WO2013138112A1 - Presentation-indifferent commerce - Google Patents

Presentation-indifferent commerce Download PDF

Info

Publication number
WO2013138112A1
WO2013138112A1 PCT/US2013/029083 US2013029083W WO2013138112A1 WO 2013138112 A1 WO2013138112 A1 WO 2013138112A1 US 2013029083 W US2013029083 W US 2013029083W WO 2013138112 A1 WO2013138112 A1 WO 2013138112A1
Authority
WO
WIPO (PCT)
Prior art keywords
item
transaction
erisc
machine
readable medium
Prior art date
Application number
PCT/US2013/029083
Other languages
French (fr)
Inventor
Courtland CALDWELL
Jesse HULTGREN
Eric BERENS
Original Assignee
Prestigeware Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Prestigeware Incorporated filed Critical Prestigeware Incorporated
Publication of WO2013138112A1 publication Critical patent/WO2013138112A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce

Definitions

  • FIG. 1 illustrates an example of a system for presentation indifferent commerce, according to an embodiment.
  • FIG. 2 illustrates an example of a system for presentation indifferent commerce, according to an embodiment.
  • FIG. 3 illustrates an example of a set of data structure relationships for stenographic authentication, according to an embodiment.
  • FIG. 4 illustrates an example of a method for presentation indifferent commerce, according to an embodiment.
  • FIG. 5 is a block diagram illustrating an example of a machine upon which one or more embodiments may be implemented.
  • Presentation indifferent commerce can be accomplished using a transaction module on a consumer platform.
  • the transaction module can interact with other modules, such as a capture and identification module to identify an item, a communication and authentication module to interact with a transaction processor, and a purchasing module to facilitate purchase of items.
  • the transaction processor can be centrally located and provide a consistent consumer experience (e.g., consumer profile, consumer interaction preferences, etc.) across devices (e.g., mobile device, tablet, home computer, gaming console, television, etc.).
  • communications module or any combination of the three can ensure a secure transaction for the consumer.
  • the transaction module can be arranged to manage consumer profile information, or to use the communications module to interact with a consumer profile repository (e.g., social networking site, transaction processor, profile module, etc.) to add greater context (e.g., depth) to purchasing interactions.
  • a consumer profile repository e.g., social networking site, transaction processor, profile module, etc.
  • greater context e.g., depth
  • Examples can include color or brand preferences, item preferences (e.g., size) for others (e.g., friends or family), etc.
  • additional purchasing information such as reviews, recommendations, or time based suggestions, can be presented to the consumer. For example, a consumer's spouse has an upcoming birthday and prefers red pants in a particular size that are produced from a particular clothing label.
  • a reminder can be presented to the consumer to purchase the item along with a list of vendors, prices, delivery dates, gift wrapping options, etc.
  • the transaction module can also interact with other user profiles (e.g., people other than the consumer or purchaser).
  • This other user profile information can be used to facilitate the purchasing transaction.
  • aspects of these other user profiles can be obfuscated (e.g., hidden) from the consumer to, for example, keep the other user's confidence.
  • the consumer wants to purchase a dress for his uncle.
  • the transaction module can connect to the aunt's user profile and acquire information such as a preferred dress size and color.
  • the aunt may not want her dress size to be known and so this information can be obfuscated from the consumer. However, the information can still be used by the transaction processor to ensure that the aunt gets a well fitted garment without having to exchange it.
  • the transaction module can also be arranged to collect or use transaction context to facilitate purchasing transactions.
  • the transaction module can collect the geographical coordinates (e.g., via a Global
  • GPS Positioning System
  • This transaction context can be used to identify an item (e.g., from store inventory), vendor (e.g., the store identity), and even interact with the store's point-of-sale (POS) system to complete the purchase.
  • item e.g., from store inventory
  • vendor e.g., the store identity
  • POS point-of-sale
  • the consumer By placing the transaction module at the consumer device to provide a common interface to both identifying items and also purchasing those items, the consumer is given end-to-end control over the purchasing experience. This control also simplifies the consumer's experience by avoiding the currently complex task of navigating vendor identification and purchasing interfaces and procedures. Further, consumer purchasing flexibility is increased by allowing the consumer to initiate the purchasing process whenever and wherever the consumer interacts with an item.
  • Item a measure (e.g., unit, volume, etc.) of a tangible or intangible good, service, or donation.
  • ISC Item Set Criterion
  • the color red can be an ISC for a set of goods that are red, such as red shoes and red balls.
  • ISC can include a bar code, a color, a size, a shape, a location, or an observation method (e.g., perspective of photograph, parsed from a video buffer, etc.).
  • ERISC Electronic representation of an ISC
  • a picture of a product barcode an example of an ISC
  • a mobile device e.g., smart-phone
  • an electronic code identifying an item embedded in an online advertisement when read by the consumer's computer.
  • the ERISC can be the same as the ISC.
  • an electronic advertisement can include machine-readable code identifying the item.
  • the ERISC is also the ISC.
  • Platform a thing from which the ERISC can be derived.
  • a billboard of red balls can be the platform and the ERISC can be a picture of the billboard captured by the consumer's device.
  • Example platforms can include virtual advertising (e.g., webpage advertisements, product websites), virtual objects (e.g., identifiable items rendered by a program such as video game objects or scenes, webpage images, etc.), physical advertising (e.g., billboards, posters, notices), or physical objects (e.g., shoes, coats, buildings, etc.).
  • FIG. 1 illustrates an example of a system 100 for presentation indifferent commerce.
  • the system 100 can include a transaction module on a consumer device 105 (e.g., operated by a consumer 110) and a transaction processor 115.
  • the system 100 can interact with a variety of different platforms, such as a webpage 125 served from a webserver 120, a physical building 135 within a geographical area 130, or a product 145 in a store display 140.
  • the transaction processor 115 can be arranged to receive an ERISC from the consumer device 105 pertaining to a platform (e.g., webpage 125).
  • the transaction processor 115 can also be arranged to receive information about the consumer's identity.
  • the transaction processor 115 can be arranged to use the ERISC to gather item information (e.g., product and vendor details).
  • the transaction processor 1 15 can be arranged to create a transaction module based on the item information and the consumer identity.
  • the transaction processor 115 can be arranged to transmit the transaction module to the consumer device 105.
  • the platform 125 can include a bootstrap module (e.g., code within an online advertisement) to acquire (e.g., gather, collect, provide) the ERISC or the consumer identity information to the transaction processor 1 15.
  • the bootstrap module can be arranged to execute the transaction module created by the transaction processor 115.
  • the bootstrap module can be dynamically modified by the transaction processor 115 to create the transaction module.
  • the transaction module can be arranged to allow abbreviated user interactions based on an interaction (e.g., observation) context.
  • An abbreviated user interaction includes fewer, or less complex, user manipulations to indicate a particular result.
  • the consumer 110 takes a picture of a grilled cheese sandwich in a restaurant at lunch time.
  • This interaction context includes the fact that it is a meal time, that the consumer 1 10 is in an eatery, and that the subject of the photograph is a food item.
  • the interaction context can be used by the transaction module to infer that the consumer 110 wishes to order a grilled cheese sandwich and so provides a simple confirmation prompt, or no prompt at all before ordering the sandwich.
  • Examples of abbreviated user interactions can include long taps (e.g., presses or clicks with a pointing device), gestures (e.g., swipes, wipes, rotations), or physical manipulation of the consumer device 105 (e.g., shaking, bending, folding, closing, opening, etc.) coupled with a transaction (e.g., purchase) feature.
  • long taps e.g., presses or clicks with a pointing device
  • gestures e.g., swipes, wipes, rotations
  • physical manipulation of the consumer device 105 e.g., shaking, bending, folding, closing, opening, etc.
  • a transaction e.g., purchase
  • the transaction processor 115 can be arranged to manage a purchase transaction, including such things as workflow, purchase negotiations, data collection, communications security, transaction execution, fulfillment (e.g., logistics or delivery), among others.
  • the transaction processor 115 can be arranged to facilitate item returns (e.g., refund, exchange, replacement, etc.).
  • the facilitation can provide information to the consumer 110 and a vendor to permit the consumer 1 10 to return the item at a store.
  • the facilitation can provide information to the consumer 1 10 and a vendor to permit the consumer 110 to effectuate the return remotely (e.g., via the mail, online, etc.).
  • the transaction processor 115 can be arranged to provide support services (e.g., manuals, advice, frequently-asked-questions (FAQ) repositories, etc.). By providing post purchase support or item return, presentation indifferent commerce normalizes whole purchase lifecycle for the consumer 110.
  • support services e.g., manuals, advice, frequently-asked-questions (FAQ) repositories, etc.
  • the transaction processor 115 can be arranged to manage user profiles, include a consumer profile for the consumer 1 10.
  • the management can include creating, updating, or deleting the consumer profile.
  • the management can include collection of user profile information from an alternate profile repository.
  • the alternate profile repository can include a linked account at, for example, a social networking service, employer, educator, or the government.
  • the consumer profile can be arranged to link (e.g., to give or receive permission for data access) to another user's profile.
  • the profile can be arranged to store consumer financial information (e.g., payment options), such as credit cards, checking, or other account information that can be used to complete a purchase transaction.
  • the profile module (or equivalent functionality in another module) can be arranged to enforce data sharing preferences of the consumer 110 or other users.
  • the data sharing preferences can include permissions specifying at least one of a party and level of access to individual pieces of information or groups of information.
  • the transaction processor 115 can include or interact with an event module.
  • the event module can be arranged to observe dates, messages, or other observable activities of or applicable to the consumer 1 10 or other people (acquaintances, friends, family, coworkers, etc., or subsets thereof). Examples of events can include such things as a reminder, a birthday, a period preceding a birthday or other date, an anniversary, a dinner engagement, etc.
  • the platform 125 is a webpage (e.g., website, internet- accessible platform, etc.) 125 served from a webserver 120 and accessed via a web browser on the consumer device 105.
  • the consumer 110 can direct the web browser to a news site to read this morning's headlines.
  • the platform 125 can deliver content, including an ERISC/ISC (e.g., they are the same thing) to the consumer device 105.
  • the consumer 110 can encounter an advertisement for a pair of earrings while browsing the headlines.
  • the advertisement can include an item attribute (e.g., product code) which is the ERISC/ISC.
  • the advertisement can also include a bootstrap module that executes on the client machine and opens a connection (e.g., cross-domain Hypertext Transfer Protocol
  • the transaction processor 115 can verify the consumer's identity based on the consumer device 105 and a previously configured link between the consumer profile for the consumer 1 10 and a social network account for the consumer 110.
  • the transaction processor 1 15 can authenticate the consumer 1 10 to the bootstrap module (e.g., create a transaction session) and transmit instructions to cause the bootstrap module to instantiate the transaction module.
  • the transaction module can modify the advertisement to include new functionality (e.g., additional user interface elements) to help the consumer 1 10 purchase the earrings directly from the advertisement.
  • the earring example can be extended to incorporate other people's profiles as described above.
  • the transaction processor 115 (or the transaction module) can be arranged to infer that the earring purchase is for his wife based on a link between his consumer profile and her profile (e.g., at a social networking site).
  • the transaction processor 115 can be arranged to recommend to the consumer 110 that he should purchase a clip-on variant in blue of the earrings because, although his wife's ears are pierced, she prefers blue clip-on earrings based on her profile.
  • the transaction processor 115 can be arranged to complete the purchase of the earrings by communicating fulfillment instructions to the vendor.
  • the fulfillment instructions can include a payment method, a desired delivery date (e.g., the wife's birthday), a delivery address, a size or style the earrings, a personalized message, etc.
  • the user selected to pay with his first credit card and the payment can be handled by the transaction processor 115.
  • the transaction processor 115 can be arranged to determine which of a plurality of payment options is most efficient for the consumer 110. For example, a second credit card may provide a number of reward "points" for the purchase that is in excess of the "points" offered by the first credit card. However, the first credit card may offer free shipping whose value exceeds the value of the additional "points" garnered by using the second credit card. Thus, the transaction processor 115 would recommend or use the first credit card.
  • the platform 125 can be a store, a department within the store, a store shelf, or a physical object 145, individually or in any combination.
  • the consumer 1 10 visits a local retail store including different kinds of balls. The consumer 110 sees a particular ball 145 that she finds appealing.
  • the bootstrap or transaction modules can be arranged to automatically authenticate the consumer 110 to the transaction processor 115 by accessing the consumer device's data (e.g., metadata) from which the consumer's identity can be confirmed.
  • the user can be presented with additional details about the ball 145 including other available colors and which sizes are in stock at the store in which the user is currently located.
  • the store location can be determined, for example, using GPS or other localization services.
  • the consumer 1 10 can elect (e.g., via a user interface provided by the transaction module) to purchase a blue version of the ball 145 that she originally liked.
  • the blue ball can be presented to the consumer 110 by the transaction module (e.g., via the transaction processor 1 15) based on the consumer's past ball purchasing decisions.
  • the consumer 110 can elect to take the ball 145 with her now via the user interface.
  • the transaction module can be arranged to her to the Customer Service desk, where, for example, near field communication (NFC) can be used to facilitate completion of the transaction.
  • NFC near field communication
  • a clerk can hand her the ball 145 and confirm her receipt of the item via the transaction processor 1 15 (e.g., via a POS system) or transaction module (e.g., the consumer 110 acknowledges receipt on the consumer device 105).
  • a copy of the consumer's receipt can be transmitted to one or more of the transaction module or the consumer's email.
  • the platform 125 can be a physical object 145 that is representative of an item, such as the building 135 in a geographical area 130 (e.g., a city block).
  • the building 135 can include a variety of ISCs, such as geographical location, perspective (e.g., direction and elevation of the consumer 110 when viewing the building 135), physical appearance, color, size, words (e.g., marquees, names, etc.).
  • the ISCs, captured in an ERISC e.g., photograph or video of the building 135) can be used to, for example, determine the building's name.
  • Items, such as models of the building 135, promotional items (e.g., clothing), etc. connected to the building 135 can be identified by the transaction processor 115 based on the ISCs or derived information, such as the building's name, and presented to the consumer 110.
  • the consumer 110 can then complete a purchase transaction as described above.
  • a radio talk show host encourages his listeners to donate to a foundation.
  • the ISC can be encoded in the radio transmission.
  • the user can, for example, use the transaction module on his consumer device 105 (e.g., a tablet) to capture and process an ERISC from the transmitted ISC.
  • the platform 125 can be the radio station, the broadcast (e.g., over the air radio signal), the sound system playing the broadcast, or a car in which the sound system is installed, alone or in any combination.
  • the consumer device 105 may not be connected to any medium enabling
  • the transaction module can be arranged to store the ERISC for use when communication is restored.
  • the consumer 1 10 can arrive at home and his and the consumer device 105 can connect to a home wireless network.
  • the consumer 1 10 can be alerted that he has a pending ERISC and can be provided a user interface by the transaction module to complete the transaction.
  • the consumer 1 10 can be presented with the option to donate $5, $10, or $25. In this example, the consumer 1 10 selects to donate $10.
  • the transaction module or processor 1 15 can recommend that the consumer 1 10 take advantage of a 5% cash back promotion currently offered on his third card for charitable donations.
  • the consumer 1 10 can reject the recommendation and instead elect to pay using his debit account.
  • the transaction module can be arranged to confirm and execute the transaction.
  • the consumer 1 10 can be playing a video game on the consumer device 105 (e.g., video game system, console, etc.). For example, while driving a virtual car around a city, the consumer 1 10 can park his car outside of a pizza restaurant within the video game. The user's character can exit the car and walk into the pizza restaurant. The user's character can engage with a non-player character (NPC).
  • NPC non-player character
  • the NPC can offer the user a menu of items to choose from.
  • the menu can include both virtual (in game) and physical (out of game) items for sale.
  • the vendor can accept both virtual (e.g., in-game) and non- virtual (e.g., real) currency as payment for the item.
  • the consumer 1 10 selects a physical large pepperoni pizza.
  • the NPC confirms that the pizza is for the consumer 1 10 (not another recipient) and the user's form of payment. After order confirmation, the NPC can inform the consumer 1 10, within the game, that the pizza will be delivered to his home in forty minutes.
  • the consumer 1 10 can receive in game updates when his pizza moves through various stages of preparation.
