Internet – Mark E. Roberts, Jennifer K. Mathe, Khanh Nguyen, Blackhawk Network Inc

Abstract for “System and Method for Targeted Marketing and Consumer Resource Management”

“Systems and methods can be used to offer consumers gift card exchange options. A consumer can choose to exchange registered gift cards by choosing the cards to swap and specifying the value to be swapped. Digitally swapping cards can be done via universal transaction cards, or the gift cards may be cancelled and replaced by one or more new cards. Partial gift card values may also be exchanged. A consumer account can be used to buy and configure gift cards which may be used for buying goods and services. The consumer account may include a universal transaction identifier that can be used to purchase goods or services from multiple providers.

Background for “System and Method for Targeted Marketing and Consumer Resource Management”

“1. “1.

“The invention concerns systems and methods that use computer network technology to give consumers resource management capabilities and to enhance the marketing channels of retailers, service providers, and manufacturers.”

“2. “2.

The Internet has become a global marketplace that allows consumers to buy goods and services online and transact electronically. The Internet has opened up new distribution channels and increased consumer reach through advertising. The Internet and many other more advanced technologies have evolved to offer retailers, service providers, and manufacturers (retailers?) There are many ways to draw consumers to traditional suppliers of goods. Many retailers offer gift cards that can be used in-store for a predetermined amount. Many retailers also have loyalty programs or awards programs and many have given consumers access to their accounts via the Internet. The Internet has been used by retailers to send coupons and direct notices about discounts and offers to consumers. To help determine what’s hot and what’s not, retailers may be able to obtain marketing information from consumers.

“Despite the incredible growth of the Internet market place, both consumers and retailers still face frustrations. The main source of frustration for consumers is resource management (managing information, coupon codes, receipts and spam, loyalty card cards, rebates, etc.). Gift cards are becoming increasingly popular but they can also be a source for confusion and clutter. The balance of most gift cards cannot be viewed online, so it is difficult for consumers to check the status. Often, gift cards are purchased from many retailers. It is important to keep track of gift cards. Gift cards are often discarded, which is a disadvantage for the consumer and a disadvantage to the retailer. Consumers often feel frustrated with the hassle of having to store receipts or receive unsolicited emails. They also have to remember multiple passwords in order to access loyalty programs and award programs.

Retailer frustration is caused by poor consumer information and attention. With so many offers and advertisements, consumers find it difficult to make use of them. This leaves retailers unsure of how successful their campaigns were, what products are selling, and who is buying which products. Retailers often target a specific consumer who is not interested in the product or service or at the right time. In an effort to capture consumers’ attention at the right time, retailers often overcommunicate with them. This can lead to consumers receiving irrelevant communications. These frustrations are not just related, but can also be caused by the other party. It is futile to try and solve one’s needs while simultaneously attending to the needs the other.

Consumers need to consolidate and manage their shopping resources. It is also necessary to give retailers access to customers in a focused and informed manner. Systems and methods that improve consumer resource management as well as provide retailers with better access to consumers are needed.

“In light of the above, we provide methods for managing consumer resources. A consumer interface is a terminal that can be used by a consumer to access the internet. A consumer can provide input to the network terminal. The input is then communicated to the enterprise infrastructure. Based on the input from the consumer at the enterprise infrastructure, a consumer account is created. A partner interface allows you to access a variety of services and goods providers through the consumer account. A consumer account can also be configured to allow the setting of fund balances for at most one selected service provider. To enable purchase from at least one of the selected providers, the consumer purchases a gift certificate from the enterprise infrastructure.

“Another aspect of the invention is the generation of a universal transaction ID from the enterprise infrastructure. This universal transaction ID corresponds to the consumer account and allows for purchases from a plurality service and goods providers.”

“Another aspect of the invention provides a method for targeted marketing by a good and service provider. The example method collects transaction data from terminals that process transactions at point-of-sale. Each transaction includes a unique consumer identifier. The transaction data are sent to an enterprise infrastructure. Based on the consumer identifiers, each transaction is assigned a consumer account in the enterprise infrastructure. The transaction data are then stored in the appropriate consumer accounts. The information about consumers who purchased goods or services from the provider of goods and service is given to the goods and the services provider. The information may be used by the goods and services provider to target consumers and offer coupons and discounts.

The following description and drawings will help you to better understand the various advantages, aspects, and novel features of this invention.

“Other systems and methods, as well as features, of the invention will be or become apparent to anyone with skill in art upon examination and description of the following figures. All such additional systems, methods and features, as well as their advantages, are to be described in this description. They will be covered by the accompanying claims.

“The following description of preferred embodiments refers to the accompanying drawings, which form a part of this document and show, as an illustration, specific embodiments where the invention can be used. You can use other embodiments and make structural changes without leaving the scope of this invention.

“I. “I.

“FIG. “FIG. The system 100 comprises an enterprise infrastructure 102 that can communicate over the Internet104 and secure network connections106. These connections may include connections over the Internet104 or any other suitable wide-area network (WAN), (e.g. Telecommunications networks. An enterprise may operate the enterprise infrastructure 102 by offering targeted marketing services to goods and service providers 108, 110 and consumer resource management services for consumers at network terminals 116, 118. Providers 108 and 110 can securely connect to the enterprise network 102 through secured network connections106. Secured network connections 106 allow providers 108, 110 to securely connect to the enterprise infrastructure 102. Retailers, 108, 110 and providers may use Point-of?Sale terminals 112,114 to connect to the enterprise infrastructure. 102 can be accessed over secured network connections 106. Consumers can access the enterprise infrastructure 102 via the Internet 104 using network terminals 116 and 118. These network terminals 116 and 118 can be personal computers, laptops or mobile devices that are capable of running World-Wide Web clients applications (e.g. web browsers.

FIG. 1. The POS terminals 112, 114 are used by retailers to interact with the enterprise infrastructure 102. You may also use other types of terminals such as network terminals (similar network terminals 116 and 118), which can include handheld devices, mobile phones or PCs. To give retailers access to enterprise infrastructure 102, network terminals can be made available at Kiosks.

FIG. 1. may include service providers and manufacturers, which may or not have a commercial presence online 104. Service providers, manufacturers and retailers that have a commercial presence online 104 might offer product distribution channels that allow consumers to buy goods on-line. A web-site may be used to allow credit card transactions, secure bank account access, account information, and account information for consumers who have accounts with the provider 108, 110. Banks may be included in the providers 108, 110 so that consumers can access funds.

“In FIG. 100, the providers 108, 110 may be in a business relationship (e.g. 1. The providers 110 and 108 may be in business relationships (e.g. Contractual) with the entity operating the enterprise infrastructure102, which allows for the configuration of electronic commercial access to partners via the enterprise architecture 102. The retailers 108 and 110 could be retailers who collect data from the POS terminals 112. 114 about purchases made at retailer’s stores. The providers 110 and 108 may be manufacturers who may use the enterprise infrastructure102 as a distribution channel for their products or as a source to target marketing information. The ‘partners’ are the providers 108, 110 who have a business relationship with the enterprise infrastructure102. This description.

“The enterprise infrastructure102 may be used by consumers who are members, subscribers, customers, or customers with an account with the enterprise infrastructure102. The consumer interface allows them to access, configure, and use the tools that are available on their accounts. To represent gift cards with a balance, consumers can either purchase gift cards or set up a universal transaction ID 120,122. A gift card may have a universal transaction identifier 120 or 122. Gift cards can only be used to make purchases at specific retailers, service providers, or manufacturers. However, the universal transaction ID 120,122 may be configured to allow a consumer to buy goods from other providers (108, 110). The universal transaction identifier 120 and 122 reading devices may be installed on the POS terminals 112, 114 to allow the association of the universal transaction identifier 122, 122 with a consumer account within the enterprise infrastructure 102. Data relating to the consumers may include information about the partners 108 and 110, as well as balances and limits on gift card amounts that can be used to purchase goods from each partner 110, 108.

“It should be noted that the universal transaction ID 120, 122 contains identifying information that is keyed into the consumer’s account within the enterprise infrastructure 101. The magnetic strip of universal transaction identifier (card 120, 122) records the identifying information in a manner similar to credit cards. However, the identifying information can be stored on a different card, such as a radio frequency identification transmitter (RFID), barcode or other suitable form. A thumbprint image may also be used to identify the user. This thumbprint image can be scanned at POS terminal 112, 114, or any other biometric identifier. Access to the system can also be achieved using an identification proxy, such as a user?s telephone number or another means of unique identification.

“A universal transaction identifier, also known as universal transaction card, may be used for purposes of this application. Neither of these identifiers require a physical card to be functional. A universal transaction identifier or universal transaction card can be used to identify a consumer and associate that identification with their account in the enterprise infrastructure 101. It is not necessary that any purchase of physical structures be used as universal transaction identifiers or universal card when referring to the purchase or use a universal transfer identifier.

“Consumers may interact with the enterprise infrastructure102 via a client app that connects to their accounts and provides tools for the consumer to manage consumer resources. The client application is the consumer interface to the enterprise infrastructure. The consumer’s front-end can perform functions such: buy gift cards, exchange gift cards and track balances. It also allows the consumer to subscribe to loyalty programs and track coupons from partners. They can store and sort receipts and redeem rebates and track. 10-21.”

“The enterprise infrastructure 102 could include a system network that can perform a variety services for consumers, providers 110, and providers 108. The system network contains applications that make it possible for consumers to access the consumer front-end as well as database storage systems to store information about providers and consumers. Hardware and software are also included in the system network to implement security measures to protect both system data and consumers’ data.

