US Patent Application for SYSTEM AND METHOD FOR LINK-INITIATED USER ENGAGEMENT AND RETENTION Patent Application (Application #20240211923 issued June 27, 2024) (2024)

CROSS-REFERENCE TO RELATED APPLICATIONS

Priority is claimed in the application data sheet to the following patents or patent applications, each of which is expressly incorporated herein by reference in its entirety:

    • Ser. No. 18/185,993
    • Ser. No. 17/409,841
    • Ser. No. 17/360,731
    • Ser. No. 17/229,251
    • 63/166,391
    • Ser. No. 17/209,474
    • Ser. No. 17/208,059
    • Ser. No. 17/191,977
    • Ser. No. 17/190,260
    • Ser. No. 17/153,426
    • 62/965,626
    • 62/963,368
    • 62/963,379
    • 63/040,610
    • 63/025,287
    • 63/022,190
    • 62/994,219
    • 63/154,357
    • Ser. No. 17/085,931
    • 62/963,568
    • 62/940,607
    • Ser. No. 16/693,275
    • 62/904,568
    • 62/883,360
    • 62/879,862
    • 63/211,496

BACKGROUND OF THE INVENTION Field of the Art

The disclosure relates to the field of computer-based communication systems, and more particularly to the field of ecommerce and security.

Discussion of the State of the Art

A common problem in the industry of customer engagement and retention is the challenge of re-engaging users who have shown initial interest in a product, service, or app but have not been active for a while. This phenomenon is often referred to as “user churn” or “user attrition.” It's a concern for businesses because acquiring new customers can be more costly than retaining existing ones. Therefore, finding effective ways to re-engage inactive users and bring them back into the fold is crucial for maintaining a healthy customer base.

What is needed is a system and method for link-initiated user engagement and retention utilizing context-aware custom-generated deep links.

SUMMARY OF THE INVENTION

Accordingly, the inventor has conceived and reduced to practice, a system and method for dynamic-link initiated user engagement and retention which employs a dynamic rules engine, utilizing a range of engagement rules and device-specific context to generate personalized deep links. As a user interacts with the platform, the rules engine assesses their behaviors, preferences, and past interactions. Leveraging this data, the engine constructs deep links tailored to the user's profile and device attributes. For instance, if an inactive user previously showed interest in a specific product category, the engine might craft a deep link offering an exclusive discount within that category, optimized for the user's device. These deep links are then seamlessly delivered via auto-populated text messages, emails, push notifications, or other channels. By providing direct access to enticing content, promotions, or features, the system re-engages users, enhancing customer retention and fostering active, ongoing engagement.

According to a first preferred embodiment, a system for link-initiated user engagement and retention is disclosed, comprising: a computing device comprising a processor, a memory, and a first plurality of programming instructions stored in the memory and operable on the processor, wherein the first plurality of programming instructions, when operating on the processor, cause the computing device to: generate a passive call-to-action comprising a first uniform resource identifier (URI) configured to provide a first deep link to a messaging application on a mobile device and a payload, the payload comprising a pre-populated message suitable for display in the messaging application; upon receipt of a message substantially corresponding to the payload and associated mobile device metadata, check if there is an active mobile device record associated with the mobile device; wherein there is no active mobile device record associated with the mobile device, create and store an active mobile device record to be associated with the mobile device, the created active mobile device record comprising at least the mobile device metadata; send a confirmation message to the mobile device responsive to the creation of the active mobile device record associated with the mobile device; wherein there is an active mobile device record associated with the mobile device, forward the message to a rules engine; the rules engine comprising a second plurality of programming instructions stored in the memory and operable on the processor, wherein the second plurality of programming instructions, when operating on the processor, cause the rules engine to: receive the message; retrieve at least historical interaction data associated with the mobile device from the active mobile device record associated with the mobile device; retrieve an engagement rule associated with the payload, wherein the engagement rule comprises engagement instructions; and use the active mobile device record associated with the mobile device, the historical interaction data, and the engagement instructions to generate a second URI configured to provide a second deep link to the messaging application on the mobile device.

According to a second preferred embodiment, a method for link-initiated user engagement and retention is disclosed, comprising the steps of: generating a passive call-to-action comprising a first uniform resource identifier (URI) configured to provide a first deep link to a messaging application on a mobile device and a payload, the payload comprising a pre-populated message suitable for display in the messaging application; upon receipt of a message substantially corresponding to the payload and associated mobile device metadata, checking if there is an active mobile device record associated with the mobile device; wherein there is no active mobile device record associated with the mobile device, creating and storing an active mobile device record to be associated with the mobile device, the created active mobile device record comprising at least the mobile device metadata; sending a confirmation message to the mobile device responsive to the creation of the active mobile device record associated with the mobile device; wherein there is an active mobile device record associated with the mobile device, forwarding the message to a rules engine; receiving, using the rules engine, the message; retrieving, using the rules engine, at least historical interaction data associated with the mobile device from the active mobile device record associated with the mobile device; retrieving, using the rules engine, an engagement rule associated with the payload, wherein the engagement rule comprises engagement instructions; and using, using the rules engine, the active mobile device record associated with the mobile device, the historical interaction data, and the engagement instructions to generate a second URI configured to provide a second deep link to the messaging application on the mobile device.

