits per week </Parameter2>
</Condition2>
<Ad_database> Hybrid car Ads </Ad_database>
<Price>
<Amount> $ 1.00 </Amount>
<Contingency> Impression </Contingency>
</Price> </Rule>
[00109] In one implementation, the elements of Fig. l ib may form the basis of a user interface for marketer rule generation. A marketer and/or other GCSI/CTIS user may be presented with lists of user profile data sets (1147) and server data pulls (1 157) that may be dragged and dropped to the marketer rule box (1 165) to generate a marketer rule. When the parameter values have been specified and the rule is complete, the user may click OK to submit the rule and/or drag and drop the rule to a marketer rules database icon (1 181).
[00110] Fig. 11c shows an implementation of logic flow for generating a rule queue in one embodiment of GCSI CTIS operation. A rule is instantiated (1 182), and the GCSI/CTIS server checks parameter quanta associated with the rule (1183). A runtime quantum is discerned for the rule (1184) to determine the timing for applying the rule. The rule is subsequently parsed to generate the appropriate query structure (1185), and the cron schedule for the rule is established based on the runtime quantum (1 186). The rule may then be pushed to the cron schedule queue (1187), and a determination made as to whether there are any additional new rules to process (1188).
[00111 ] Fig. l id shows an implementation of logic flow for cron job queue management in one embodiment of GCSI/CTIS operation. The GCSI CTIS may monitor the cron job queue and, for each queued cron job associated with a rule that is next in the queue (1 189), the GCSI/CTIS may determine whether or not it is time for that particular cron job to run (1 190). If not, then the GCSI CTIS passes to the next cron job in the queue (1 191). On the other hand, if it is time to run, then the appropriate databases specified in the rule are queried, and the particular cron job is dequeued (1 192). If the results of the database query match the rule criteria so as to require serving an Ad impression to a user, then that match indication may be passed to Ad selection modules in order to choose an Ad to supply to the user. In one implementation, the marketer rule itself may uniquely determine an Ad to serve. In another implementation, the marketer rule may determine a set or class of Ads to serve, from which a unique Ad may then be randomly selected. In yet another implementation, as Ad may be selected from the marketer rule determined set or class of Ads based on a user profile.
[00112 ] It must be emphasized again that this is but a single, specific embodiment of the non-triggered Ad serving procedure intended for illustrative purposes. The procedure is highly flexible and can be finely tuned for the specific application at hand. Some other possible methods may include different relative weighting factors, alternative weighting considerations, categorical filtering, consideration of the number of provider zone breaches above the threshold level, graduated consideration of the distance from the provider location, modified provider zone shapes, pattern recognition algorithms, artificial intelligence facilitation, and/or the like.
VARIOUS APPLICATIONS
[00113 ] The GCSI/CTIS provides a targeted information serving system that may be applied to a wide variety of marketing and information dispensation applications. In one embodiment, the GCSI/CTIS creates enhanced ads with content that cannot be included in a print ad. For example, a user who scans a code related to an automobile ad is provided additional content pertaining to the automobile such as detailed images, video, audio, reviews, and links to additional information. Based on the geocode provided in the Scan Message, the GCSI/CTIS may provide a list of local dealerships and pricing. Based on the user profile, the GCSI/CTIS may suggest other automobiles by the same manufacturer that are popular with customers that share the same income bracket, geographic address, number of children, etc. as the user. [00114] In another embodiment, the GCSI/CTIS provides targeted coupons to consumers. By scanning a code in an article or advertisement of interest, a user may be provided with a coupon code for a store or establishment near the location where the scan took place, thereby increasing the likelihood that the coupon would be used. Choosing the coupon based on the contents of the user profile may further increase the likelihood of a consummated transaction. FIGURES 12a and 12b show two examples wherein the GCSI/CTIS supplies coupons and/or discount info to a user. Fig 12a shows an advertisement 1205 for hay fever medication that contains a scan code. Upon scanning the code, the user's cell phone is supplied with a coupon 1210 for 25% off the advertised medication, along with a nearby store at which to redeem the coupon. Fig. 12b shows an article related to events and nightlife in New York City 1215 that contains a scan code. Upon scanning the code to obtain additional content, the user may also be provided with a contextual advertisement for a local bar 1220, including an announcement of happy hour discount prices based on the time of the scan. In an alternative embodiment, the coupon could be provided to the user based on an anticipated provider zone breach rather than a contiguous, causal code scan.
[00115] In one implementation, coupons may be supplied to a user's mobile device with digital rights management (DRM) software included to prevent or discourage coupon copying, sharing, and/or the like. In another implementation, no DRM software is included with the coupon.
[00116] In another embodiment, the GCSI CTIS allows for reduced use of printed space in media publications. For example, an ordinary printed article or advertisement may be supplanted by a 2D matrix code that supplies the content directly to the user's mobile display device. Furthermore, the supplied content may be dressed with additional content that is specifically chosen for the user based on his/her profile or current location, thus increasing the value and utility of the content while still utilizing significantly reduced print space. This increased content value, coupled with the reduction in print space, may translate to significantly increased advertising revenue for media publications. In another embodiment, scan codes may be placed in web-based ads so that users may scan those ads with their mobile device. In another embodiment, scan codes may be placed in television-based ads.
[00117] In another embodiment, the GCSI/CTIS provides a means to supply urgent or breaking information. For example, a breaking news story that arrives too late to be included as a printed article can still be incorporated into a publication via a 2D matrix code. Publications could even have a permanent code in each issue that users can scan in order to access timely breaking and/or supplemental news for which there was a lack of space or time to include in the printed publication.
[00118] In another embodiment, the GCSI/CTIS provides a means of disseminating targeted information over a large scale. For example, during a widespread emergency, a single 2D matrix code could be broadcast on television. When users scan the code, they are supplied with regional information/instructions, shelter locations, maps, etc. Certain users may be provided even more specific instructions if, for example, their profile lists their occupation as some form of emergency personnel. In an alternative embodiment, the GCSI/CTIS can provide targeted information to any or all users expected to be in the vicinity of a particular area or event based on their history of space- time trajectories. For example, if a chemical spill occurs and users are projected to be in the vicinity of it, a prior warning to avoid the area can be broadcast to the users' mobile devices. In an alternative embodiment, traffic alerts can be broadcast to the mobile devices of users projected to be in the vicinity of a high-traffic area before they are stuck there. The GCSI/CTIS may supply targeted Ads, including coupons, for nearby businesses, restaurants, coffee shops, etc. to these users for them to solicit while they wait for traffic to disperse. In general, just as the GCSI/CTIS can provide information to users about where they should go (e.g., Ad provider locations), it can also warn them to stay out of areas that they shoud not go, all based on the projected user trajectories.
[00119] In another embodiment, the GCSI/CTIS may serve Ads based on prevailing ambient conditions or climate at users' space-time positions.. For example, this may occur when the relevance score for contextual Ads is low. An illustration of the logic and data flow in this embodiment is provided in FIGURE 13, wherein the contextual Ads selected from the Information Base on the basis of code scan and user profile are supplanted in favor of Ads chosen on the basis of prevailing ambient conditions at 1340. Exemplary embodiments are provided in FIGURES 14 and 15. In Fig. 14, an Ad for allergy medication is provided 1447 in lieu of weak contextual ad options 1442 in response to a code scan from the weather section of a media publication 1407 in conjunction with ambient weather information, including pollen count, queried at the server 1412. In Fig. 15, an Ad for sunscreen is provided 1547 in lieu of weak contextual Ad options 1542 in response to a code scan from the front page section of a media publication 1507 in conjunction with ambient weather information, including humidity and UV index, queried directly by the user's mobile device 1512. In various embodiments, certain ambient conditions such as UV levels, humidity, download/upload speeds, and/or the like may be detected by the user's mobile device itself, while in other embodiments, ambient conditions are separately supplied to a database used in conjunction with the GCSI/CTIS.
[00120] In another embodiment, the GCSI/CTIS may serve contextual Ads with content enhanced by reference to prevailing ambient conditions. An illustration of the logic and data flow in this embodiment is provided in FIGURE 16 wherein the contextual Ads selected from the information base at 1635 are further refined by the ambient condition information at 1640. Exemplary embodiments are provided in FIGURES 17- 20. In Fig. 17, a code is scanned from the Business section of a media publication 1707 and the GCSI/CTIS selects luxury car Ads for display 1739 based on the scanned code, user location, and user profile 1732, and these Ads are further refined based on the ambient weather conditions provided to the server at 1712. In this case, warm and sunny weather provides further context to cause the GCSI/CTIS to serve an Ad for a luxury convertible 1747. In Fig. 18, a code is scanned from the Travel section of a media publication 1807 and the GCSI/CTIS selects travel Ads for display 1839 based on the scanned code and user profile 1832, which includes recent scan code transactions pertaining to travel and Miami sports scores. The GCSI/CTIS consequently queries the prevailing ambient weather conditions, comprised of cold and rainy weather, and supplies an Ad for Miami travel opportunities. In Fig. 19, a code is scanned from the Weekend section of a media publication 1907 and the GCSI/CTIS selects a contextual Ad for eating out 1939 from the Information base 1935 to serve based on the scanned code and the prevailing ambient weather conditions, which are hot and sunny 1912. This Ad is further refined by the user profile contents 1932 indicating a college student interested in comics and entertainment, and an Ad for an ice cream shop is finally supplied 1947. In Fig. 20, a code is scanned from a baseball team schedule within a media publication 2007. Based on the prevailing ambient weather conditions, including scattered showers 2012, the scanned code, and the recent activity in the user profile 2032, an Ad is supplied for ponchos and golf umbrellas 2042.
[00121 ] In one implementation, a GCSI/CTIS server may query, store, and/or consider data pertaining to media demographics associated with a particular medium in which a code is published; the subject content associated with a code; the type of information requested by scanning a code; and/or the like. For example, a user scanning a code associated with a product review for a hybrid sports utility vehicle (SUV) in a men's magazine may trigger a GCSI/CTIS system to draw and/or analyze data pertaining to media demographics associated with the men's magazine, subject content associated with hybrid vehicles (i.e., environmentally conscious consumers), subject content associated with SUVs (i.e., outdoor activity or families), and product reviews. Thus, the GCSI/CTIS may be configured to consider both the subject of a user's inquiry, the source of the inquiry, the type of inquiry, and/or the like.
[00122 ] In various embodiments, the GCSI/CTIS may serve Ads based on a wide variety of different ambient and/or situational conditions that may be detected by the client mobile device, provided by internal or third party databases or information feeds, and/or the like. Some non-limiting examples of potential ambient and/or situational conditions that may be considered and/or employed in selecting information to serve are temperature, weather, light levels, UV levels, pollen count, humidity, air quality, prices of commodities and/or consumer goods, stock and/or financial index prices, global and/or local news events, internet activities, sports scores, entertainment news, security warnings, and/or the like. Consideration of such factors, by themselves or in conjunction with knowledge of a user such as may be gleaned from a user profile, may form the basis of information serving rules that have great specificity of targeting. For example, a marketer rule within the GCSI CTIS may specify that an Ad for participating bars that includes a coupon for a particular brand of beer be served to all male users between the ages of 21 and 40 with a history of scanning baseball-related codes within three hours of any time that the local baseball team wins a game. In another example, a marketer rule within the GCSI/CTIS may specify that an Ad for hybrid vehicles be served to all mothers with young children who have a history of scanning codes in Time magazine whenever the local price of gasoline is greater than $2.50/gallon and they scan a code in an issue of Time that contains articles on both global warming and the Iraq War. Such hyper-targeted information serving, enabled by the GCSI/CTIS, may prove very valuable to marketers and, in fact, to a wide variety of information dissemination applications. Advertisers may be able to purchase Ad time and/or impressions that are conditional on events, people, time, place, ambient conditions, and/or combinations thereof, and/or the like. Consequently, a premium may be charged to advertisers for each Ad served, and that premium may increase with the number of factors considered in serving the Ad (i.e., the degree to which the Ad serving is targeted). In another implementation, a different price may be charged per impression depending on the characteristics of the individual to which the Ad is served. For example, the hybrid car Ad described above may cost an advertiser $0.75 for an impression to a mom with adult children but $ 1.00 for an impression to a mom with young children. Such graded pricing schemes may be specified within a marketing rule data structure.
[00123 ] In another embodiment, Ads may be served based on internet "climate", such as serving Ads for virus detection software during an outbreak or serving Ads for high-speed broadband internet service on days of high internet traffic. Conditions for specific websites (i.e., cyberspace-time positions) could even be taken into account. For example, an Ad for high-speed broadband internet service could be supplied to visitors of a website experiencing particularly high traffic.
[00124] In another embodiment, the GCSI/CTIS may interface with various customer information databases, customer relationship management databases, and/or any other third party data sources in order to extract information that may be used to further target and/or refine Ad selection for a given user. In one implementation, a marketer may supply the GCSI CTIS with access to a given marketer-specific database and/or data feed, in order to allow the GCSI/CTIS to access the information therein during Ad selection processes. It should be understood that the functionality described for this embodiment of the GCSI/CTIS may be integrated or employed within any of the other GCSI/CTIS embodiments described herein.
[00125] In another embodiment, the GCSI/CTIS can interface with and optimize Ads for various User Agent devices, which may include PCs, laptops, PDAs, DVRs, cable boxes, internet-coupled media devices, and generally with programmable electronic devices possessing external data transfer capabilities and/or the like. FIGURE 21 provides an illustration of the logic and data flow in one embodiment. At 2115, the Scan Message content further incorporates an optional Send to Device info, which specifies the destination User Agent device for a particular Ad. Then, at 2150, the Ad content selected by the GCSI/CTIS is configured and/or optimized for the User Agent device. Exemplary embodiments are provided in FIGURES 22 and 23. In Fig. 22, a code from a sports publication is scanned by a cell phone 2207, and a set-top-box/cable box/DVR User Agent device is specified in the optional Send to Device information of the Scan Message 2217. Consequently, in addition to contextual Ads supplied to the user's cell phone containing article/video links 2237 and season ticket offers 2239, additional content is configured and sent to the User Agent device, such as authorization to descramble a pay- per-view sporting event. In one embodiment, the user's mobile device would provide a signal to the User Agent device to cause it to send a Request for Info to the GCSI/CTIS. In another embodiment, the GCSI/CTIS could send an appropriately configured signal to the User Agent device without the need for a Request for Info signal. In Fig. 23, a code is scanned from the Tech section of a media publication using a cell phone 2307, and the optional Send to Device info in the Scan Message specifies to send to a PC laptop 2317. In accordance with the ambient conditions embodiment discussed previously, the GCSI/CTIS gauges the ambient conditions associated with the device and determines that there has been a recent outbreak of a particular computer virus over the internet 2322. Consequently, the GCSI/CTIS supplies an offer for Virus Scan software subscriptions 2344, and may send Virus Scan software directly to the specified PC laptop based on user response.
[00126] In another embodiment, the GCSI/CTIS provides a mechanism of instituting plans for large-scale coordination of personnel using a single coded broadcast. High-level officials could determine which of a number of coordination plans to institute, each being associated with a unique 2D matrix code. When a plan is decided upon, the code is broadcast (such as over television or the internet) and lower-level employees scan the code to obtain instructions, diagrams, maps, etc. that are tailored to the employees' specific profile contents (i.e., job, skills, location, etc.). There may also be authorization information included in the employee profiles that determines whether they are allowed to decode the broadcast. As each employee progresses in their role within the plan, additional codes could be provided to the employee to scan, both to update their tasks and to track their progress, space-time trajectories, etc.