“In FIG. 100, an example system for targeted advertising and consumer resource management is shown. 1. The enterprise infrastructure 102 provides consumers a web-site with tools, features and functions that enable them to manage their consumer resources, purchase, obtain, and exchange gift cards 120, 122. Refer to FIGS. 10-21 for more information. The tools have a personal profile section and features section. A personal resource management section is also included. The personal profile section lets a consumer store information that will help them make shopping and buying decisions. It also allows the consumer to control the frequency and volume of communications from Retailers. The features section offers tools to purchase gift cards or swap cards for purchases at other stores. You will also find lists of savings and offers that are targeted to you based on different targeting mechanisms (e.g. Demographics, zip code and psychographics as well as loyalty are all possible options. (which may be provided by the user. Consumers can also trade or swap gift cards with others by using the features section. The personal management section offers tools to help the consumer manage gift cards, special deals, loyalty programs, retailer credit cards accounts, receipts, and rebates.

The system 100 gives providers 108, 110 and consumers focused access. As partners, providers 108 and 110 can target consumers with advertisements, coupons, and other information about products and services. The partners may access data via the consumer front end and generate the data for the partners. Providers 110, 108 and 110 have a better audience to target their advertisements as well as information about the success or failures of their advertising campaigns. Providers 110, 108 also get more information about the owners and uses of gift cards. This includes the use by consumers of a universal transaction ID. Providers 108, 110 can also target specific markets and track consumer spending through multiple channels, such as direct marketing, online, offline marketing, etc. Online and offline sales (B&M retailers and online retailers).

“II Enterprise Infrastructure”

“FIG. “FIG. 1. The system network 200 shown in FIG. 2. This is an example of a network that can be used to implement this system. Refer to FIG. 1. Other network architectures, not listed here, may also be used. The system network 200 comprises a web server farm, a database farm 204 and an electronic data interchange farm (EDI) farm 206, as well as an internal access server farm (208). To implement a consumer front end over the Internet, 200 comprises a layer 7 switch farm 220 and an Internet firewall infrastructure 212. The consumer front-end can be implemented via a website on the World Wide Web. System network 200 also contains an EDI virtual area network (VLAN), 216 that provides point-to-point connections to EDI partners 220 a., 220 b., and 220 c.

“In general, the system networking 200 in FIG. 2. includes both local and remote infrastructure. Co-location facilities that host remote infrastructure may provide connectivity to the network network 200. Remote infrastructure is servers, routers and databases, as well as other network entities, that can be geographically distributed to allow access to both partners and consumers. Remote infrastructure may include devices that fall under one functional class. They may be distributed in system network 200 as farms (e.g. web server farm, EDI server farm, etc.). Local infrastructure could include routers, servers, databases, and other network entities that provide limited access to the system for targeted marketing or consumer resource management. Access to local infrastructure can also be restricted by network design (e.g., geographically distributed). An Intranet may contain all internal databases.

“The system network 200 is shown in FIG. 2. Implements a logical separation between server systems according to type and access. This creates multiple layers of access and provides greater security within the system network 200. System network 200 allows for multiple layers of access. It has a vertical separation of service and security levels that allows for many layers of access. The access levels range from the consumer’s front-end (via Internet 214), which has the lowest level of security, to the system data base 205 which has the highest security and access.

“The layers are implemented as virtual local areas networks (VLANs), which have no real access to each other except through routing that is done by routing modules on network switches. You can configure each VLAN to restrict access to the level you require. There are generally four levels of security: the presentation, business logic, data access, and data tier.

The presentation tier, which is at the top of access (for consumers front-end), is responsible for data delivery to clients that are not part of the enterprise infrastructure. End clients can be either consumers or partners. 220a, 220b, and 220c. The presentation tier formats data for communication with the business logic application tier that processes client requests and handles data delivery. The presentation tier data may be in XML format with XSLT stylesheets for client applications. The presentation tier operations are generally performed in a layer of servers that is part of the web server farm 202 and which is located in a DMZ network. These servers can be accessed via a web farm DMZ-VLAN 230 or the Layer 7 switch farm 210. The DMZ network servers act as proxy servers between enterprises and consumers.

The web server farm 202 hosts the next level of access, which forms the business logic Tier. The application code (Beans), which handles requests from clients (such as web browsers), and makes requests to the Data Access Tier (for relevant data) for this tier, is called the business logic tier. The data will be processed and delivered to client applications. To preserve the integrity of the applications and the database 205, the business logic tier is kept apart from interactions with consumers. An outer web farm VLAN232 may provide additional security.

“In the next layer the data access Tier may request directly to the Data Tier (or database 205). To distinguish how data is stored and retrieved from different platforms, the data access tier could be distinct from the business logic application tier. An inner web farm VLAN 234, which may provide security, could be used.

“The data layer is the last layer of security and includes database 205. It has the highest security to protect most sensitive data. An internal access VLAN 236, which can be used to configure security, may be used.

“The system network 200 contains a horizontal separation of EDI partnership, which are logical VLANs, that allow each partner to have separate access 220a, 220b, and 220c to the infrastructure for the example system of targeted marketing and consumer resources management, implemented using the system network network 200. A partner can access their private VLAN at 216, 218 and into the system network infrastructure through a VPN concentrator. Or routed through the routing module on the backbone switch. This structure can be used to isolate security issues from single partners 220a, 220b, 220-c.

“The EDI partner’s access to the system network 200 can also be layered vertically depending on level of security. An EDI farm DMZ VLAN 240 offers the lowest level security for the consumer’s front-end to access the EDI server farm 206. The VLAN 242 outer EDI farm provides a higher level security at a business level, similar to that described in the above reference to web server farm 202. For access to more sensitive data via the database farm 204, the inner EDI farms VLAN 244 provides the highest level of security.

Co-location facilities that host remote infrastructure may provide connectivity to the system network 200. To ensure that all networks are accessible, Tier 1 Internet Backbone providers may provide connectivity. This allows for the fastest possible network path from Leverage Consumers to Leverage Infrastructure. A backup connection to InterNAP can also be established.

“In the example system of targeted marketing and consumer resource management, complex backbone connections make it appear that the infrastructure is ‘local. The consumers can access the system network 200 through their ISPs. This stops the consumer from connecting to peer networks, resulting in a reduced network performance.

“A. “A.

“The web server farm 200 includes two banks of servers that can serve either static or dynamic content. Each bank can be either designated the dynamic or static web farm. Client requests for static content may be served by the static web farm. It does not use server content processing or generation, and is therefore neither database-generated nor can it serve client requests. web browser). Images, videos, and web templates are just a few examples of such content. The dynamic web farm can be used to serve dynamic content in many ways. This could include server-side scripting or XML/XLS conversion. Middle-tier applications can also interface with the database 205.

“The web server farm 200 may be implemented with any hardware or software system that implements server functions. The web server farm 202 can be implemented using Sun multiprocessor blades servers running Solaris? operating system, or Red Hat Linux Enterprise? operating system. Zeus is also included in the example web server farm 202 implementation. Web Server (ZWS). Similar to Apache? The ZWS web server application is robust, high-quality, and fully-featured. ZWS can be multi-threaded to take advantage of the multi-core multiprocessing nature on multi-cored hardware platforms. This increases response time and load servicing client requests. The Java will be housed in the web server farm 202. Java? server software, which runs the applications that serve consumer requests via the enterprise website. Java Application Server software could be a combination Apache Tomcat for simple Java applications and JBoss Application Server for J2EE apps.

It is important to understand that web server farm 202 implementations may be implemented using any hardware or software system. These hardware and software system descriptions are just a few examples of what hardware and software systems can be used.

“B. “B.

“The database server farm 204 can store data specific for consumer front-end interactions as well as the EDI partner data from partners 220 a., 220 b., and 220 c. The database farm 204 can be implemented using any hardware and software systems that are capable of operating as database servers. One example implementation is the database server farm 204, which uses Sun multiprocessor Enterprise servers with full redundant power, mirrored drives and multi-core processors. The database server farm 204 can run either the MySQL Database Server or Oracle Database Server products depending on the nature of the application. Depending on the nature of data stored, complex relational databases tables might use Oracle, while simple database schemas may use MySQL. Clustering of database server applications can be used to provide high availability and fault tolerance. This will allow for application load balancing between the database server farm 204.

“The database 205 from the database server farm 204 could be located in a SAN solution (Storage Area network) that offers high availability and fault tolerance.”

It is important to understand that different implementations of the database farm 204 can use any hardware or software system. These hardware and software system are just a few examples of what hardware and software systems can be used.

“C. EDI Farm”.

“The EDI (Electronic Data Interchange farm) farm 206 can be identified in the system network 200 to communicate 220 a-220 b-220 c with partners 220 a-220 c. The EDI farms servers 206 might have different applications and permissions to the web server farm 202 in order to access, process, and store data within the database farm 204. To increase data processing efficiency and storage efficiency, the nature of the applications running on the EDI farm server 206 may allow them to have greater direct access to the database 205. The EDI farm server 206 could be located in a private VLAN (Virtual Local Area Networks). This VLAN can only be accessed through VPN Concentrators or specific Point-to?Point access to the VLAN, as shown at 216 and 218, respectively.

“The EDI farm servers 206 can be implemented using any hardware and software system that is capable of operating server functions. The EDI farm 206 can be implemented on the same platform as the web server farm 202, or using IBM Mainframes. The EDI farm server 206 software may be identical to the webserver farm 202 software. If the EDI farms servers 206 are equipped with IBM Mainframes, the hardware will run IBM AIX and the EDI farms servers 206 will run IBM Websphere Application Server software.

It is important to understand that specific implementations for the EDI server farm 206 can use any hardware or software system. These hardware and software system are just a few examples of what hardware and software systems can be used.

“D. Internal Access”

The internal access farm servers server 208 could also be similar to the web server farm farm 202 in terms of platform, software and resource architecture. The applications, however, will be designed for intranet access, just like the EDI farms servers 206. These applications could include data mining or statistical information for sales and marketing.”

“III. “III. Partner Interfaces to Enterprise Infrastructure”

“A. “A.