According to an aspect of an embodiment, the mobile device metadata comprises a time and a context of action.

According to an aspect of an embodiment, the active mobile device record further comprises user profile information, a purchase history, and at least one user preference.

According to an aspect of an embodiment, a database stored in a non-volatile data storage device, the database comprising a plurality of engagement rules.

According to an aspect of an embodiment, the engagement rule is retrieved from the database.

BRIEF DESCRIPTION OF THE DRAWING FIGURES

The accompanying drawings illustrate several aspects and, together with the description, serve to explain the principles of the invention according to the aspects. It will be appreciated by one skilled in the art that the particular arrangements illustrated in the drawings are merely exemplary and are not to be considered as limiting of the scope of the invention or the claims herein in any way.

FIG. 1 is a block diagram illustrating an exemplary system architecture for a dynamic-link communication platform.

FIG. 2 is a block diagram illustrating an exemplary architecture for message gateway.

FIG. 3 is a block diagram illustrating an exemplary use of a message gateway.

FIG. 4 is a block diagram illustrating an exemplary architecture for a management service.

FIG. 5 is a block diagram illustrating exemplary data within one or more data stores.

FIG. 6 is a block diagram illustrating exemplary content that may be served by a dynamic-link communication platform.

FIG. 7 is a block diagram illustrating exemplary rules that may be used by a dynamic-link communication platform.

FIG. 8 is a block diagram illustrating exemplary initiators used to facilitate dynamic-link communications.

FIG. 9 is a flow diagram illustrating an exemplary method for initializing a dynamic-link communication platform.

FIG. 10 is a flow diagram illustrating an exemplary method for implementing a dynamic-link communication platform.

FIG. 11 is a flow diagram illustrating an exemplary method for facilitating multimodal communications.

FIG. 12 is a block diagram illustrating an exemplary system architecture for a dynamic-link verification platform.

FIG. 13 is a flow diagram illustrating a method for verifying a user via a mobile device and reverse lookup.

FIG. 14 is a block diagram illustrating an exemplary architecture for a management service configured to identify a subsequent message received from a mobile device and generate different content than that which was sent responsive to an initial interaction between the mobile device and an initiator, according to an embodiment.

FIG. 15 is a flow diagram illustrating an exemplary method for handling two or more subsequent messages or interactions between a user mobile device and the dynamic-link communication platform, according to an embodiment.

FIG. 16 is a flow diagram illustrating an exemplary method for generating a second set of content for subsequent interactions between a user/mobile device and platform, according to some embodiments.

FIG. 17 is a flow diagram illustrating an exemplary method for generating a second set of content for subsequent interactions between a mobile device and platform, according to an embodiment.

FIG. 18 illustrates an exemplary computing environment on which an embodiment described herein may be implemented, in full or in part.

DETAILED DESCRIPTION OF THE DRAWING FIGURES

The inventor has conceived, and reduced to practice, a system and method for dynamic-link initiated user engagement and retention which employs a dynamic rules engine, utilizing a range of engagement rules and device-specific context to generate personalized deep links. As a user interacts with the platform, the rules engine assesses their behaviors, preferences, and past interactions. Leveraging this data, the engine constructs deep links tailored to the user's profile and device attributes. For instance, if an inactive user previously showed interest in a specific product category, the engine might craft a deep link offering an exclusive discount within that category, optimized for the user's device. These deep links are then seamlessly delivered via auto-populated text messages, emails, push notifications, or other channels. By providing direct access to enticing content, promotions, or features, the system re-engages users, enhancing customer retention and fostering active, ongoing engagement.

Deep linking is a technique used in software development, especially in the context of mobile applications (App) and websites, to direct users to specific content within an app or website, rather than just the homepage or main screen. It allows seamless navigation between different sections or pages of an app/website, even when the user clicks on a link from outside the app/website. The traditional approach to linking often results in opening a new browser tab or directing users to the homepage of an app, which can be frustrating for users when they want to access a specific piece of content. Deep linking solves this problem by providing a URL that points directly to the desired content, even if it's within a specific page or section of an app.