[00127] In another embodiment, the GCSI/CTIS provides a means of employee tracking. For example, tasks are supplied to employees in the form of 2D matrix codes. When a code is scanned by a given employee, the scan is recorded in the employee's profile and the employee is provided with instructions specific to that task and their position within the organization. When the task is completed, the employee is provided with a completion code that, when scanned, records the employee's successful completion of that task and provides instructions for the next task and/or reward information. In this manner, a record of employee accomplishments is kept as well as information regarding the time taken by the employee to accomplish various tasks. A statistical record of an employee's experience by subject matter may also be generated and included in his/her profile using the GCSI/CTIS.
[00128] In another embodiment, the GCSI/CTIS can connect users based on user profiles. For example, in analogy to the "provider zone" breaches discussed above, the GCSI/CTIS may also track the intersection of user space-time trajectories. In particular, if one user is within a specified distance of the projected space-time trajectory of another user with whom the first user is associated, a message may be sent to one or both users notifying them of their potential proximity. Further consideration of user profiles may also be utilized in such notifications.
[00129] In another embodiment, the GCSI CTIS can be used to provide information regarding consumer products that cannot be included on the product packaging. By scanning a code printed on a consumer product package, the user could be provided with nutritional information, ingredients, website links, coupons, etc. Additional advertisements could also be served based on the nature of the product scanned and the user profile. For example, a user who scans a container of mustard and has "grilling" listed among his/her interests may be served an advertisement and/or coupon for hot dogs in addition to the mustard information.
[00130] In another embodiment, the GCSI/CTIS provides an efficient mechanism of serving real estate listings. For example, when a user scans a code related to real estate listings, the GCSI/CTIS supplies him/her with advertisements and/or listings that are close to their geographic location and appropriate to their demographic profile (i.e., income, marital status, number of children, etc.). In addition, the GCSI/CTIS may provide additional listings to the user based on projected breaches of zones corresponding to available homes or apartments that suit the user's profile. [00131 ] In another embodiment, the GCSI/CTIS expedites software downloads to a user's mobile device. For example, by scanning a 2D matrix code in an ad for a cell phone ringtone version of a popular song, the user can automatically download the ringtone to the cell phone with which they scan the code. The transaction is recorded in the user profile and may result in the display of an advertisement related to the latest album by the artist who recorded the ringtone song, or an album by a related artist, at some future time.
[00132 ] In another embodiment, the GCSI/CTIS may allow users to instantly subscribe to and/or enroll in services, loyalty programs, discount programs, and/or the like by scanning codes associated therewith. For example, a user may subscribe to receive weather updates by scanning a weather-linked code. In another example, a user may enroll in a brand-affiliated coupon program by scanning a code associated with that program. Selection of a subscription and/or enrollment code may cause the GCSI CTIS to submit a user's personal information to an integrated subsystem and/or third-party system for subscription registration. In some implementations, the GCSI/CTIS may require a verification from the user, separate from the code scan itself, that the user wishes to enroll and/or subscribe to the associated service. In some implementations, a user may submit trigger specifications and/or conditions for enrolled service notifications. For example, a user may specify that he or she only wishes to receive weather updates associated with heavy rain or thunderstorms. In another example, a user may specify that he or she only wishes to receive coupons for products from a particular grocery store and not from other grocery stores. Scanning of a code associated with a subscription program wherein specification of triggers and/or conditions is permitted may cause a GCSI CTIS system to retrieve and display a user interface screen to the user that is tailored to the particular subscription and/or enrollment service and configured to receive trigger and/or condition specifications.
[00133 ] In another embodiment, the GCSI/CTIS may be configured to track and/or implement a rewards program. For example, in a single-tiered rewards program implementation, a user may scan a code every time he or she purchases a particular item (e.g., a sandwich from the local sandwich shop) in order to register each purchase and store a record thereof in association with the user. The user may then receive a discount, free item, and/or the like after a pre-designated number of purchases and associated scans are registered, after which the record of scans is reset to start anew. In another example, in a multi-tiered rewards program implementation, a user may continue to register additional purchases and associated code scans to receive larger and/or more significant benefits, discounts, and/or the like.
[00134] In another embodiment, the GCSI/CTIS may be configured to implement contests and/or prize awards. For example, a user may enroll in a contest by scanning a code associated with the contest, causing personal information, user identifiers, and/or the like to be submitted to a contest subsystem. Such contests may comprise instant-win and/or other types of lotteries, auctions, raffles, and/or the like and/or may enroll the user in a contest program through which they may receive further instructions, possibly including additional codes for scanning, in the future.
[00135] In another embodiment, the GCSI/CTIS may be configured as a voting facility. A user may register a vote for a particular candidate, ballot initiative, viewpoint, survey result, and/or anything else for which a vote may be registered by scanning a code associated with the user's choice. In one implementation, a user identifier may be discerned and submitted with the vote in order to prevent repeat voting, to correlate with voter registration, and/or the like. In one implementation, voter identifying information may be stripped from a scan message prior to the message being provided to particular agencies or individuals, in order to preserve a secret-ballot style of voting.
[00136] In another embodiment, the GCSI/CTIS may be configured as a facility to effectuate purchases of goods and/or services. By scanning a code associated with a particular good or service, a message may be sent to a GCSI/CTIS system identifying the good or service associated with the code as well as identifying the user, such as based on a mobile device identifier. The GCSI/CTIS system may then automatically generate a bill for the user, charge a specified credit account, deduct a payment from a debit account, and/or the like to effectuate payment for the good or service. In one implementation, the GCSI/CTIS may return a payment confirmation, such as to the user's mobile device and/or a retailer's point-of-sale device to confirm that the user has provided adequate payment.
[00137] In another embodiment, the GCSI/CTIS may be configured to facilitate communications. For example, a code may correspond to a particular telephone number, IP address, and/or the like. Scanning of the code by a communications-enabled mobile device may cause the mobile device to automatically establish a connection with the address to which the code corresponds. In one implementation, the connection may be established directly by an on-board applet loaded on the mobile device. In another implementation, the connection may be established by an instruction sent to the mobile device by a GCSI/CTIS subsystem in response to a received code scan.
CODE SERVING INTERFACE
[00138] Serving codes to users may be accomplished by a variety of different means and in a variety of different contexts. FIGURES 24-29 illustrate some implementations of code serving interfaces in embodiments of the GCSI/CTIS system. In these implementations, a graphical display and/or interface initially presents a first visual token for display. This first visual token may comprise virtually any image, picture, drawing, emblem, icon, logo, animation, and/or the like. This first visual token may then be animated to reveal a second visual token comprising encoded information, such as a QR code, matrix code, bar code, and/or the like. Animation of the first visual token may, for example, comprise rotation of the first visual token to reveal the second visual token on a proximate side of the first visual token. For example, a two-dimensional picture in the graphical display may rotate in the third dimension to reveal a matrix code on the back of the picture. Other forms of animation may also be employed within different implementations. For example, the first visual token may dissolve, morph, disassemble and reassemble, and/or the like to reveal the second visual token. In some implementations, the animation of the first visual token to reveal the second visual token may occur only in response to some user interaction with the first visual token. For example, a computer screen may display a first visual token persistently until a user clicks on the first visual token with a mouse pointer, at which time the first visual token may rotate to reveal the second visual token on its back. In another example, an electronic billboard may persistently show an advertisement until a motion sensor detects someone walking by, at which time the advertisement dissolves to reveal a matrix code underneath. In still another example, an electronic sign may display a particular image until a detector coupled to the sign detects a signal and/or an authorization code from a compatible, portable electronic device near the detector, at which time the image may morph into a barcode. In still another example, the first visual token displayed on a touch-sensitive display may flip over to reveal a code when a user touches it with a finger or runs a finger over it to simulate a flipping motion. [00139] Fig. 24 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a portable electronic device in one embodiment of GCSI/CTIS operation. A wide variety of different portable devices may execute and/or coordinate with GCSI/CTIS functionality, such as but not limited to portable media players, cellular telephones, blackberries, PDAs, and/or the like. In the illustrated implementation, a portable media player displays album information, including an image of the album cover, on a graphical display, where the displayed information corresponds to music being played on the player 2401. A user may click on or otherwise select the album cover image, causing it to increase in size 2405 and rotate 2410-2415 to reveal a matrix code on the image 2420.
[00140] Fig. 25 shows an implementation of a user interface manifesting GCSI/CTIS functionality on digital paper in one embodiment of GCSI/CTIS operation. Here, an image is included in one area of an article displayed on the paper 2501. Either by itself or in response to some user action, the image flips 2505 to reveal the code on its other side 2510.
[00141 ] Fig. 26 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a digital billboard in one embodiment of GCSI/CTIS operation. A public, electronic billboard display shows an advertisement comprising a product logo 2601. The product logo rotates 2605 to reveal a matrix code on its opposite side 2610. Flipping of the logo may occur periodically or aperiodically, upon detection of a nearby viewer, upon detection of a portable device capable of decoding the matrix code, and/or the like.
[00142 ] Fig. 27 shows an implementation of a user interface manifesting GCSI/CTIS functionality for serving an SMS text message prompt in one embodiment of GCSI/CTIS operation. A first visual token 2701 shows an image and text, such as may correspond to an advertisement, logo, and/or the like. The token may appear in a wide variety of contexts, such as on a website, in a virtual world, on a cell phone or other portable communications and/or media device (e.g., Blackberry, iPhone, iPod, and/or the like), on an electronic billboard, on broadcast television or recorded video content, and/or the like. The first visual token may be animated, such as by flipping, rotating, revolving, and/or the like (2705, 2710), to reveal encoded content on a proximate side thereof. In the implementation illustrated in Fig. 27, a message appears along with an SMS code that a user may key in to an SMS enabled communication device to receive associated content. In alternative implementations, other types of codes and/or code communication protocols may be displayed and/or employed for communication with GCSI/CTIS systems, such as but not limited to: MMS, instant messaging, web browser based messaging, email, Enhanced Messaging System (EMS), TCP/IP, WAP, and/or the like. For example, a first visual token may be animated to reveal an email address, website address, instant message nickname, and/or the like on a proximate side to enable a user to connect to and/or communicate with a GCSI/CTIS system and/or affiliated entity for the receipt of information, coupons, offers, advertisements, media, and/or the like.
[00143 ] Fig. 28 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a mobile phone 2801 in one embodiment of GCSI CTIS operation. A first visual token comprising an image, advertisement, logo, and/or the like 2805 is displayed on a mobile phone display screen. The first visual token may be animated 2810, such as in response to a user interaction (e.g., pressing a button on the mobile telephone, clicking on the first visual token with a pointer widget, and/or the like). In an alternative implementation, the first visual token may be automatically animated and/or animate without the need for any user interaction. In the illustrated implementation, the animated first visual token flips to reveal a second visual token comprising a message and an SMS text message prompt on a proximate side 2815. In one implementation, the user may manually key in the text message and/or destination address to receive the associated content. In another implementation, the GCSI/CTIS interface may supply a selectable link that, when selected, will automatically generate an SMS text message to retrieve the associated content. In still another implementation, such as the example illustrated at 2815, the user may be allowed to automatically generate and/or send the SMS text message from the second visual token by pressing a "Send" button on the mobile phone, clicking and/or otherwise interacting with the second visual token, and/or the like.
[00144] In one implementation, a user may receive a coupon and/or coupon code in response to an interaction with the second visual token, sending of an SMS text and/or other message in response to the second visual token, and/or the like. For example, in one implementation, a user may receive a numerical coupon code in response to a sent SMS text message, wherein the numerical coupon code may be presented to a retailer, entered into a website, and/or the like to receive discounts, free items, special offers, and/or the like. In another implementation, the user may receive a scannable code, such as a QR code, matrix code, and/or the like in response to a sent SMS text message, wherein the scannable code may be scanned by a retailer in order for the user to receive the associated benefits, discounts, and/or the like. For example, the scannable code may appear on a user's mobile phone display screen and may be scannable therefrom to provide the user with the benefits associated thereto. In another implementation, the user may receive an e-mail message in response to interaction with a graphical code-serving interface, the message containing requested content and/or links thereto, scannable codes, coupon codes, and/or the like. [00145] In another implementation, a first visual token may comprise a "poster" image corresponding to a full-length movie, movie preview, video clip, television show, and/or the like. The second visual token revealed on a proximate side of the first visual token may then enable a user to retrieve the full video content associated with the poster image. For example, a user may scroll through a series of poster images corresponding to a series of full-length movies. When the user finds a movie he or she desires to retrieve, watch, download, and/or the like, he or she may select the corresponding poster image, which may then be animated to reveal a second visual token, such as an SMS instruction, message, delivery address, phone number, and/or the like, whereby the user may interact with a GCSI/CTIS system and/or affiliated entity to retrieve the desired movie content.
[00146] In one implementation, a series of first visual tokens may be displayed as scrollable thumbnails, within a cinematic presentation, as an immersive slideshow, and/or the like.
[00147] Fig. 29 shows an implementation of a user interface manifesting GCSI/CTIS functionality on a portable communication device in one embodiment of GCSI/CTIS operation. The portable communication device 2901 shown in the illustrated implementation may represent a blackberry, iPhone, PDA, and/or the like. A first visual token 2905 is animated 2910 to reveal a message and a selectable hyperlink on a proximate side 2915, in this case a URL connecting to content, information, offers, coupons, and/or the like. In one implementation, a user may be permitted to directly select the hyperlink from the displayed image using interface elements of the device in order to retrieve content, view a webpage, interact with a GCSI/CTIS and/or affiliated system, and/or the like.
[00148] A variety of operational models may be employed to provide code-serving interface capabilities to users and content providers alike in accordance with the embodiments and/or implementations described herein. In one implementation, a central GCSI/CTIS server may enable content providers to supply first and/or second visual tokens, associated SMS and/or MMS codes, and/or any other information necessary to connect users to supplied content. The central GCSI/CTIS server may then outfit the supplied tokens and/or other information with HTML markup information allowing the code-serving interface to be embedded in any webpage or other display media. In one implementation, the HTML markup information may further include a link to one or more downloadable applets that may be required to enable a user to view and/or interact with the code-serving interface. Having provided the data corresponding to a first and/or second visual token, SMS and/or MMS code, and/or other information, a content provider may be provided with an embeddable link, URL, and/or the like that may be cut and pasted into a web page HTML to embed the code-serving interface therein.
[00149] In another implementation, a content provider may submit just a first visual token and response content and/or a means of addressing said content, and a GCSI/CTIS server may generate a corresponding code-serving interface, a dial-in code and/or SMS and/or MMS address, hyperlink, and/or the like to allow users to interact with the first visual token to receive the response content. In one implementation, the generated code-serving interface may include HTML markup information enabling it to be embeddable on any webpage. A fee may be charged to the content provider, such as on a pay-per-click basis, for user interactions with the generated code-serving interface.