“The retail partner infrastructure connects partners to the enterprise infrastructure 100 (in FIG. 1). Implementation of the retail partner infrastructure may be dependent on the computer network system linking the retail partner’s points-of-sale terminals within the partner’s shops. While some partners may have large, highly functionally-integrated computer networks, others may only have basic systems. FIGS. FIGS.

“FIG. “FIG. An in-store infrastructure 302, a first internet interface 304, a retail network operation center (NOC), 306, and a second internet interface 308 make up the retail partner infrastructure 300. The enterprise infrastructure 310 is also included. In-store infrastructure 302 comprises a POS controller 312 that is connected to the first WAN Interface 304 and to POS terminals 314. Transactions processed at each POS terminal 314, a-d can be communicated to host controller 312. FIG. FIG. 3. Each retail partner location 320 is connected to a central infrastructure. This infrastructure consolidates data and manages internetworking, intranetworking traffic and EDI partner traffic. The NOC 306 is the central infrastructure of the retail partner infrastructure 300. The NOC 306 is the central infrastructure. It may be used by the host controller 312 to collect data from each POS terminal 314 a.d. and then communicate that data to the NoC 306.”

“Consumers can purchase goods at the retail partner locations 320 by using gift cards. They can swipe their universal transaction identifier 120 (in FIG. 1) at any of the POS terminals 314-6 a-d. A card reader such as a credit or debit card reader may be installed at the POS terminal 314 a.d. This will allow the reader to sense the universal transaction identifier. The universal transaction identifier may be presented by the consumer to the salesperson at the retail partner 320 location during a transaction. To determine the correct customer account, the universal transaction identifier can be read by the card reader at 314 a.d. This identifier, together with the purchase price for the article purchased, and any other pertinent data (e.g. An identifier for the article to be purchased) to the host controller 312, who communicates the universal transaction ID and purchase price to enterprise infrastructure 310.

“An appropriate application for the retail partnership is processed at the enterprise infrastructure 310 by looking up an account that has the universal transaction ID. To determine if the account has sufficient funds to cover the transaction, the gift card balances associated with the retail partner are checked. If the balance is sufficient and the consumer decides to use it, the transaction will be processed and recorded. The universal transaction identifier reduces the balance associated with the retail partner gift cards. Before the transaction is completed at the POS terminal 314 a.d, other functions can be performed. These include transmitting data about offers and savings and the use of or accrual rewards associated with a loyalty programme.

“The retail partner infrastructure 300 uses the existing network infrastructure between each retail location (320) and the corporate office’s NoC 306. Data can be routed through the NOC 306 in order to establish a network path that provides a central point for contact with the enterprise infrastructure 308. FIG. 3. The partnership can be managed from one point, to facilitate integration and management.”

“FIG. “FIG. Each retail location 402 is connected to a POS controller 410 and connects to a plurality POS terminals 412 a?d. The network 404 also has an in-store network 404 that links to a WAN network 406. This network provides connectivity to the enterprise infrastructure 408. The host controller 410 can handle data consolidation and accounting.

“FIG. FIG. 5 shows another example of a retail partnership infrastructure 500. FIG. 5 shows the retail partner infrastructure 500. FIG. 5 shows an in-store network 504 for each store 502. In-store network 504 consists of a number of POS terminals 504 that are connected to a WAN 506, which provides connectivity with an enterprise infrastructure 508. Retail partner infrastructure 500 can establish an EDI connection at any POS Terminal 512 a.d. or through an instore POS Controller (not shown). This could include building interfaces to either the POS Terminal 512, POS Host Control or both. You can establish connectivity either via a point to point line or via the Internet by setting up a VPN gateway to either Host Controllers (Network Operation Center infrastructure) or Retail Partner NOCs (Network Operator Center).

“IV. Pos Terminal Interfaces”

“As explained above with reference to FIG. “As described above with reference to FIG. 3, a consumer may make purchases at the POS terminals 314, a-d. 6-8 show operation of POS terminal interfaces to enterprise infrastructure. This illustrates how data about consumer buying behavior can be collected and made accessible to partners. There are several POS terminal interfaces you can use, including the scanner interface; magnetic stripe reader (MSR) Interface; pin pad interface; and POS application interface.

“Three of the most commonly used enterprise infrastructure interfaces are interfaces to a physical device. The rest of the enterprise infrastructure interfaces are against enterprise infrastructure at the application level or higher.

“FIG. “FIG. A typical human interface is used to process commercial transactions on the POS terminal 602. The barcode scanner 604 can be seen as an independent component in FIG. 6. The barcode scanner 604 is shown separately in FIG. 1-5.”

Referring to FIG. 6. A salesperson at a retail partner location may initiate a transaction at POS terminal 602. In response, the POS terminal 602 can send a message to the barcode scanner 604 at 608 indicating that the transaction has begun. After receiving the message, the barcode scanner 604 initiates steps to scan a barcode. The POS terminal 602 also sends a message to the enterprise infrastructure 606 (610) indicating that a transaction has begun. The message at 609 may be sent to a retail partner infrastructure, such as the one shown in FIGS. 3-5. The enterprise infrastructure 606 might respond to message 610 with the start of transaction receipt. The salesperson may scan the UPC/SKU using the barcode scanner 604 at 612. This will allow the UPC/SKU data to be transmitted back to the POS terminal 602 (at 614). The POS terminal 602 can send the UPC/SKU data to enterprise infrastructure 606 (616) and wait for a scanned item UPC receipt. The receipt may be received by the POS terminal 606 at 618. This will send a message to the barcode scanner 604 indicating that the transaction is complete. Wait for a receipt. The barcode scanner 602 can then send a message to the enterprise infrastructure 606 indicating that the transaction is over. Wait for a receipt at 618.

“FIG. “FIG.7” is a flow diagram that shows operation of another example POS terminal. FIG. 7. uses a barcode scanner 704. The POS terminal 702 may be used by a salesperson at a retail partner location to initiate a transaction. In response to the message, the POS terminal 702 can send a message to the barcode scanner 704 (708) indicating that the transaction has begun. After receiving the message, the barcode scanner 704 initiates steps. The message is sent to the POS terminal 702 by 708. The POS terminal 702 also sends a message to 706 at 710 indicating the start of a transaction. The message at 710 could be sent to a retail partner infrastructure, such as the one shown in FIGS. 3-5. The enterprise infrastructure 706 might respond to message 710 with the start of transaction receipt. The enterprise infrastructure 706 may respond to the 712 sales call by scanning the UPC/SKU using the barcode scanner 704. This will cause the UPC/SKU data to be sent to 714 to the enterprise infrastructure 706. The POS terminal 702 can send a message to the barcode scanner 704 at 716 indicating that the transaction is complete. Wait for a receipt. The barcode scanner 702 might then send a message to the enterprise infrastructure 706 indicating that the transaction is over. Wait for a receipt at 718. The barcode scanner 704 could then send a message to the POS terminal 702 at 720 indicating that the transaction is over.

“Flow diagrams 600 and 700 are shown in FIGS. 6, 7 and 8 show how enterprise infrastructure 606, 706 can collect information about consumers who have purchased products. The interface used to implement the flow diagrams 600, 700 can interact with barcode scanners 604, 704 in retail stores. These scanners can be either hand-held scanners, or bed scanners. Combination scanners with scales in grocery stores and hand scanners in department stores are examples of such scanners.

“The enterprise infrastructures 606, 706 may distribute an app that runs on each POS terminal 602,702 and?attach?? scan devices 604-704. The enterprise infrastructure 606, 706 might then?listen’. The enterprise infrastructure 606, 706 may then?listen? to each item by scanning it and collecting the UPC barcode or SKU information. This information can be used to identify each item that is purchased by consumers.

“FIG. “FIG.8” is a flow diagram that shows operation of another example POS terminal 802 with a magnetic strip reader and integrated PIN pad 804. The Magnetic Stripe reader (MSR 804) may be used to interact with MSR devices, which are typically attached to pin pads devices for ATM authentication. An application may be distributed by the enterprise infrastructure 806 to each POS terminal 802 and pin pad device 802. the MSR device 804. The enterprise infrastructure 806 can collect data from every swipe of a magnetic stripe card to verify a consumer’s membership. This data will allow identification of the consumer subscriber for the specific in-store purchase transaction.

FIG. 8 shows the PIN pad interface for the magnetic strip reader 804 8 communicates with the PIN pads devices used to authenticate electronic payments (EPT) at POS terminal 802. The PIN pad devices typically include keys and may be integrated with the magnet strip reader 804. An application may be distributed by the enterprise infrastructure 806 to either the POS terminal 802 or the pin pad device of the magnetic stripe reader 804. An enterprise infrastructure 806 customer or consumer may assign a PIN to be used with the universal transactions identifier. This application allows the enterprise infrastructure 806 authenticate the consumer against their database and authorise the consumer to use the universal transaction ID and other benefits contained within.”

Referring to FIG. Referring to FIG. 8, a salesperson can initiate a transaction at the POS Terminal 802, which signals a start-of-transaction message to the magnetic strips reader 804 at 810. After initializing the magnetic strip reader 804, it sends back a message at 810 confirming that the transaction has been initiated. Then, it waits for the magnetic strips input. The universal transaction identifier (card), is sent back to the magnetic strip reader 804 at 812. At 812 the magnetic stripe reader 804 passes the card’s data through the 804. At 804, the magnetic strip reader 804 displays a request for a PIN. The consumer enters the PIN at 814. The magnetic stripe reader 804 transmits the PIN along with other identifying information, to the enterprise infrastructure 806 at 816. It then waits for confirmation. The magnetic stripe reader 804 will confirm membership and request transaction data from the POS terminal 802. This may include UPC data retrieved using the barcode scanner, as discussed above in reference to FIGS. 6, and 7. 818 is the time when the transaction data are requested and received by the magnetic stripe reader 804. The magnetic stripe reader 804 transmits the transaction data 820 to the enterprise infrastructure 806. A message from the POS terminal 802 may signal the end of a transaction to the magnetic stripe reader 804. The magnetic stripe reader 804 transmits an end-of-transaction message to the enterprise infrastructure 806 @ 824. It then waits for a receipt message. The magnetic stripe reader 804 transmits the end-of-transaction message at 826 to the enterprise infrastructure 806 at 824 and waits for an end of transaction receipt message from the POS terminal 802 in order to complete the transaction.