There are two main types of deep linking: traditional deep linking and universal deep linking. Traditional deep linking involves creating custom URLs that can open a specific section or content of an app directly. When users click on a deep link, it triggers the app to open (if installed on the device) and takes them to the designated page within the app. Universal deep links work across different platforms and handle scenarios where the app is not installed. When users click on a universal deep link, it first checks if the app is installed on the device. If it is, the app opens to the specific content; if not, the link redirects the user to a fallback web URL, ensuring a seamless user experience even without the app. Implementing deep linking requires proper handling within the app and website, as well as support from the operating systems (for mobile apps) and web browsers (for websites) to recognize and process the deep links correctly. Developers often use URL schemes (for traditional deep linking) or App Links (for universal deep linking on Android) and Universal Links (for universal deep linking on iOS) to set up deep linking functionality in their applications.

A common problem in the field of customer engagement and retention is the challenge of re-engaging users who have shown initial interest in a product, service, or app but have not been active for a while. Deep links can provide an avenue towards a solution for this problem by enabling personalized and contextually relevant re-engagement strategies. Deep links can help address the issue of user churn and improve customer engagement and retention. For instance, deep links allow the system to create customized re-engagement campaigns that target specific user segments based on their past interactions, preferences, and behavior. For instance, if a user had abandoned their shopping cart, a deep link could lead them directly back to their cart, along with a special offer to incentivize them to complete the purchase. Deep links can be used to deliver personalized offers, discounts, or content that resonate with the user's previous interactions. By providing value and relevance, the system can entice users to return and engage with the app or website. In addition, deep links can guide inactive users to specific features or sections of an app or website (and/or product/event) that align with their interests. This direct access makes it easier for users to re-engage with the content they find most appealing.

The system and method may utilize temporal context and multi-channel re-engagement strategies. For example, deep links can be integrated into time-sensitive promotions, encouraging users to take immediate action. What's more, deep links can be shared across various communication channels, including emails, SMS, push notifications, and social media. This allows the system to reach out to inactive users through their preferred channels, increasing the likelihood of re-engagement. Deep links can also track user interactions and behaviors after re-engagement, providing valuable insights into the effectiveness of different re-engagement strategies. This data can be used to refine and optimize future campaigns.

By leveraging deep links to create targeted and personalized re-engagement strategies, the system and method can rekindle interest among inactive users and encourage them to become active and engaged customers once again. The ability to guide users directly to relevant content or features increases the chances of successful re-engagement, contributing to improved customer/user retention rates.

In various implementations of the system and methods described herein, a custom-generated deep link may be implemented in a text message auto-populated within a text messaging application operating on a mobile device, wherein the deep link is associated with an initiator which is linked to a specific event, promotion, verification event, and/or action. In some embodiments, when the same mobile device interacts with an initiator for a second time a server may receive the second initiator interaction and deliver a different result (e.g., deep link) than the first initiator interaction.

According to at least one aspect of an embodiment, the system and methods described herein may comprise a rules engine configured to process a second (or subsequent) initiator scan by a user of a mobile device and select an appropriate response based on various contextual data and/or metadata associated with either a first or the second (or subsequent) initiator scan. According to the aspect, rules engine may comprise one or more databases for storing various rules which can be used for routing and/or message response generation. Rules engine may be configured to create a custom-generated deep link that is responsive to a user's interaction with an initiator. Rules engine may be further configured to receive, retrieve, derive, infer, or otherwise obtain relevant contextual, or metadata associated with the user, the user's mobile device, or both. This data helps in tailoring the deep link (or other type of information that can be communicated to a user responsive to a second initiator scan) to provide a personalized and seamless experience for the user.

In some embodiments, contextual data may include (but is not limited to) user profile information, previous (i.e., historical) interactions, initiator target information, purchase history, search queries, device information, referral source (i.e., initiator), time and context of action, personal preferences, push notification interaction, and session context, to name a few. Information about the user's profile, such as their name, gender, location, language preferences, and user ID, can be used to create personalized content (e.g., deep links). For instance, a deep link could direct the user to content or offers specific to their location or language. Data on the user's previous interactions within the app or website can be valuable for creating deep links that lead them to relevant content they have engaged with in the past. For example, if the user was browsing specific products or articles, the deep link can take them back to those pages. If the user has made previous purchases, deep links can be customized to offer related products or discounts, encouraging repeat purchases. Information about the user's recent search queries can help create deep links that lead them to search results or suggested content related to their interests. Details about the user's device type (e.g., mobile, tablet, desktop) and operating system (e.g., iOS, Android, Windows) can be used to generate deep links that are compatible with their device. If the user arrived at the app or website through a specific referral source (e.g., social media, email campaign, QR code), the deep link can be customized to acknowledge the source and offer relevant content or promotions. The time of day and the context in which the user initiated the action can be considered while generating deep links. For example, if the user scanned a QR code at a particular event, the deep link could direct them to event-specific information or offers. Data about the user's preferences, such as favorite categories, genres, or topics, can be used to customize deep links that match their interests. If the user interacts with a push notification, the deep link can lead them to a relevant section of the app or website based on the notification content. Information about the user's current session, such as items in their shopping cart or content in progress, can be used to create deep links that resume their previous activity. By leveraging this contextual data, the disclosed system and methods can create deep links that deliver a highly personalized experience for users, increasing the likelihood of engagement and conversion.