  • the updates can include in-game pop-up messages, spoken dialogue, or modifications to the game's environment (e.g., viewing the virtual pizza chefs preparing the pie).
  • the platform 125 can be one, or a combination, of the video game, the video game system, the video game network (e.g., a network facilitating online multiplayer games), etc.
  • the ISC can be a product code, an image of the pizza (e.g., taken from a screenshot), etc.
  • the ERISC can be the screenshot itself, the product code, the NPC, etc.
  • the NPC can be the user interface provided by a transaction module interacting with the game via an application programming interface (API) or within the game itself.
  • API application programming interface
  • the consumer 1 10 can read a copy of a hard copy magazine.
  • the consumer 1 10 encounters an advertisement for IT services.
  • the consumer 1 10 is interested in being contacted by someone from the vendor's sales team and can initiate the interaction by taking a photograph of the advertisement with his consumer device 105.
  • the photograph includes an image of the page including, for example, a machine-readable symbol (e.g., a two-dimensional barcode).
  • the consumer 1 10 can be prompted (e.g., by the transaction module) to confirm that he wishes to transmit his personal contact information to the vendor in order to be contacted by a member of the vendor's sales team.
  • the platform 125 can be the magazine and the ERISC can be the digitally extracted and processed symbol from the image.
  • the consumer 1 10 and three friends walk into a restaurant for a meal.
  • the four friends are seated and presented with menus.
  • a module on the consumer device 105 can determine the restaurant. This can be accomplished using GPS, accessible networks, etc.
  • the module e.g., transaction module
  • the transaction processor 1 15 can communicate each friend's preferences (e.g., drink preferences) to the restaurant. In an example, this communication can occur based on previously entered user profile preferences and does not require action by any party during this particular visit. In an example, the preference can be based on user selections from other restaurant visits.
  • the waitress asks the consumer 1 10 if he would like a cola, which he then confirms.
  • the restaurant can anticipate the users' drink choices, for example, because the users had previously authorized restaurants to view food and drink preferences as well as to determine (or be informed) when the user enters the restaurant.
  • the friends place their orders and enjoy their meals.
  • the bill is brought to the table by the waitress and the consumer 1 10 can text a code, presented on the receipt, to the transaction processor 1 15.
  • the number to text can be stored in the consumer device 105, or displayed on the receipt.
  • a response text message (e.g., email) can be received.
  • the response text can include a link to a universal resource location (URL).
  • the user can activate the URL, causing a web resource to be loaded in a web browser (or other native application).
  • the web resource can be arranged to allow the consumer 1 10 to verify that his receipt is correct.
  • the consumer 1 10 can select his desired form of payment.
  • the consumer 1 10 can indicate the tip he wants to give to the waitress.
  • the consumer 1 10 can confirm the transaction and can receive a digital receipt, for example, via email.
  • the restaurant staff can be immediately informed (e.g., via the transaction processor 1 15) that the payment was received and the four friends walk out of the restaurant.
  • the ERISC can be the text message that the user types and sends.
  • the platform 125 can be the restaurant, the menu, the receipt, etc.
  • presentation indifferent commerce can provide a consumer 1 10 with an intuitive and consistent experience when purchasing items.
  • a consumer's payment options, returns, and other purchase transaction elements can be conveniently accessed via the consumer device 105 and secured and generalized by the transaction processor 1 15.
  • FIG. 2 illustrates an example of a system 200 for presentation indifferent commerce.
  • Components of the system 200 can be arranged to perform one or more functional roles discussed above with respect to FIG. 1.
  • Components of the system 200 can include a consumer device 105 arranged to be
  • the consumer device 105 can include a capture module 205.
  • the capture module 205 can be arranged to create an ERISC from the item set criterion (ISC) observed on a platform 210.
  • the ISC can be a standard identification label.
  • the standard identification label can be a universal product code (UPC) or a barcode.
  • the capture module 205 can be arranged to capture an image of a portion of the platform 210, the portion of the platform 210 containing the ISC, to create the ERISC.
  • the platform 210 can be a physical object 145.
  • the physical object 145 is at least one of a store display 140, a billboard, or a print publication (e.g., newspaper, magazine, brochure, etc.).
  • Examples of the ERISC for physical objects 145 can include a picture, video or audio recording, chemical sample, radio frequency (RF) identification, scans (e.g., barcode scan), among others.
  • RF radio frequency
  • the platform 210 can be computer-renderable environment.
  • a computer-renderable environment can include any non-physical display (e.g., light and sound) produced by a computer for user interaction.
  • Examples of computer-renderable environments include computer applications, games, mobile device apps, etc.
  • the computer-renderable environment can be a web page.
  • the capture module 205 can be arranged to extract the ISC from an HTML document used to render the web page in order to create the ERISC.
  • the HTML document can include the ERISC and the capture module 205 can be arranged to extract the ERISC.
  • the ERISC or the HTML document can include a bootstrap module.
  • the capture module 205 can be arranged to capture an image of the ISC from an image buffer (e.g., in a video unit, system memory, application memory, etc.) used to render the web page.
  • the computer-renderable environment can be a self- contained application.
  • self-contained refers to a program that is generally closed to outside input beyond the controls presented to a user.
  • most games e.g., interactive games
  • a non-self- contained application can include programs such as a web browser.
  • a web browser permits a variety of inputs that are not controlled by a user, such as the content and logic in an HTML document.
  • Self-contained applications can present challenges to capturing the ERISC because there is generally no provision built into the environment for the capture module 205 to acquire the ERISC.
  • the capture module 205 can be arranged to capture an image of the ISC from an image buffer of the system (e.g., the consumer device 105) rendering the self-contained application to create the ERISC.
  • the self-contained application can include an API (e.g., a bootstrap module) for dynamic interactions.
  • the capture module 205 can be arranged to interface (e.g., use in a unidirectional or bidirectional manner) the self-contained application API to retrieve the ISC to create the ERISC.
  • the consumer device 105 can include an authentication module 215 arranged to authenticate the system to a transaction processor 115 to create a transaction session.
  • the authentication module 215 can be invoked or instantiated by a bootstrap module in either the consumer device 105 or the platform 210.
  • the authentication module 215 can be arranged to use a steganographic authentication mechanism (SAM).
  • SAM steganographic authentication mechanism
  • the authentication module 215 can be arranged to participate in establishing a secure transaction session over an insecure connection.
  • a bootstrap module can be transmitted to the consumer device 105, for example, via a web page.
  • the bootstrap module can be arranged to initiate an initial connection to the transaction processor 115 upon being executed at the consumer device 105 (e.g., by the authentication module 215).
  • the authentication module 215 can be arranged to authenticate the consumer 110 to the transaction processor 115 without sharing, for example, consumer information to an outside party such as the vendor.
  • the secure transaction session can include anonymizing the consumer 110 and countermeasures against various attacks such as phishing, man-in-the-middle, redirection, etc.
  • An example implementation can include using a JavaScript® Object Notation (JSON) with padding (JSON-P) request, allowing cross domain JavaScript® network calls, to the transaction processor 1 15.
  • the transaction processor 115 can be arranged to receive the request headers and validate whether or not the headers indicate an authenticated user.
  • the consumer 110 can originally authenticate to an authentication authority (e.g., email provider, social networking service, a login module located remotely from the consumer device 105, etc.).
  • the authentication authority can be arranged to issue three cookies to the authentication module 215. Together, the three cookies represent an authentication initialization vector (AIV) for a cross-domain authenticated session.
  • AIV authentication initialization vector
  • the three cookies respectively are a token id number, a hashed customer id number, and a session expiration date (e.g., including time).
  • one or more of the three cookies can be encrypted prior to transmission.
  • the AIV can be stored in the transaction processor 115 for use in cross domain
  • the AIV can be stored on the consumer device 105 (e.g., the authentication module 215) for use in cross domain authentication.
  • the consumer device 105 can include a transaction module 230 arranged to coordinate client-side interactions for a transaction.
  • the transaction module 230 can be instantiated using the transaction session.
  • the transaction processor 1 15 can be arranged to create the transaction module 230 in response to and based on authentication information sent by the authentication module 215.
  • the transaction module 230 can be created by instructions to modify the behavior of the bootstrap module.
  • the transaction module 230 can be arranged to provide a user interface to the consumer 110.
  • the user interface is arranged to display status or transaction information to the consumer 110.
  • the user interface is arranged to accept consumer input to control the transaction.
  • the consumer device 105 can include a communications module 220 arranged to communicate the ERISC to the transaction module 230.
  • the communications module 220 can be arranged to provide communications services to any component inside or outside the consumer device 105.
  • the communications module 220 can be arranged to provide an asynchronous messaging system to modules on the consumer device 105.
  • the communications module 220 can be arranged to interface between the modules on the consumer device 105 and external modules or systems via the network 240.
  • the consumer device 105 can include an identification module 235 arranged to identify an item based on the ERISC received at the transaction module 230.
  • the identification module 235 A is on the consumer device 105.
  • the identification module 235B is external to the consumer device 105.
  • the identification module 235 includes both internal 235 A and external 235B components.
  • the consumer device 105 can include a purchasing module 225 arranged to offer to purchase an item using the transaction session.
  • the item being identified based on the ERISC received at the transaction module 230.
  • the purchasing module 225 can be arranged to complete the purchase in response to receiving notice that the offer to purchase was accepted.
  • the purchasing module 225 can include a
  • the transaction processor 115 can include the recommendation module.
  • the transaction module 230 can include the recommendation module.
  • the recommendation module can be a stand-alone module that is either internal or external to the consumer device 105.
  • the recommendation module can be arranged to determine a context of the transaction and to provide (e.g., without user intervention) a transaction parameter based on the context.
  • the recommendation module can be arranged to determine a geographical location of the platform 210 to determine the context.
  • the recommendation module can be arranged to determine that the offer to purchase is for a purchase on behalf of a party other than the purchaser (e.g., another or different person).
  • the recommendation module can be arranged to compare the item to a set of likely items corresponding to the consumer 110 (e.g., purchaser).
  • the set of likely items can be determined by a probability function using the context as inputs.
  • the context can include information that the consumer 110 is an adult man.
  • the item may be a small doll figure and the context can include information that the doll is currently a popular holiday gift for female children.
  • the context can also include information that the consumer 110 has a young girl as a child.
  • the context information can be used as inputs into the probability function.
  • the output of the probability function can be compared to a threshold value to determine whether the item is intended for the consumer 110 or on behalf of another.
  • the recommendation module can be arranged to retrieve an item preference for the party other than the consumer 110 and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item to provide the transaction parameter.
  • the recommendation module can recommend which action figure to purchase based on the item preference.
  • the similar items can be, for example, action figures belonging to a particular super-hero group and match the item because they are all action figures. Similar examples can include clothing color, size, brand, etc.
  • the recommendation module can be arranged to provide an instruction arranged to cause the item preference to be concealed from the consumer 110. This can be useful when the other party doesn't wish to share a preference but the preference can be important to proper item selection, such as clothing sizes.
  • the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
  • the recommendation module can be arranged to interface with a third- party personal information repository that includes personal information for the party other than the consumer 1 10 to retrieve the item preference.
  • the third-party information repository can be a social networking service (e.g., application).
  • the recommendation module in order to provide the transaction parameter, can be arranged to retrieve an item preference for the consumer 1 10.
  • the recommendation module can also be arranged to use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • FIG. 3 illustrates an example of a set of data structures and data relationships 300 for a SAM module.
  • the data structures 300 can include a shape repository 305 (e.g., library) and an authentication interface 325.
  • the shape repository 305 can include a user subset 315 of shapes (e.g., images, geometric patterns, etc.) and a random subset 310 of shapes.
  • one or more shapes 305 are not images.
  • isomorphic (entity mapping, where "shape" includes any number of entities) relationships can be used. These relationships can include selecting a set of words from a dictionary or selecting a single star from the galaxy.
  • members of the random subset 310 are randomly selected in response to an authentication event.
  • the authentication event is one of initiating the SAM module, an authentication attempt, or at specific (e.g., scheduled) times.
  • the SAM module can be arranged to provide a management interface to the consumer 1 10.
  • the management interface can be arranged to allow the consumer 110 to identify members of the user subset 315 from the shapes 305.
  • the management interface can be arranged to accept consumer 110 additions, deletions, or modifications to the shapes.
  • the SAM module can be arranged to provide the authentication interface 325 to the consumer 110.
  • the authentication interface 325 can be arranged to display a user shape 320 (a member of the user subset 315) and members of the random subset 310 to the consumer 110.
  • the authentication interface 325 can be arranged to accept consumer 110 selection of one of the displayed shapes. If the selected shape is the user shape 320, the SAM module authenticates the consumer 110 and fails to authenticate the consumer 110 otherwise.
  • SAM authentication can provide an easy and secure authentication method on input limited interfaces. For example, the consumer 110 need only press the correct shape instead of navigating a soft-keyboard on a touch-screen device.
  • the security is enhanced because the computing power necessary to assess the content of an image and correlate the content with the user is generally difficult to obtain and use in a timely or cost-efficient manner.
  • FIG. 4 illustrates an example of a method 400 for presentation indifferent commerce, according to an embodiment.
  • Various operations of the method 400 can be performed by one or more components discussed above with respect to FIGS. 1-3 or other hardware components.
  • an electronic representation of an ERISC can be created from an ISC observed on a platform.
  • the ISC can be a standard identification label.
  • the standard identification label can be a bar code.
  • creating the ERISC can include capturing an image of a portion of the platform, the portion of the platform containing the ISC.
  • the platform can be a physical object.
  • the physical object is a store display.
  • the physical object is a billboard.
  • the physical object is a print publication.
  • the platform can be a computer-renderable environment.
  • the computer-renderable environment can be a self- contained application.
  • creating the ERISC can include capturing an image of the ISC from an image buffer rendering the self-contained application.
  • creating the ERISC can include interfacing with an application programming interface (API) to retrieve the ISC.
  • API application programming interface
  • the self-contained application can be an interactive game.
  • the computer-renderable environment can be a web page.
  • creating the ERISC can include extracting the ISC from an HTML document used to render the web page.
  • creating the ERISC can include capturing an image of the ISC from an image buffer rendering the web page.
  • a transaction session can be created by authenticating to a transaction processor 115.
  • authenticating to the transaction processor 1 15 can include using SAM.
  • a transaction module 230 can be instantiated using the transaction session.
  • the ERISC can be communicated to the transaction module 230.
  • an item can be identified based on the ERISC received at the transaction module 230.
  • an offer to purchase the item can be made using the transaction session.
  • offering to purchase the item using the transaction session can include determining a context of the transaction.
  • offering to purchase the item using the transaction session can include providing, without user intervention, a transaction parameter based on the context.
  • determining the context can include determining a geographical location of the platform.
  • providing the transaction parameter can include retrieving an item preference for the consumer 110.
  • providing the transaction parameter can include using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • determining the context can include determining that the purchase is on behalf of a party other than the consumer 1 10. In an example, determining that the purchase is on behalf of the party other than the consumer 110 can include comparing the item to a set of likely items corresponding to the consumer 110. The set of likely items can be determined by a probability function using the context as inputs.