“FIGS. “FIGS. Transaction data includes product information, determined by the UPC/SKU at the barcode scanner and personal information, determined using the universal transaction ID. The transaction data may be stored by the enterprise infrastructure as part of the consumer?s account information. Retail partners may be able to access information from the enterprise infrastructure, as well as product information. Retail partners can use this information to target ads, offers, coupons, savings, and so forth. To consumers who actually buy their products or are more likely than others to purchase their products.

“Transaction data can also be collected by a POS app that runs on POS terminals, or within the POS controller 312 (in FIG. 3). 3. Other POS-specific data may be collected or tracked by the POS application.

“V. Retail Partner Application Architecture”

“FIG. “FIG. “Enterprise infrastructure and retail partners interface 900” includes a remote enterprise infrastructure 902, an enterprise PUS terminal environment 904, a retail partner central infrastructure 906 and an enterprise infrastructure 902.

“The retail POS terminal environment 904 may include components that can operate in POS terminals. These components include a PUS application 908, a magnetic stripe reader (910), a scanner (912) and a PIN pad 914. The retail POS environment 902 could implement interfaces to enterprise infrastructure 902 as described in FIGS. 6-8. The POS application 908 can be found within the retail partner POS terminal 904; it interfaces with the MSR910, scanner 912 and PIN pads devices 914. The transaction data from the POS application 908 can be transmitted to the enterprise infrastructure 902.

“Depending on the device interfaced, data can be collected in multiple formats. Enterprise infrastructure 902 can support both binary and default ASCII formats. One example is that data may be converted into XML to make it easier to transport and parse.

“The enterprise infrastructure 902 comprises partner EDI server 930, internal app servers 940, web server 950, and a database store 980. The EDI server farm 206 includes the partner EDI servers 930. Refer to FIG. 2. The servers in the internal application server farm 208 are 940. 2. The web servers 95 are servers in the web farm 202, as described in FIG. 2. FIG. 2: The data store 980 refers to the database 205. 2.”

“As illustrated in FIG. 9. The enterprise infrastructure 902 communicates to the retail POS terminal environment 904 and the retail partner centralized infrastructure 906. Retail partner centralized infrastructure 906 comprises a retail partner application store 920 and a retailer partner data store 922. The host controller 312 may be part of the retail partner central infrastructure 906 (see FIG. 3) connected via retail NOC 306. The host controller 412 and 512 may be connected via the retail partner centralized infrastructure 906 (in FIGS. 4, 5, and 5 in each retail store. The retail partner centralized infra 906 could be an established EDI connector, which interfaces with the retail partner application server 920 as well as the EDI servers 930.

“Depending on the device interfaced, data can be collected in multiple formats. Enterprise infrastructure 902 can support both binary and default ASCII formats. One example is that data may be converted into XML to make it easier to transport and parse, specifically the NRFIXRetail POSLog format.

“VI. “VI.

“FIGS. 10-20 show various user interfaces that can be used by the system 100 to interact directly with the consumer. Also, they illustrate the operation of system 100. Although the system 100 can be implemented in many ways for interaction with consumers, the examples shown in FIGS. FIGS. 10-20 illustrate an online web-based program that allows consumers to interact with them, manage their resources and distribute targeted marketing messages. The system could be a system of software modules. Those who are skilled in the art will know this. The system may contain multiple modules. They may be located locally or remotely and can communicate over a network such as the Internet.

“FIG. FIG. 10 shows an example of a user interface which can be used by consumers and offers targeted offers to specific consumers. FIG. FIG. 10 shows that the consumer interface 1000 could include three sections: (i), a personal profile section 1002, (ii), a features section 1004 and (iii), a personal management section 1006

“When a consumer wants to become a member of the system, they will be asked to input basic personal information. This can be later viewed and modified through the personal profile section 1002 in the consumer’s account. The consumer will be asked for basic information such as their age, gender, zip code preferences information and information about family members or friends to whom they may buy gifts or other items. FIG. FIG. 10 shows how the personal profile section 1002 can be divided into subsections. These could include a message center section, a friend and family section and a dates section. The art of targeting marketing and managing consumer purchases can be assisted by other types of information. This includes consumer financial information and purchasing methods information such as credit card or shipping information. This information can be presented in many ways and should not be restricted to the presentation shown in FIG. 10.”

The illustrated example shows how the consumer can view offers and savings. He/she may also exchange gift cards or store credit and may initiate and track rebate redemptions. The illustrated example also shows how the consumer can view special offers and gift cards that are of particular interest to him/her via his/her personal management section 1006 A consumer can also view the personal management section 1006 to see his/her loyalty rewards and earned rewards, as well as his/her available store credit and digital receipts for recent purchases from participating retailers.

“As will also be explained below in connection with FIGS. 10-20, the system 100 can be used to interact with consumers via an online web-based software program. It may include: (a) an offer or savings feature;(b) gift cards purchase feature; (3c) gift card registration feature); (d) gift cards exchange feature; e) loyalty programs enrollment management feature; and (f) an event and travel feature and savings feature. (g) A digital receipts feature and savings feature. (i) An on-line rebate feature. FIG. 10 may also be available via the features section 1004 and the personal management section 1006 in the consumer interface.

“Gift cards can be combined and accessed through a single universal transaction ID (described above with reference in FIG. 1). You can configure the universal transaction ID to allow you to use your gift card with multiple retailers, service providers, or manufacturers.

“A. “A.

FIG. 10 a member of system 100 may be eligible to receive targeted marketing campaigns, such as offers and discounts or other information. These savings and offers are shown in the illustrated example as an expandable line-item listed under the?View Discounts & Offers? section of the consumer interface 1000. tab. Each offer can identify the vendor, give a description of each offer, and expiration date. It may also identify the targeting method used to encourage consumers to accept the offer. The offer could contain text, video, photos, service provider branding, retailer or manufacturer branding or web-links. The consumer can also choose to save offers that interest them into their personal management section 1006 which allows them to activate an offer.

“FIG. “FIG. FIG. FIG. 1 illustrates how the system 100 managers can contract with service providers, retailers, and/or manufacturers to develop special offers for consumers. Once the campaign details have been established, the system will identify the consumer member that will be targeted by the special offer at step 1104. The system manager will then send the special offer to the targeted consumer at step 1108. This will be available by the consumer via their personal account in the consumer system. This will allow you to identify the reason each consumer was selected for the campaign.

Campaigns can be distinguished by co-branding/short messaging campaigns, expiration dates, cobranding, short message service campaigns and offers searchable by nontarget consumers. Offers transferable among member consumer members. On-line vs off-line redemption are just a few examples. To identify which consumer should be targeted for a particular offer or part of a campaign, targeting methods may include demographic, geographic, profile preferences/psychographics, recent purchases/uses, gift card/store credit ownership, loyalty program memberships, event calendar, travel calendar, word of mouth/previous campaign participation. The art of targeting is not restricted to the above. Other campaign characterization categories, as well as the offer details, may also be used to identify the target consumers.

“FIG. “FIG. 11B” is an example flow diagram that illustrates the consumer receiving and processing special offers and saving. A registered user must be created before a consumer can receive savings and special offers. A profile is required in order to receive targeted offers. After becoming a registered user, the consumer will log on to their account and click the “View Offers and Saves” button. In FIG. 10. This tab will allow the consumer to view offers targeted to him/her and view the reasons why they were received. FIG. FIG. 10 shows the identifying information that is included with each offer. This allows the consumer to identify why they received that particular offer.”

“For instance, FIG. 10 is that the consumer receives information to identify why they were selected for this line-item offer. This identifier information is presented in colored boxes with different indicia. Each box is a different targeting method used to identify the target recipient of the campaign offer. A key may be given to users to help them identify the various targeting methods. As previously discussed, these targeting methods, may include, but are not limited to, demographic, geographic, profile preferences/psychographics, recent purchases/uses, gift card/store credit ownership, loyalty program memberships, event calendar, travel calendar, word of mouth/previous campaign participation. FIG. FIG. 10 shows how the user interface might allow them to roll over boxes that represent different targets. A text bubble, or another indicator, may be displayed when the user rolls over the boxes. This signifies that the customer has detailed information about why the target box is there. You can highlight relevant sections of a consumer’s personal manager section if they correspond to the reasons for a specific target box. If, for example, an offer was made because a consumer is a member of a loyalty program, the relevant sections in a consumer’s personal manager section may be highlighted if the consumer views the target reason (as shown in FIG. 10).”

“At step 1114 of FIG. 11B allows the consumer to decide whether to activate or delete a specific offer. A customer can request feedback from the vendor about the offer, increase or decrease the volume of offers from that vendor, or to receive no offers for a certain time period.

A consumer can choose to immediately remove unwanted offers from their offer listing. However, if a consumer chooses not to accept an offer, as illustrated in the illustration, the offer will be removed from the user’s list of offers upon expiration without notice, step 1116.

If a consumer is interested to use a specific offer, they can activate it by moving the offer into the personal management section 1006 in their account. The offer will be displayed in the personal management section 1006 on the tab of activated offers. In the illustrated example, it is called?My Special Offers. The illustrated example shows that once an offer expires it will be removed in the consumer’s personal section 1006 at step 1120. However, the consumer will still be notified about its expiration and deletion as special interest was shown by the offer.