One or more different aspects may be described in the present application. Further, for one or more of the aspects described herein, numerous alternative arrangements may be described; it should be appreciated that these are presented for illustrative purposes only and are not limiting of the aspects contained herein or the claims presented herein in any way. One or more of the arrangements may be widely applicable to numerous aspects, as may be readily apparent from the disclosure. In general, arrangements are described in sufficient detail to enable those skilled in the art to practice one or more of the aspects, and it should be appreciated that other arrangements may be utilized and that structural, logical, software, electrical and other changes may be made without departing from the scope of the particular aspects. Particular features of one or more of the aspects described herein may be described with reference to one or more particular aspects or figures that form a part of the present disclosure, and in which are shown, by way of illustration, specific arrangements of one or more of the aspects. It should be appreciated, however, that such features are not limited to usage in the one or more particular aspects or figures with reference to which they are described. The present disclosure is neither a literal description of all arrangements of one or more of the aspects nor a listing of features of one or more of the aspects that must be present in all arrangements.

Headings of sections provided in this patent application and the title of this patent application are for convenience only and are not to be taken as limiting the disclosure in any way.

Devices that are in communication with each other need not be in continuous communication with each other, unless expressly specified otherwise. In addition, devices that are in communication with each other may communicate directly or indirectly through one or more communication means or intermediaries, logical or physical.

A description of an aspect with several components in communication with each other does not imply that all such components are required. To the contrary, a variety of optional components may be described to illustrate a wide variety of possible aspects and in order to more fully illustrate one or more aspects. Similarly, although process steps, method steps, algorithms or the like may be described in a sequential order, such processes, methods and algorithms may generally be configured to work in alternate orders, unless specifically stated to the contrary. In other words, any sequence or order of steps that may be described in this patent application does not, in and of itself, indicate a requirement that the steps be performed in that order. The steps of described processes may be performed in any order practical. Further, some steps may be performed simultaneously despite being described or implied as occurring non-simultaneously (e.g., because one step is described after the other step). Moreover, the illustration of a process by its depiction in a drawing does not imply that the illustrated process is exclusive of other variations and modifications thereto, does not imply that the illustrated process or any of its steps are necessary to one or more of the aspects, and does not imply that the illustrated process is preferred. Also, steps are generally described once per aspect, but this does not mean they must occur once, or that they may only occur once each time a process, method, or algorithm is carried out or executed. Some steps may be omitted in some aspects or some occurrences, or some steps may be executed more than once in a given aspect or occurrence.

When a single device or article is described herein, it will be readily apparent that more than one device or article may be used in place of a single device or article. Similarly, where more than one device or article is described herein, it will be readily apparent that a single device or article may be used in place of the more than one device or article.

The functionality or the features of a device may be alternatively embodied by one or more other devices that are not explicitly described as having such functionality or features. Thus, other aspects need not include the device itself.

Techniques and mechanisms described or referenced herein will sometimes be described in singular form for clarity. However, it should be appreciated that particular aspects may include multiple iterations of a technique or multiple instantiations of a mechanism unless noted otherwise. Process descriptions or blocks in figures should be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process. Alternate implementations are included within the scope of various aspects in which, for example, functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those having ordinary skill in the art.

Conceptual Architecture

FIG. 1 is a block diagram illustrating an exemplary system architecture for a dynamic-link communication platform 100. Dynamic-link communication platform 100 links an initiator 108 with some type of content or call-to-action associated with a target product or service 116. An initiator 108 may take on many forms, a preferred form being a QR code, however other forms are anticipated in a non-exhaustive list in FIG. 8. The content served may also take many forms, a preferred form being a text or URL associated with a product 120 or service 122, however other forms are anticipated in a non-exhaustive list in FIG. 6. Actions are typically, but not limited to, communicating with some type of agent 118, be it a sales agent, technical support agent, or other types of representatives.

Initialization of dynamic-link communication platform 100 comprises storing content and rules associated with a product 120 or service 122 in some form of computer memory 106, i.e., in a database, federated data store, or distributed ledger, etc. The content and rules are assigned an initiator ID that is unique to that product 120 or service 122 and everything related to that product 120 or service 122 (e.g., content, rules, initiator ID, etc.) is called a campaign 180. The initiator ID may be autogenerated by an algorithm, or taken sequentially from a list, or other methods known to those in the art. Additionally, neither the content nor the rules together are a requirement, but each campaign must have at least one or the other or both. For example, a campaign for a product sold online may have no rules and the only content is a URL to the product page for that product. Or in another example, a marketing campaign attempting to get users 112 to speak to a sales representative may have only a set of rules that forward the user's 112 phone number to a phone number of the business. However, in some situations, there may be content and rules, whereby it may be possible to only forward the content based on some part of the user's 112 metadata embedded in the auto-populated message.