  • providing the transaction parameter can include retrieving an item preference for the party other than the consumer 110.
  • providing the transaction parameter can include using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • using the item preference can include concealing the item preference from the consumer 1 10.
  • the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
  • retrieving the item preference can include interfacing with a third-party personal information repository that includes personal information for the party other than the consumer 110.
  • the third-party personal information repository can be a social networking application.
  • FIG. 5 illustrates a block diagram of an example machine 500 upon which any one or more of the techniques (e.g., methodologies) discussed herein may perform.
  • the machine 500 may operate as a standalone device or may be connected (e.g., networked) to other machines.
  • the machine 500 may operate in the capacity of a server machine, a client machine, or both in server-client network environments.
  • the machine 500 may act as a peer machine in peer-to-peer (P2P) (or other distributed) network environment.
  • P2P peer-to-peer
  • the machine 500 may be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a mobile telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term
  • machine shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein, such as cloud computing, software as a service (SaaS), other computer cluster configurations.
  • cloud computing software as a service
  • SaaS software as a service
  • Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms.
  • Modules are tangible entities (e.g., hardware) capable of performing specified operations and may be configured or arranged in a certain manner.
  • circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module.
  • the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations.
  • the software may reside on a machine-readable medium.
  • the software when executed by the underlying hardware of the module, causes the hardware to perform the specified operations.
  • module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein.
  • each of the modules need not be instantiated at any one moment in time.
  • the modules comprise a general-purpose hardware processor configured using software
  • the general-purpose hardware processor may be configured as respective different modules at different times.
  • Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.
  • Machine 500 may include a hardware processor 502 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), a graphics processing unit (GPU), etc.
  • a hardware processor 502 e.g., a central processing unit (CPU), a graphics processing unit
  • the machine 500 may further include a display unit 510, an alphanumeric input device 512 (e.g., a keyboard), and a user interface (UI) navigation device 514 (e.g., a mouse).
  • a display unit 510, input device 512 and UI navigation device 514 may be a touch screen display.
  • the machine 500 may additionally include a storage device (e.g., drive unit) 516, a signal generation device 518 (e.g., a speaker), a network interface device 520, and one or more sensors 521, such as a global positioning system (GPS) sensor, compass, accelerometer, or other sensor.
  • the machine 500 may include an output controller 528, such as a serial (e.g., universal serial bus (USB), parallel, or other wired or wireless (e.g., infrared(IR), near field communication (NFC), etc.) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
  • a serial e.g., universal serial bus (USB), parallel, or other wired or wireless (e.g., infrared(IR), near field communication (NFC), etc.) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
  • USB universal serial bus
  • NFC near field
  • the storage device 516 may include a machine-readable medium 522 on which is stored one or more sets of data structures or instructions 524 (e.g., software) embodying or utilized by any one or more of the techniques or functions described herein.
  • the instructions 524 may also reside, completely or at least partially, within the main memory 504, within static memory 506, or within the hardware processor 502 during execution thereof by the machine 500.
  • one or any combination of the hardware processor 502, the main memory 504, the static memory 506, or the storage device 516 may constitute machine readable media.
  • machine-readable medium 522 is illustrated as a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that arranged to store the one or more instructions 524.
  • machine-readable medium may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that arranged to store the one or more instructions 524.
  • machine-readable medium may include any medium that is capable of storing, encoding, or carrying instructions for execution by the machine 500 and that cause the machine 500 to perform any one or more of the techniques of the present disclosure, or that is capable of storing, encoding or carrying data structures used by or associated with such instructions.
  • Non-limiting machine-readable medium examples may include solid-state memories, and optical and magnetic media.
  • a massed machine-readable medium comprises a machine-readable medium with a plurality of particles having resting mass.
  • massed machine readable media may include: non-volatile memory, such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM)) and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD- ROM disks.
  • non-volatile memory such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM)) and flash memory devices
  • EPROM Electrically Programmable Read-Only Memory
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • flash memory devices e.g., electrically Erasable Programmable Read-Only Memory (EEPROM)
  • EPROM Electrically Programmable Read-Only Memory
  • EEPROM Electrically Erasable Programmable Read-Only Memory
  • flash memory devices e.g.,
  • the instructions 524 may further be transmitted or received over a communications network 526 using a transmission medium via the network interface device 520 utilizing any one of a number of transfer protocols (e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.).
  • transfer protocols e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.
  • Example communication networks may include a local area network (LAN), a wide area network (WAN), a packet data network (e.g., the Internet), mobile telephone networks (e.g., cellular networks), Plain Old Telephone (POTS) networks, and wireless data networks (e.g., Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards known as Wi-Fi®, IEEE 802.16 family of standards known as WiMax®), peer-to- peer (P2P) networks, among others.
  • the network interface device 520 may include one or more physical jacks (e.g., Ethernet, coaxial, or phone jacks) or one or more antennas to connect to the communications network 526.
  • the network interface device 520 may include a plurality of antennas to wirelessly communicate using at least one of single-input multiple-output (SIMO), multiple-input multiple-output (MIMO), or multiple- input single-output (MISO) techniques.
  • SIMO single-input multiple-output
  • MIMO multiple-input multiple-output
  • MISO multiple- input single-output
  • transmission medium shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine 500, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
  • Example 1 can include subject matter (such as a device, apparatus, or system for presentation indifferent commerce) comprising a capture module arranged to create an electronic representation of an item set criterion (ERISC) from an item set criterion (ISC) observed on a platform, an authentication module arranged to authenticate the system to a transaction processor to create a transaction session, instantiate a transaction module using the transaction session, a
  • ERISC electronic representation of an item set criterion
  • ISC item set criterion
  • communications module arranged to communicate the ERISC to the transaction module, an identification module arranged to identify an item based on the ERISC received at the transaction module, and a purchasing module arranged to offer to purchase an item using the transaction session, the item identified based on the ERISC received at the transaction module.
  • Example 2 the subject matter of Example 1 can optionally include wherein to create the ERISC includes the capture module arranged to capture an image of a portion of the platform, the portion of the platform containing the ISC.
  • Example 3 the subject matter of Example 2 can optionally include wherein the platform is a physical object.
  • Example 4 the subject matter of Example 3 can optionally include wherein the physical object is a store display.
  • Example 5 the subject matter of one or both of Examples 3 and 4 can optionally include wherein the physical object is a billboard.
  • Example 6 the subject matter of any one or more of Examples 3-5 can optionally include wherein the physical object is a print publication.
  • Example 7 the subject matter of any one or more of Examples 1-6 can optionally include wherein the platform is a computer-renderable environment.
  • Example 8 the subject matter of Example 7 can optionally include wherein the computer-renderable environment is a self-contained application.
  • Example 9 the subject matter of Example 8 can optionally include wherein to create the ERISC includes the capture module arranged to capture an image of the ISC from an image buffer of the system rendering the self-contained application.
  • Example 10 the subject matter of one or both of Examples 8 and 9 can optionally include wherein to create the ERISC includes the capture module arranged interface with an application programming interface (API) to retrieve the ISC.
  • API application programming interface
  • Example 11 the subject matter of any one or more of Examples 8-
  • the self-contained application is an interactive game.
  • Example 12 the subject matter of any one or more of Examples 7-
  • 11 can optionally include wherein the computer-renderable environment is a web page.
  • Example 13 the subject matter of Example 12 can optionally include wherein to create the ERISC includes the capture module arranged to extract the ISC from a hypertext markup language (HTML) document used to render the web page.
  • HTML hypertext markup language
  • Example 14 the subject matter of one or both of Examples 12 and
  • ERISC 13 can optionally include wherein to create the ERISC includes the capture module arranged to capture an image of the ISC from an image buffer rendering the web page.
  • Example 15 the subject matter of any one or more of Examples 1-
  • the ISC 14 can optionally include wherein the ISC is a standard identification label.
  • Example 16 the subject matter of claim 15 can optionally include wherein the standard identification label is a bar code.
  • Example 17 the subject matter of any one or more of Examples 1-
  • to authenticate to the transaction processor includes the authentication module arranged to use a steganographic authentication mechanism (SAM).
  • SAM steganographic authentication mechanism
  • Example 18 the subject matter of any one or more of Examples 1-
  • 17 can optionally include wherein to purchase the item using the transaction session includes the purchasing module comprising a recommendation module arranged to determine a context of the transaction, and provide, without user intervention, a transaction parameter based on the context.
  • the purchasing module comprising a recommendation module arranged to determine a context of the transaction, and provide, without user intervention, a transaction parameter based on the context.
  • Example 19 the subject matter of Example 18 can optionally include wherein to determine the context includes the recommendation module arranged to determine a geographical location of the platform.
  • Example 20 the subject matter of one or both of Examples 18 and
  • recommendation module arranged to determine that the purchase is on behalf of a party other than a purchaser.
  • Example 21 the subject matter of Example 20 can optionally include wherein to determine that the purchase is on behalf of the party other than the purchaser includes the recommendation module arranged to compare the item to a set of likely items corresponding to the purchaser, the set of likely items determined by a probability function using the context as inputs.
  • Example 22 the subject matter of one or both of Examples 20 and
  • to provide the transaction parameter includes the recommendation module arranged to retrieve an item preference for the party other than the purchaser, and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • Example 23 the subject matter of Example 22 can optionally include wherein to use the item preference includes the recommendation module arranged to provide an instruction arranged to cause the item preference to be concealed from the purchaser.
  • Example 24 the subject matter of one or both of Examples 22 and
  • the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
  • Example 25 the subject matter of any one or more of Examples 22-24 can optionally include wherein to retrieve the item preference includes the recommendation module arranged to interface with a third-party personal information repository that includes personal information for the party other than the purchaser.
  • Example 26 the subject matter of Example 25 can optionally include wherein the third-party personal information repository is a social networking application.
  • the third-party personal information repository is a social networking application.
  • Example 27 the subject matter of any one or more of Examples
  • 18-26 can optionally include wherein to provide the transaction parameter includes the recommendation module arranged to retrieve an item preference for the purchaser, and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • the recommendation module arranged to retrieve an item preference for the purchaser, and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • Example 28 can include, or can optionally be combined with the subject matter of any one of Examples 1-27 to include, subject matter (such as a method, means for performing acts, or machine-readable medium including instructions that, when performed by a machine cause the machine to performs acts) comprising creating an electronic representation of an item set criterion (ERISC) from an item set criterion (ISC) observed on a platform, authenticating to a transaction processor to create a transaction session, instantiating a transaction module using the transaction session, communicating the ERISC to the transaction module, identifying an item based on the ERISC received at the transaction module, and offering to purchase the item using the transaction session.
  • subject matter such as a method, means for performing acts, or machine-readable medium including instructions that, when performed by a machine cause the machine to performs acts
  • ERISC electronic representation of an item set criterion
  • ISC item set criterion
  • Example 29 the subject matter of Example 28 can optionally include wherein creating the ERISC includes capturing an image of a portion of the platform, the portion of the platform containing the ISC.
  • Example 30 the subject matter of Example 29 can optionally include wherein the platform is a physical object.
  • Example 31 the subject matter of Example 30 can optionally include wherein the physical object is a store display.
  • Example 32 the subject matter of one or both of Examples 30 and
  • the physical object is a billboard.
  • Example 33 the subject matter of any one or more of Examples
  • 30-32 can optionally include wherein the physical object is a print publication.
  • Example 34 the subject matter of any one or more of Examples 28-34 can optionally include wherein the platform is a computer- renderable environment.
  • Example 35 the subject matter of Example 34 can optionally include wherein the computer-renderable environment is a self-contained application.
  • Example 36 the subject matter of Example 35 can optionally include wherein creating the ERISC includes capturing an image of the ISC from an image buffer rendering the self-contained application.
  • Example 37 the subject matter of one or both of Examples 35 and
  • creating the ERISC includes interfacing with an application programming interface (API) to retrieve the ISC.
  • API application programming interface
  • Example 38 the subject matter of any one or more of Examples
  • 35-37 can optionally include wherein the self-contained application is an interactive game.
  • Example 39 the subject matter of any one or more of Examples 34-38 can optionally include wherein the computer-renderable environment is a web page.
  • Example 40 the subject matter of Example 39 can optionally include wherein creating the ERISC includes extracting the ISC from a hypertext markup language (HTML) document used to render the web page.
  • HTML hypertext markup language
  • creating the ERISC includes capturing an image of the ISC from an image buffer rendering the web page.
  • Example 42 the subject matter of any one or more of Examples 28-41 can optionally include wherein the ISC is a standard identification label.
  • Example 43 the subject matter of Example 42 can optionally include wherein the standard identification label is a bar code.
  • Example 44 the subject matter of any one or more of Examples
  • 28 ⁇ -3 can optionally include wherein authenticating to the transaction processor includes using a steganographic authentication mechanism (SAM).
  • SAM steganographic authentication mechanism
  • Example 45 the subject matter of any one or more of Examples
  • 28 ⁇ -4 can optionally include wherein purchasing the item using the transaction session includes determining a context of the transaction, and providing, without user intervention, a transaction parameter based on the context.
  • Example 46 the subject matter of Example 45 can optionally include wherein determining the context includes determining a geographical location of the platform.
  • Example 47 the subject matter of one or both of Examples 45 and
  • determining the context includes determining that the purchase is on behalf of a party other than a purchaser.
  • Example 48 the subject matter of Example 47 can optionally include wherein determining that the purchase is on behalf of the party other than the purchaser includes comparing the item to a set of likely items corresponding to the purchaser, the set of likely items determined by a probability function using the context as inputs.
  • Example 49 the subject matter of one or both of Examples 47 and
  • Example 48 can optionally include wherein providing the transaction parameter includes retrieving an item preference for the party other than the purchaser, and using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • providing the transaction parameter includes retrieving an item preference for the party other than the purchaser, and using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
  • using the item preference includes concealing the item preference from the purchaser.
  • Example 51 the subject matter of one or both of Examples 49 and 50 can optionally include wherein the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
  • Example 52 the subject matter of any one or more of Examples
  • 49-51 can optionally include wherein retrieving the item preference includes interfacing with a third-party personal information repository that includes personal information for the party other than the purchaser.
  • Example 53 the subject matter of Example 52 can optionally include wherein the third-party personal information repository is a social networking application.
  • the third-party personal information repository is a social networking application.
  • Example 54 the subject matter of any one or more of Examples 45-53 can optionally include wherein providing the transaction parameter includes retrieving an item preference for the purchaser, and using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.