[00150] In still another implementation, a webpage or other display area may include a generic placeholder for code-serving interfaces that may be filled by code- serving interfaces and/or associated content supplied from one or more advertisement servers and/or GCSI/CTIS servers. The supplied code-serving interfaces may be selected based on webpage content, contextual cues, and/or the like and/or based on the goals of content providers and/or code-serving interface creators. For example, an advertiser may wish to place a particular code-serving interface associated with a new action movie on any webpage having a generic placeholder that mentions extreme sports. A fee may be charged to an advertiser for such targeted and/or contextual placement, such as on a bid- per-keyword basis. Fees may also be charged on a pay-per-click basis (i.e., levying a charge whenever a user clicks a code-serving interface to reveal the code, communication address, and/or the like on a proximate side).
GCSI/CTIS MEDIA ACQUISITION EXAMPLE
[00151 ] In some embodiments, the GCSI/CTIS may be configured to supply media content, music, images, video, and/or the like to users based on the scanning of codes as described above. Acquisition of full media content may, in some implementations, be preceded by acquisition of media samples that may be reviewed by an acquiring user to determine whether or not to proceed with acquisition of the full content. For example, a billboard may display the Billboard Top 20 songs with a separate code for each song on the list. Consumers, in this example, may scan codes corresponding to each song in the list for which they have interest using a mobile scanning device and receive a sample of each song. In one implementation, a sampling user may further be provided with an opportunity to purchase and/or otherwise acquire the full media content once the sample has been received and/or reviewed. In one implementation, media may be acquired by a user via MMS messaging, while in another implementation, media may be acquired by means of an integrated media service (IMS). The IMS may, in one implementation, comprise an on-demand media service wherein users may maintain accounts, sample and/or purchase media, download and/or upload media, and/or the like. An example of an IMS is Apple's iTunes Store. FIGURE 30 shows an implementation of logic flow for media sampling and full media acquisition in one embodiment of GCSI/CTIS operation. A code may be scanned by a user 3001, such as via a mobile device. The scanned code information, as well as hardware information identifying the device, the user, and/or the like may then be received by GCSI/CTIS from the mobile device, such as via a communications network. The GCSI CTIS may then make a determination, such as may be based on the hardware information, user information, a user profile, and/or the like, as to whether the mobile device is configured with an IMS 3005. If the mobile device is configured with an IMS, the GCSI/CTIS may issue an instruction to the mobile device to connect to the IMS 3010, allowing the user to engage IMS functionality such as the sampling, purchasing, downloading, viewing/playing, and/or the like of media files 3015.
[00152 ] If the user's mobile device is not configured with an IMS, the GCSI/CTIS may send a message to the device, such as an SMS text message 3020, to determine if the user desires to receive a sample of the requested media 3025. In one implementation, the GCSI/CTIS may first interact with a media service to determine if a sample is available before offering the sample to the user. If a sample is desired, the GCSI/CTIS may sent a media sample to the user's mobile device, such as in the form of an MMS message. The sample may, in various implementations, comprise a clipped and/or low-quality version of an audio file, image file, video file, publication, and/or the like. In one implementation, the GCSI CTIS may first acquire the sample from a music service in order to provide it to the user's mobile device. In an alternative implementation, the GCSI/CTIS may itself generate a sample from an original copy of a media file, such as may be acquired from a media service.
[00153 ] The GCSI CTIS may then generate and send a query, such as via SMS text message 3035, to determine if the user would like to purchase the media associated with the scanned code 3040. If not, the GCSI/CTIS may exit the routine associated with the acquisition of the current media file, present alternative and/or related media files for user consideration, and/or the like 3045. If, on the other hand, the user indicates a desire to purchase the media file in question, the GCSI/CTIS may query the user, such as via an SMS text message, as to which of a selection of pricing and/or download options the user would like to pursue 3050. For example, in various implementations, the user may be provided with options as to the quality and/or format of media files acquired, the method of acquisition, accessibility and/or rental options, and/or the like. In the illustrated implementation, the user may be presented with an option as to the method of media acquisition. Specifically, a determination may be made as to whether or not the media is to be acquired directly by the user's mobile device 3055. In the illustrated implementation, the determination is based on a user preference, however in alternative implementations, the determination may be made, in whole or in part, based on a variety of other factors, such as detected capabilities of the user's mobile device, available network bandwidth, pre-set profile settings, and/or the like. If the user selects for the media to be directly provided to his or her mobile device, then a corresponding fee may be charged and the media may be streamed, downloaded, and/or the like directly to the user's mobile device 3060. Alternatively, if the user does not desire to acquire the media directly to his or her mobile device, then the GCSI/CTIS may charge a price corresponding to an indirect delivery mode and conduct the media file to an intermediary storage facility for later retrieval 3065. For example, the GCSI/CTIS may instruct a media service to allocate the media file to a user account for later retrieval by the user. In another example, the GCSI/CTIS may acquire the media file and/or email the file to a user email account for later retrieval. When the user is ready, he or she may obtain the media file from the intermediary storage facility, transfer the file to a mobile device, and/or the like. [00154] The charging of a fee for acquired media may proceed in a variety of different manners within various embodiments of the GCSI/CTIS. For example, in one implementation, a user may be directly requested to enter payment information (e.g., credit card number, checking account number, etc.) at the time of purchase. The entered information may be verified before the media is made available to the user and/or the user's mobile device. In another implementation, a user may enter payment information into a user profile and have a corresponding account automatically charged when the user directs the GCSI/CTIS to acquire media.
[00155] FIGURE 31 shows an illustration of media acquisition in one embodiment of GCSI/CTIS operation. In the illustrated implementation , a printed publication 3101 displays an advertisement for a new release by a recording artist 3105, the advertisement including a scannable matrix code that facilitates the acquisition of media associated with the new release by a user. In an alternative implementation, an animated user interface may present a scannable code on a proximate side of a first image, such as on a video billboard, website, television program, and/or the like. The media may, for example, comprise an entire album, a single, a ringtone, a video, an image, and/or the like. In one implementation, the media provided may depend on the scanned code in conjunction with a user profile containing user preferences, a history of user behavior and/or prior scanned codes, and/or the like. The user may engage the media content by scanning the code with his or her mobile device 31 10, after which the GCSI CTIS may query the user, such as via an SMS text message, as to whether or not he or she wishes to sample and/or purchase the requested media 31 15. The user may respond, in one implementation, by sending a reply text message to be relayed to the GCSI/CTIS. In one implementation, the GCSI/CTIS may subsequently provide, stream, upload, and/or the like the requested media directly to the user's mobile device for storage and/or playback 3120. In another implementation, the GCSI/CTIS may provide the requested media to an intermediary storage facility, such as a user's media service account, an email server, an ftp server, and/or the like. The user may then subsequently procure the media from the intermediary storage facility, transfer the media to a mobile device, and/or the like 3125 at a later time.
[00156] FIGURES 32a-b show an implementation of logic flow for code scan monetization in one embodiment of GCSI/CTIS operation. In Fig. 32a, a code is scanned at 3201. In the illustrated implementation, the code may be found on a physical item that is subject to purchase and may be found in a retail establishment. For example, a compact disc (CD) in a music store may be embellished with a scannable code that, when scanned, may provide a sample of the music stored on the CD, deliver a ringtone to the user's mobile scanning device, provide artist information, images, concert dates, a coupon, and/or the like. In another implementation, the item for purchase may not be physical but rather may be provided online, such as on a website, and an associated code may be provided on the page on which the item is offered for purchase. Once the code is scanned 3201, a determination may be made as to whether the retailer providing the item is subscribed to a GCSI/CTIS service 3205. In one implementation, the retailer may be discerned based on a geographic position provided to the GCSI/CTIS by a code message sent from the user's mobile device that may, for example, be compared to records of retailer locations. The geographic position may be determined, for example, by an onboard GPS unit on the user's mobile device or based on geographic information contained in the scanned code. Subscription to the service may, for example, entail licensing to embellish items with GCSI/CTIS affiliated codes in exchange for a fee, such as a onetime or periodic fee and/or a per-scan fee, such as illustrated in the implementation shown in Fig. 32. If the retailer is determined at 3205 to be a subscriber, then the GCSI/CTIS may register a retailer payment 3210. For example, in one implementation, registering payment may comprise noting the fee in a fee record. In an alternative implementation, the GCSI/CTIS may automatically deduct the fee from a pre-designated account. A determination may also be made as to whether the manufacturer, publisher, distributor, and/or the like of the item in question is a subscriber 3215. For example, for the case of the CD discussed above, the "manufacturer" may comprise a record label. If the manufacturer is determined to be a subscriber, then a manufacturer payment is registered at 3220.
[00157] Discernment of retailer, competitor, and/or manufacturer identities may be accomplished by a variety of different schemes in various implementations and/or embodiments of GCSI/CTIS operation. For example, a unique subset of codes may be reserved for a particular manufacturer, retailer, and/or the like, such that a scan message corresponding to any code of the unique subset may be associated by a GCSI/CTIS system with the particular manufacturer, retailer, and/or the like. In another implementation, retailers associated with a given scanned code may be discerned based on a geoposition of the mobile scanning device at the time of code scanning. Fig. 32b provides an illustration of an implementation of logic flow for discerning retailers in one embodiment of GCSI/CTIS operation. A determination is made at 3267 as to whether the mobile scanning device used to scan a code is position sensitive. Position sensitivity of a mobile device may be facilitated, for example, by an on-board GPS unit, mobile device and/or cellular tower triangulation, trilateration, multilateration, and/or the like. If the device includes one or more position sensitive facilities, the GCSI/CTIS may discern the position of the mobile device 3270. Position discernment by the mobile device and/or the GCSI/CTIS may include drawing raw geographic position data from one of the facilities described above using, for example, mobile device software development kit (SDK) tools, an example of which are those associated with the iPhone SDK toolkit. The GCSI/CTIS system may then query position records based on the position discerned at 3270 to seek retailers matching that position 3273. A determination is madet at 3276 as to whether any matching retailers are found. If no retailers match the discerned mobile device position, or if the mobile device lacks position sensitivity at 3267, the GCSI/CTIS system may query code records based on the scanned code received from the mobile device to seek retailers matching the scanned code 3279. A determination is made at 3282 if any retailers are code discernible and, if not, then the GCSI/CTIS may return an error message and/or record that no matching retailer was found 3285. If any matches are find either by position or code discernment, then a determination may be made as to whether there exist multiple retailer matches 3288. If not, then the unique matching retailer may be recorded, provided to facilitate subsequent code scan monetization, and/or the like 3294. If multiple retailer matches exist, the GCSI CTIS system may apply one or more retailer ambiguity resolution schemes 3291 in order to narrow down the results to a unique retailer match. A wide variety of ambiguity resolution schemes may be employed within different implementations and/or embodiments of GCSI/CTIS operation. For example, in one implementation, a GCSI CTIS system may consult a user profile associated with the user who's mobile device issued the code scan to determine whether the user's code scan history indicates a preference for a particular retailer, retailer type, and/or the like which may assist in further discerning the unique retailer associated with the current code scan. In another implementation, the GCSI/CTIS system may provide a plurality of possible retailer matches in a message (e.g., an SMS message) to a user's mobile device and request feedback as to which retailer is the correct one in whose establishment the code was scanned.
[00158] A determination may then be made as to whether a conversion has taken place whereby the user has actually purchased the item associated with the scanned code. In one implementation, the GCSI/CTIS may monitor activity on a credit card associated with a user account once that user has registered a code scan. A subsequent purchase using the associated credit card may then register a conversion with the GCSI/CTIS. If no conversion is detected, such as within a pre-designated period of time, then the code scan monetization is complete for the particular code scan 3230. If, on the other hand, a conversion is registered, the a determination may be made as to whether the manufacturer is subscribed to pay further fees upon item conversion 3235. If so, then the additional manufacturer payment for conversion is registered at 3240.
[00159] A determination may be made as to whether the conversion, i.e., the purchase of the code-associated item, was made at the retailer at which the code was scanned 3245. If so, then a determination may be made as to whether the retailer is subscribed to pay an additional fee associated with item conversion 3250. If so, that payment is registered at 3255. If the conversion occurs at a competitor retailer different than the original retailer at which the item-associated code was scanned (e.g., another brick-and-mortar retailer, another website, etc.), a determination may be made as to whether the competitor retailer is subscribed to pay a fee for item conversion 3260. If so, then the competitor payment may be registered at 3265. In one implementation, a competitor may be permitted to supply a message (e.g., an SMS text message, and/or the like) to a user's mobile device when the user scans codes associated with particular items at particular retail locations in order to entice the user to purchase the item from the competitor instead of at the particular retail location in which the code was scanned. The competitor message may, for example, include a coupon and/or other discount on the sale price of the code-associated item. In one implementation, the competitor may be charged a separate fee for being allowed to supply such messages, such as a per-message fee, a one-time or periodic fee, and/or the like. [00160] In some implementations, fees charged to manufacturers, retailers, and/or competitors may be substantially the same. In alternative implementations, different fees may be charged to manufacturers, retailers, and/or competitors.
[00161 ] FIGURES 33 a-e show aspects of implementations of JagTag encoding and codes in some embodiments of GCSI/CTIS operation. Fig. 33a shows an implementation of logic flow for JagTag encoding in one embodiment of GCSI/CTIS operation. An alphanumeric string may be associated with content to which a JagTag code is ultimately to be associated 3301. In one implementation, a five character string is employed. Each character of the alphanumeric string may then be converted into a corresponding integer, such as may be based on a correspondence table 3302. Fig. 33b shows an implementation of such a corresponding table relating decoded characters, including lowercase letters 3313, numbers 3314, and uppercase letters 3315, to encoded values 3316 comprising integers between 0 and 62. To convert the alphanumeric string into a JagTag code, each character in the string is converted into a corresponding integer between 0 and 62 using the table in Fig. 33b. A determination may then be made as to whether any of the characters comprise punctuation marks or other unrecognizable or uncovertable characters 3303. If so, those characters are set to blanks or zeros in the resulting string of integers 3304. A determination may also be made as to whether the number of characters in the alphanumeric string exceeds a pre-designated maximum number 3305 (e.g., 5 characters). If so, additional characters are ignored 3306.
[00162 ] Each resulting integer may then be converted to a corresponding binary value 3307, and a determination may be made as to whether there are a sufficient number of "on" bits (i.e., bits equal to 1) 3308. For example, the GCSI/CTIS may require the existence of at least some minimum number (e.g., 9) of on bits. If not, then the system may return an error message and/or recommend that the user try a different initial alphanumeric string 3309. Otherwise, the GCSI/CTIS system may concatenate the string of binary numbers to yield a single 32 bit long bitset array 3310. The system may then generate aJagTag bit representation 3311, as described below, nd output the resulting JagTag to a physical display and/or storage (e.g., storing an image formatted JagTag in a database, printing the JagTag, displaying the JagTag on a display screen, and/or the like) 3312.