“Optionally the system 100 could also allow a customer to change how he/she is targeted by a vendor, step 1122. The vendor may have an option to send feedback directly to the vendor. The consumer can also request more or less offers from one vendor, seek offers of a specific type or category, or seek to temporarily or permanently suspend receiving offers from a vendor.

“Additionally the system may also be capable of gathering analytics data and statistical data about campaign performance, and may provide such information for participating service providers, retailers, and manufacturers.”

“B. “B.

Summary for “System and Method for Targeted Marketing and Consumer Resource Management”

“1. “1.

“The invention concerns systems and methods that use computer network technology to give consumers resource management capabilities and to enhance the marketing channels of retailers, service providers, and manufacturers.”

“2. “2.

The Internet has become a global marketplace that allows consumers to buy goods and services online and transact electronically. The Internet has opened up new distribution channels and increased consumer reach through advertising. The Internet and many other more advanced technologies have evolved to offer retailers, service providers, and manufacturers (retailers?) There are many ways to draw consumers to traditional suppliers of goods. Many retailers offer gift cards that can be used in-store for a predetermined amount. Many retailers also have loyalty programs or awards programs and many have given consumers access to their accounts via the Internet. The Internet has been used by retailers to send coupons and direct notices about discounts and offers to consumers. To help determine what’s hot and what’s not, retailers may be able to obtain marketing information from consumers.

“Despite the incredible growth of the Internet market place, both consumers and retailers still face frustrations. The main source of frustration for consumers is resource management (managing information, coupon codes, receipts and spam, loyalty card cards, rebates, etc.). Gift cards are becoming increasingly popular but they can also be a source for confusion and clutter. The balance of most gift cards cannot be viewed online, so it is difficult for consumers to check the status. Often, gift cards are purchased from many retailers. It is important to keep track of gift cards. Gift cards are often discarded, which is a disadvantage for the consumer and a disadvantage to the retailer. Consumers often feel frustrated with the hassle of having to store receipts or receive unsolicited emails. They also have to remember multiple passwords in order to access loyalty programs and award programs.

Retailer frustration is caused by poor consumer information and attention. With so many offers and advertisements, consumers find it difficult to make use of them. This leaves retailers unsure of how successful their campaigns were, what products are selling, and who is buying which products. Retailers often target a specific consumer who is not interested in the product or service or at the right time. In an effort to capture consumers’ attention at the right time, retailers often overcommunicate with them. This can lead to consumers receiving irrelevant communications. These frustrations are not just related, but can also be caused by the other party. It is futile to try and solve one’s needs while simultaneously attending to the needs the other.

Consumers need to consolidate and manage their shopping resources. It is also necessary to give retailers access to customers in a focused and informed manner. Systems and methods that improve consumer resource management as well as provide retailers with better access to consumers are needed.

“In light of the above, we provide methods for managing consumer resources. A consumer interface is a terminal that can be used by a consumer to access the internet. A consumer can provide input to the network terminal. The input is then communicated to the enterprise infrastructure. Based on the input from the consumer at the enterprise infrastructure, a consumer account is created. A partner interface allows you to access a variety of services and goods providers through the consumer account. A consumer account can also be configured to allow the setting of fund balances for at most one selected service provider. To enable purchase from at least one of the selected providers, the consumer purchases a gift certificate from the enterprise infrastructure.

“Another aspect of the invention is the generation of a universal transaction ID from the enterprise infrastructure. This universal transaction ID corresponds to the consumer account and allows for purchases from a plurality service and goods providers.”

“Another aspect of the invention provides a method for targeted marketing by a good and service provider. The example method collects transaction data from terminals that process transactions at point-of-sale. Each transaction includes a unique consumer identifier. The transaction data are sent to an enterprise infrastructure. Based on the consumer identifiers, each transaction is assigned a consumer account in the enterprise infrastructure. The transaction data are then stored in the appropriate consumer accounts. The information about consumers who purchased goods or services from the provider of goods and service is given to the goods and the services provider. The information may be used by the goods and services provider to target consumers and offer coupons and discounts.

The following description and drawings will help you to better understand the various advantages, aspects, and novel features of this invention.

“Other systems and methods, as well as features, of the invention will be or become apparent to anyone with skill in art upon examination and description of the following figures. All such additional systems, methods and features, as well as their advantages, are to be described in this description. They will be covered by the accompanying claims.

“The following description of preferred embodiments refers to the accompanying drawings, which form a part of this document and show, as an illustration, specific embodiments where the invention can be used. You can use other embodiments and make structural changes without leaving the scope of this invention.

“I. “I.

“FIG. “FIG. The system 100 comprises an enterprise infrastructure 102 that can communicate over the Internet104 and secure network connections106. These connections may include connections over the Internet104 or any other suitable wide-area network (WAN), (e.g. Telecommunications networks. An enterprise may operate the enterprise infrastructure 102 by offering targeted marketing services to goods and service providers 108, 110 and consumer resource management services for consumers at network terminals 116, 118. Providers 108 and 110 can securely connect to the enterprise network 102 through secured network connections106. Secured network connections 106 allow providers 108, 110 to securely connect to the enterprise infrastructure 102. Retailers, 108, 110 and providers may use Point-of?Sale terminals 112,114 to connect to the enterprise infrastructure. 102 can be accessed over secured network connections 106. Consumers can access the enterprise infrastructure 102 via the Internet 104 using network terminals 116 and 118. These network terminals 116 and 118 can be personal computers, laptops or mobile devices that are capable of running World-Wide Web clients applications (e.g. web browsers.

FIG. 1. The POS terminals 112, 114 are used by retailers to interact with the enterprise infrastructure 102. You may also use other types of terminals such as network terminals (similar network terminals 116 and 118), which can include handheld devices, mobile phones or PCs. To give retailers access to enterprise infrastructure 102, network terminals can be made available at Kiosks.

FIG. 1. may include service providers and manufacturers, which may or not have a commercial presence online 104. Service providers, manufacturers and retailers that have a commercial presence online 104 might offer product distribution channels that allow consumers to buy goods on-line. A web-site may be used to allow credit card transactions, secure bank account access, account information, and account information for consumers who have accounts with the provider 108, 110. Banks may be included in the providers 108, 110 so that consumers can access funds.

“In FIG. 100, the providers 108, 110 may be in a business relationship (e.g. 1. The providers 110 and 108 may be in business relationships (e.g. Contractual) with the entity operating the enterprise infrastructure102, which allows for the configuration of electronic commercial access to partners via the enterprise architecture 102. The retailers 108 and 110 could be retailers who collect data from the POS terminals 112. 114 about purchases made at retailer’s stores. The providers 110 and 108 may be manufacturers who may use the enterprise infrastructure102 as a distribution channel for their products or as a source to target marketing information. The ‘partners’ are the providers 108, 110 who have a business relationship with the enterprise infrastructure102. This description.

“The enterprise infrastructure102 may be used by consumers who are members, subscribers, customers, or customers with an account with the enterprise infrastructure102. The consumer interface allows them to access, configure, and use the tools that are available on their accounts. To represent gift cards with a balance, consumers can either purchase gift cards or set up a universal transaction ID 120,122. A gift card may have a universal transaction identifier 120 or 122. Gift cards can only be used to make purchases at specific retailers, service providers, or manufacturers. However, the universal transaction ID 120,122 may be configured to allow a consumer to buy goods from other providers (108, 110). The universal transaction identifier 120 and 122 reading devices may be installed on the POS terminals 112, 114 to allow the association of the universal transaction identifier 122, 122 with a consumer account within the enterprise infrastructure 102. Data relating to the consumers may include information about the partners 108 and 110, as well as balances and limits on gift card amounts that can be used to purchase goods from each partner 110, 108.

“It should be noted that the universal transaction ID 120, 122 contains identifying information that is keyed into the consumer’s account within the enterprise infrastructure 101. The magnetic strip of universal transaction identifier (card 120, 122) records the identifying information in a manner similar to credit cards. However, the identifying information can be stored on a different card, such as a radio frequency identification transmitter (RFID), barcode or other suitable form. A thumbprint image may also be used to identify the user. This thumbprint image can be scanned at POS terminal 112, 114, or any other biometric identifier. Access to the system can also be achieved using an identification proxy, such as a user?s telephone number or another means of unique identification.

“A universal transaction identifier, also known as universal transaction card, may be used for purposes of this application. Neither of these identifiers require a physical card to be functional. A universal transaction identifier or universal transaction card can be used to identify a consumer and associate that identification with their account in the enterprise infrastructure 101. It is not necessary that any purchase of physical structures be used as universal transaction identifiers or universal card when referring to the purchase or use a universal transfer identifier.

“Consumers may interact with the enterprise infrastructure102 via a client app that connects to their accounts and provides tools for the consumer to manage consumer resources. The client application is the consumer interface to the enterprise infrastructure. The consumer’s front-end can perform functions such: buy gift cards, exchange gift cards and track balances. It also allows the consumer to subscribe to loyalty programs and track coupons from partners. They can store and sort receipts and redeem rebates and track. 10-21.”

“The enterprise infrastructure 102 could include a system network that can perform a variety services for consumers, providers 110, and providers 108. The system network contains applications that make it possible for consumers to access the consumer front-end as well as database storage systems to store information about providers and consumers. Hardware and software are also included in the system network to implement security measures to protect both system data and consumers’ data.

“In FIG. 100, an example system for targeted advertising and consumer resource management is shown. 1. The enterprise infrastructure 102 provides consumers a web-site with tools, features and functions that enable them to manage their consumer resources, purchase, obtain, and exchange gift cards 120, 122. Refer to FIGS. 10-21 for more information. The tools have a personal profile section and features section. A personal resource management section is also included. The personal profile section lets a consumer store information that will help them make shopping and buying decisions. It also allows the consumer to control the frequency and volume of communications from Retailers. The features section offers tools to purchase gift cards or swap cards for purchases at other stores. You will also find lists of savings and offers that are targeted to you based on different targeting mechanisms (e.g. Demographics, zip code and psychographics as well as loyalty are all possible options. (which may be provided by the user. Consumers can also trade or swap gift cards with others by using the features section. The personal management section offers tools to help the consumer manage gift cards, special deals, loyalty programs, retailer credit cards accounts, receipts, and rebates.