Abstract

Systems and techniques for presentation indifferent commerce are described herein. An electronic representation of an item set criterion (ERISC) can be created from an item set criterion (ISC) observed on a platform. A transaction session can be created by authenticating to a transaction processor. A transaction module can be instantiated using the transaction session. The ERISC can be communicated to the transaction module. An item can be identified based on the ERISC received at the transaction module. An offer to purchase the item can be made using the transaction module.

Description

PRESENTATION-INDIFFERENT COMMERCE
CLAIM OF PRIORITY
[0001] This patent application claims the benefit of priority to U.S.
Provisional Patent Applicant Serial No. 61/609,776, filed March 12, 2012, which is hereby incorporated by reference in its entirety.
BACKGROUND
[0002] Consumers are presented with a variety of ways to purchase items (e.g., products, services, charitable donations, etc.). Examples of ways in which items are presented include online advertisements (e.g., in a webpage), real-world advertisements (e.g., on posters or billboards), and physical stores (e.g., product displays, service counters, collection boxes, etc.) among others. Often, after directly or referentially (e.g., in an advertisement) encountering an item, the consumer must remember the context of the encounter and also seek out the item's vendor in order to purchase the item. This process can involve any or all of traveling to the vendor's store, finding the vendor's website, setting up a profile, discovering acceptable payment options, or completing mail-in forms. Often, different vendors employ a variety of different procedures (e.g., point-of-sale (POS) systems, cashiers, online shopping carts, particular payment methods, etc.) and locations
(e.g., physical or virtual). Thus, a consumer may expect to interact with a variety of disparate procedures and interfaces to obtain items from a variety of vendors.
BRIEF DESCRIPTION OF THE DRAWINGS [0003] In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed in the present document.
[0004] FIG. 1 illustrates an example of a system for presentation indifferent commerce, according to an embodiment.
[0005] FIG. 2 illustrates an example of a system for presentation indifferent commerce, according to an embodiment.
[0006] FIG. 3 illustrates an example of a set of data structure relationships for stenographic authentication, according to an embodiment.
[0007] FIG. 4 illustrates an example of a method for presentation indifferent commerce, according to an embodiment.
[0008] FIG. 5 is a block diagram illustrating an example of a machine upon which one or more embodiments may be implemented.
DETAILED DESCRIPTION [0009] Determining who may be selling an item and navigating the complex vendor interactions to complete a purchase places a tremendous burden on a consumer. Providing a single and familiar interface that is indifferent to either the item presentation method or the vendor's transactional requirements— e.g., facilities to identify item vendors and then complete item purchases— simplifies the consumer's experience. Presentation indifferent commerce normalizes item identification from a myriad of platforms. This normalized item identification can then be used to identify available vendors for the item. Once a vendor is identified, an automated financial agent can use consumer profile information to facilitate (e.g., negotiate and complete) purchasing the item.
[0010] Presentation indifferent commerce can be accomplished using a transaction module on a consumer platform. In an example, the transaction module can interact with other modules, such as a capture and identification module to identify an item, a communication and authentication module to interact with a transaction processor, and a purchasing module to facilitate purchase of items. The transaction processor can be centrally located and provide a consistent consumer experience (e.g., consumer profile, consumer interaction preferences, etc.) across devices (e.g., mobile device, tablet, home computer, gaming console, television, etc.). In an example, the transaction processor, authentication module,
communications module, or any combination of the three can ensure a secure transaction for the consumer.
[0011] The transaction module can be arranged to manage consumer profile information, or to use the communications module to interact with a consumer profile repository (e.g., social networking site, transaction processor, profile module, etc.) to add greater context (e.g., depth) to purchasing interactions.
Examples can include color or brand preferences, item preferences (e.g., size) for others (e.g., friends or family), etc. Moreover, additional purchasing information, such as reviews, recommendations, or time based suggestions, can be presented to the consumer. For example, a consumer's spouse has an upcoming birthday and prefers red pants in a particular size that are produced from a particular clothing label. A reminder can be presented to the consumer to purchase the item along with a list of vendors, prices, delivery dates, gift wrapping options, etc.
[0012] In an example, the transaction module can also interact with other user profiles (e.g., people other than the consumer or purchaser). This other user profile information can be used to facilitate the purchasing transaction. In an example, aspects of these other user profiles can be obfuscated (e.g., hidden) from the consumer to, for example, keep the other user's confidence. For example, the consumer wants to purchase a dress for his aunt. The transaction module can connect to the aunt's user profile and acquire information such as a preferred dress size and color. The aunt may not want her dress size to be known and so this information can be obfuscated from the consumer. However, the information can still be used by the transaction processor to ensure that the aunt gets a well fitted garment without having to exchange it.
[0013] The transaction module can also be arranged to collect or use transaction context to facilitate purchasing transactions. For example, the transaction module can collect the geographical coordinates (e.g., via a Global
Positioning System (GPS)) sensor in a mobile phone and determine that the user is in a particular store in a shopping mall. This transaction context can be used to identify an item (e.g., from store inventory), vendor (e.g., the store identity), and even interact with the store's point-of-sale (POS) system to complete the purchase.
[0014] By placing the transaction module at the consumer device to provide a common interface to both identifying items and also purchasing those items, the consumer is given end-to-end control over the purchasing experience. This control also simplifies the consumer's experience by avoiding the currently complex task of navigating vendor identification and purchasing interfaces and procedures. Further, consumer purchasing flexibility is increased by allowing the consumer to initiate the purchasing process whenever and wherever the consumer interacts with an item.
[0015] The following definitions are applicable to this application and its claims:
[0016] Item: a measure (e.g., unit, volume, etc.) of a tangible or intangible good, service, or donation.
[0017] Item Set Criterion (ISC): a criterion that identifies a set of items. For example, the color red can be an ISC for a set of goods that are red, such as red shoes and red balls. Examples of an ISC can include a bar code, a color, a size, a shape, a location, or an observation method (e.g., perspective of photograph, parsed from a video buffer, etc.).
[0018] Electronic representation of an ISC (ERISC): an electronic encoding of an ISC. For example, a picture of a product barcode (an example of an ISC) taken with a mobile device (e.g., smart-phone), or an electronic code identifying an item embedded in an online advertisement when read by the consumer's computer. In an example, the ERISC can be the same as the ISC. For example, an electronic advertisement can include machine-readable code identifying the item. In this example, the ERISC is also the ISC.
[0019] Platform: a thing from which the ERISC can be derived. For example, a billboard of red balls can be the platform and the ERISC can be a picture of the billboard captured by the consumer's device. Example platforms can include virtual advertising (e.g., webpage advertisements, product websites), virtual objects (e.g., identifiable items rendered by a program such as video game objects or scenes, webpage images, etc.), physical advertising (e.g., billboards, posters, notices), or physical objects (e.g., shoes, coats, buildings, etc.).
[0020] FIG. 1 illustrates an example of a system 100 for presentation indifferent commerce. The system 100 can include a transaction module on a consumer device 105 (e.g., operated by a consumer 110) and a transaction processor 115. The system 100 can interact with a variety of different platforms, such as a webpage 125 served from a webserver 120, a physical building 135 within a geographical area 130, or a product 145 in a store display 140.
[0021] In an example, the transaction processor 115 can be arranged to receive an ERISC from the consumer device 105 pertaining to a platform (e.g., webpage 125). The transaction processor 115 can also be arranged to receive information about the consumer's identity. The transaction processor 115 can be arranged to use the ERISC to gather item information (e.g., product and vendor details). The transaction processor 1 15 can be arranged to create a transaction module based on the item information and the consumer identity. The transaction processor 115 can be arranged to transmit the transaction module to the consumer device 105. In an example, the platform 125 can include a bootstrap module (e.g., code within an online advertisement) to acquire (e.g., gather, collect, provide) the ERISC or the consumer identity information to the transaction processor 1 15. In an example, the bootstrap module can be arranged to execute the transaction module created by the transaction processor 115. In an example, the bootstrap module can be dynamically modified by the transaction processor 115 to create the transaction module.
[0022] In an example, the transaction module can be arranged to allow abbreviated user interactions based on an interaction (e.g., observation) context. An abbreviated user interaction includes fewer, or less complex, user manipulations to indicate a particular result. For example, the consumer 110 takes a picture of a grilled cheese sandwich in a restaurant at lunch time. This interaction context includes the fact that it is a meal time, that the consumer 1 10 is in an eatery, and that the subject of the photograph is a food item. The interaction context can be used by the transaction module to infer that the consumer 110 wishes to order a grilled cheese sandwich and so provides a simple confirmation prompt, or no prompt at all before ordering the sandwich. Examples of abbreviated user interactions can include long taps (e.g., presses or clicks with a pointing device), gestures (e.g., swipes, wipes, rotations), or physical manipulation of the consumer device 105 (e.g., shaking, bending, folding, closing, opening, etc.) coupled with a transaction (e.g., purchase) feature.
[0023] In an example, the transaction processor 115 can be arranged to manage a purchase transaction, including such things as workflow, purchase negotiations, data collection, communications security, transaction execution, fulfillment (e.g., logistics or delivery), among others. In an example, the transaction processor 115 can be arranged to facilitate item returns (e.g., refund, exchange, replacement, etc.). In an example, the facilitation can provide information to the consumer 110 and a vendor to permit the consumer 1 10 to return the item at a store. In an example, the facilitation can provide information to the consumer 1 10 and a vendor to permit the consumer 110 to effectuate the return remotely (e.g., via the mail, online, etc.). In an example, the transaction processor 115 can be arranged to provide support services (e.g., manuals, advice, frequently-asked-questions (FAQ) repositories, etc.). By providing post purchase support or item return, presentation indifferent commerce normalizes whole purchase lifecycle for the consumer 110.
[0024] In an example, the transaction processor 115 can be arranged to manage user profiles, include a consumer profile for the consumer 1 10. In an example, the management can include creating, updating, or deleting the consumer profile. In an example, the management can include collection of user profile information from an alternate profile repository. In an example, the alternate profile repository can include a linked account at, for example, a social networking service, employer, educator, or the government. In an example, the consumer profile can be arranged to link (e.g., to give or receive permission for data access) to another user's profile. In an example, the profile can be arranged to store consumer financial information (e.g., payment options), such as credit cards, checking, or other account information that can be used to complete a purchase transaction. In an example, the profile module (or equivalent functionality in another module) can be arranged to enforce data sharing preferences of the consumer 110 or other users. In an example, the data sharing preferences can include permissions specifying at least one of a party and level of access to individual pieces of information or groups of information.
[0025] In an example, the transaction processor 115 can include or interact with an event module. The event module can be arranged to observe dates, messages, or other observable activities of or applicable to the consumer 1 10 or other people (acquaintances, friends, family, coworkers, etc., or subsets thereof). Examples of events can include such things as a reminder, a birthday, a period preceding a birthday or other date, an anniversary, a dinner engagement, etc.
[0026] In an example, the platform 125 is a webpage (e.g., website, internet- accessible platform, etc.) 125 served from a webserver 120 and accessed via a web browser on the consumer device 105. For example, the consumer 110 can direct the web browser to a news site to read this morning's headlines. The platform 125 can deliver content, including an ERISC/ISC (e.g., they are the same thing) to the consumer device 105. The consumer 110 can encounter an advertisement for a pair of earrings while browsing the headlines. The advertisement can include an item attribute (e.g., product code) which is the ERISC/ISC. In an example, the advertisement can also include a bootstrap module that executes on the client machine and opens a connection (e.g., cross-domain Hypertext Transfer Protocol
(HTTP) connection) to the transaction processor 1 15. The transaction processor 115 can verify the consumer's identity based on the consumer device 105 and a previously configured link between the consumer profile for the consumer 1 10 and a social network account for the consumer 110. The transaction processor 1 15 can authenticate the consumer 1 10 to the bootstrap module (e.g., create a transaction session) and transmit instructions to cause the bootstrap module to instantiate the transaction module. The transaction module can modify the advertisement to include new functionality (e.g., additional user interface elements) to help the consumer 1 10 purchase the earrings directly from the advertisement.
[0027] The earring example can be extended to incorporate other people's profiles as described above. For example, say the consumer 110 is a married man. The transaction processor 115 (or the transaction module) can be arranged to infer that the earring purchase is for his wife based on a link between his consumer profile and her profile (e.g., at a social networking site). The transaction processor 115 can be arranged to recommend to the consumer 110 that he should purchase a clip-on variant in blue of the earrings because, although his wife's ears are pierced, she prefers blue clip-on earrings based on her profile.