[00163 ] The first bit of the bitset array may be considered a most-significant bit and the last bit of the bitset array may be considered a least-significant bit. Once complete, the 32 bit binary bitset array may be converted into a JagTag code representation. Fig. 33c further illustrates JagTag encoding in one implementation. The JagTag may include an L-shaped component 3318 that may, in one implementation, promote orientational and/or size discrimination of the JagTag, such as by a scanning or analyzing device. The JagTag may further include four circular elements 3319 that may also serve to promote orientational and/or size discrimination. The most significant bit of the bitset array may be encoded as a circle at the position indicated by the crossed circle at 3320, with a white circle (owing to the dark background of the L-shaped component 3318) indicating a 1 and no circle indicating a 0. The next most significant bit of the bitset array, then, may be encoded as a circle at the position indicated by the crossed circle at 3325. The numbering scheme indicated at 3330 shows how the circles (or lack of circles) at positions numbered from 0 to 31 correspond to the bits in the 32-bit bitset array, with 0 the most significant bit and 31 the least significant bit. If the bit falls on the L-shaped component 3318, a white circle is drawn for a bit value of 1, and otherwise a dark circle is drawn for a bit value of 1.
[00164] In one implementation, a shell script may be configured to accept an alphanumeric string comprising characters to be encoded and to return a JagTag in an image format, such as a PNG, JPG, GIF, BMP, and/or the like file format. In one implementation, the shell script may be further configured to receive a color specification (e.g., an HTML-style RGB triplet).
[00165] Configuring a JagTag for optimal recognition may be accomplished in a variety of different ways within different implementations. For example, a color for the JagTag code may be selected to as to have high contrast with the background color. A high number of "on" bits (i.e., bits equal to 1) may also improve code recognition, as discussed above. Accordingly, in one implementation, resulting JagTag codes having fewer than a minimum number of on bits may be rejected. Other measures that may be taken in various implementations to improve JagTag recognition may include maximizing code dimensions, ensuring that the code is surrounded by a substantial margin (e.g., at least 25% of the code's width and height), and ensuring fidelity of the code by eliminating any obscuring interferences. JagTag codes may be configured for a wide variety of physical manifestations, including printing on magazine pages, billboards, newspapers, and/or the like, displaying on video display screens, television broadcasts, websites, and/or the like. JagTags may also be configured into different shapes or display configurations in various implementations.
[00166] Fig. 33d shows one non-limiting embodiment of data loss resilient codes 3331, with characteristics that include: reducing errors based on "bleeding" of encoded data points by using circles/dots rather than squares that touch each other (this combats fuzziness of image as well as reduced light conditions); using a stronger identifier to discover processing directionality (rotation, skew, slant) - this is the black line with white dots shown in the figure; including data points within the identifier in order to maximize encoded data as well as allow for reduction in size of code; using equidistant lengths on identifier to process for skew and slant; using constant data points within the directional identifier to process for skew and slant— this may be top left, bottom right and bottom left white dots (not indicated in figure 33d); reducing the amount of data encoded in the code— most likely 5-8 characters— in order to allow for size reduction of the code; developing code characteristics so partial decoding allows for matching code to correct data on the server — for example, if only 70% of the characters from a code are discernible, the GCSI/CTIS can use server logic to extrapolate what the code is as well as the campaign/client it's associated with, i.e., information about the exact publication the code is in may be lost, but the GCSI/CTIS system can figure out the campaign and return an appropriate message; with regard to partial decode matching, server side and database logic focuses both on creating codes for clients and campaigns that are unique sets in order to enable partial decode matching as well as providing a set of rules around time, mobile number, and likelihood in order to determine the best potential match for partial decodes.
[00167] In the embodiment of the basic codes 3331 shown in Fig. 33d, design wrapped around the code does not impact the effectiveness of the decoding. High tone color differentials are allowed, so rather than black, dark blue, or red could be used. The white dots in the identifiers are less likely to allow for color changes although a very light yellow or gray may be allowed.
[00168] In a further embodiment, the dots most likely to be lost in an image may be assessed and the least useful information encoded appropriately based on that assessment. An interesting opportunity for this code is that it allows for some logos to potentially replace the dots. For example, an Alltel logo can be used nearly as well as the dots, or a Nike logo is decodable with some server side code modifications.
[00169] The codes have an additional benefit in that they are in and of themselves, aesthetically pleasing, and as such offer significant advantages over previous codes. The ability in one embodiment, to vary the colors of the code, allows it to better integrate and look better in marketing contexts.
[00170] Fig. 33e shows some implementations of alternative JagTag display configurations, including circular 3335, triangular 3340, modified squares (3345, 3350, 3365), rectangular 3370, letter shaped (J shapes shown at 3355 and 3360), and/or the like. JagTags may also be displayed in proximity to and/or integrated with other codes, logos, insignias, and/or the like, such as shown at 3375.
[00171 ] In one embodiment, the GCSI/CTIS may admit voice inputs; recorded, generated and/or downloaded audio inputs; video inputs; telephone tree and/or interactive voice response (IVR) selection inputs; keystroke inputs to a telephone keypad or keyboard engaging a softphone and/or VOIP phone; and/or the like as input codes triggering the provision of requested multimedia content to a user device, such as may be selected in connection with a user profile and/or a user history of requested content and/or code inputs. For example, in one implementation, an advertisement, kiosk, website, and/or any other code provision platform may provide a user with a code specification, comprising a sequence of words the user should speak into his or her mobile device, and an address (e.g., a telephone number) to which the spoken content should be directed (e.g., "To get a free ringtone from Acme, call (XXX)XXX-XXXX and say Ί want a free Acme ringtone!'"). In alternative implementations, a user may be required or requested to speak a code number, password, company name, location name, and/or the like as part of his or her code input in order to further clarify and/or tailor the nature of the requested content and/or to provide additional information to the GCSI/CTIS for storage in association with the user, such as in a user profile.
[00172 ] Speech recognition and/or speech-to-text functionality may be implemented via a wide variety of software packages, such as CMU Sphinx, Julius, VoxForge speech corpus tools, Microsoft Speech API, and/or the like. In a speech-to-text implementation, the text output of employed speech recognition software may be provided to the GCSI/CTIS for comparison with stored code information, such as a direct comparison of the resulting text string with a stored text string to find a match. In some implementations, alternative strings, common string errors, and/or the like may be stored in association with a code string and compared with speech-to-text output to determine whether an approximate match exists.
[00173 ] In addition to matching the provided audio input, the GCSI/CTIS may extract user and/or user device identifying information, such as a telephone number, user hardware ID, and/or the like, in order to access a user profile and/or other user-connected information and/or to know where requested content should be provided. In an implementation wherein the user provides spoken audio content to the GCSI/CTIS via a telephone connection, the GCSI/CTIS may employ a caller number identification telephone service to discern the user's telephone number and to identify the user, query a user profile and/or user code input and/or content request history, reply to the user and/or provide requested content, and/or the like. In one implementation, a user profile may be discerned and accessed based on the determined user telephone number, a secondary user address (e.g., an e-mail address) queried from the user profile, and requested content may then be provided to the secondary address.
[00174] In some implementations of voice-triggering, the GCSI/CTIS may perform further analyses of provided audio information, such as to attempt to authenticate a user and/or to identify a user so as to access user information to tailor provided content. For example, the GCSI/CTIS may instruct the performance of a spectral analysis, fast fourier transform, and/or the like of provided audio information (e.g., by any of a variety of audio analysis software packages, such as but not limited to WaveSurfer, BRP-PACU, and/or the like), and may compare the results of this analysis (e.g., the frequency values corresponding to prominent peaks of the fourier transform) to stored information. In one implementation, the comparison may be performed with information known to be associated with a particular
[00175] In another implementation, a code may be implemented as pre-recorded audio content that a user may input into his or her mobile device and provide therefrom to a GCSI/CTIS system to receive multimedia content in response thereto. For example, in one implementation, a user may dial a phone number specified by the code or a code context (e.g., a website where the code is found), and then may hold the phone's receiver up to a speaker playing the prerecorded content. The phone may then relay the played audio information to the GCSI/CTIS system via the dialed phone number, which may recognize the pre-recorded audio code and may provide multimedia content in response thereto. In one implementation, the GCSI/CTIS may employ speech recognition and/or speech-to-text software to decode, recognize, and/or evaluate the provided audio information. In an alternative implementation, the GCSI/CTIS and/or an affiliated system may perform other types of audio analysis (e.g., fast fourtier transform and/or other spectral analyses) on the provided audio content, such as to discern non-speech code components. Examples of software packages that include such audio analysis capabilities are WaveSurfer and BRP-PACU.
[00176] In yet another implementation, a code may be implemented as a sequence of selections in an IVR system, telephone tree, and/or the like. For example, in one implementation, a user may call a GCSI CTIS connected system, such as based on a phone number provided in an advertisement, television commercial, article, website, billboard, and/or the like. Alternatively, the user may call a general number and enter a code, such as by speaking it or keying it into a telephone keypad, to identify a particular advertisement, television commercial, article, website, billboard, and/or the like. In one implementation, voice and/or keypad entry of the code may be sufficient input for selection and provision of multimedia content to the user (the GCSI/CTIS system may further receive a user identifier, such as based on a hardware identifier of a user's mobile device, and provide content based on contents of a user profile). In another implementation, the GCSI/CTIS may direct the provision of a series of selectable options to the user in accordance with a pre-set IVR system, telephone tree, and/or the like. The sequence of options selected may comprise a code that, in conjunction with aspects of a user profile, may be employed to select multimedia content, such as an audio recording, for playback to the user. In one implementation, user selections in an IVR system, telephone tree, and/or the like may initiate the provision of multimedia content to a separate device from that with which the user made his or her selections (e.g., a user may employ a telephone to interact with an IVR system to initiate the selection of multimedia content to a user's television, the content being selected based on selections during the IVR system interaction, a user profile and/or history of code inputs, IVR system interactions, and/or the like).
[00177] In still another implementation, a code may be implemented as a sequence of keystroke inputs to a telephone keypad, keyboard engaging a softphone and/or VOIP phone, and/or the like. An entered code may comprise a series of numbers, corresponding letters, non-alphanumeric symbols (e.g., #, *, and/or the like), and/or the like. In one implementation, a code input may be sent to a GCSI CTIS equipped system via an SMS message, MMS message, e-mail, and/or the like. In an alternative implementation, a user may dial a telephone number to access a GCSI/CTIS equipped system and directly enter the keystroke sequence during the call, which is received and interpreted by the GCSI/CTIS system to determine the requested content to provide in response.
[00178] In still another implementation, a user mobile device may be provided with an audio signal generator, such as may generate audio information encoding GCSI/CTIS codes. For example, a user may provide information to the audio signal generator, such as a number, code, or other information that may be found in association with an advertisement, website, and/or the like related to desired multimedia content. The audio signal may then generate a custom audio signal specific to the requested content, which signal may then be provided to the GCSI CTIS (e.g., via a telephone connection and/or as a recorded file provided by an MMS message, e-mail, and/or the like). The GCSI/CTIS may then employ audio analysis software such as that described above to decode the provided audio code and provide requested content based on the decoded information.
[00179] In one embodiment, a GCSI CTIS system may engage an augmented reality interface (e.g., a display of a real -world environment merged with virtual computer-generated imagery into a single display) to generate codes and/or provide requested content to users.
[00180] In one implementation, a user may point a mobile device video camera at a QR code, JagTag code, barcode, and/or the like. The device may detect the presence of the code and serve a virtual image of requested content, an associated application, and/or the like in the display screen, such as adjacent to the code and/or to a product, advertisement, website, television program, magazine article, and/or the like associated therewith. For example, a user may point a mobile device video camera at a code displayed in an aisle of the supermarket and, in response, a GCSI/CTIS system and/or associated application may augment a video display of products in that aisle with highlights to indicate that they are subject to a discount. In one implementation, the highlighted products may be selected based on the code and/or on a user profile, which may include a history of codes engaged by that particular user and/or his or her mobile device. In another example, a billboard may contain a code that, when captured by the video camera of a mobile device, causes an augmented reality display to be generated, such as an advertisement displayed on or near the billboard when viewed on the mobile device display.
[00181 ] In another implementation, the virtual portion of an augmented reality display may be generated and/or displayed to the user by a device that is separate and distinct from the user's mobile device and/or the device used to capture the code. For example, in one implementation, a user may scan and/or capture a code with a mobile device camera and submit the code to a GCSI/CTIS system. In response, the system may cause an augmented reality display to be generated on a secondary display device, such as a monitor in a grocery store. In another example, the GCSI CTIS system may cause a projector to project an image of the virtual portion of the augmented reality display onto one or more physical objects (e.g., projecting a spotlight on a product in a grocery store aisle).
[00182 ] In another implementation, capturing a code by a video camera of a mobile device may cause the GCSI CTIS system to deliver an application to the display screen of the mobile device that appears to exist in three dimensions. The user may, in some implementations, engage the application using the mobile device. For example, if the mobile device is equipped with touchscreen capabilities, the user may engage the application by touching the display screen where the application is displayed. The type and/or configuration of the application delivered to the user may, in some implementations, be based on the code captured by the video camera and/or on a user profile, such as may include a history of captured and/or scanned codes.
[00183 ] FIGURE 34 shows an implementation of an augmented reality user interface for providing requested content in one embodiment of GCSI/CTIS operation. A scannable code, in this case a JagTag 3401, may be provided to a user, such as within a print publication, on a website, in a television commercial, and/or the like. The user may scan the code via a mobile device 3403, such as by capturing the code via an integrated video camera to display the code on the display screen of the mobile device. The capturing of the code may engage a GCSI/CTIS system to augment the display with user interface overlays (3405, 3410), three-dimensionally rendered objects/images (3412), requested content, advertisements (3415, 3420), and/or the like. In one implementation, user interface overlays (3405, 3410) may admit and/or react to user interaction, such as by acting as touchscreen interface elements of an interactive application. In one implementation, augmented reality interface components, such as overlays, may be transparent, selectively transparent, and/or semi-transparent to show aspects of the underlying media or environment in which the scannable code is presented.
[00184] In one implementation, the scannable code 3401 may appear in an augmented reality interface display with a demarcation, such as a highlighted border 341 1. The border and/or one or more other components of the scannable code may be employed in a border-locking capacity to accept and/or identify the code and/or to orient other objects or images in the augmented reality display. For example, in one implementation, a scannable code may be positioned within a media display such that elements of an augmented reality display, such as overlays, are positioned and/or oriented in a desired manner with respect to other components of the media display (e.g., a video about an advertised product is displayed in proximity to an ad for the product adjacent to the scannable code).