The system 100 gives providers 108, 110 and consumers focused access. As partners, providers 108 and 110 can target consumers with advertisements, coupons, and other information about products and services. The partners may access data via the consumer front end and generate the data for the partners. Providers 110, 108 and 110 have a better audience to target their advertisements as well as information about the success or failures of their advertising campaigns. Providers 110, 108 also get more information about the owners and uses of gift cards. This includes the use by consumers of a universal transaction ID. Providers 108, 110 can also target specific markets and track consumer spending through multiple channels, such as direct marketing, online, offline marketing, etc. Online and offline sales (B&M retailers and online retailers).

“II Enterprise Infrastructure”

“FIG. “FIG. 1. The system network 200 shown in FIG. 2. This is an example of a network that can be used to implement this system. Refer to FIG. 1. Other network architectures, not listed here, may also be used. The system network 200 comprises a web server farm, a database farm 204 and an electronic data interchange farm (EDI) farm 206, as well as an internal access server farm (208). To implement a consumer front end over the Internet, 200 comprises a layer 7 switch farm 220 and an Internet firewall infrastructure 212. The consumer front-end can be implemented via a website on the World Wide Web. System network 200 also contains an EDI virtual area network (VLAN), 216 that provides point-to-point connections to EDI partners 220 a., 220 b., and 220 c.

“In general, the system networking 200 in FIG. 2. includes both local and remote infrastructure. Co-location facilities that host remote infrastructure may provide connectivity to the network network 200. Remote infrastructure is servers, routers and databases, as well as other network entities, that can be geographically distributed to allow access to both partners and consumers. Remote infrastructure may include devices that fall under one functional class. They may be distributed in system network 200 as farms (e.g. web server farm, EDI server farm, etc.). Local infrastructure could include routers, servers, databases, and other network entities that provide limited access to the system for targeted marketing or consumer resource management. Access to local infrastructure can also be restricted by network design (e.g., geographically distributed). An Intranet may contain all internal databases.

“The system network 200 is shown in FIG. 2. Implements a logical separation between server systems according to type and access. This creates multiple layers of access and provides greater security within the system network 200. System network 200 allows for multiple layers of access. It has a vertical separation of service and security levels that allows for many layers of access. The access levels range from the consumer’s front-end (via Internet 214), which has the lowest level of security, to the system data base 205 which has the highest security and access.

“The layers are implemented as virtual local areas networks (VLANs), which have no real access to each other except through routing that is done by routing modules on network switches. You can configure each VLAN to restrict access to the level you require. There are generally four levels of security: the presentation, business logic, data access, and data tier.

The presentation tier, which is at the top of access (for consumers front-end), is responsible for data delivery to clients that are not part of the enterprise infrastructure. End clients can be either consumers or partners. 220a, 220b, and 220c. The presentation tier formats data for communication with the business logic application tier that processes client requests and handles data delivery. The presentation tier data may be in XML format with XSLT stylesheets for client applications. The presentation tier operations are generally performed in a layer of servers that is part of the web server farm 202 and which is located in a DMZ network. These servers can be accessed via a web farm DMZ-VLAN 230 or the Layer 7 switch farm 210. The DMZ network servers act as proxy servers between enterprises and consumers.

The web server farm 202 hosts the next level of access, which forms the business logic Tier. The application code (Beans), which handles requests from clients (such as web browsers), and makes requests to the Data Access Tier (for relevant data) for this tier, is called the business logic tier. The data will be processed and delivered to client applications. To preserve the integrity of the applications and the database 205, the business logic tier is kept apart from interactions with consumers. An outer web farm VLAN232 may provide additional security.

“In the next layer the data access Tier may request directly to the Data Tier (or database 205). To distinguish how data is stored and retrieved from different platforms, the data access tier could be distinct from the business logic application tier. An inner web farm VLAN 234, which may provide security, could be used.

“The data layer is the last layer of security and includes database 205. It has the highest security to protect most sensitive data. An internal access VLAN 236, which can be used to configure security, may be used.

“The system network 200 contains a horizontal separation of EDI partnership, which are logical VLANs, that allow each partner to have separate access 220a, 220b, and 220c to the infrastructure for the example system of targeted marketing and consumer resources management, implemented using the system network network 200. A partner can access their private VLAN at 216, 218 and into the system network infrastructure through a VPN concentrator. Or routed through the routing module on the backbone switch. This structure can be used to isolate security issues from single partners 220a, 220b, 220-c.

“The EDI partner’s access to the system network 200 can also be layered vertically depending on level of security. An EDI farm DMZ VLAN 240 offers the lowest level security for the consumer’s front-end to access the EDI server farm 206. The VLAN 242 outer EDI farm provides a higher level security at a business level, similar to that described in the above reference to web server farm 202. For access to more sensitive data via the database farm 204, the inner EDI farms VLAN 244 provides the highest level of security.

Co-location facilities that host remote infrastructure may provide connectivity to the system network 200. To ensure that all networks are accessible, Tier 1 Internet Backbone providers may provide connectivity. This allows for the fastest possible network path from Leverage Consumers to Leverage Infrastructure. A backup connection to InterNAP can also be established.

“In the example system of targeted marketing and consumer resource management, complex backbone connections make it appear that the infrastructure is ‘local. The consumers can access the system network 200 through their ISPs. This stops the consumer from connecting to peer networks, resulting in a reduced network performance.

“A. “A.

“The web server farm 200 includes two banks of servers that can serve either static or dynamic content. Each bank can be either designated the dynamic or static web farm. Client requests for static content may be served by the static web farm. It does not use server content processing or generation, and is therefore neither database-generated nor can it serve client requests. web browser). Images, videos, and web templates are just a few examples of such content. The dynamic web farm can be used to serve dynamic content in many ways. This could include server-side scripting or XML/XLS conversion. Middle-tier applications can also interface with the database 205.

“The web server farm 200 may be implemented with any hardware or software system that implements server functions. The web server farm 202 can be implemented using Sun multiprocessor blades servers running Solaris? operating system, or Red Hat Linux Enterprise? operating system. Zeus is also included in the example web server farm 202 implementation. Web Server (ZWS). Similar to Apache? The ZWS web server application is robust, high-quality, and fully-featured. ZWS can be multi-threaded to take advantage of the multi-core multiprocessing nature on multi-cored hardware platforms. This increases response time and load servicing client requests. The Java will be housed in the web server farm 202. Java? server software, which runs the applications that serve consumer requests via the enterprise website. Java Application Server software could be a combination Apache Tomcat for simple Java applications and JBoss Application Server for J2EE apps.

It is important to understand that web server farm 202 implementations may be implemented using any hardware or software system. These hardware and software system descriptions are just a few examples of what hardware and software systems can be used.

“B. “B.

“The database server farm 204 can store data specific for consumer front-end interactions as well as the EDI partner data from partners 220 a., 220 b., and 220 c. The database farm 204 can be implemented using any hardware and software systems that are capable of operating as database servers. One example implementation is the database server farm 204, which uses Sun multiprocessor Enterprise servers with full redundant power, mirrored drives and multi-core processors. The database server farm 204 can run either the MySQL Database Server or Oracle Database Server products depending on the nature of the application. Depending on the nature of data stored, complex relational databases tables might use Oracle, while simple database schemas may use MySQL. Clustering of database server applications can be used to provide high availability and fault tolerance. This will allow for application load balancing between the database server farm 204.

“The database 205 from the database server farm 204 could be located in a SAN solution (Storage Area network) that offers high availability and fault tolerance.”

It is important to understand that different implementations of the database farm 204 can use any hardware or software system. These hardware and software system are just a few examples of what hardware and software systems can be used.

“C. EDI Farm”.

“The EDI (Electronic Data Interchange farm) farm 206 can be identified in the system network 200 to communicate 220 a-220 b-220 c with partners 220 a-220 c. The EDI farms servers 206 might have different applications and permissions to the web server farm 202 in order to access, process, and store data within the database farm 204. To increase data processing efficiency and storage efficiency, the nature of the applications running on the EDI farm server 206 may allow them to have greater direct access to the database 205. The EDI farm server 206 could be located in a private VLAN (Virtual Local Area Networks). This VLAN can only be accessed through VPN Concentrators or specific Point-to?Point access to the VLAN, as shown at 216 and 218, respectively.

“The EDI farm servers 206 can be implemented using any hardware and software system that is capable of operating server functions. The EDI farm 206 can be implemented on the same platform as the web server farm 202, or using IBM Mainframes. The EDI farm server 206 software may be identical to the webserver farm 202 software. If the EDI farms servers 206 are equipped with IBM Mainframes, the hardware will run IBM AIX and the EDI farms servers 206 will run IBM Websphere Application Server software.

It is important to understand that specific implementations for the EDI server farm 206 can use any hardware or software system. These hardware and software system are just a few examples of what hardware and software systems can be used.

“D. Internal Access”

The internal access farm servers server 208 could also be similar to the web server farm farm 202 in terms of platform, software and resource architecture. The applications, however, will be designed for intranet access, just like the EDI farms servers 206. These applications could include data mining or statistical information for sales and marketing.”

“III. “III. Partner Interfaces to Enterprise Infrastructure”

“A. “A.

“The retail partner infrastructure connects partners to the enterprise infrastructure 100 (in FIG. 1). Implementation of the retail partner infrastructure may be dependent on the computer network system linking the retail partner’s points-of-sale terminals within the partner’s shops. While some partners may have large, highly functionally-integrated computer networks, others may only have basic systems. FIGS. FIGS.