[0028] In an example, the transaction processor 115 can be arranged to complete the purchase of the earrings by communicating fulfillment instructions to the vendor. In an example, the fulfillment instructions can include a payment method, a desired delivery date (e.g., the wife's birthday), a delivery address, a size or style the earrings, a personalized message, etc. For example, the user selected to pay with his first credit card and the payment can be handled by the transaction processor 115. In an example, the transaction processor 115 can be arranged to determine which of a plurality of payment options is most efficient for the consumer 110. For example, a second credit card may provide a number of reward "points" for the purchase that is in excess of the "points" offered by the first credit card. However, the first credit card may offer free shipping whose value exceeds the value of the additional "points" garnered by using the second credit card. Thus, the transaction processor 115 would recommend or use the first credit card.
[0029] In an example, the platform 125 can be a store, a department within the store, a store shelf, or a physical object 145, individually or in any combination. In this example, the consumer 1 10 visits a local retail store including different kinds of balls. The consumer 110 sees a particular ball 145 that she finds appealing.
Using, for example, a bootstrap module or transaction module on her consumer device 105, she snaps a photograph of the ball's barcode. The photo of the barcode is the ERISC in this example. In this example, the bootstrap or transaction modules can be arranged to automatically authenticate the consumer 110 to the transaction processor 115 by accessing the consumer device's data (e.g., metadata) from which the consumer's identity can be confirmed. The user can be presented with additional details about the ball 145 including other available colors and which sizes are in stock at the store in which the user is currently located. The store location can be determined, for example, using GPS or other localization services.
[0030] In an example, the consumer 1 10 can elect (e.g., via a user interface provided by the transaction module) to purchase a blue version of the ball 145 that she originally liked. The blue ball can be presented to the consumer 110 by the transaction module (e.g., via the transaction processor 1 15) based on the consumer's past ball purchasing decisions. The consumer 110 can elect to take the ball 145 with her now via the user interface. The transaction module can be arranged to her to the Customer Service desk, where, for example, near field communication (NFC) can be used to facilitate completion of the transaction. A clerk can hand her the ball 145 and confirm her receipt of the item via the transaction processor 1 15 (e.g., via a POS system) or transaction module (e.g., the consumer 110 acknowledges receipt on the consumer device 105). A copy of the consumer's receipt can be transmitted to one or more of the transaction module or the consumer's email.
[0031] In an example the platform 125 can be a physical object 145 that is representative of an item, such as the building 135 in a geographical area 130 (e.g., a city block). The building 135 can include a variety of ISCs, such as geographical location, perspective (e.g., direction and elevation of the consumer 110 when viewing the building 135), physical appearance, color, size, words (e.g., marquees, names, etc.). In an example, the ISCs, captured in an ERISC (e.g., photograph or video of the building 135) can be used to, for example, determine the building's name. Items, such as models of the building 135, promotional items (e.g., clothing), etc. connected to the building 135 can be identified by the transaction processor 115 based on the ISCs or derived information, such as the building's name, and presented to the consumer 110. The consumer 110 can then complete a purchase transaction as described above.
[0032] Below are additional illustrative examples of platforms 125 and platform interactions that are not shown in FIG. 1. For example, a radio talk show host encourages his listeners to donate to a foundation. The ISC can be encoded in the radio transmission. The user can, for example, use the transaction module on his consumer device 105 (e.g., a tablet) to capture and process an ERISC from the transmitted ISC. Here, the platform 125 can be the radio station, the broadcast (e.g., over the air radio signal), the sound system playing the broadcast, or a car in which the sound system is installed, alone or in any combination. At a given point in time, the consumer device 105 may not be connected to any medium enabling
communication with the transaction processor 1 15. The transaction module can be arranged to store the ERISC for use when communication is restored. The consumer 1 10 can arrive at home and his and the consumer device 105 can connect to a home wireless network. The consumer 1 10 can be alerted that he has a pending ERISC and can be provided a user interface by the transaction module to complete the transaction. The consumer 1 10 can be presented with the option to donate $5, $10, or $25. In this example, the consumer 1 10 selects to donate $10. The transaction module or processor 1 15 can recommend that the consumer 1 10 take advantage of a 5% cash back promotion currently offered on his third card for charitable donations. The consumer 1 10 can reject the recommendation and instead elect to pay using his debit account. The transaction module can be arranged to confirm and execute the transaction.
[0033] In an example, the consumer 1 10 can be playing a video game on the consumer device 105 (e.g., video game system, console, etc.). For example, while driving a virtual car around a city, the consumer 1 10 can park his car outside of a pizza restaurant within the video game. The user's character can exit the car and walk into the pizza restaurant. The user's character can engage with a non-player character (NPC). The NPC can offer the user a menu of items to choose from. In an example, the menu can include both virtual (in game) and physical (out of game) items for sale. In an example, the vendor can accept both virtual (e.g., in-game) and non- virtual (e.g., real) currency as payment for the item. The consumer 1 10 selects a physical large pepperoni pizza. The NPC confirms that the pizza is for the consumer 1 10 (not another recipient) and the user's form of payment. After order confirmation, the NPC can inform the consumer 1 10, within the game, that the pizza will be delivered to his home in forty minutes. The consumer 1 10 can receive in game updates when his pizza moves through various stages of preparation. In an example, the updates can include in-game pop-up messages, spoken dialogue, or modifications to the game's environment (e.g., viewing the virtual pizza chefs preparing the pie). In this example, the platform 125 can be one, or a combination, of the video game, the video game system, the video game network (e.g., a network facilitating online multiplayer games), etc. The ISC can be a product code, an image of the pizza (e.g., taken from a screenshot), etc. The ERISC can be the screenshot itself, the product code, the NPC, etc. In an example, the NPC can be the user interface provided by a transaction module interacting with the game via an application programming interface (API) or within the game itself.
[0034] In an example, the consumer 1 10 can read a copy of a hard copy magazine. The consumer 1 10 encounters an advertisement for IT services. The consumer 1 10 is interested in being contacted by someone from the vendor's sales team and can initiate the interaction by taking a photograph of the advertisement with his consumer device 105. The photograph includes an image of the page including, for example, a machine-readable symbol (e.g., a two-dimensional barcode). The consumer 1 10 can be prompted (e.g., by the transaction module) to confirm that he wishes to transmit his personal contact information to the vendor in order to be contacted by a member of the vendor's sales team. In this example, the platform 125 can be the magazine and the ERISC can be the digitally extracted and processed symbol from the image.
[0035] In an example, the consumer 1 10 and three friends walk into a restaurant for a meal. The four friends are seated and presented with menus. A module on the consumer device 105, for example, can determine the restaurant. This can be accomplished using GPS, accessible networks, etc. The module (e.g., transaction module), or the transaction processor 1 15, can communicate each friend's preferences (e.g., drink preferences) to the restaurant. In an example, this communication can occur based on previously entered user profile preferences and does not require action by any party during this particular visit. In an example, the preference can be based on user selections from other restaurant visits. The waitress asks the consumer 1 10 if he would like a cola, which he then confirms. The restaurant can anticipate the users' drink choices, for example, because the users had previously authorized restaurants to view food and drink preferences as well as to determine (or be informed) when the user enters the restaurant. The friends place their orders and enjoy their meals. The bill is brought to the table by the waitress and the consumer 1 10 can text a code, presented on the receipt, to the transaction processor 1 15. In an example, the number to text can be stored in the consumer device 105, or displayed on the receipt. A response text message (e.g., email) can be received. The response text can include a link to a universal resource location (URL). The user can activate the URL, causing a web resource to be loaded in a web browser (or other native application). The web resource can be arranged to allow the consumer 1 10 to verify that his receipt is correct. The consumer 1 10 can select his desired form of payment. In an example, the consumer 1 10 can indicate the tip he wants to give to the waitress. The consumer 1 10 can confirm the transaction and can receive a digital receipt, for example, via email. The restaurant staff can be immediately informed (e.g., via the transaction processor 1 15) that the payment was received and the four friends walk out of the restaurant. In this example, the ERISC can be the text message that the user types and sends. The platform 125 can be the restaurant, the menu, the receipt, etc.
[0036] As illustrated in the examples above, presentation indifferent commerce can provide a consumer 1 10 with an intuitive and consistent experience when purchasing items. A consumer's payment options, returns, and other purchase transaction elements can be conveniently accessed via the consumer device 105 and secured and generalized by the transaction processor 1 15.
[0037] FIG. 2 illustrates an example of a system 200 for presentation indifferent commerce. Components of the system 200 can be arranged to perform one or more functional roles discussed above with respect to FIG. 1. Components of the system 200 can include a consumer device 105 arranged to be
communicatively coupled via a network 240 to a transaction processor 1 15 to accomplish presentation indifferent commerce.
[0038] The consumer device 105 can include a capture module 205. The capture module 205 can be arranged to create an ERISC from the item set criterion (ISC) observed on a platform 210. In an example, the ISC can be a standard identification label. In an example, the standard identification label can be a universal product code (UPC) or a barcode. In an example, the capture module 205 can be arranged to capture an image of a portion of the platform 210, the portion of the platform 210 containing the ISC, to create the ERISC. In an example, the platform 210 can be a physical object 145. In an example, the physical object 145 is at least one of a store display 140, a billboard, or a print publication (e.g., newspaper, magazine, brochure, etc.). Examples of the ERISC for physical objects 145 can include a picture, video or audio recording, chemical sample, radio frequency (RF) identification, scans (e.g., barcode scan), among others.
[0039] In an example, the platform 210 can be computer-renderable environment. A computer-renderable environment can include any non-physical display (e.g., light and sound) produced by a computer for user interaction.
Examples of computer-renderable environments include computer applications, games, mobile device apps, etc. In an example, the computer-renderable environment can be a web page. In an example, the capture module 205 can be arranged to extract the ISC from an HTML document used to render the web page in order to create the ERISC. In an example, the HTML document can include the ERISC and the capture module 205 can be arranged to extract the ERISC. In an example, the ERISC or the HTML document can include a bootstrap module. In an example, the capture module 205 can be arranged to capture an image of the ISC from an image buffer (e.g., in a video unit, system memory, application memory, etc.) used to render the web page.
[0040] In an example, the computer-renderable environment can be a self- contained application. As used herein, "self-contained" refers to a program that is generally closed to outside input beyond the controls presented to a user. For example, most games (e.g., interactive games) include a defined set of interactions that a user can perform and to which the game reacts. In contrast, a non-self- contained application can include programs such as a web browser. A web browser permits a variety of inputs that are not controlled by a user, such as the content and logic in an HTML document. Self-contained applications can present challenges to capturing the ERISC because there is generally no provision built into the environment for the capture module 205 to acquire the ERISC. In an example, the capture module 205 can be arranged to capture an image of the ISC from an image buffer of the system (e.g., the consumer device 105) rendering the self-contained application to create the ERISC. In an example, the self-contained application can include an API (e.g., a bootstrap module) for dynamic interactions. In an example, the capture module 205 can be arranged to interface (e.g., use in a unidirectional or bidirectional manner) the self-contained application API to retrieve the ISC to create the ERISC.
[0041] The consumer device 105 can include an authentication module 215 arranged to authenticate the system to a transaction processor 115 to create a transaction session. In an example the authentication module 215 can be invoked or instantiated by a bootstrap module in either the consumer device 105 or the platform 210. In an example, the authentication module 215 can be arranged to use a steganographic authentication mechanism (SAM). An example of a SAM implementation is discussed below with respect to FIG. 3.
[0042] In an example, the authentication module 215 can be arranged to participate in establishing a secure transaction session over an insecure connection. For example, a bootstrap module can be transmitted to the consumer device 105, for example, via a web page. The bootstrap module can be arranged to initiate an initial connection to the transaction processor 115 upon being executed at the consumer device 105 (e.g., by the authentication module 215). The authentication module 215 can be arranged to authenticate the consumer 110 to the transaction processor 115 without sharing, for example, consumer information to an outside party such as the vendor. The secure transaction session can include anonymizing the consumer 110 and countermeasures against various attacks such as phishing, man-in-the-middle, redirection, etc. An example implementation can include using a JavaScript® Object Notation (JSON) with padding (JSON-P) request, allowing cross domain JavaScript® network calls, to the transaction processor 1 15. The transaction processor 115 can be arranged to receive the request headers and validate whether or not the headers indicate an authenticated user. In an example, the consumer 110 can originally authenticate to an authentication authority (e.g., email provider, social networking service, a login module located remotely from the consumer device 105, etc.). The authentication authority can be arranged to issue three cookies to the authentication module 215. Together, the three cookies represent an authentication initialization vector (AIV) for a cross-domain authenticated session. In an example, the three cookies respectively are a token id number, a hashed customer id number, and a session expiration date (e.g., including time). In an example, one or more of the three cookies can be encrypted prior to transmission. In an example, the AIV can be stored in the transaction processor 115 for use in cross domain