[00185] In one implementation, augmented reality interface elements such as overlays, ads, interactive interface components, and/or the like may be configured for persistent positioning with respect to the scannable code and/or other objects in the code environment. For example, in one implementation, the border of a scannable code and/or other reference elements of the code may be employed to persistently position and/or orient augmented reality interface elements with respect thereto. Thus, if the mobile device is moved with respect to the reference elements of the code, augmented reality interface elements may move on the mobile device display in such a way as to maintain a persistent position and/or orientation with respect to the reference elements of the code and/or other objects in the code environment. As an illustrative example, in Fig. 34, the overlay at 3405 and ad at 3415 may move to the corresponding overlay at 3410 and ad at 3420 when the device is moved from right to left with respect to the code and/or the magazine article in which the code is displayed.
[00186] In one implementation, multiple and/or different content may be delivered to and/or displayed by the mobile device in response to the scanning of a particular code. For example, scanning a single code in a media environment may cause the provision and display of more than one type of content on the mobile device display, such as a coupon code in one part of the display and a multimedia video in another part of the display. In one implementation, multiple display elements provided in response to a scanned code may be configured for display in proximity to particular elements of the media environment in which the code is provided (e.g., a coupon code for a product provided next to an advertisement of that product in a magazine in which the code is provided, as well as a video about a topic provided next to an article about the same topic in the same magazine page). In one implementation, a GCSI/CTIS system and/or associated mobile device may be configured to automatically provide augmented reality interface elements in a preset position relative to a scanned code. In another implementation, a GCSI/CTIS system and/or associated mobile device may be configured to detect and/or analyze aspects of the code environment beyond the scannable code itself, and to utilize these other aspects in the querying, selection, and/or display of content provided to the mobile device display. For example, in one implementation, a single code may be provided in a single media environment that, when scanned, may provide various content in different positions of an augmented reality display based on other elements of the media environment detected by the mobile device. Such other aspects may include, but are not limited to, other scannable codes (e.g., other JagTag codes, barcodes, QR codes, datamatrices, and/or the like), text (e.g., such as may be detected and/or analyzed via optical character recognition), images, and/or the like. In one implementation, the same code may be provided in multiple different media environments and yield different content to a user depending on other elements of the media environment that may be detected by the user's mobile device. For example, a single code may be generated to instruct the provision of a particular class of video content. When this code is provided in proximity to an advertisement for a car (wherein the advertisement includes additional detectable components, such as recognizable text), a video of a commercial for the car may be provided. When the same code is provided in proximity to an advertisement for a restaurant, a video of a commercial for the restaurant may be provided.
GCSI/CTIS CONTROLLER
[00187] FIGURE 35 of the present disclosure illustrates inventive aspects of a GCSI/CTIS controller 3501 in a block diagram. In this embodiment, the GCSI/CTIS controller 3501 may serve to aggregate, process, store, search, serve, identify, instruct, generate, match, and/or update Scan Messages, Reply Messages, Ads, user profiles, and/or other related data.
[00188] Typically, users, which may be people and/or other systems, engage information technology systems (e.g., commonly computers) to facilitate information processing. In turn, computers employ processors to process information; such processors are often referred to as central processing units (CPUs). A common form of processor is referred to as a microprocessor. CPUs use communicative signals to enable various operations. Such communicative signals may be stored and/or transmitted in batches as program and/or data components facilitate desired operations. These stored instruction code signals may engage the CPU circuit components to perform desired operations. A common type of program is a computer operating system, which, commonly, is executed by CPU on a computer; the operating system enables and facilitates users to access and operate computer information technology and resources. Common resources employed in information technology systems include: input and output mechanisms through which data may pass into and out of a computer; memory storage into which data may be saved; and processors by which information may be processed. Often information technology systems are used to collect data for later retrieval, analysis, and manipulation, commonly, which is facilitated through a database program. Information technology systems provide interfaces that allow users to access and operate various system components.
[00189] In one embodiment, the GCSI/CTIS controller 3501 may be connected to and/or communicate with entities such as, but not limited to: one or more users from user input devices 351 1; peripheral devices 3512; a cryptographic processor device 3528; and/or a communications network 3513. [00190] Networks are commonly thought to comprise the interconnection and interoperation of clients, servers, and intermediary nodes in a graph topology. It should be noted that the term "server" as used throughout this disclosure refers generally to a computer, other device, program, or combination thereof that processes and responds to the requests of remote users across a communications network. Servers serve their information to requesting "clients." The term "client" as used herein refers generally to a computer, other device, program, or combination thereof that is capable of processing and making requests and obtaining and processing any responses from servers across a communications network. A computer, other device, program, or combination thereof that facilitates, processes information and requests, and/or furthers the passage of information from a source user to a destination user is commonly referred to as a "node." Networks are generally thought to facilitate the transfer of information from source points to destinations. A node specifically tasked with furthering the passage of information from a source to a destination is commonly called a "router." There are many forms of networks such as Local Area Networks (LANs), Pico networks, Wide Area Networks (WANs), Wireless Networks (WLANs), etc. For example, the Internet is generally accepted as being an interconnection of a multitude of networks whereby remote clients and servers may access and interoperate with one another.
[00191 ] The GCSI/CTIS controller 3501 may be based on common computer systems that may comprise, but are not limited to, components such as: a computer systemization 3502 connected to memory 3529.
Computer Systemization
[00192 ] A computer systemization 3502 may comprise a clock 3530, central processing unit (CPU) 3503, a read only memory (ROM) 3506, a random access memory (RAM) 3505, and/or an interface bus 3507, and most frequently, although not necessarily, the foregoing are all interconnected and/or communicating through a system bus 3504. Optionally, the computer systemization may be connected to an internal power source 3586. Optionally, a cryptographic processor 3526 and/or a global positioning system (GPS) component 3575 may be connected to the system bus. The system clock typically has a crystal oscillator and provides a base signal. The clock is typically coupled to the system bus and various clock multipliers that will increase or decrease the base operating frequency for other components interconnected in the computer systemization. The clock and various components in a computer systemization drive signals embodying information throughout the system. Such transmission and reception of signals embodying information throughout a computer systemization may be commonly referred to as communications. These communicative signals may further be transmitted, received, and the cause of return and/or reply signal communications beyond the instant computer systemization to: communications networks, input devices, other computer systemizations, peripheral devices, and/or the like. Of course, any of the above components may be connected directly to one another, connected to the CPU, and/or organized in numerous variations employed as exemplified by various computer systems.
[00193 ] The CPU comprises at least one high-speed data processor adequate to execute program components for executing user and/or system-generated requests. The CPU may be a microprocessor such as AMD's Athlon, Duron and/or Opteron; IBM and/or Motorola's PowerPC; IBM's and Sony's Cell processor; Intel's Celeron, Itanium, Pentium, Xeon, and/or XScale; and/or the like processor(s). The CPU interacts with memory through signal passing through conductive conduits to execute stored signal program code according to conventional data processing techniques. Such signal passing facilitates communication within the GCSI/CTIS controller and beyond through various interfaces. Should processing requirements dictate a greater amount speed, parallel, mainframe and/or super-computer architectures may similarly be employed. Alternatively, should deployment requirements dictate greater portability, smaller Personal Digital Assistants (PDAs) may be employed.
Power Source
[00194] The power source 3586 may be of any standard form for powering small electronic circuit board devices such as the following power cells: alkaline, lithium hydride, lithium ion, lithium polymer, nickel cadmium, solar cells, and/or the like. Other types of AC or DC power sources may be used as well. In the case of solar cells, in one embodiment, the case provides an aperture through which the solar cell may capture photonic energy. The power cell 3586 is connected to at least one of the interconnected subsequent components of the GCSI/CTIS thereby providing an electric current to all subsequent components. In one example, the power source 3586 is connected to the system bus component 3504. In an alternative embodiment, an outside power source 3586 is provided through a connection across the I/O 3508 interface. For example, a USB and/or IEEE 1394 connection carries both data and power across the connection and is therefore a suitable source of power.
Interface Adapters
[00195] Interface bus(ses) 3507 may accept, connect, and/or communicate to a number of interface adapters, conventionally although not necessarily in the form of adapter cards, such as but not limited to: input output interfaces (I/O) 3508, storage interfaces 3509, network interfaces 3510, and/or the like. Optionally, cryptographic processor interfaces 3527 similarly may be connected to the interface bus. The interface bus provides for the communications of interface adapters with one another as well as with other components of the computer systemization. Interface adapters are adapted for a compatible interface bus. Interface adapters conventionally connect to the interface bus via a slot architecture. Conventional slot architectures may be employed, such as, but not limited to: Accelerated Graphics Port (AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (Extended) (PCI(X)), PCI Express, Personal Computer Memory Card International Association (PCMCIA), and/or the like.
[00196] Storage interfaces 3509 may accept, communicate, and/or connect to a number of storage devices such as, but not limited to: storage devices 3514, removable disc devices, and/or the like. Storage interfaces may employ connection protocols such as, but not limited to: (Ultra) (Serial) Advanced Technology Attachment (Packet Interface) ((Ultra) (Serial) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, fiber channel, Small Computer Systems Interface (SCSI), Universal Serial Bus (USB), and/or the like.
[00197] Network interfaces 3510 may accept, communicate, and/or connect to a communications network 3513. Through a communications network 3513, the GCSI/CTIS controller is accessible through remote clients 3533b (e.g.,, computers with web browsers) by users 3533a. Network interfaces may employ connection protocols such as, but not limited to: direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), Token Ring, wireless connection such as IEEE 802.1 la-x, and/or the like. A communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); a Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g.,, employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like. A network interface may be regarded as a specialized form of an input output interface. Further, multiple network interfaces 3510 may be used to engage with various communications network types 3513. For example, multiple network interfaces may be employed to allow for the communication over broadcast, multicast, and/or unicast networks.
[00198] Input Output interfaces (I/O) 3508 may accept, communicate, and/or connect to user input devices 351 1, peripheral devices 3512, cryptographic processor devices 3528, and/or the like. I/O may employ connection protocols such as, but not limited to: Apple Desktop Bus (ADB); Apple Desktop Connector (ADC); audio: analog, digital, monaural, RCA, stereo, and/or the like; IEEE 1394a-b; infrared; joystick; keyboard; midi; optical; PC AT; PS/2; parallel; radio; serial; USB; video interface: BNC, coaxial, composite, digital, Digital Visual Interface (DVI), RCA, RF antennae, S-Video, VGA, and/or the like; wireless; and/or the like. A common output device is a television set, which accepts signals from a video interface. Also, a video display, which typically comprises a Cathode Ray Tube (CRT) or Liquid Crystal Display (LCD) based monitor with an interface (e.g.,, DVI circuitry and cable) that accepts signals from a video interface, may be used. The video interface composites information generated by a computer systemization and generates video signals based on the composited information in a video memory frame. Typically, the video interface provides the composited video information through a video connection interface that accepts a video display interface (e.g.,, an RCA composite video connector accepting an RCA composite video cable; a DVI connector accepting a DVI display cable, etc.).
[00199] User input devices 351 1 may be card readers, dongles, finger print readers, gloves, graphics tablets, joysticks, keyboards, mouse (mice), remote controls, retina readers, trackballs, trackpads, and/or the like.
[00200] Peripheral devices 3512 may be connected and/or communicate to I/O and/or other facilities of the like such as network interfaces, storage interfaces, and/or the like. Peripheral devices may be audio devices, cameras, dongles (e.g.,, for copy protection, ensuring secure transactions with a digital signature, and/or the like), external processors (for added functionality), goggles, microphones, monitors, network interfaces, printers, scanners, storage devices, video devices, video sources, visors, and/or the like.
[00201 ] It should be noted that although user input devices and peripheral devices may be employed, the GCSI/CTIS controller may be embodied as an embedded, dedicated, and/or monitor-less (i.e.,, headless) device, wherein access would be provided over a network interface connection.
[00202 ] Cryptographic units such as, but not limited to, microcontrollers, processors 3526, interfaces 3527, and/or devices 3528 may be attached, and/or communicate with the GCSI/CTIS controller. A MC68HC16 microcontroller, commonly manufactured by Motorola Inc., may be used for and/or within cryptographic units. Equivalent microcontrollers and/or processors may also be used. The MC68HC16 microcontroller utilizes a 16-bit multiply-and-accumulate instruction in the 16 MHz configuration and requires less than one second to perform a 512-bit RSA private key operation. Cryptographic units support the authentication of communications from interacting agents, as well as allow for anonymous transactions. Cryptographic units may also be configured as part of CPU. Other commercially available specialized cryptographic processors include VLSI Technology's 33 MHz 6868 or Semaphore Communications' 40 MHz Roadrunner 184.
Memory
[00203 ] Generally, any mechanization and/or embodiment allowing a processor to affect the storage and/or retrieval of information is regarded as memory 3529. However, memory is a fungible technology and resource, thus, any number of memory embodiments may be employed in lieu of or in concert with one another. It is to be understood that the GCSI/CTIS controller and/or a computer systemization may employ various forms of memory 3529. For example, a computer systemization may be configured wherein the functionality of on-chip CPU memory (e.g.,, registers), RAM, ROM, and any other storage devices are provided by a paper punch tape or paper punch card mechanism; of course such an embodiment would result in an extremely slow rate of operation. In a typical configuration, memory 3529 will include ROM 3506, RAM 3505, and a storage device 3514. A storage device 3514 may be any conventional computer system storage. Storage devices may include a drum; a (fixed and/or removable) magnetic disk drive; a magneto-optical drive; an optical drive (i.e.,, CD ROM/RAM/Recordable (R), Rewritable (RW), DVD R/RW, etc.); an array of devices (e.g.,, Redundant Array of Independent Disks (RAID)); and/or other devices of the like. Thus, a computer systemization generally requires and makes use of memory.
Component Collection
[00204] The memory 3529 may contain a collection of program and/or database components and/or data such as, but not limited to: operating system component(s) 3515 (operating system); information server component(s) 3516 (information server); user interface component(s) 3517 (user interface); Web browser component(s) 3518 (Web browser); database(s) 3519; mail server component(s) 3521; mail client component(s) 3522; cryptographic server component(s) 3520 (cryptographic server); the GCSI/CTIS component(s) 3535; and/or the like (i.e.,, collectively a component collection). These components may be stored and accessed from the storage devices and/or from storage devices accessible through an interface bus. Although non-conventional program components such as those in the component collection, typically, are stored in a local storage device 3514, they may also be loaded and/or stored in memory such as: peripheral devices, RAM, remote storage facilities through a communications network, ROM, various forms of memory, and/or the like.
Operating System