“FIG. “FIG. An in-store infrastructure 302, a first internet interface 304, a retail network operation center (NOC), 306, and a second internet interface 308 make up the retail partner infrastructure 300. The enterprise infrastructure 310 is also included. In-store infrastructure 302 comprises a POS controller 312 that is connected to the first WAN Interface 304 and to POS terminals 314. Transactions processed at each POS terminal 314, a-d can be communicated to host controller 312. FIG. FIG. 3. Each retail partner location 320 is connected to a central infrastructure. This infrastructure consolidates data and manages internetworking, intranetworking traffic and EDI partner traffic. The NOC 306 is the central infrastructure of the retail partner infrastructure 300. The NOC 306 is the central infrastructure. It may be used by the host controller 312 to collect data from each POS terminal 314 a.d. and then communicate that data to the NoC 306.”

“Consumers can purchase goods at the retail partner locations 320 by using gift cards. They can swipe their universal transaction identifier 120 (in FIG. 1) at any of the POS terminals 314-6 a-d. A card reader such as a credit or debit card reader may be installed at the POS terminal 314 a.d. This will allow the reader to sense the universal transaction identifier. The universal transaction identifier may be presented by the consumer to the salesperson at the retail partner 320 location during a transaction. To determine the correct customer account, the universal transaction identifier can be read by the card reader at 314 a.d. This identifier, together with the purchase price for the article purchased, and any other pertinent data (e.g. An identifier for the article to be purchased) to the host controller 312, who communicates the universal transaction ID and purchase price to enterprise infrastructure 310.

“An appropriate application for the retail partnership is processed at the enterprise infrastructure 310 by looking up an account that has the universal transaction ID. To determine if the account has sufficient funds to cover the transaction, the gift card balances associated with the retail partner are checked. If the balance is sufficient and the consumer decides to use it, the transaction will be processed and recorded. The universal transaction identifier reduces the balance associated with the retail partner gift cards. Before the transaction is completed at the POS terminal 314 a.d, other functions can be performed. These include transmitting data about offers and savings and the use of or accrual rewards associated with a loyalty programme.

“The retail partner infrastructure 300 uses the existing network infrastructure between each retail location (320) and the corporate office’s NoC 306. Data can be routed through the NOC 306 in order to establish a network path that provides a central point for contact with the enterprise infrastructure 308. FIG. 3. The partnership can be managed from one point, to facilitate integration and management.”

“FIG. “FIG. Each retail location 402 is connected to a POS controller 410 and connects to a plurality POS terminals 412 a?d. The network 404 also has an in-store network 404 that links to a WAN network 406. This network provides connectivity to the enterprise infrastructure 408. The host controller 410 can handle data consolidation and accounting.

“FIG. FIG. 5 shows another example of a retail partnership infrastructure 500. FIG. 5 shows the retail partner infrastructure 500. FIG. 5 shows an in-store network 504 for each store 502. In-store network 504 consists of a number of POS terminals 504 that are connected to a WAN 506, which provides connectivity with an enterprise infrastructure 508. Retail partner infrastructure 500 can establish an EDI connection at any POS Terminal 512 a.d. or through an instore POS Controller (not shown). This could include building interfaces to either the POS Terminal 512, POS Host Control or both. You can establish connectivity either via a point to point line or via the Internet by setting up a VPN gateway to either Host Controllers (Network Operation Center infrastructure) or Retail Partner NOCs (Network Operator Center).

“IV. Pos Terminal Interfaces”

“As explained above with reference to FIG. “As described above with reference to FIG. 3, a consumer may make purchases at the POS terminals 314, a-d. 6-8 show operation of POS terminal interfaces to enterprise infrastructure. This illustrates how data about consumer buying behavior can be collected and made accessible to partners. There are several POS terminal interfaces you can use, including the scanner interface; magnetic stripe reader (MSR) Interface; pin pad interface; and POS application interface.

“Three of the most commonly used enterprise infrastructure interfaces are interfaces to a physical device. The rest of the enterprise infrastructure interfaces are against enterprise infrastructure at the application level or higher.

“FIG. “FIG. A typical human interface is used to process commercial transactions on the POS terminal 602. The barcode scanner 604 can be seen as an independent component in FIG. 6. The barcode scanner 604 is shown separately in FIG. 1-5.”

Referring to FIG. 6. A salesperson at a retail partner location may initiate a transaction at POS terminal 602. In response, the POS terminal 602 can send a message to the barcode scanner 604 at 608 indicating that the transaction has begun. After receiving the message, the barcode scanner 604 initiates steps to scan a barcode. The POS terminal 602 also sends a message to the enterprise infrastructure 606 (610) indicating that a transaction has begun. The message at 609 may be sent to a retail partner infrastructure, such as the one shown in FIGS. 3-5. The enterprise infrastructure 606 might respond to message 610 with the start of transaction receipt. The salesperson may scan the UPC/SKU using the barcode scanner 604 at 612. This will allow the UPC/SKU data to be transmitted back to the POS terminal 602 (at 614). The POS terminal 602 can send the UPC/SKU data to enterprise infrastructure 606 (616) and wait for a scanned item UPC receipt. The receipt may be received by the POS terminal 606 at 618. This will send a message to the barcode scanner 604 indicating that the transaction is complete. Wait for a receipt. The barcode scanner 602 can then send a message to the enterprise infrastructure 606 indicating that the transaction is over. Wait for a receipt at 618.

“FIG. “FIG.7” is a flow diagram that shows operation of another example POS terminal. FIG. 7. uses a barcode scanner 704. The POS terminal 702 may be used by a salesperson at a retail partner location to initiate a transaction. In response to the message, the POS terminal 702 can send a message to the barcode scanner 704 (708) indicating that the transaction has begun. After receiving the message, the barcode scanner 704 initiates steps. The message is sent to the POS terminal 702 by 708. The POS terminal 702 also sends a message to 706 at 710 indicating the start of a transaction. The message at 710 could be sent to a retail partner infrastructure, such as the one shown in FIGS. 3-5. The enterprise infrastructure 706 might respond to message 710 with the start of transaction receipt. The enterprise infrastructure 706 may respond to the 712 sales call by scanning the UPC/SKU using the barcode scanner 704. This will cause the UPC/SKU data to be sent to 714 to the enterprise infrastructure 706. The POS terminal 702 can send a message to the barcode scanner 704 at 716 indicating that the transaction is complete. Wait for a receipt. The barcode scanner 702 might then send a message to the enterprise infrastructure 706 indicating that the transaction is over. Wait for a receipt at 718. The barcode scanner 704 could then send a message to the POS terminal 702 at 720 indicating that the transaction is over.

“Flow diagrams 600 and 700 are shown in FIGS. 6, 7 and 8 show how enterprise infrastructure 606, 706 can collect information about consumers who have purchased products. The interface used to implement the flow diagrams 600, 700 can interact with barcode scanners 604, 704 in retail stores. These scanners can be either hand-held scanners, or bed scanners. Combination scanners with scales in grocery stores and hand scanners in department stores are examples of such scanners.

“The enterprise infrastructures 606, 706 may distribute an app that runs on each POS terminal 602,702 and?attach?? scan devices 604-704. The enterprise infrastructure 606, 706 might then?listen’. The enterprise infrastructure 606, 706 may then?listen? to each item by scanning it and collecting the UPC barcode or SKU information. This information can be used to identify each item that is purchased by consumers.

“FIG. “FIG.8” is a flow diagram that shows operation of another example POS terminal 802 with a magnetic strip reader and integrated PIN pad 804. The Magnetic Stripe reader (MSR 804) may be used to interact with MSR devices, which are typically attached to pin pads devices for ATM authentication. An application may be distributed by the enterprise infrastructure 806 to each POS terminal 802 and pin pad device 802. the MSR device 804. The enterprise infrastructure 806 can collect data from every swipe of a magnetic stripe card to verify a consumer’s membership. This data will allow identification of the consumer subscriber for the specific in-store purchase transaction.

FIG. 8 shows the PIN pad interface for the magnetic strip reader 804 8 communicates with the PIN pads devices used to authenticate electronic payments (EPT) at POS terminal 802. The PIN pad devices typically include keys and may be integrated with the magnet strip reader 804. An application may be distributed by the enterprise infrastructure 806 to either the POS terminal 802 or the pin pad device of the magnetic stripe reader 804. An enterprise infrastructure 806 customer or consumer may assign a PIN to be used with the universal transactions identifier. This application allows the enterprise infrastructure 806 authenticate the consumer against their database and authorise the consumer to use the universal transaction ID and other benefits contained within.”

Referring to FIG. Referring to FIG. 8, a salesperson can initiate a transaction at the POS Terminal 802, which signals a start-of-transaction message to the magnetic strips reader 804 at 810. After initializing the magnetic strip reader 804, it sends back a message at 810 confirming that the transaction has been initiated. Then, it waits for the magnetic strips input. The universal transaction identifier (card), is sent back to the magnetic strip reader 804 at 812. At 812 the magnetic stripe reader 804 passes the card’s data through the 804. At 804, the magnetic strip reader 804 displays a request for a PIN. The consumer enters the PIN at 814. The magnetic stripe reader 804 transmits the PIN along with other identifying information, to the enterprise infrastructure 806 at 816. It then waits for confirmation. The magnetic stripe reader 804 will confirm membership and request transaction data from the POS terminal 802. This may include UPC data retrieved using the barcode scanner, as discussed above in reference to FIGS. 6, and 7. 818 is the time when the transaction data are requested and received by the magnetic stripe reader 804. The magnetic stripe reader 804 transmits the transaction data 820 to the enterprise infrastructure 806. A message from the POS terminal 802 may signal the end of a transaction to the magnetic stripe reader 804. The magnetic stripe reader 804 transmits an end-of-transaction message to the enterprise infrastructure 806 @ 824. It then waits for a receipt message. The magnetic stripe reader 804 transmits the end-of-transaction message at 826 to the enterprise infrastructure 806 at 824 and waits for an end of transaction receipt message from the POS terminal 802 in order to complete the transaction.