authentication. In an example, the AIV can be stored on the consumer device 105 (e.g., the authentication module 215) for use in cross domain authentication.
[0043] The consumer device 105 can include a transaction module 230 arranged to coordinate client-side interactions for a transaction. In an example, the transaction module 230 can be instantiated using the transaction session. For example, the transaction processor 1 15 can be arranged to create the transaction module 230 in response to and based on authentication information sent by the authentication module 215. In an example, the transaction module 230 can be created by instructions to modify the behavior of the bootstrap module. The transaction module 230 can be arranged to provide a user interface to the consumer 110. In an example, the user interface is arranged to display status or transaction information to the consumer 110. In an example, the user interface is arranged to accept consumer input to control the transaction.
[0044] The consumer device 105 can include a communications module 220 arranged to communicate the ERISC to the transaction module 230. In an example, the communications module 220 can be arranged to provide communications services to any component inside or outside the consumer device 105. For example, the communications module 220 can be arranged to provide an asynchronous messaging system to modules on the consumer device 105. In an example, the communications module 220 can be arranged to interface between the modules on the consumer device 105 and external modules or systems via the network 240.
[0045] The consumer device 105 can include an identification module 235 arranged to identify an item based on the ERISC received at the transaction module 230. In an example, the identification module 235 A is on the consumer device 105. In an example, the identification module 235B is external to the consumer device 105. In an example, the identification module 235 includes both internal 235 A and external 235B components.
[0046] The consumer device 105 can include a purchasing module 225 arranged to offer to purchase an item using the transaction session. The item being identified based on the ERISC received at the transaction module 230. In an example, the purchasing module 225 can be arranged to complete the purchase in response to receiving notice that the offer to purchase was accepted.
[0047] In an example, the purchasing module 225 can include a
recommendation module. In an example, the transaction processor 115 can include the recommendation module. In an example, the transaction module 230 can include the recommendation module. In an example, the recommendation module can be a stand-alone module that is either internal or external to the consumer device 105.
[0048] The recommendation module can be arranged to determine a context of the transaction and to provide (e.g., without user intervention) a transaction parameter based on the context. In an example, the recommendation module can be arranged to determine a geographical location of the platform 210 to determine the context. In an example, the recommendation module can be arranged to determine that the offer to purchase is for a purchase on behalf of a party other than the purchaser (e.g., another or different person). In an example, the recommendation module can be arranged to compare the item to a set of likely items corresponding to the consumer 110 (e.g., purchaser). In an example, the set of likely items can be determined by a probability function using the context as inputs. For example, the context can include information that the consumer 110 is an adult man. The item may be a small doll figure and the context can include information that the doll is currently a popular holiday gift for female children. The context can also include information that the consumer 110 has a young girl as a child. The context information can be used as inputs into the probability function. The output of the probability function can be compared to a threshold value to determine whether the item is intended for the consumer 110 or on behalf of another. [0049] In an example, the recommendation module can be arranged to retrieve an item preference for the party other than the consumer 110 and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item to provide the transaction parameter. For example, if the consumer 110 is the father of a young boy, and has selected an action figure, the recommendation module can recommend which action figure to purchase based on the item preference. The similar items can be, for example, action figures belonging to a particular super-hero group and match the item because they are all action figures. Similar examples can include clothing color, size, brand, etc. In an example, the recommendation module can be arranged to provide an instruction arranged to cause the item preference to be concealed from the consumer 110. This can be useful when the other party doesn't wish to share a preference but the preference can be important to proper item selection, such as clothing sizes. In an example, the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume. In an example, the recommendation module can be arranged to interface with a third- party personal information repository that includes personal information for the party other than the consumer 1 10 to retrieve the item preference. In an example, the third-party information repository can be a social networking service (e.g., application).
[0050] In an example, in order to provide the transaction parameter, the recommendation module can be arranged to retrieve an item preference for the consumer 1 10. The recommendation module can also be arranged to use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
[0051] FIG. 3 illustrates an example of a set of data structures and data relationships 300 for a SAM module. The data structures 300 can include a shape repository 305 (e.g., library) and an authentication interface 325. The shape repository 305 can include a user subset 315 of shapes (e.g., images, geometric patterns, etc.) and a random subset 310 of shapes. In an example, one or more shapes 305 are not images. In an example, isomorphic (entity mapping, where "shape" includes any number of entities) relationships can be used. These relationships can include selecting a set of words from a dictionary or selecting a single star from the galaxy. In an example, members of the random subset 310 are randomly selected in response to an authentication event. In an example, the authentication event is one of initiating the SAM module, an authentication attempt, or at specific (e.g., scheduled) times.
[0052] In an example, the SAM module can be arranged to provide a management interface to the consumer 1 10. The management interface can be arranged to allow the consumer 110 to identify members of the user subset 315 from the shapes 305. In an example, the management interface can be arranged to accept consumer 110 additions, deletions, or modifications to the shapes.
[0053] In an example, the SAM module can be arranged to provide the authentication interface 325 to the consumer 110. The authentication interface 325 can be arranged to display a user shape 320 (a member of the user subset 315) and members of the random subset 310 to the consumer 110. The authentication interface 325 can be arranged to accept consumer 110 selection of one of the displayed shapes. If the selected shape is the user shape 320, the SAM module authenticates the consumer 110 and fails to authenticate the consumer 110 otherwise.
[0054] SAM authentication can provide an easy and secure authentication method on input limited interfaces. For example, the consumer 110 need only press the correct shape instead of navigating a soft-keyboard on a touch-screen device. The security is enhanced because the computing power necessary to assess the content of an image and correlate the content with the user is generally difficult to obtain and use in a timely or cost-efficient manner.
[0055] FIG. 4 illustrates an example of a method 400 for presentation indifferent commerce, according to an embodiment. Various operations of the method 400 can be performed by one or more components discussed above with respect to FIGS. 1-3 or other hardware components.
[0056] At operation 405, an electronic representation of an ERISC can be created from an ISC observed on a platform. In an example, the ISC can be a standard identification label. In an example, the standard identification label can be a bar code.
In an example, creating the ERISC can include capturing an image of a portion of the platform, the portion of the platform containing the ISC. In an example, the platform can be a physical object. In an example, the physical object is a store display. In an example, the physical object is a billboard. In an example, the physical object is a print publication.
[0057] In an example, the platform can be a computer-renderable environment. In an example, the computer-renderable environment can be a self- contained application. In an example, creating the ERISC can include capturing an image of the ISC from an image buffer rendering the self-contained application. In an example, creating the ERISC can include interfacing with an application programming interface (API) to retrieve the ISC. In an example, the self-contained application can be an interactive game.
[0058] In an example, the computer-renderable environment can be a web page. In an example, creating the ERISC can include extracting the ISC from an HTML document used to render the web page. In an example, creating the ERISC can include capturing an image of the ISC from an image buffer rendering the web page.
[0059] At operation 410, a transaction session can be created by authenticating to a transaction processor 115. In an example, authenticating to the transaction processor 1 15 can include using SAM.
[0060] At operation 415, a transaction module 230 can be instantiated using the transaction session.
[0061] At operation 420, the ERISC can be communicated to the transaction module 230.
[0062] At operation 425, an item can be identified based on the ERISC received at the transaction module 230.
[0063] At operation 430, an offer to purchase the item can be made using the transaction session. In an example, offering to purchase the item using the transaction session can include determining a context of the transaction. In an example, offering to purchase the item using the transaction session can include providing, without user intervention, a transaction parameter based on the context. In an example, determining the context can include determining a geographical location of the platform. In an example, providing the transaction parameter can include retrieving an item preference for the consumer 110. In an example, providing the transaction parameter can include using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
[0064] In an example, determining the context can include determining that the purchase is on behalf of a party other than the consumer 1 10. In an example, determining that the purchase is on behalf of the party other than the consumer 110 can include comparing the item to a set of likely items corresponding to the consumer 110. The set of likely items can be determined by a probability function using the context as inputs.
[0065] In an example, providing the transaction parameter can include retrieving an item preference for the party other than the consumer 110. In an example, providing the transaction parameter can include using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item. In an example, using the item preference can include concealing the item preference from the consumer 1 10. In an example, the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume. In an example, retrieving the item preference can include interfacing with a third-party personal information repository that includes personal information for the party other than the consumer 110. In an example, the third-party personal information repository can be a social networking application.
[0066] FIG. 5 illustrates a block diagram of an example machine 500 upon which any one or more of the techniques (e.g., methodologies) discussed herein may perform. In alternative embodiments, the machine 500 may operate as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine 500 may operate in the capacity of a server machine, a client machine, or both in server-client network environments. In an example, the machine 500 may act as a peer machine in peer-to-peer (P2P) (or other distributed) network environment. The machine 500 may be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a mobile telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term
"machine" shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein, such as cloud computing, software as a service (SaaS), other computer cluster configurations.
[0067] Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms. Modules are tangible entities (e.g., hardware) capable of performing specified operations and may be configured or arranged in a certain manner. In an example, circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module. In an example, the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations. In an example, the software may reside on a machine-readable medium. In an example, the software, when executed by the underlying hardware of the module, causes the hardware to perform the specified operations.
[0068] Accordingly, the term "module" is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein. Considering examples in which modules are temporarily configured, each of the modules need not be instantiated at any one moment in time. For example, where the modules comprise a general-purpose hardware processor configured using software, the general-purpose hardware processor may be configured as respective different modules at different times. Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.
[0069] Machine (e.g., computer system) 500 may include a hardware processor 502 (e.g., a central processing unit (CPU), a graphics processing unit
(GPU), a hardware processor core, or any combination thereof), a main memory 504 and a static memory 506, some or all of which may communicate with each other via an interlink (e.g., bus) 508. The machine 500 may further include a display unit 510, an alphanumeric input device 512 (e.g., a keyboard), and a user interface (UI) navigation device 514 (e.g., a mouse). In an example, the display unit 510, input device 512 and UI navigation device 514 may be a touch screen display. The machine 500 may additionally include a storage device (e.g., drive unit) 516, a signal generation device 518 (e.g., a speaker), a network interface device 520, and one or more sensors 521, such as a global positioning system (GPS) sensor, compass, accelerometer, or other sensor. The machine 500 may include an output controller 528, such as a serial (e.g., universal serial bus (USB), parallel, or other wired or wireless (e.g., infrared(IR), near field communication (NFC), etc.) connection to communicate or control one or more peripheral devices (e.g., a printer, card reader, etc.).
[0070] The storage device 516 may include a machine-readable medium 522 on which is stored one or more sets of data structures or instructions 524 (e.g., software) embodying or utilized by any one or more of the techniques or functions described herein. The instructions 524 may also reside, completely or at least partially, within the main memory 504, within static memory 506, or within the hardware processor 502 during execution thereof by the machine 500. In an example, one or any combination of the hardware processor 502, the main memory 504, the static memory 506, or the storage device 516 may constitute machine readable media.
[0071] While the machine-readable medium 522 is illustrated as a single medium, the term "machine-readable medium" may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that arranged to store the one or more instructions 524.
[0072] The term "machine-readable medium" may include any medium that is capable of storing, encoding, or carrying instructions for execution by the machine 500 and that cause the machine 500 to perform any one or more of the techniques of the present disclosure, or that is capable of storing, encoding or carrying data structures used by or associated with such instructions. Non-limiting machine-readable medium examples may include solid-state memories, and optical and magnetic media. In an example, a massed machine-readable medium comprises a machine-readable medium with a plurality of particles having resting mass.