Other rules may comprise routing instructions or routing logic and may further use Artificial Intelligence (“AI”) techniques known to those skilled in the art including deep learning algorithms and incorporate data resources as listed in previous paragraph along with an array of other factors including but not limited to time-of-day, day-of-week, store hours, resource availability, service level requirements, previous customer interaction and transactions, customer tiering structure, data from 3rd party systems including but not limited to CRM systems, location-based services, weather-services and so forth.

With a unique initiator ID for a product 120 or service 122 in place, an initiator 108, such as a QR code, may be generated. It is not necessary to always generate the initiator 108 with a dynamic-link communication platform 100. According to one embodiment, initiators 108 may also be received alongside the content and rules. Generated initiators 108 may be sent, forwarded, printed, mailed, or hosted on some form of media 110. Media 110 in this sense is referring to the many forms that an initiator may be placed. A non-exhaustive list includes printed materials such as billboards, posters, and flyers; and electronic means such as online advertisem*nts, embedded advertisem*nts, URLs, push notifications, streaming media, etc.

With the dynamic-link communication platform 100 initialized, a user 112 will observe 150 media 110 with an initiator 108, use his or her device—such as a mobile device 114—to engage 152 with an initiator 108, for example scanning a QR code, which will trigger the device 114 to auto-populate a text message 154. The user 112 will simply press the send key/button to send the message 156. In the case the initiator 108 is a QR code, then the destination of the message and other data may be embedded in the QR code such that the embedded data is then transferred along with the message to the dynamic-link communication platform 100 so that the dynamic-link communication platform 100 knows the context in which the message was sent. In almost every case there may be a way two derive context from a message. Take for example, three billboards all directed to the same product 120/campaign but each containing a different phone number, where the phone number is the initiator 108 and shares the same initiator ID. In this case a user will dial the phone number and be returned the content (e.g., a text message with the product information) and the number that was dialed gives context as to the location of the billboard and the user 112. In a case where the media 110 does not allow for context, but the initiator 108 has Internet access, the initiator 108 may communicate 176/178 with the management service component 104 of a dynamic-link communication platform 100 in order to provide context as well as deliver and confirm compliance with rules if applicable.

The message sent 156 from the device 114 is received by a message gateway 102 and forwarded 158 onto a management service 104. The message gateway 102 receives and sends messages from various modes of communication, e.g., text, email, voice, and other protocols. The initiator ID contained in the message is used to query 160 a data store 106 which will return 162 any content and rules associated with that initiator ID. Upon compliance with any rules, and if there is content to be delivered back to the device 114, then the content is sent 164 to the message gateway 102 for sending 166 back to the device 114. If the message was a request to communicate with an agent 118, then upon compliance with any rules, the message or content will be sent to the message gateway 102 for delivery 172 to the agent 118. The agent 118 if applicable, will send a return message 174, and that return message will again go to the management service 104 for rule compliance before being delivered to the device 114. Some content to be delivered to the device will contain external links 170 to the products 120 and services 122. Content, rules, and provided initiators 108 may be dynamically updated via communication lines 168 with the initiator targets 116. For example, if the URL to a product changes, the product owner may push updated content to replace the old content in the data store 106.

In some embodiments, platform 100 may store information associated with a user/mobile device history of interactions with platform 100 and/or various initiators 108 in a suitable database 106. For example, a record/profile may be established and associated with a mobile device (e.g., using a device identifier such as a mobile telephone number, Apple's IDFA for iOS devices, Google Advertiser ID for Android devices, International Mobile Equipment Identity, Media Access Control, etc.) comprising historical interaction data such as previous initiators the device/user has interacted with, metadata associated with each such interaction (e.g., time, location, device state, etc.), and outcomes associated with the interaction. In some aspects, outcomes associated with an interaction may comprise information related to: purchase history and whether or not the user made a purchase or subscribed to a service if the initiator is associated with a product or service; if a purchase/subscription was made for a different product/service than what was associated with the initiator, but was a result of the user being directed to the product via the initial deep link; user engagement with a product/service (e.g., how long the user stayed on the deep linked website/application); and user sentiment (which may be derived using natural language processing and/or understanding artificial intelligence systems and any subsequent messages/metadata exchanged between the user mobile device and platform 100). In some implementations, the content served to a mobile device 114 (e.g., via an auto populated message in a messaging application) responsive to the mobile device interacting with an initiator 108 may be based in part on such a record/profile and the information contained therein.