[00205] The operating system component 3515 is an executable program component facilitating the operation of the GCSI/CTIS controller. Typically, the operating system facilitates access of I/O, network interfaces, peripheral devices, storage devices, and/or the like. The operating system may be a highly fault tolerant, scalable, and secure system such as Apple Macintosh OS X (Server), AT&T Plan 9, Be OS, Linux, Unix, and/or the like operating systems. However, more limited and/or less secure operating systems also may be employed such as Apple Macintosh OS, Microsoft DOS, Microsoft Windows 2000/2003/3.1/95/98/CE/Millenium/NT/Vista/XP (Server), Palm OS, and/or the like. An operating system may communicate to and/or with other components in a component collection, including itself, and/or the like. Most frequently, the operating system communicates with other program components, user interfaces, and/or the like. For example, the operating system may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses. The operating system, once executed by the CPU, may enable the interaction with communications networks, data, I/O, peripheral devices, program components, memory, user input devices, and/or the like. The operating system may provide communications protocols that allow the GCSI/CTIS controller to communicate with other entities through a communications network 3513. Various communication protocols may be used by the GCSI/CTIS system controller as a subcarrier transport mechanism for interaction, such as, but not limited to: multicast, TCP/IP, UDP, unicast, and/or the like. Information Server
[00206] An information server component 3516 is a stored program component that is executed by a CPU. The information server may be a conventional Internet information server such as, but not limited to Apache Software Foundation's Apache, Microsoft's Internet Information Server, and/or the. The information server may allow for the execution of program components through facilities such as Active Server Page (ASP), ActiveX, (ANSI) (Objective-) C (++), C#, Common Gateway Interface (CGI) scripts, Java, JavaScript, Practical Extraction Report Language (PERL), Python, WebObjects, and/or the like. The information server may support secure communications protocols such as, but not limited to, File Transfer Protocol (FTP); HyperText Transfer Protocol (HTTP); Secure Hypertext Transfer Protocol (HTTPS), Secure Socket Layer (SSL), and/or the like. The information server provides results in the form of Web pages to Web browsers, and allows for the manipulated generation of the Web pages through interaction with other program components. After a Domain Name System (DNS) resolution portion of an HTTP request is resolved to a particular information server, the information server resolves requests for information at specified locations on the GCSI/CTIS controller based on the remainder of the HTTP request. For example, a request such as http://123.124.125.126/myInformation.html might have the IP portion of the request "123.124.125.126" resolved by a DNS server to an information server at that IP address; that information server might in turn further parse the http request for the "/mylnformation.html" portion of the request and resolve it to a location in memory containing the information "mylnformation.html." Additionally, other information serving protocols may be employed across various ports, e.g.,, FTP communications across port 21, and/or the like. An information server may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the information server communicates with the GCSI/CTIS database 3519, operating systems, other program components, user interfaces, Web browsers, and/or the like.
[00207] Access to the GCSI/CTIS database may be achieved through a number of database bridge mechanisms such as through scripting languages as enumerated below (e.g.,, CGI) and through inter-application communication channels as enumerated below (e.g.,, CORBA, WebObjects, etc.). Any data requests through a Web browser are parsed through the bridge mechanism into appropriate grammars as required by the GCSI CTIS. In one embodiment, the information server would provide a Web form accessible by a Web browser. Entries made into supplied fields in the Web form are tagged as having been entered into the particular fields, and parsed as such. The entered terms are then passed along with the field tags, which act to instruct the parser to generate queries directed to appropriate tables and/or fields. In one embodiment, the parser may generate queries in standard SQL by instantiating a search string with the proper join/select commands based on the tagged text entries, wherein the resulting command is provided over the bridge mechanism to the GCSI/CTIS as a query. Upon generating query results from the query, the results are passed over the bridge mechanism, and may be parsed for formatting and generation of a new results Web page by the bridge mechanism. Such a new results Web page is then provided to the information server, which may supply it to the requesting Web browser.
[00208] Also, an information server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses. User Interface
[00209] The function of computer interfaces in some respects is similar to automobile operation interfaces. Automobile operation interface elements such as steering wheels, gearshifts, and speedometers facilitate the access, operation, and display of automobile resources, functionality, and status. Computer interaction interface elements such as check boxes, cursors, menus, scrollers, and windows (collectively and commonly referred to as widgets) similarly facilitate the access, operation, and display of data and computer hardware and operating system resources, functionality, and status. Operation interfaces are commonly called user interfaces. Graphical user interfaces (GUIs) such as the Apple Macintosh Operating System's Aqua, Microsoft's Windows XP, or Unix's X-Windows provide a baseline and means of accessing and displaying information graphically to users.
[00210] A user interface component 3517 is a stored program component that is executed by a CPU. The user interface may be a conventional graphic user interface as provided by, with, and/or atop operating systems and/or operating environments such as Apple Macintosh OS, e.g.,, Aqua, G USTEP, Microsoft Windows ( T/XP), Unix X Windows (KDE, Gnome, and/or the like), mythTV, and/or the like. The user interface may allow for the display, execution, interaction, manipulation, and/or operation of program components and/or system facilities through textual and/or graphical facilities. The user interface provides a facility through which users may affect, interact, and/or operate a computer system. A user interface may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the user interface communicates with operating systems, other program components, and/or the like. The user interface may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
Web Browser
[00211 ] A Web browser component 3518 is a stored program component that is executed by a CPU. The Web browser may be a conventional hypertext viewing application such as Microsoft Internet Explorer or Netscape Navigator. Secure Web browsing may be supplied with 128bit (or greater) encryption by way of HTTPS, SSL, and/or the like. Some Web browsers allow for the execution of program components through facilities such as Java, JavaScript, ActiveX, and/or the like. Web browsers and like information access tools may be integrated into PDAs, cellular telephones, and/or other mobile devices. A Web browser may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the Web browser communicates with information servers, operating systems, integrated program components (e.g.,, plug-ins), and/or the like; e.g.,, it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses. Of course, in place of a Web browser and information server, a combined application may be developed to perform similar functions of both. The combined application would similarly affect the obtaining and the provision of information to users, user agents, and/or the like from the GCSI/CTIS enabled nodes. The combined application may be nugatory on systems employing standard Web browsers.
Mail Server
[00212 ] A mail server component 3521 is a stored program component that is executed by a CPU 3503. The mail server may be a conventional Internet mail server such as, but not limited to sendmail, Microsoft Exchange, and/or the like. The mail server may allow for the execution of program components through facilities such as ASP, ActiveX, (ANSI) (Objective-) C (++), CGI scripts, Java, JavaScript, PERL, pipes, Python, WebObjects, and/or the like. The mail server may support communications protocols such as, but not limited to: Internet message access protocol (IMAP), Microsoft Exchange, post office protocol (POP3), simple mail transfer protocol (SMTP), and/or the like. The mail server can route, forward, and process incoming and outgoing mail messages that have been sent, relayed and/or otherwise traversing through and/or to the GCSI/CTIS.
[00213 ] Access to the GCSI/CTIS mail may be achieved through a number of APIs offered by the individual Web server components and/or the operating system.
[00214] Also, a mail server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses.
Mail Client
[00215] A mail client component 3522 is a stored program component that is executed by a CPU 3503. The mail client may be a conventional mail viewing application such as Apple Mail, Microsoft Entourage, Microsoft Outlook, Microsoft Outlook Express, Mozilla Thunderbird, and/or the like. Mail clients may support a number of transfer protocols, such as: IMAP, Microsoft Exchange, POP3, SMTP, and/or the like. A mail client may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the mail client communicates with mail servers, operating systems, other mail clients, and/or the like; e.g.,, it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses. Generally, the mail client provides a facility to compose and transmit electronic mail messages.
Cryptographic Server
[00216] A cryptographic server component 3520 is a stored program component that is executed by a CPU 3503, cryptographic processor 3526, cryptographic processor interface 3527, cryptographic processor device 3528, and/or the like. Cryptographic processor interfaces will allow for expedition of encryption and/or decryption requests by the cryptographic component; however, the cryptographic component, alternatively, may run on a conventional CPU. The cryptographic component allows for the encryption and/or decryption of provided data. The cryptographic component allows for both symmetric and asymmetric (e.g.,, Pretty Good Protection (PGP)) encryption and/or decryption. The cryptographic component may employ cryptographic techniques such as, but not limited to: digital certificates (e.g.,, X.509 authentication framework), digital signatures, dual signatures, enveloping, password access protection, public key management, and/or the like. The cryptographic component will facilitate numerous (encryption and/or decryption) security protocols such as, but not limited to: checksum, Data Encryption Standard (DES), Elliptical Curve Encryption (ECC), International Data Encryption Algorithm (IDEA), Message Digest 5 (MD5, which is a one way hash function), passwords, Rivest Cipher (RC5), Rijndael, RSA (which is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman), Secure Hash Algorithm (SHA), Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (HTTPS), and/or the like. Employing such encryption security protocols, the GCSI/CTIS may encrypt all incoming and/or outgoing communications and may serve as node within a virtual private network (VPN) with a wider communications network. The cryptographic component facilitates the process of "security authorization" whereby access to a resource is inhibited by a security protocol wherein the cryptographic component effects authorized access to the secured resource. In addition, the cryptographic component may provide unique identifiers of content, e.g.,, employing an MD5 hash to obtain a unique signature for a digital audio file. A cryptographic component may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. The cryptographic component supports encryption schemes allowing for the secure transmission of information across a communications network to enable the GCSI/CTIS component to engage in secure transactions if so desired. The cryptographic component facilitates the secure accessing of resources on the GCSI/CTIS and facilitates the access of secured resources on remote systems; i.e.,, it may act as a client and/or server of secured resources. Most frequently, the cryptographic component communicates with information servers, operating systems, other program components, and/or the like. The cryptographic component may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
The GCSI/CTIS Database
[00217] The GCSI CTIS database component 3519 may be embodied in a database and its stored data. The database is a stored program component, which is executed by the CPU; the stored program component portion configuring the CPU to process the stored data. The database may be a conventional, fault tolerant, relational, scalable, secure database such as Oracle or Sybase. Relational databases are an extension of a flat file. Relational databases consist of a series of related tables. The tables are interconnected via a key field. Use of the key field allows the combination of the tables by indexing against the key field; i.e.,, the key fields act as dimensional pivot points for combining information from various tables. Relationships generally identify links maintained between tables by matching primary keys. Primary keys represent fields that uniquely identify the rows of a table in a relational database. More precisely, they uniquely identify rows of a table on the "one" side of a one-to-many relationship.
[00218] Alternatively, the GCSI/CTIS database may be implemented using various standard data-structures, such as an array, hash, (linked) list, struct, structured text file (e.g.,, XML), table, and/or the like. Such data-structures may be stored in memory and/or in (structured) files. In another alternative, an object-oriented database may be used, such as Frontier, ObjectStore, Poet, Zope, and/or the like. Object databases can include a number of object collections that are grouped and/or linked together by common attributes; they may be related to other object collections by some common attributes. Object-oriented databases perform similarly to relational databases with the exception that objects are not just pieces of data but may have other types of functionality encapsulated within a given object. If the GCSI/CTIS database is implemented as a data- structure, the use of the GCSI CTIS database 3519 may be integrated into another component such as the GCSI CTIS component 3535. Also, the database may be implemented as a mix of data structures, objects, and relational structures. Databases may be consolidated and/or distributed in countless variations through standard data processing techniques. Portions of databases, e.g.,, tables, may be exported and/or imported and thus decentralized and/or integrated.
[00219] In one embodiment, the database component 3519 includes several tables 3519a,b. A user profile table 3519a includes fields such as, but not limited to: a user ID, name, email address, address, demographic profile, hardware ID, scan history record, scan statistics, and/or the like. The user profile table may support and/or track multiple entity accounts on a GCSI/CTIS. An Information Base table 3519b includes fields such as, but not limited to: Ad provider ID, Ad ID, Ad content, Ad labels, geographic tags, temporal tags, subject tags, Ad ratings, Ad statistics, and/or the like.
[00220] In one embodiment, the GCSI/CTIS database may interact with other database systems. For example, employing a distributed database system, queries and data access by OLBS modules may treat the combination of the GCSI/CTIS database, an integrated data security layer database as a single database entity.
[00221 ] In one embodiment, user programs may contain various user interface primitives, which may serve to update the GCSI/CTIS. Also, various accounts may require custom database tables depending upon the environments and the types of clients the GCSI/CTIS may need to serve. It should be noted that any unique fields may be designated as a key field throughout. In an alternative embodiment, these tables have been decentralized into their own databases and their respective database controllers (i.e.,, individual database controllers for each of the above tables). Employing standard data processing techniques, one may further distribute the databases over several computer systemizations and/or storage devices. Similarly, configurations of the decentralized database controllers may be varied by consolidating and/or distributing the various database components 3519a,b. The GCSI CTIS may be configured to keep track of various settings, inputs, and parameters via database controllers.
[00222 ] The GCSI/CTIS database may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the GCSI CTIS database communicates with the GCSI CTIS component, other program components, and/or the like. The database may contain, retain, and provide information regarding other nodes and data. The GCSI/CTIS Component
[00223 ] The GCSI/CTIS component 3535 is a stored program component that is executed by a CPU. The GCSI/CTIS affects accessing, obtaining and the provision of information, services, transactions, and/or the like across various communications networks.
[00224] The GCSI/CTIS component enables the identification, generation, and aggregation of Scan Messages and Reply Messages, and the provision of encoded symbologies in association with and/or proximity to other display elements, graphical features, and/or visual tokens.
[00225] The GCSI/CTIS component enabling access of information between nodes may be developed by employing standard development tools such as, but not limited to: (ANSI) (Objective-) C (++), Apache components, binary executables, database adapters, Java, JavaScript, mapping tools, procedural and object oriented development tools, PERL, Python, shell scripts, SQL commands, web application server extensions, WebObjects, and/or the like. In one embodiment, the GCSI/CTIS server employs a cryptographic server to encrypt and decrypt communications. The GCSI/CTIS component may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the GCSI/CTIS component communicates with the GCSI/CTIS database, operating systems, other program components, and/or the like. The GCSI/CTIS may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
Distributed GCSI/CTIS
[00226] The structure and/or operation of any of the GCSI/CTIS node controller components may be combined, consolidated, and/or distributed in any number of ways to - I l l - facilitate development and/or deployment. Similarly, the component collection may be combined in any number of ways to facilitate deployment and/or development. To accomplish this, one may integrate the components into a common code base or in a facility that can dynamically load the components on demand in an integrated fashion.
[00227] The component collection may be consolidated and/or distributed in countless variations through standard data processing and/or development techniques. Multiple instances of any one of the program components in the program component collection may be instantiated on a single node, and/or across numerous nodes to improve performance through load-balancing and/or data-processing techniques. Furthermore, single instances may also be distributed across multiple controllers and/or storage devices; e.g., databases. All program component instances and controllers working in concert may do so through standard data processing communication techniques.
