Offline to online sales conversion
First Claim
Patent Images
1. A computer-implemented method comprising:
- detecting, by a computer system, a security token that is associated with a given entity;
authenticating, by the computer system, the security token;
accepting, by the computer system and from the given entity, input requesting a code based on the authentication of the security token, data identifying the given entity, and an encryption key;
in response to receiving the input, generating, by the computer system, the code that provides access to an item online and identifies a particular store as an origin of the code;
encrypting the code using the encryption key;
providing the code to a client device;
receiving data indicating that the encrypted code has been input online;
decrypting the code using the encryption key;
in response to receiving the code, confirming that the code is valid;
receiving data indicating that the item was obtained using the code; and
storing data indicating that the item was obtained online using the code and associating the obtained item with the particular store based on the code.
2 Assignments
0 Petitions
Accused Products
Abstract
Various aspects can be implemented for increasing offline to online sales conversion. In general, one aspect can be a method that includes generating a coupon identifier dynamically at a retail location based on a unique password. The method also includes assigning tracking information and a variable sales price discount associated with a variable expiration time to the coupon identifier. The method further includes issuing the coupon identifier to a customer at the retail location for use in a future online sales transaction. Other implementations of this aspect include corresponding systems, apparatus, and computer program products.
25 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
detecting, by a computer system, a security token that is associated with a given entity; authenticating, by the computer system, the security token; accepting, by the computer system and from the given entity, input requesting a code based on the authentication of the security token, data identifying the given entity, and an encryption key; in response to receiving the input, generating, by the computer system, the code that provides access to an item online and identifies a particular store as an origin of the code; encrypting the code using the encryption key; providing the code to a client device; receiving data indicating that the encrypted code has been input online; decrypting the code using the encryption key; in response to receiving the code, confirming that the code is valid; receiving data indicating that the item was obtained using the code; and storing data indicating that the item was obtained online using the code and associating the obtained item with the particular store based on the code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; detecting, by a computer system, a security token that is associated with a given entity; authenticating, by the computer system, the security token; accepting, by the computer system and from the given entity, input requesting a code based on the authentication of the security token, data identifying the given entity, and an encryption key; in response to receiving the input, generating, by the computer system, the code that provides access to an item online and identifies a particular store as an origin of the code; encrypting the code using the encryption key;
providing the code to a client device;receiving data indicating that the encrypted code has been input online; decrypting the code using the encryption key; in response to receiving the code, confirming that the code is valid; receiving data indicating that the item was obtained using the code; and storing data indicating that the item was obtained online using the code and associating the obtained item with the particular store based on the code. - View Dependent Claims (18, 19)
-
-
20. A non-transitory computer-readable medium storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
detecting, by a computer system, a security token that is associated with a given entity; authenticating, by the computer system, the security token; accepting, by the computer system and from the given entity, input requesting a code based on the authentication of the security token, data identifying the given entity, and an encryption key; in response to receiving the input, generating, by the computer system, the code that provides access to an item online and identifies a particular store as an origin of the code; encrypting the code using the encryption key; providing the code to a client device; receiving data indicating that the encrypted code has been input online; decrypting the code using the encryption key; in response to receiving the code, confirming that the code is valid; receiving data indicating that the item was obtained using the code; and storing data indicating that the item was obtained online using the code and associating the obtained item with the particular store based on the code.
-
Specification