Customers/users and their devices 114, agents 118, 177 and their business user mobile device(s), other business user device(s), and TCPA compliant mobile device(s)used by agents 118, may connect to a dynamic-link communication platform 100, typically via a cellular phone network, although connections may be made through other means, as well, such as through the Internet via a Wi-Fi router for example. Similarly, devices may connect to over a Local Area Network (“LAN”) or Wide Area Network (“WAN”), the Internet, a direct physical connection to another device, or some other network connection. Dynamic-link communication platform system 100 may connect to 3rd party or external systems or components, such as Customer Relationship Management (“CRM”) systems, Private Branch Exchange (“PBX”), traditional telephony call center agents, voicemail systems, and so forth, through 3rd party data gateway.

FIG. 2 is a block diagram illustrating an exemplary architecture for message gateway. The message gateway 102 may comprise various modules 202-208 which send and receive 250 different modes of communication. A conversion module 210 may be implemented which is dedicated to converting between different modes of communication. However, the arrangement of these modules and their inherent functions need not be arranged in the manner illustrated in FIG. 2. Another anticipated embodiment employs third-party gateway services where and if possible, such as an SMS-to-email gateway, however it may be more efficient to centrally perform the conversions, especially with regard to privacy.

Messages received 250 by the modules are sent to management service 252. The returned content or response messages from the management service may already be formatted in the proper format for the respective module 254. Returned content or response messages not properly formatted 256 may get formatted by the conversion module before going out to the proper module 202-208.

FIG. 3 is an example of a user engaging with an initiator that is intended to connect the user with a sales agent using a web-enabled chat interface. A user will interact with an initiator and then send the generated message which will be received 302 by a text message module 202. The text message module 202 may contain instructions to send and receive wireless protocols typically used for mobile devices such as SMS, MMS, iMessage, RCS, etc. The message is sent to the management service 304 where the initiator ID from the message will identify the campaign and subsequently at least one or more agents to query if they may respond to the request. The rules of the campaign may set forth what content the message to the agent contains. For example, the first message may just contain a query to approve or deny the request. According to another embodiment, the original message plus any metadata about the user or request may be slotted into an agent's queue. Many possibilities exist as to what the messages may contain and are not limited to the examples set forth herein. Irrespective of what the messages may contain, a message is sent to an agent 308/310 via the web module 206, however not before the text message is converted into the appropriate format 306 for the web module 206. The response from the agent 312 is sent to the management service for rule compliance 314 and then back 316 to the message gateway 102 conversion module 210 so that it may be converted into a text format to be set to the user 318/320.

FIG. 4 is a block diagram illustrating an exemplary architecture for a management service 104. Messages from the message gateway are received 450 by the management service 104 and a campaign manager 402 uses the message initiator ID to retrieve the associated content and rules from one or more databases 452/454 and sends the rules to a rules validator 404. If there are no rules and only content to be served, then the content will simply be sent out to the message gateway 456. If a campaign from the one or more databases does contain one or more rules however, the rules validator 404 ensures that all the requirements of the campaign are met before sending the content or executing a specific action is performed. One example is that a rule may dictate that the message be stripped of private information before it is forwarded or used, and in such a case, the message will be sent to an anonymizer 406 before the message is sent 458 to the message gateway 460. The anonymizer 406 removes personally identifiable information (PII) from messages using machine learning algorithms such as natural language processing or natural language reasoning. Rules may go as far as being employed to prescreen the source of the message using the metadata embedded into the message as a way to discriminate whether or not the contents of the campaign may be allowed to be sent to the message sender.

FIG. 5 is a block diagram illustrating exemplary data within one or more data stores 106. This diagram illustrates an exemplary logical representation of one way to organize and store data associated with an initiator in one or more data bases. In this arrangement an initiator ID table 502 stores a list of initiator IDs, each of which are linked with a memory address associated with each initiator target 116, i.e., campaign 504-508, in the data store. In this way, content and rules may be efficiently retrieved from the management service 550/552. According to this embodiment, each campaign 504-508 has at least their own set of rules 512/518/524, content 514/520/526, and an initiator ID 510/516/522.

Database(s) 106 may take the form of a managed or unmanaged database, document-oriented database system, or a Structured Query Language (“SQL”) database. Examples of types of database software that may operate include MYSQL™, ORACLE DATABASE™, MONGODB™, and others. It may exist as a distinct physical device or be operating on another computing device that may perform other functions aside from operating, hosting and serving the database 106. If it is a distinct physical device, the database may be connected over a LAN or WAN, the Internet, a direct physical connection to another device, or some other network connection.