[00228] The configuration of the GCSI/CTIS controller will depend on the context of system deployment. Factors such as, but not limited to, the budget, capacity, location, and/or use of the underlying hardware resources may affect deployment requirements and configuration. Regardless of if the configuration results in more consolidated and/or integrated program components, results in a more distributed series of program components, and/or results in some combination between a consolidated and distributed configuration, data may be communicated, obtained, and/or provided. Instances of components consolidated into a common code base from the program component collection may communicate, obtain, and/or provide data. This may be accomplished through intra-application data processing communication techniques such as, but not limited to: data referencing (e.g., pointers), internal messaging, object instance variable communication, shared memory space, variable passing, and/or the like. [00229] If component collection components are discrete, separate, and/or external to one another, then communicating, obtaining, and/or providing data with and/or to other component components may be accomplished through inter-application data processing communication techniques such as, but not limited to: Application Program Interfaces (API) information passage; (distributed) Component Object Model ((D)COM), (Distributed) Object Linking and Embedding ((D)OLE), and/or the like), Common Object Request Broker Architecture (CORBA), process pipes, shared files, and/or the like. Messages sent between discrete component components for inter-application communication or within memory spaces of a singular component for intra-application communication may be facilitated through the creation and parsing of a grammar. A grammar may be developed by using standard development tools such as lex, yacc, XML, and/or the like, which allow for grammar generation and parsing functionality, which in turn may form the basis of communication messages within and between components. Again, the configuration will depend upon the context of system deployment.
[00230] Additional embodiments may include:
1. An information serving processor-implemented method, comprising: accumulating user activity interest information;
accumulating user situational information;
associating the user activity interest information and user situational information with a user profile;
updating the user profile with the associated information in a database; analyzing accumulated information associated with the user profile;
querying an information database based on the analysis of the user profile; selecting information based on the user profile to include in a message; and sending the message to a user for provision in an augmented reality display.
2. The method of claim 1, wherein the information included in the message sent to the user is selected based on a ranking.
3. The method of claim 1, further comprising receiving a relevance rating of the message sent to the user.
4. The method of claim 1, further comprising updating an Ad profile based on the user activity interest information and user situational information.
5. The method of claim 1, further, comprising:
determining information to include in a message based on the querying of the information database.
6. The method of claim 1, wherein the user situational information includes geographic location.
7. The method of claim 6, wherein the user situational information includes geographic location at a given time.
8. The method of claim 1, wherein the user activity interest information further comprises a code scanned by a mobile device.
9. The method of claim 1, wherein the message sent to the user is sent to a mobile device.
10. The method of claim 1, wherein the message sent to the user is served on a website.
11. A processor- implemented method for serving information to a mobile device, comprising: receiving messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan;
associating the user identification with a user profile in a database; updating the user profile with the received messages;
analyzing the accumulated messages in the user profile; determining information to serve to the user based on the received message and the user profile;
selecting the information to serve to the user from a database;
incorporating the selected information into a reply message; and sending the reply message to the user's mobile device for provision in an augmented reality display.
12. An information receiving processor-implemented method, comprising: accumulating user activity interest information;
accumulating user situational information;
incorporating user activity interest information in an interest message; incorporating user situational information in a situational message; sending the interest message to a server;
sending the situational message to the server; and
receiving a reply based on the interest message, the situational message, and a user profile, wherein the reply is configured for provision in an augmented reality display.
13. The method of claim 12, wherein the interest message and situational message are bundled into a single message. 14. The method of claim 12, further comprising responding to the reply with a relevance rating.
15. The method of claim 12, wherein the reply is received on a mobile device.
16. The method of claim 12, wherein the interest message and situational message are sent from a mobile device.
17. The method of claim 12, wherein the user activity interest information further comprises a code scanned by a mobile device.
18. The method of claim 12, wherein the user situational information includes geographic location at a given time.
19. An information serving apparatus, comprising:
a memory;
a processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to:
accumulate user activity interest information;
accumulate user situational information;
associate the user activity interest information and user situational information with a user profile;
update the user profile with the associated information in a database; analyze accumulated information associated with the user profile;
query an information database based on the analysis of the user profile; select information based on the user profile to include in a message; and send the message to a user for provision in an augmented reality display.
20. The apparatus of claim 19, wherein the information included in the message sent to the user is selected based on a ranking. 21. The apparatus of claim 19, further comprising:
receive a relevance rating of the message sent to the user.
22. The apparatus of claim 19, further comprising:
update an Ad profile based on the user activity interest information and user situational information.
23. The apparatus of claim 19, further, comprising:
determine information to include in a message based on the querying of the information database.
24. The apparatus of claim 19, wherein the user situational information includes geographic location.
25. The apparatus of claim 24, wherein the user situational information includes geographic location at a given time.
26. The apparatus of claim 19, wherein the user activity interest information further comprises a code scanned by a mobile device.
27. The apparatus of claim 19, wherein the message sent to the user is sent to a mobile device.
28. The apparatus of claim 19, wherein the message sent to the user is served on a website.
29. An apparatus for serving information to a mobile device, comprising: a memory;
a processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to: receive messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan;
associate the user identification with a user profile in a database;
update the user profile with the received messages;
analyze the accumulated messages in the user profile;
determine information to serve to the user based on the received message and the user profile;
select the information to serve to the user from a database; incorporate the selected information into a reply message; and send the reply message to the user's mobile device for provision in an augmented reality display.
30. An information receiving apparatus, comprising:
a memory;
a processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to:
accumulate user activity interest information;
accumulate user situational information;
incorporate user activity interest information in an interest message; incorporate user situational information in a situational message;
send the interest message to a server;
send the situational message to the server; and receive a reply based on the interest message, the situational message, and a user profile, wherein the reply is configured for provision in an augmented reality display.
31. The apparatus of claim 30, wherein the interest message and situational message are bundled into a single message.
32. The apparatus of claim 30, further comprising:
respond to the reply with a relevance rating.
33. The apparatus of claim 30, wherein the reply is received on a mobile device.
34. The apparatus of claim 30, wherein the interest message and situational message are sent from a mobile device.
35. The apparatus of claim 30, wherein the user activity interest information further comprises a code scanned by a mobile device.
36. The apparatus of claim 30, wherein the user situational information includes geographic location at a given time.
37. An information serving processor-accessible medium, comprising:
a plurality of processing instructions stored in the medium and issuable by a processor to:
accumulate user activity interest information;
accumulate user situational information;
associate the user activity interest information and user situational information with a user profile;
update the user profile with the associated information in a database; analyze accumulated information associated with the user profile;
query an information database based on the analysis of the user profile; select information based on the user profile to include in a message; and send the message to a user for provision in an augmented reality display.
38. The medium of claim 37, wherein the information included in the message sent to the user is selected based on a ranking.
39. The medium of claim 37, further comprising:
receive a relevance rating of the message sent to the user.
40. The medium of claim 37, further comprising:
update an Ad profile based on the user activity interest information and user situational information.
41. The medium of claim 37, further, comprising:
determine information to include in a message based on the querying of the information database.
42. The medium of claim 37, wherein the user situational information includes geographic location.
43. The medium of claim 42, wherein the user situational information includes geographic location at a given time.
44. The medium of claim 37, wherein the user activity interest information further comprises a code scanned by a mobile device.
45. The medium of claim 37, wherein the message sent to the user is sent to a mobile device.
46. The medium of claim 37, wherein the message sent to the user is served on a website.
47. A processor-accessible medium for serving information to a mobile device, comprising: a plurality of processing instructions stored in the medium and issuable by a processor to:
receive messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan;
associate the user identification with a user profile in a database;
update the user profile with the received messages;
analyze the accumulated messages in the user profile;
determine information to serve to the user based on the received message and the user profile;
select the information to serve to the user from a database; incorporate the selected information into a reply message; and send the reply message to the user's mobile device for provision in an augmented reality display.
48. An information receiving processor-accessible medium, comprising: a plurality of processing instructions stored in the medium and issuable by a processor to:
accumulate user activity interest information;
accumulate user situational information;
incorporate user activity interest information in an interest message; incorporate user situational information in a situational message;
send the interest message to a server;
send the situational message to the server; and receive a reply based on the interest message, the situational message, and a user profile, wherein the reply is configured for provision in an augmented reality display.
49. The medium of claim 48, wherein the interest message and situational message are bundled into a single message.
50. The medium of claim 48, further comprising:
respond to the reply with a relevance rating.
51. The medium of claim 48, wherein the reply is received on a mobile device.
52. The medium of claim 48, wherein the interest message and situational message are sent from a mobile device.
53. The medium of claim 48, wherein the user activity interest information further comprises a code scanned by a mobile device.
54. The medium of claim 48, wherein the user situational information includes geographic location at a given time.
55. An information serving processor-implemented system, comprising:
means to accumulate user activity interest information;
means to accumulate user situational information;
means to associate the user activity interest information and user situational information with a user profile;
means to update the user profile with the associated information in a database;
means to analyze accumulated information associated with the user profile;
means to query an information database based on the analysis of the user profile; means to select information based on the user profile to include in a message; and
means to send the message to a user for provision in an augmented reality display.
56. The system of claim 55, wherein the information included in the message sent to the user is selected based on a ranking.
57. The system of claim 55, further comprising:
means to receive a relevance rating of the message sent to the user.
58. The system of claim 55, further comprising:
means to update an Ad profile based on the user activity interest information and user situational information.
59. The system of claim 55, further, comprising:
means to determine information to include in a message based on the querying of the information database.
60. The system of claim 55, wherein the user situational information includes geographic location.
61. The system of claim 60, wherein the user situational information includes geographic location at a given time.
62. The system of claim 55, wherein the user activity interest information further comprises a code scanned by a mobile device.
63. The system of claim 55, wherein the message sent to the user is sent to a mobile device.
64. The system of claim 55, wherein the message sent to the user is served on a website. 65. A processor-implemented system for serving information to a mobile device, comprising:
means to receive messages from a user comprised of user identification, mobile device identification, time of the scan, and user geographic location at the time of the scan;
means to associate the user identification with a user profile in a database; means to update the user profile with the received messages; means to analyze the accumulated messages in the user profile;
means to determine information to serve to the user based on the received message and the user profile;
means to select the information to serve to the user from a database; means to incorporate the selected information into a reply message; and means to send the reply message to the user's mobile device for provision in an augmented reality display.
66. An information receiving processor-implemented system, comprising: means to accumulate user activity interest information;
means to accumulate user situational information;
means to incorporate user activity interest information in an interest message;
means to incorporate user situational information in a situational message; means to send the interest message to a server;
means to send the situational message to the server; and
means to receive a reply based on the interest message, the situational message, and a user profile, wherein the reply is configured for provision in an augmented reality display. 67. The system of claim 66, wherein the interest message and situational message are bundled into a single message.
68. The system of claim 66, further comprising:
means to respond to the reply with a relevance rating.
69. The system of claim 66, wherein the reply is received on a mobile device.
70. The system of claim 66, wherein the interest message and situational message are sent from a mobile device.
71. The system of claim 66, wherein the user activity interest information further comprises a code scanned by a mobile device.
72. The system of claim 66, wherein the user situational information includes geographic location at a given time.
[00231 ]
[00232 ] The entirety of this disclosure (including the Cover Page, Title, Headings, Field, Background, Summary, Brief Description of the Drawings, Detailed Description, Claims, Abstract, Figures, and otherwise) shows by way of illustration various embodiments in which the claimed inventions may be practiced. The advantages and features of the disclosure are of a representative sample of embodiments only, and are not exhaustive and/or exclusive. They are presented only to assist in understanding and teach the claimed principles. It should be understood that they are not representative of all claimed inventions. As such, certain aspects of the disclosure have not been discussed herein. That alternate embodiments may not have been presented for a specific portion of the invention or that further undescribed alternate embodiments may be available for a portion is not to be considered a disclaimer of those alternate embodiments. It will be appreciated that many of those undescribed embodiments incorporate the same principles of the invention and others are equivalent. Thus, it is to be understood that other embodiments may be utilized and functional, logical, organizational, structural and/or topological modifications may be made without departing from the scope and/or spirit of the disclosure. As such, all examples and/or embodiments are deemed to be non-limiting throughout this disclosure. Also, no inference should be drawn regarding those embodiments discussed herein relative to those not discussed herein other than it is as such for purposes of reducing space and repetition. For instance, it is to be understood that the logical and/or topological structure of any combination of any program components (a component collection), other components and/or any present feature sets as described in the figures and/or throughout are not limited to a fixed operating order and/or arrangement, but rather, any disclosed order is exemplary and all equivalents, regardless of order, are contemplated by the disclosure. Furthermore, it is to be understood that such features are not limited to serial execution, but rather, any number of threads, processes, services, servers, and/or the like that may execute asynchronously, concurrently, in parallel, simultaneously, synchronously, and/or the like are contemplated by the disclosure. As such, some of these features may be mutually contradictory, in that they cannot be simultaneously present in a single embodiment. Similarly, some features are applicable to one aspect of the invention, and inapplicable to others. In addition, the disclosure includes other inventions not presently claimed. Applicant reserves all rights in those presently unclaimed inventions including the right to claim such inventions, file additional applications, continuations, continuations in part, divisions, and/or the like thereof. As such, it should be understood that advantages, embodiments, examples, functional, features, logical, organizational, structural, topological, and/or other aspects of the disclosure are not to be considered limitations on the disclosure as defined by the claims or limitations on equivalents to the claims.