“FIGS. “FIGS. Transaction data includes product information, determined by the UPC/SKU at the barcode scanner and personal information, determined using the universal transaction ID. The transaction data may be stored by the enterprise infrastructure as part of the consumer?s account information. Retail partners may be able to access information from the enterprise infrastructure, as well as product information. Retail partners can use this information to target ads, offers, coupons, savings, and so forth. To consumers who actually buy their products or are more likely than others to purchase their products.

“Transaction data can also be collected by a POS app that runs on POS terminals, or within the POS controller 312 (in FIG. 3). 3. Other POS-specific data may be collected or tracked by the POS application.

“V. Retail Partner Application Architecture”

“FIG. “FIG. “Enterprise infrastructure and retail partners interface 900” includes a remote enterprise infrastructure 902, an enterprise PUS terminal environment 904, a retail partner central infrastructure 906 and an enterprise infrastructure 902.

“The retail POS terminal environment 904 may include components that can operate in POS terminals. These components include a PUS application 908, a magnetic stripe reader (910), a scanner (912) and a PIN pad 914. The retail POS environment 902 could implement interfaces to enterprise infrastructure 902 as described in FIGS. 6-8. The POS application 908 can be found within the retail partner POS terminal 904; it interfaces with the MSR910, scanner 912 and PIN pads devices 914. The transaction data from the POS application 908 can be transmitted to the enterprise infrastructure 902.

“Depending on the device interfaced, data can be collected in multiple formats. Enterprise infrastructure 902 can support both binary and default ASCII formats. One example is that data may be converted into XML to make it easier to transport and parse.

“The enterprise infrastructure 902 comprises partner EDI server 930, internal app servers 940, web server 950, and a database store 980. The EDI server farm 206 includes the partner EDI servers 930. Refer to FIG. 2. The servers in the internal application server farm 208 are 940. 2. The web servers 95 are servers in the web farm 202, as described in FIG. 2. FIG. 2: The data store 980 refers to the database 205. 2.”

“As illustrated in FIG. 9. The enterprise infrastructure 902 communicates to the retail POS terminal environment 904 and the retail partner centralized infrastructure 906. Retail partner centralized infrastructure 906 comprises a retail partner application store 920 and a retailer partner data store 922. The host controller 312 may be part of the retail partner central infrastructure 906 (see FIG. 3) connected via retail NOC 306. The host controller 412 and 512 may be connected via the retail partner centralized infrastructure 906 (in FIGS. 4, 5, and 5 in each retail store. The retail partner centralized infra 906 could be an established EDI connector, which interfaces with the retail partner application server 920 as well as the EDI servers 930.

“Depending on the device interfaced, data can be collected in multiple formats. Enterprise infrastructure 902 can support both binary and default ASCII formats. One example is that data may be converted into XML to make it easier to transport and parse, specifically the NRFIXRetail POSLog format.

“VI. “VI.

“FIGS. 10-20 show various user interfaces that can be used by the system 100 to interact directly with the consumer. Also, they illustrate the operation of system 100. Although the system 100 can be implemented in many ways for interaction with consumers, the examples shown in FIGS. FIGS. 10-20 illustrate an online web-based program that allows consumers to interact with them, manage their resources and distribute targeted marketing messages. The system could be a system of software modules. Those who are skilled in the art will know this. The system may contain multiple modules. They may be located locally or remotely and can communicate over a network such as the Internet.

“FIG. FIG. 10 shows an example of a user interface which can be used by consumers and offers targeted offers to specific consumers. FIG. FIG. 10 shows that the consumer interface 1000 could include three sections: (i), a personal profile section 1002, (ii), a features section 1004 and (iii), a personal management section 1006

“When a consumer wants to become a member of the system, they will be asked to input basic personal information. This can be later viewed and modified through the personal profile section 1002 in the consumer’s account. The consumer will be asked for basic information such as their age, gender, zip code preferences information and information about family members or friends to whom they may buy gifts or other items. FIG. FIG. 10 shows how the personal profile section 1002 can be divided into subsections. These could include a message center section, a friend and family section and a dates section. The art of targeting marketing and managing consumer purchases can be assisted by other types of information. This includes consumer financial information and purchasing methods information such as credit card or shipping information. This information can be presented in many ways and should not be restricted to the presentation shown in FIG. 10.”

The illustrated example shows how the consumer can view offers and savings. He/she may also exchange gift cards or store credit and may initiate and track rebate redemptions. The illustrated example also shows how the consumer can view special offers and gift cards that are of particular interest to him/her via his/her personal management section 1006 A consumer can also view the personal management section 1006 to see his/her loyalty rewards and earned rewards, as well as his/her available store credit and digital receipts for recent purchases from participating retailers.

“As will also be explained below in connection with FIGS. 10-20, the system 100 can be used to interact with consumers via an online web-based software program. It may include: (a) an offer or savings feature;(b) gift cards purchase feature; (3c) gift card registration feature); (d) gift cards exchange feature; e) loyalty programs enrollment management feature; and (f) an event and travel feature and savings feature. (g) A digital receipts feature and savings feature. (i) An on-line rebate feature. FIG. 10 may also be available via the features section 1004 and the personal management section 1006 in the consumer interface.

“Gift cards can be combined and accessed through a single universal transaction ID (described above with reference in FIG. 1). You can configure the universal transaction ID to allow you to use your gift card with multiple retailers, service providers, or manufacturers.

“A. “A.

FIG. 10 a member of system 100 may be eligible to receive targeted marketing campaigns, such as offers and discounts or other information. These savings and offers are shown in the illustrated example as an expandable line-item listed under the?View Discounts & Offers? section of the consumer interface 1000. tab. Each offer can identify the vendor, give a description of each offer, and expiration date. It may also identify the targeting method used to encourage consumers to accept the offer. The offer could contain text, video, photos, service provider branding, retailer or manufacturer branding or web-links. The consumer can also choose to save offers that interest them into their personal management section 1006 which allows them to activate an offer.

“FIG. “FIG. FIG. FIG. 1 illustrates how the system 100 managers can contract with service providers, retailers, and/or manufacturers to develop special offers for consumers. Once the campaign details have been established, the system will identify the consumer member that will be targeted by the special offer at step 1104. The system manager will then send the special offer to the targeted consumer at step 1108. This will be available by the consumer via their personal account in the consumer system. This will allow you to identify the reason each consumer was selected for the campaign.

Campaigns can be distinguished by co-branding/short messaging campaigns, expiration dates, cobranding, short message service campaigns and offers searchable by nontarget consumers. Offers transferable among member consumer members. On-line vs off-line redemption are just a few examples. To identify which consumer should be targeted for a particular offer or part of a campaign, targeting methods may include demographic, geographic, profile preferences/psychographics, recent purchases/uses, gift card/store credit ownership, loyalty program memberships, event calendar, travel calendar, word of mouth/previous campaign participation. The art of targeting is not restricted to the above. Other campaign characterization categories, as well as the offer details, may also be used to identify the target consumers.

“FIG. “FIG. 11B” is an example flow diagram that illustrates the consumer receiving and processing special offers and saving. A registered user must be created before a consumer can receive savings and special offers. A profile is required in order to receive targeted offers. After becoming a registered user, the consumer will log on to their account and click the “View Offers and Saves” button. In FIG. 10. This tab will allow the consumer to view offers targeted to him/her and view the reasons why they were received. FIG. FIG. 10 shows the identifying information that is included with each offer. This allows the consumer to identify why they received that particular offer.”

“For instance, FIG. 10 is that the consumer receives information to identify why they were selected for this line-item offer. This identifier information is presented in colored boxes with different indicia. Each box is a different targeting method used to identify the target recipient of the campaign offer. A key may be given to users to help them identify the various targeting methods. As previously discussed, these targeting methods, may include, but are not limited to, demographic, geographic, profile preferences/psychographics, recent purchases/uses, gift card/store credit ownership, loyalty program memberships, event calendar, travel calendar, word of mouth/previous campaign participation. FIG. FIG. 10 shows how the user interface might allow them to roll over boxes that represent different targets. A text bubble, or another indicator, may be displayed when the user rolls over the boxes. This signifies that the customer has detailed information about why the target box is there. You can highlight relevant sections of a consumer’s personal manager section if they correspond to the reasons for a specific target box. If, for example, an offer was made because a consumer is a member of a loyalty program, the relevant sections in a consumer’s personal manager section may be highlighted if the consumer views the target reason (as shown in FIG. 10).”

“At step 1114 of FIG. 11B allows the consumer to decide whether to activate or delete a specific offer. A customer can request feedback from the vendor about the offer, increase or decrease the volume of offers from that vendor, or to receive no offers for a certain time period.

A consumer can choose to immediately remove unwanted offers from their offer listing. However, if a consumer chooses not to accept an offer, as illustrated in the illustration, the offer will be removed from the user’s list of offers upon expiration without notice, step 1116.

If a consumer is interested to use a specific offer, they can activate it by moving the offer into the personal management section 1006 in their account. The offer will be displayed in the personal management section 1006 on the tab of activated offers. In the illustrated example, it is called?My Special Offers. The illustrated example shows that once an offer expires it will be removed in the consumer’s personal section 1006 at step 1120. However, the consumer will still be notified about its expiration and deletion as special interest was shown by the offer.

“Optionally the system 100 could also allow a customer to change how he/she is targeted by a vendor, step 1122. The vendor may have an option to send feedback directly to the vendor. The consumer can also request more or less offers from one vendor, seek offers of a specific type or category, or seek to temporarily or permanently suspend receiving offers from a vendor.

“Additionally the system may also be capable of gathering analytics data and statistical data about campaign performance, and may provide such information for participating service providers, retailers, and manufacturers.”

“B. “B.

Click here to view the patent on Google Patents.