FIG. 12 is a block diagram illustrating an exemplary system architecture for a dynamic-link verification platform 1200. A dynamic-link verification platform 1200 functions in much the way of a dynamic-link communication platform 100 in FIG. 1. However, one or more validation databases 1202 have taken the place of a product for use in authorizing individuals at business establishments, public parks and venues, and other places where authorization/validation may be utilized. In general, a user 112 attempts to conduct an ecommerce transaction or attempts to enter a controlled space. In both scenarios, an initiator 108 may be presented to the user 112 so that the mobile device 114 may interact with the initiator 108 whereby the initiator 108 triggers the mobile device 114 to auto-populate a text message relating to the ecommerce transaction or the request to gain entry into the controlled space. It is possible that more than one initiator 108 is present such as the case if there are multiple events at one venue, and other like-situations. The mobile device 114 sends the auto-populated text message and it is received by the message gateway 102. The text messages forwarded on to the management service 104 where the initiator ID is used to retrieve a rule relating to the e-commerce transaction or request for entry, or as defined hereafter a verification event. The rule contains instructions for the management service 104 to perform in order to verify the owner of the mobile device 114. Rules may comprise various instructions, some of which are disclosed in the following examples.

A first example may be used at a concert and requiring users to have full vaccination status against a coronavirus in order to gain entry. The instructions contained in the rule in this scenario may be to use the phone number of the mobile device 114 against the billing information associated with the mobile device's 114 carrier to determine the name of the user 112. Subsequently, use the name on the billing information against the CDC's vaccination whitelist. Then, contingent on the successful verification of the first two steps, compare the name of the vaccinated user against the guest list provided by the verification event host. Lastly, send an approval notification to the event host. It should be noted that the event host is not a person, but may be another electronic device which may unlock a gate, send a message, activate the printer, complete a transaction, etc.

A second example may be an ecommerce transaction where in the consumer is attempting to purchase alcohol that is restricted to anyone under the age of 21 years old. The instructions in this scenario may require the user to provide biometrics on the mobile device 114 and use the biometrics to compare against a government database.

According to one use case, a consumer may go to an ecommerce website to purchase a product or service that requires his or her identity to be verified. On the product page 110 for that ecommerce item, there may be a selectable item—i.e., an initiator 108—such as a link or a button that may say something to the effect of “verify” or something of the like. When the consumer 112 interacts with this initiator 108, a message will be auto-generated on their mobile device 114. The message destination will go to a dynamic link verification platform 1200 so that the management service 104 can first check any local data stores 106 to see if the validation may be confirmed, and if not reach out to one or more validation databases 1202 over a network. Validation of the user 112 of the mobile device 114 may happen in the following non-exhaustive list of examples: a third-party reverse lookup service matching the phone number to the consumer's name; matching some or all of the billing information of the mobile device to the consumer's name; using APIs of other third-party verification databases, or using verification methods present on the mobile device—e.g., biometrics, security applications, and partner applications. According to one embodiment the data store 106 may be used to store the user's 114 validation status. In this way, a data store 106 may build up a list of users who are pre-verified and to what extent they are pre-verified. According to one aspect, a distributed ledger may provide a private and secure means to store such a pre-verified list of users. Upon verification of a user's identity, the dynamic-link verification platform 1200 may send an approval to the ecommerce provider so that the transaction may be completed.

An additional use case may be using a validation platform 1200 to control entry into a public place, event, or venue based upon the condition that the individual has the appropriate vaccines. The management service 104 may reach out to a federated database comprising databases such as the CDC, hospital chains, etc. It may use the same local data store 106 and distributed ledger as mentioned previously. There may be multiple levels of validation depending on the context of the situation. For example, it is possible that a user has all of his or her vaccines and it is recorded as much in a database and upon a validation request, the user is verified as green, signifying that the user may attend the current and all future events contingent on the fact that the rules don't change regarding what vaccinations are required period. However, consider a second person who is also fully vaccinated, but their vaccination information has yet to be uploaded to any database. This person may be manually verified by a person working the gate at a public event, such that after manual verification, the user's status may be stored in the local database 106 as yellow, signifying that they are only validated this one time and they must be validated again the next time they visit any establishment. It may be also that a user is not able to be manually or automatically verified according to their vaccination status, therefore a user 112 requesting to get in using their mobile device 114 and engaging with an initiator 108 would be denied entry and would be flagged as red signifying that they are not allowed entry into the event. The different verification levels—green, yellow, and red—may be used to print out wristbands of different colors, or provide different information in the form of a text message to the mobile device. The different statuses may be used to control what areas of the venue the person is allowed to be at. For example, at a restaurant, a user with a green status may be able to dine indoors while users with only a yellow status may only dine outdoors. With regards to providing different information in the form of a text message, keep in mind that the dynamic link verification platform 1200 has the capabilities to store that information and provide it upon receiving the auto-populated text message from the mobile device 114, as disclosed in at least FIG. 1.

FIG. 14 is a block diagram illustrating an exemplary architecture for a management service 1400 configured to identify a subsequent message received from a mobile device and generate different content than that which was sent responsive to an initial interaction between the mobile device and an initiator, according to an embodiment. Management service 1400 functions in much the same way of management service 104 in FIG. 4. However, a rules engine 1401 is present and configured to receive subsequent messages/interactions between a mobile device and platform 100, determine if there is any previous history of interaction with respect to a particular initiator between the mobile device and platform 100, and then generate a different set of content to be transmitted as an auto-populated message to a default messaging application operating on the mobile device.