Specific examples of massed machine readable media may include: non-volatile memory, such as semiconductor memory devices (e.g., Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM)) and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD- ROM disks.
[0073] The instructions 524 may further be transmitted or received over a communications network 526 using a transmission medium via the network interface device 520 utilizing any one of a number of transfer protocols (e.g., frame relay, internet protocol (IP), transmission control protocol (TCP), user datagram protocol (UDP), hypertext transfer protocol (HTTP), etc.). Example communication networks may include a local area network (LAN), a wide area network (WAN), a packet data network (e.g., the Internet), mobile telephone networks (e.g., cellular networks), Plain Old Telephone (POTS) networks, and wireless data networks (e.g., Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards known as Wi-Fi®, IEEE 802.16 family of standards known as WiMax®), peer-to- peer (P2P) networks, among others. In an example, the network interface device 520 may include one or more physical jacks (e.g., Ethernet, coaxial, or phone jacks) or one or more antennas to connect to the communications network 526. In an example, the network interface device 520 may include a plurality of antennas to wirelessly communicate using at least one of single-input multiple-output (SIMO), multiple-input multiple-output (MIMO), or multiple- input single-output (MISO) techniques. The term "transmission medium" shall be taken to include any intangible medium that is capable of storing, encoding or carrying instructions for execution by the machine 500, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
Additional Notes & Examples
[0074] Example 1 can include subject matter (such as a device, apparatus, or system for presentation indifferent commerce) comprising a capture module arranged to create an electronic representation of an item set criterion (ERISC) from an item set criterion (ISC) observed on a platform, an authentication module arranged to authenticate the system to a transaction processor to create a transaction session, instantiate a transaction module using the transaction session, a
communications module arranged to communicate the ERISC to the transaction module, an identification module arranged to identify an item based on the ERISC received at the transaction module, and a purchasing module arranged to offer to purchase an item using the transaction session, the item identified based on the ERISC received at the transaction module.
[0075] In Example 2, the subject matter of Example 1 can optionally include wherein to create the ERISC includes the capture module arranged to capture an image of a portion of the platform, the portion of the platform containing the ISC.
[0076] In Example 3, the subject matter of Example 2 can optionally include wherein the platform is a physical object.
[0077] In Example 4, the subject matter of Example 3 can optionally include wherein the physical object is a store display.
[0078] In Example 5, the subject matter of one or both of Examples 3 and 4 can optionally include wherein the physical object is a billboard.
[0079] In Example 6, the subject matter of any one or more of Examples 3-5 can optionally include wherein the physical object is a print publication. [0080] In Example 7, the subject matter of any one or more of Examples 1-6 can optionally include wherein the platform is a computer-renderable environment.
[0081] In Example 8, the subject matter of Example 7 can optionally include wherein the computer-renderable environment is a self-contained application.
[0082] In Example 9, the subject matter of Example 8 can optionally include wherein to create the ERISC includes the capture module arranged to capture an image of the ISC from an image buffer of the system rendering the self-contained application.
[0083] In Example 10, the subject matter of one or both of Examples 8 and 9 can optionally include wherein to create the ERISC includes the capture module arranged interface with an application programming interface (API) to retrieve the ISC.
[0084] In Example 11, the subject matter of any one or more of Examples 8-
10 can optionally include wherein the self-contained application is an interactive game.
[0085] In Example 12, the subject matter of any one or more of Examples 7-
11 can optionally include wherein the computer-renderable environment is a web page.
[0086] In Example 13, the subject matter of Example 12 can optionally include wherein to create the ERISC includes the capture module arranged to extract the ISC from a hypertext markup language (HTML) document used to render the web page.
[0087] In Example 14, the subject matter of one or both of Examples 12 and
13 can optionally include wherein to create the ERISC includes the capture module arranged to capture an image of the ISC from an image buffer rendering the web page.
[0088] In Example 15, the subject matter of any one or more of Examples 1-
14 can optionally include wherein the ISC is a standard identification label.
[0089] In Example 16, the subject matter of claim 15 can optionally include wherein the standard identification label is a bar code. [0090] In Example 17, the subject matter of any one or more of Examples 1-
16 can optionally include wherein to authenticate to the transaction processor includes the authentication module arranged to use a steganographic authentication mechanism (SAM).
[0091] In Example 18, the subject matter of any one or more of Examples 1-
17 can optionally include wherein to purchase the item using the transaction session includes the purchasing module comprising a recommendation module arranged to determine a context of the transaction, and provide, without user intervention, a transaction parameter based on the context.
[0092] In Example 19, the subject matter of Example 18 can optionally include wherein to determine the context includes the recommendation module arranged to determine a geographical location of the platform.
[0093] In Example 20, the subject matter of one or both of Examples 18 and
19 can optionally include wherein to determine the context includes the
recommendation module arranged to determine that the purchase is on behalf of a party other than a purchaser.
[0094] In Example 21, the subject matter of Example 20 can optionally include wherein to determine that the purchase is on behalf of the party other than the purchaser includes the recommendation module arranged to compare the item to a set of likely items corresponding to the purchaser, the set of likely items determined by a probability function using the context as inputs.
[0095] In Example 22, the subject matter of one or both of Examples 20 and
21 can optionally include wherein to provide the transaction parameter includes the recommendation module arranged to retrieve an item preference for the party other than the purchaser, and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
[0096] In Example 23, the subject matter of Example 22 can optionally include wherein to use the item preference includes the recommendation module arranged to provide an instruction arranged to cause the item preference to be concealed from the purchaser. [0097] In Example 24, the subject matter of one or both of Examples 22 and
23 can optionally include wherein the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
[0098] In Example 25, the subject matter of any one or more of Examples 22-24 can optionally include wherein to retrieve the item preference includes the recommendation module arranged to interface with a third-party personal information repository that includes personal information for the party other than the purchaser.
[0099] In Example 26, the subject matter of Example 25 can optionally include wherein the third-party personal information repository is a social networking application.
[0100] In Example 27, the subject matter of any one or more of Examples
18-26 can optionally include wherein to provide the transaction parameter includes the recommendation module arranged to retrieve an item preference for the purchaser, and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
[0101] Example 28 can include, or can optionally be combined with the subject matter of any one of Examples 1-27 to include, subject matter (such as a method, means for performing acts, or machine-readable medium including instructions that, when performed by a machine cause the machine to performs acts) comprising creating an electronic representation of an item set criterion (ERISC) from an item set criterion (ISC) observed on a platform, authenticating to a transaction processor to create a transaction session, instantiating a transaction module using the transaction session, communicating the ERISC to the transaction module, identifying an item based on the ERISC received at the transaction module, and offering to purchase the item using the transaction session.
[0102] In Example 29, the subject matter of Example 28 can optionally include wherein creating the ERISC includes capturing an image of a portion of the platform, the portion of the platform containing the ISC. [0103] In Example 30, the subject matter of Example 29 can optionally include wherein the platform is a physical object.
[0104] In Example 31, the subject matter of Example 30 can optionally include wherein the physical object is a store display.
[0105] In Example 32, the subject matter of one or both of Examples 30 and
31 can optionally include wherein the physical object is a billboard.
[0106] In Example 33, the subject matter of any one or more of Examples
30-32 can optionally include wherein the physical object is a print publication.
[0107] In Example 34, the subject matter of any one or more of Examples 28-34 can optionally include wherein the platform is a computer- renderable environment.
[0108] In Example 35, the subject matter of Example 34 can optionally include wherein the computer-renderable environment is a self-contained application.
[0109] In Example 36, the subject matter of Example 35 can optionally include wherein creating the ERISC includes capturing an image of the ISC from an image buffer rendering the self-contained application.
[0110] In Example 37, the subject matter of one or both of Examples 35 and
36 can optionally include wherein creating the ERISC includes interfacing with an application programming interface (API) to retrieve the ISC.
[0111] In Example 38, the subject matter of any one or more of Examples
35-37 can optionally include wherein the self-contained application is an interactive game.
[0112] In Example 39, the subject matter of any one or more of Examples 34-38 can optionally include wherein the computer-renderable environment is a web page.
[0113] In Example 40, the subject matter of Example 39 can optionally include wherein creating the ERISC includes extracting the ISC from a hypertext markup language (HTML) document used to render the web page. [0114] In Example 41, the subject matter of one or both of Examples 39 and
40 can optionally include wherein creating the ERISC includes capturing an image of the ISC from an image buffer rendering the web page.
[0115] In Example 42, the subject matter of any one or more of Examples 28-41 can optionally include wherein the ISC is a standard identification label.
[0116] In Example 43, the subject matter of Example 42 can optionally include wherein the standard identification label is a bar code.
[0117] In Example 44, the subject matter of any one or more of Examples
28^-3 can optionally include wherein authenticating to the transaction processor includes using a steganographic authentication mechanism (SAM).
[0118] In Example 45, the subject matter of any one or more of Examples
28^-4 can optionally include wherein purchasing the item using the transaction session includes determining a context of the transaction, and providing, without user intervention, a transaction parameter based on the context.
[0119] In Example 46, the subject matter of Example 45 can optionally include wherein determining the context includes determining a geographical location of the platform.
[0120] In Example 47, the subject matter of one or both of Examples 45 and
46 can optionally include wherein determining the context includes determining that the purchase is on behalf of a party other than a purchaser.
[0121] In Example 48, the subject matter of Example 47 can optionally include wherein determining that the purchase is on behalf of the party other than the purchaser includes comparing the item to a set of likely items corresponding to the purchaser, the set of likely items determined by a probability function using the context as inputs.
[0122] In Example 49, the subject matter of one or both of Examples 47 and
48 can optionally include wherein providing the transaction parameter includes retrieving an item preference for the party other than the purchaser, and using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item. [0123] In Example 50, the subject matter of Example 49 can optionally include wherein using the item preference includes concealing the item preference from the purchaser.
[0124] In Example 51, the subject matter of one or both of Examples 49 and 50 can optionally include wherein the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
[0125] In Example 52, the subject matter of any one or more of Examples
49-51 can optionally include wherein retrieving the item preference includes interfacing with a third-party personal information repository that includes personal information for the party other than the purchaser.
[0126] In Example 53, the subject matter of Example 52 can optionally include wherein the third-party personal information repository is a social networking application.
[0127] In Example 54, the subject matter of any one or more of Examples 45-53 can optionally include wherein providing the transaction parameter includes retrieving an item preference for the purchaser, and using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
[0128] The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments in that may be practiced. These embodiments are also referred to herein as "examples." Such examples can include elements in addition to those shown or described. However, the present inventors also contemplate examples in which only those elements shown or described are provided. Moreover, the present inventors also contemplate examples using any combination or permutation of those elements shown or described (or one or more aspects thereof), either with respect to a particular example (or one or more aspects thereof), or with respect to other examples (or one or more aspects thereof) shown or described herein.
[0129] All publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.
[0130] In this document, the terms "a" or "an" are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of "at least one" or "one or more." In this document, the term "or" is used to refer to a nonexclusive or, such that "A or B" includes "A but not B," "B but not A," and "A and B," unless otherwise indicated. In the appended claims, the terms "including" and "in which" are used as the plain-English equivalents of the respective terms "comprising" and "wherein." Also, in the following claims, the terms "including" and "comprising" are open-ended, that is, a system, device, article, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim. Moreover, in the following claims, the terms "first," "second," and "third," etc. are used merely as labels, and are not intended to impose numerical requirements on their objects.
[0131] The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments can be used, such as by one of ordinary skill in the art upon reviewing the above description. The Abstract is to allow the reader to quickly ascertain the nature of the technical disclosure and it is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. Also, in the above Detailed Description, various features may be grouped together to streamline the disclosure. This should not be interpreted as intending that an unclaimed disclosed feature is essential to any claim. Rather, inventive subject matter may lie in less than all features of a particular disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment. The scope of the embodiments should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.