Claims

CLAIMS What is claimed is:
1. An information serving processor-implemented method, comprising: accumulating user activity interest information comprising voice trigger inputs;
accumulating user situational information;
associating the user activity interest information and user situational information with a user profile;
updating the user profile with the associated information in a database; analyzing accumulated information associated with the user profile;
querying an information database based on the analysis of the user profile; selecting information based on the user profile to include in a message; and
sending the message to a user.
2. The method of claim 1, wherein the information included in the message sent to the user is selected based on a ranking.
3. The method of claim 1, further comprising receiving a relevance rating of the message sent to the user.
4. The method of claim 1, further comprising updating an Ad profile based on the user activity interest information and user situational information.
5. The method of claim 1, further, comprising:
determining information to include in a message based on the querying of the information database.
6. The method of claim 1, wherein the user situational information includes geographic location.
7. The method of claim 6, wherein the user situational information includes geographic location at a given time.
8. The method of claim 1, wherein the user activity interest information further comprises a code scanned by a mobile device.
9. The method of claim 1, wherein the message sent to the user is sent to a mobile device.
10. The method of claim 1, wherein the message sent to the user is served on a website.
11. A processor- implemented method for serving information to a mobile device, comprising:
receiving messages from a user comprised of user identification, mobile device identification, voice trigger inputs, time of the scan, and user geographic location at the time of the scan;
associating the user identification with a user profile in a database;
updating the user profile with the received messages;
analyzing the accumulated messages in the user profile;
determining information to serve to the user based on the received message and the user profile;
selecting the information to serve to the user from a database; incorporating the selected information into a reply message; and sending the reply message to the user's mobile device.
12. An information receiving processor-implemented method, comprising: accumulating user activity interest information comprising voice trigger inputs;
accumulating user situational information;
incorporating user activity interest information in an interest message; incorporating user situational information in a situational message;
sending the interest message to a server;
sending the situational message to the server; and
receiving a reply based on the interest message, the situational message, and a user profile.
13. The method of claim 12, wherein the interest message and situational message are bundled into a single message.
14. The method of claim 12, further comprising responding to the reply with a relevance rating.
15. The method of claim 12, wherein the reply is received on a mobile device.
16. The method of claim 12, wherein the interest message and situational message are sent from a mobile device.
17. The method of claim 12, wherein the user activity interest information further comprises a code scanned by a mobile device.
18. The method of claim 12, wherein the user situational information includes geographic location at a given time.
19. An information serving apparatus, comprising:
a memory;
a processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to: accumulate user activity interest information comprising voice trigger inputs;
accumulate user situational information;
associate the user activity interest information and user situational information with a user profile;
update the user profile with the associated information in a database; analyze accumulated information associated with the user profile; query an information database based on the analysis of the user profile; select information based on the user profile to include in a message; and send the message to a user.
20. The apparatus of claim 19, wherein the information included in the message sent to the user is selected based on a ranking.
21. The apparatus of claim 19, further comprising:
receive a relevance rating of the message sent to the user.
22. The apparatus of claim 19, further comprising:
update an Ad profile based on the user activity interest information and user situational information.
23. The apparatus of claim 19, further, comprising:
determine information to include in a message based on the querying of the information database.
24. The apparatus of claim 19, wherein the user situational information includes geographic location.
25. The apparatus of claim 24, wherein the user situational information includes geographic location at a given time.
26. The apparatus of claim 19, wherein the user activity interest information further comprises a code scanned by a mobile device.
27. The apparatus of claim 19, wherein the message sent to the user is sent to a mobile device.
28. The apparatus of claim 19, wherein the message sent to the user is served on a website.
29. An apparatus for serving information to a mobile device, comprising: a memory;
a processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to:
receive messages from a user comprised of user identification, mobile device identification, voice trigger inputs, time of the scan, and user geographic location at the time of the scan;
associate the user identification with a user profile in a database;
update the user profile with the received messages;
analyze the accumulated messages in the user profile;
determine information to serve to the user based on the received message and the user profile;
select the information to serve to the user from a database; incorporate the selected information into a reply message; and send the reply message to the user's mobile device.
30. An information receiving apparatus, comprising:
a memory; a processor disposed in communication with said memory and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to:
accumulate user activity interest information comprising voice trigger inputs;
accumulate user situational information;
incorporate user activity interest information in an interest message; incorporate user situational information in a situational message;
send the interest message to a server;
send the situational message to the server; and
receive a reply based on the interest message, the situational message, and a user profile.
31. The apparatus of claim 30, wherein the interest message and situational message are bundled into a single message.
32. The apparatus of claim 30, further comprising:
respond to the reply with a relevance rating.
33. The apparatus of claim 30, wherein the reply is received on a mobile device.
34. The apparatus of claim 30, wherein the interest message and situational message are sent from a mobile device.
35. The apparatus of claim 30, wherein the user activity interest information further comprises a code scanned by a mobile device.
36. The apparatus of claim 30, wherein the user situational information includes geographic location at a given time.
37. An information serving processor-accessible medium, comprising: a plurality of processing instructions stored in the medium and issuable by a processor to:
accumulate user activity interest information comprising voice trigger inputs;
accumulate user situational information;
associate the user activity interest information and user situational information with a user profile;
update the user profile with the associated information in a database; analyze accumulated information associated with the user profile;
query an information database based on the analysis of the user profile; select information based on the user profile to include in a message; and send the message to a user.
38. The medium of claim 37, wherein the information included in the message sent to the user is selected based on a ranking.
39. The medium of claim 37, further comprising:
receive a relevance rating of the message sent to the user.
40. The medium of claim 37, further comprising:
update an Ad profile based on the user activity interest information and user situational information.
41. The medium of claim 37, further, comprising:
determine information to include in a message based on the querying of the information database.
42. The medium of claim 37, wherein the user situational information includes geographic location.
43. The medium of claim 42, wherein the user situational information includes geographic location at a given time.
44. The medium of claim 37, wherein the user activity interest information further comprises a code scanned by a mobile device.
45. The medium of claim 37, wherein the message sent to the user is sent to a mobile device.
46. The medium of claim 37, wherein the message sent to the user is served on a website.
47. A processor-accessible medium for serving information to a mobile device, comprising:
a plurality of processing instructions stored in the medium and issuable by a processor to:
receive messages from a user comprised of user identification, mobile device identification, voice trigger inputs, time of the scan, and user geographic location at the time of the scan;
associate the user identification with a user profile in a database;
update the user profile with the received messages;
analyze the accumulated messages in the user profile;
determine information to serve to the user based on the received message and the user profile;
select the information to serve to the user from a database; incorporate the selected information into a reply message; and send the reply message to the user's mobile device.
48. An information receiving processor-accessible medium, comprising: a plurality of processing instructions stored in the medium and issuable by a processor to:
accumulate user activity interest information comprising voice trigger inputs;
accumulate user situational information;
incorporate user activity interest information in an interest message;
incorporate user situational information in a situational message;
send the interest message to a server;
send the situational message to the server; and
receive a reply based on the interest message, the situational message, and a user profile.
49. The medium of claim 48, wherein the interest message and situational message are bundled into a single message.
50. The medium of claim 48, further comprising:
respond to the reply with a relevance rating.
51. The medium of claim 48, wherein the reply is received on a mobile device.
52. The medium of claim 48, wherein the interest message and situational message are sent from a mobile device.
53. The medium of claim 48, wherein the user activity interest information further comprises a code scanned by a mobile device.
54. The medium of claim 48, wherein the user situational information includes geographic location at a given time.
55. An information serving processor-implemented system, comprising:
means to accumulate user activity interest information comprising voice trigger inputs; means to accumulate user situational information;
means to associate the user activity interest information and user situational information with a user profile;
means to update the user profile with the associated information in a database;
means to analyze accumulated information associated with the user profile;
means to query an information database based on the analysis of the user profile;
means to select information based on the user profile to include in a message; and
means to send the message to a user.
56. The system of claim 55, wherein the information included in the message sent to the user is selected based on a ranking.
57. The system of claim 55, further comprising:
means to receive a relevance rating of the message sent to the user.
58. The system of claim 55, further comprising:
means to update an Ad profile based on the user activity interest information and user situational information.
59. The system of claim 55, further, comprising:
means to determine information to include in a message based on the querying of the information database.
60. The system of claim 55, wherein the user situational information includes geographic location.
61. The system of claim 60, wherein the user situational information includes geographic location at a given time.
62. The system of claim 55, wherein the user activity interest information further comprises a code scanned by a mobile device.
63. The system of claim 55, wherein the message sent to the user is sent to a mobile device.
64. The system of claim 55, wherein the message sent to the user is served on a website.
65. A processor-implemented system for serving information to a mobile device, comprising:
means to receive messages from a user comprised of user identification, mobile device identification, voice trigger inputs, time of the scan, and user geographic location at the time of the scan;
means to associate the user identification with a user profile in a database; means to update the user profile with the received messages; means to analyze the accumulated messages in the user profile;
means to determine information to serve to the user based on the received message and the user profile;
means to select the information to serve to the user from a database; means to incorporate the selected information into a reply message; and means to send the reply message to the user's mobile device.
66. An information receiving processor-implemented system, comprising: means to accumulate user activity interest information comprising voice trigger inputs;
means to accumulate user situational information; means to incorporate user activity interest information in an interest message;
means to incorporate user situational information in a situational message; means to send the interest message to a server;
means to send the situational message to the server; and
means to receive a reply based on the interest message, the situational message, and a user profile.
67. The system of claim 66, wherein the interest message and situational message are bundled into a single message.
68. The system of claim 66, further comprising:
means to respond to the reply with a relevance rating.
69. The system of claim 66, wherein the reply is received on a mobile device.
70. The system of claim 66, wherein the interest message and situational message are sent from a mobile device.
71. The system of claim 66, wherein the user activity interest information further comprises a code scanned by a mobile device.
72. The system of claim 66, wherein the user situational information includes geographic location at a given time.
PCT/US2011/037247 2010-05-19 2011-05-19 Apparatuses,methods and systems for a voice-triggered codemediated augmented reality content delivery platform WO2011146776A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US34633510P 2010-05-19 2010-05-19
US34631310P 2010-05-19 2010-05-19
US61/346,313 2010-05-19
US61/346,335 2010-05-19

Publications (1)

Publication Number Publication Date
WO2011146776A1 true WO2011146776A1 (en) 2011-11-24

Family

ID=44992067

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/037247 WO2011146776A1 (en) 2010-05-19 2011-05-19 Apparatuses,methods and systems for a voice-triggered codemediated augmented reality content delivery platform

Country Status (1)

Country Link
WO (1) WO2011146776A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013091064A1 (en) * 2011-12-21 2013-06-27 Parta Dialogue Inc. System and method for measuring and improving the efficiency of social media campaigns
EP2660762A1 (en) * 2012-05-04 2013-11-06 BlackBerry Limited Interactive advertising on a mobile device
WO2015116186A1 (en) * 2014-01-31 2015-08-06 Empire Technology Development, Llc Evaluation of augmented reality skins
EP2803153A4 (en) * 2012-01-09 2015-08-12 Five9 Inc Qr data proxy and protocol gateway
US9953462B2 (en) 2014-01-31 2018-04-24 Empire Technology Development Llc Augmented reality skin manager
US9990772B2 (en) 2014-01-31 2018-06-05 Empire Technology Development Llc Augmented reality skin evaluation
US9996852B2 (en) 2011-12-21 2018-06-12 Engagement Labs Inc./Laboratoires Engagement Inc. System and method for measuring and improving the efficiency of social media campaigns
US10192359B2 (en) 2014-01-31 2019-01-29 Empire Technology Development, Llc Subject selected augmented reality skin

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060047704A1 (en) * 2004-08-31 2006-03-02 Kumar Chitra Gopalakrishnan Method and system for providing information services relevant to visual imagery
US20090061901A1 (en) * 2007-09-04 2009-03-05 Juha Arrasvuori Personal augmented reality advertising
US20090300100A1 (en) * 2008-05-30 2009-12-03 Carl Johan Freer Augmented reality platform and method using logo recognition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060047704A1 (en) * 2004-08-31 2006-03-02 Kumar Chitra Gopalakrishnan Method and system for providing information services relevant to visual imagery
US20090061901A1 (en) * 2007-09-04 2009-03-05 Juha Arrasvuori Personal augmented reality advertising
US20090300100A1 (en) * 2008-05-30 2009-12-03 Carl Johan Freer Augmented reality platform and method using logo recognition

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013091064A1 (en) * 2011-12-21 2013-06-27 Parta Dialogue Inc. System and method for measuring and improving the efficiency of social media campaigns
US9070140B2 (en) 2011-12-21 2015-06-30 Paul Allard System and method for measuring and improving the efficiency of social media campaigns
US9996852B2 (en) 2011-12-21 2018-06-12 Engagement Labs Inc./Laboratoires Engagement Inc. System and method for measuring and improving the efficiency of social media campaigns
EP2803153A4 (en) * 2012-01-09 2015-08-12 Five9 Inc Qr data proxy and protocol gateway
US9280541B2 (en) 2012-01-09 2016-03-08 Five9, Inc. QR data proxy and protocol gateway
EP2660762A1 (en) * 2012-05-04 2013-11-06 BlackBerry Limited Interactive advertising on a mobile device
WO2015116186A1 (en) * 2014-01-31 2015-08-06 Empire Technology Development, Llc Evaluation of augmented reality skins
US9865088B2 (en) 2014-01-31 2018-01-09 Empire Technology Development Llc Evaluation of augmented reality skins
KR101821982B1 (en) * 2014-01-31 2018-01-25 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 Evaluation of augmented reality skins
US9953462B2 (en) 2014-01-31 2018-04-24 Empire Technology Development Llc Augmented reality skin manager
US9990772B2 (en) 2014-01-31 2018-06-05 Empire Technology Development Llc Augmented reality skin evaluation
US10192359B2 (en) 2014-01-31 2019-01-29 Empire Technology Development, Llc Subject selected augmented reality skin

Similar Documents

Publication Publication Date Title
US20120205436A1 (en) System for enhanced barcode decoding and image recognition and method therefor
US20110264527A1 (en) Apparatuses, Methods and Systems for a Code-Mediated Content Delivery Platform
US20140122220A1 (en) Apparatuses, methods and systems for measuring, and following up on user preferences among offer types and response options in a marketing campaign
US20130191394A1 (en) System and method for dynamically forming user groups
US20140067958A1 (en) Apparatuses, methods and systems for affiliating users of an information acquisition system
US20130262233A1 (en) Apparatuses, methods and systems for generating 3d content based on detected mobile device capability
US8069169B2 (en) Apparatuses, methods and systems for information querying and serving on the internet based on profiles
US20130325567A1 (en) System and method for creating a virtual coupon
US20140058812A1 (en) System and method for interactive mobile ads
US20130198004A1 (en) System and method for providing content information via sms messaging
US20100306318A1 (en) Apparatuses, methods, and systems for a graphical code-serving interface
WO2013120064A1 (en) System and method for sending messages to a user in a capture environment
US20130191250A1 (en) System and method for augmented reality using multi-modal sensory recognition from artifacts of interest
US20130290106A1 (en) System and method for providing directions to items of interest
US20130193201A1 (en) System and method for accessing product information for an informed response
WO2013126894A1 (en) Method and system for requesting a coupon at a point-of-sale location
WO2011146776A1 (en) Apparatuses,methods and systems for a voice-triggered codemediated augmented reality content delivery platform
US20130246182A1 (en) Apparatuses, methods and systems for acquiring information from objects in a virtual space
US20130254038A1 (en) Apparatuses, methods and systems for sharing promotional information from a 3-d scan from a mobile device
JP2015503148A (en) Identifying the same user of multiple communication devices based on web page visits, application usage, location, or route
WO2013126382A1 (en) System and method for linking media expressions for purchasing a product or other actionable events
WO2013123482A1 (en) System and method for mobile marketing, advertising, or interaction with a user
WO2013116816A1 (en) System and method of inferring user preferences
WO2008103732A1 (en) Apparatuses, methods, and systems for a graphical code-serving interface

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11784279

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11784279

Country of ref document: EP

Kind code of ref document: A1