Claims

WHAT IS CLAIMED IS:
1. A system comprising:
a capture module arranged to create an electronic representation of an item set criterion (ERISC) from an item set criterion (ISC) observed on a platform; an authentication module arranged to authenticate the system to a transaction processor to create a transaction session;
a transaction module arranged to coordinate client-side interactions for a transaction, the transaction module instantiated using the transaction session;
a communications module arranged to communicate the ERISC to the transaction module;
an identification module arranged to identify an item based on the ERISC received at the transaction module; and
a purchasing module arranged to offer to purchase an item using the transaction session, the item identified based on the ERISC received at the transaction module.
2. The system of claim 1, wherein to create the ERISC includes the capture module arranged to capture an image of a portion of the platform, the portion of the platform containing the ISC.
3. The system of claim 2, wherein the platform is a physical object.
4. The system of claim 3, wherein the physical object is a store display.
5. The system of claim 3, wherein the physical object is a billboard.
6. The system of claim 3, wherein the physical object is a print publication.
7. The system of claim 1, wherein the platform is a computer-renderable environment.
8. The system of claim 7, wherein the computer-renderable environment is a self-contained application.
9. The system of claim 8, wherein to create the ERISC includes the capture module arranged to capture an image of the ISC from an image buffer of the system rendering the self-contained application.
10. The system of claim 8, wherein to create the ERISC includes the capture module arranged to interface with an application programming interface (API) to retrieve the ISC.
11. The system of claim 8, wherein the self-contained application is an interactive game.
12. The system of claim 7, wherein the computer-renderable environment is a web page.
13. The system of claim 12, wherein to create the ERISC includes the capture module arranged to extract the ISC from a hypertext markup language (HTML) document used to render the web page.
14. The system of claim 12, wherein to create the ERISC includes the capture module arranged to capture an image of the ISC from an image buffer rendering the web page.
15. The system of claim 1, wherein the ISC is a standard identification label.
16. The system of claim 15, wherein the standard identification label is a bar code.
17. The system of claim 1, wherein to authenticate to the transaction processor includes the authentication module arranged to use a steganographic authentication mechanism (SAM).
18. The system of claim 1 , wherein to offer to purchase the item using the transaction session includes the purchasing module comprising a recommendation module arranged to:
determine a context of the transaction; and
provide, without user intervention, a transaction parameter based on the context.
19. The system of claim 18, wherein to determine the context includes the recommendation module arranged to determine a geographical location of the platform.
20. The system of claim 18, wherein to determine the context includes the recommendation module arranged to determine that the purchase is on behalf of a party other than a purchaser.
21. The system of claim 20, wherein to determine that the purchase is on behalf of the party other than the purchaser includes the recommendation module arranged to compare the item to a set of likely items corresponding to the purchaser, the set of likely items determined by a probability function using the context as input.
22. The system of claim 20, wherein to provide the transaction parameter includes the recommendation module arranged to:
retrieve an item preference for the party other than the purchaser; and use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
23. The system of claim 22, wherein to use the item preference includes the recommendation module arranged to provide an instruction arranged to cause the item preference to be concealed from the purchaser.
24. The system of claim 22, wherein the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
25. The system of claim 22, wherein to retrieve the item preference includes the recommendation module arranged to interface with a third-party personal information repository that includes personal information for the party other than the purchaser.
26. The system of claim 25, wherein the third-party personal information repository is a social networking application.
27. The system of claim 18, wherein to provide the transaction parameter includes the recommendation module arranged to:
retrieve an item preference for the purchaser; and
use the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
28. A massed machine-readable medium including instructions that, when executed by a machine, cause the machine to perform operations comprising: creating an electronic representation of an item set criterion (ERISC) from an item set criterion (ISC) observed on a platform;
authenticating to a transaction processor to create a transaction session; instantiating a transaction module using the transaction session;
communicating the ERISC to the transaction module;
identifying an item based on the ERISC received at the transaction module; and
offering to purchase the item using the transaction session.
29. The machine-readable medium of claim 28, wherein creating the ERISC includes capturing an image of a portion of the platform, the portion of the platform containing the ISC.
30. The machine-readable medium of claim 29, wherein the platform is a physical object.
31. The machine-readable medium of claim 30, wherein the physical object is a store display.
32. The machine-readable medium of claim 30, wherein the physical object is a billboard.
33. The machine-readable medium of claim 30, wherein the physical object is a print publication.
34. The machine-readable medium of claim 28, wherein the platform is a computer-renderable environment.
35. The machine-readable medium of claim 34, wherein the computer- renderable environment is a self-contained application.
36. The machine-readable medium of claim 35, wherein creating the ERISC includes capturing an image of the ISC from an image buffer rendering the self- contained application.
37. The machine-readable medium of claim 35, wherein creating the ERISC includes interfacing with an application programming interface (API) to retrieve the ISC.
38. The machine-readable medium of claim 35, wherein the self-contained application is an interactive game.
39. The machine-readable medium of claim 34, wherein the computer- renderable environment is a web page.
40. The machine-readable medium of claim 39, wherein creating the ERISC includes extracting the ISC from a Hypertext Markup Language (HTML) document used to render the web page.
41. The machine-readable medium of claim 39, wherein creating the ERISC includes capturing an image of the ISC from an image buffer rendering the web page.
42. The machine-readable medium of claim 28, wherein the ISC is a standard identification label.
43. The machine-readable medium of claim 42, wherein the standard identification label is a bar code.
44. The machine-readable medium of claim 28, wherein authenticating to the transaction processor includes using a steganographic authentication mechanism (SAM).
45. The machine-readable medium of claim 28, wherein offering to purchase the item using the transaction session includes:
determining a context of the transaction; and
providing, without user intervention, a transaction parameter based on the context.
46. The machine-readable medium of claim 45, wherein determining the context includes determining a geographical location of the platform.
47. The machine-readable medium of claim 45, wherein determining the context includes determining that a purchase is on behalf of a party other than a purchaser.
48. The machine-readable medium of claim 47, wherein determining that the purchase is on behalf of the party other than the purchaser includes comparing the item to a set of likely items corresponding to the purchaser, the set of likely items determined by a probability function using the context as input.
49. The machine-readable medium of claim 47, wherein providing the transaction parameter includes:
retrieving an item preference for the party other than the purchaser; and using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
50. The machine-readable medium of claim 49, wherein using the item preference includes concealing the item preference from the purchaser.
51. The machine-readable medium of claim 49, wherein the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
52. The machine-readable medium of claim 49, wherein retrieving the item preference includes interfacing with a third-party personal information repository that includes personal information for the party other than the purchaser.
53. The machine-readable medium of claim 52, wherein the third-party personal information repository is a social networking application.
54. The machine-readable medium of claim 45, wherein providing the transaction parameter includes:
retrieving an item preference for the purchaser; and
using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
55. A method comprising:
creating an electronic representation of an item set criterion (ERISC) from an item set criterion (ISC) observed on a platform;
authenticating to a transaction processor to create a transaction session; instantiating a transaction module using the transaction session;
communicating the ERISC to the transaction module;
identifying an item based on the ERISC received at the transaction module; and
offering to purchase the item using the transaction session.
56. The method of claim 55, wherein creating the ERISC includes capturing an image of a portion of the platform, the portion of the platform containing the ISC.
57. The method of claim 56, wherein the platform is a physical object.
58. The method of claim 57, wherein the physical object is a store display.
59. The method of claim 57, wherein the physical object is a billboard.
60. The method of claim 57, wherein the physical object is a print publication.
61. The method of claim 55, wherein the platform is a computer-renderable environment.
62. The method of claim 61, wherein the computer-renderable environment is a self-contained application.
63. The method of claim 62, wherein creating the ERISC includes capturing an image of the ISC from an image buffer rendering the self-contained application.
64. The method of claim 62, wherein creating the ERISC includes interfacing with an application programming interface (API) to retrieve the ISC.
65. The method of claim 62, wherein the self-contained application is an interactive game.
66. The method of claim 61, wherein the computer-renderable environment is a web page.
67. The method of claim 66, wherein creating the ERISC includes extracting the ISC from a Hypertext Markup Language (HTML) document used to render the web page.
68. The method of claim 66, wherein creating the ERISC includes capturing an image of the ISC from an image buffer rendering the web page.
69. The method of claim 55, wherein the ISC is a standard identification label.
70. The method of claim 69, wherein the standard identification label is a bar code.
71. The method of claim 55, wherein authenticating to the transaction processor includes using a steganographic authentication mechanism (SAM).
72. The method of claim 55, wherein offering to purchase the item using the transaction session includes:
determining a context of the transaction; and
providing, without user intervention, a transaction parameter based on the context.
73. The method of claim 72, wherein determining the context includes determining a geographical location of the platform.
74. The method of claim 72, wherein determining the context includes determining that the purchase is on behalf of a party other than a purchaser.
75. The method of claim 74, wherein determining that the purchase is on behalf of the party other than the purchaser includes comparing the item to a set of likely items corresponding to the purchaser, the set of likely items determined by a probability function using the context as input.
76. The method of claim 74, wherein providing the transaction parameter includes:
retrieving an item preference for the party other than the purchaser; and using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
77. The method of claim 76, wherein using the item preference includes concealing the item preference from the purchaser.
78. The method of claim 76, wherein the item preference is at least one of size, color, material composition, language, group affiliation, and physical volume.
79. The method of claim 76, wherein retrieving the item preference includes interfacing with a third-party personal information repository that includes personal information for the party other than the purchaser.
80. The method of claim 79, wherein the third-party personal information repository is a social networking application.
81. The method of claim 72, wherein providing the transaction parameter includes:
retrieving an item preference for the purchaser; and
using the item preference to select a specific item from a plurality of similar items, the plurality of similar items matching the item.
PCT/US2013/029083 2012-03-12 2013-03-05 Presentation-indifferent commerce WO2013138112A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261609776P 2012-03-12 2012-03-12
US61/609,776 2012-03-12

Publications (1)

Publication Number Publication Date
WO2013138112A1 true WO2013138112A1 (en) 2013-09-19

Family

ID=49161662

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/029083 WO2013138112A1 (en) 2012-03-12 2013-03-05 Presentation-indifferent commerce

Country Status (1)

Country Link
WO (1) WO2013138112A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11687519B2 (en) 2021-08-11 2023-06-27 T-Mobile Usa, Inc. Ensuring availability and integrity of a database across geographical regions

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050289017A1 (en) * 2004-05-19 2005-12-29 Efraim Gershom Network transaction system and method
US20050289018A1 (en) * 2004-06-07 2005-12-29 Todd Sullivan Online personalized apparel design and sales technology with associated manufacturing and fulfillment techniques and processes
US20090271289A1 (en) * 2007-11-20 2009-10-29 Theresa Klinger System and method for propagating endorsements
US20090292814A1 (en) * 2008-05-22 2009-11-26 Yahoo! Inc. Federation and interoperability between social networks
US20100094878A1 (en) * 2005-09-14 2010-04-15 Adam Soroca Contextual Targeting of Content Using a Monetization Platform
US20100317420A1 (en) * 2003-02-05 2010-12-16 Hoffberg Steven M System and method
US20110258049A1 (en) * 2005-09-14 2011-10-20 Jorey Ramer Integrated Advertising System

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100317420A1 (en) * 2003-02-05 2010-12-16 Hoffberg Steven M System and method
US20050289017A1 (en) * 2004-05-19 2005-12-29 Efraim Gershom Network transaction system and method
US20050289018A1 (en) * 2004-06-07 2005-12-29 Todd Sullivan Online personalized apparel design and sales technology with associated manufacturing and fulfillment techniques and processes
US20100094878A1 (en) * 2005-09-14 2010-04-15 Adam Soroca Contextual Targeting of Content Using a Monetization Platform
US20110258049A1 (en) * 2005-09-14 2011-10-20 Jorey Ramer Integrated Advertising System
US20090271289A1 (en) * 2007-11-20 2009-10-29 Theresa Klinger System and method for propagating endorsements
US20090292814A1 (en) * 2008-05-22 2009-11-26 Yahoo! Inc. Federation and interoperability between social networks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11687519B2 (en) 2021-08-11 2023-06-27 T-Mobile Usa, Inc. Ensuring availability and integrity of a database across geographical regions

Similar Documents

Publication Publication Date Title
US11049082B2 (en) Systems and methods for item acquisition by selection of a virtual object placed in a digital environment
US11887054B2 (en) Virtual planogram management systems and methods
US20210279695A1 (en) Systems and methods for item acquisition by selection of a virtual object placed in a digital environment
US11881956B2 (en) Interactive sports apparel
CN104769627B (en) Method and apparatus for opposite end auxiliary shopping
CN106575455A (en) Systems and methods of socially-driven product offerings
KR20160015367A (en) Store of the future
CN106796700A (en) For the user interface using mark media, 3D indexes virtual reality image and global position system location of ecommerce
US20160321762A1 (en) Location-based group media social networks, program products, and associated methods of use
US10585547B2 (en) Customizing the visual and functional experience of an application
WO2013138112A1 (en) Presentation-indifferent commerce
US20240137233A1 (en) Methods and Systems for Connecting Physical Objects to Digital Communications
KR20040099706A (en) Method for shopping mall operation using avata clothes coodination service by weather and computer readable record medium on which program therefor is recorded

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13760436

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13760436

Country of ref document: EP

Kind code of ref document: A1