Messages from the message gateway are received 450 by the management service 1400 and a campaign manager 402 uses the message initiator ID to retrieve the associated content and rules from one or more databases 452/454 and sends the rules to a rules validator 404. If there are no rules and only content to be served, then the content will simply be sent out to the message gateway 456. If a campaign from the one or more databases does contain one or more rules however, the rules validator 404 ensures that all the requirements of the campaign are met before sending the content or executing a specific action is performed. One example is that a rule may dictate that the message be stripped of private information before it is forwarded or used, and in such a case, the message will be sent to an anonymizer 406 before the message is sent 458 to the message gateway 460. The anonymizer 406 removes personally identifiable information (PII) from messages using machine learning algorithms such as natural language processing or natural language reasoning. Rules may go as far as being employed to prescreen the source of the message using the metadata embedded into the message to discriminate whether or not the contents of the campaign may be allowed to be sent to the message sender.

According to the embodiment, campaign manager 402 may receive a subsequent message form the mobile device via message gateway and perform a check to see if there is a record/profile associated with the mobile device and if there is any previous historical interaction data available. If there is no previous interaction data available, then the process continues as described herein. In some embodiments, if there is no active mobile device record, then campaign manager 402 can create an active mobile device record comprising at least any received metadata associated with the mobile device and store the record in database 106. If there is previous interaction data available, then the second message may be forwarded to rules engine 1402. Rules engine 1402 can receive the second/subsequent message and retrieve, receive, or otherwise obtain any metadata which may be associated with an initial, second, or any subsequent message received from the mobile device. Rules engine 1402 may leverage rules validator 404 to ensure compliance with rules prior to generating and sending a second set of content (i.e., a URI which provides a deep link and payload to a messaging application on the mobile device). Rules engine 1402 may utilize various rules and/or policies for generating a second or subsequent set of content to send to the mobile device, wherein the second set of content is different than the first set of content sent responsive to an initial interaction with an initiator. In some embodiments, the second set of content may comprise a custom-generated deep link embedded in an auto-populated text message in the default messaging application on the mobile device.

In various implementations, database 106 may comprise a plurality of engagement rules. Engagement rules may be uploaded as part of the campaign, as discussed herein. Engagement rules may comprise one or more instructions or sets of instructions which, when executed by a processor of a computing device, causes platform 1400 and/or rules engine 1402 to generate a custom payload to be delivered as a second (or subsequent) auto-populated text message. In some embodiments, the engagement rules which determine the generation of the second set of content may be hierarchical rules, wherein some of the rules may take priority or precedence when applied to a subsequent message for the purpose of generating a second set of content. In operation, in an embodiment, rules engine 1402 may evaluate the total set of rules starting with the highest level rules and progresses downward. If a rule at a higher level applies, its conditions or actions are executed. Hierarchical rules allow for the implementation of complex logic by breaking down decision-making into manageable steps. Rules at different levels can interact to create nuance outcomes based on various factors and conditions (e.g., metadata context and user/device record/profile information). Further, hierarchical rule structures can help optimize the evaluation process. Once a rule at a certain level matches the conditions, there may be no need to evaluate rules at lower levels, streamlining the decision-making process.

Detailed Description of Exemplary Aspects

FIG. 6 is a block diagram illustrating exemplary content 600 that may be served 650/652 by a dynamic-link communication platform. Content that may be stored and served via a dynamic-link communication platform may comprise text 602, pictures 604, sound bites 606, videos 608, URLs 610, push notifications 612, location data 614, calendar invites 616, phone calls 618, download requests 620, application install request 622, and application initializations 624. Much of this content may be sent over MMS or other messaging services, attached to emails, or hosted in the cloud that may be linked in emails and texts, or hosted elsewhere and sent via URL's, among many other possible combinations known in the art. Another type of content that may be stored and served via dynamic-link communication platform may comprise custom-generated deep links.

FIG. 7 is a block diagram illustrating exemplary rules 700 that may be used by a dynamic-link communication platform. A non-exhaustive list of exemplary rules 752 that may be used against an incoming request 750 comprises: what content may be delivered 702, what kind of metadata to retrieve from the device 704, whether or not to send subsequent messages to the device requesting additional information 706, and whether or not the content requires authentication 708. Rules may be an algorithm comprising a list of agents such that the algorithms perform a round-robin style query to find an available agent, and other like algorithms 710. Rules may simply forward messages to a system, device, or agent 712. Other rules may require that certain information be masked for privacy and regulatory compliance 714.

FIG. 8 is a block diagram illustrating exemplary initiators 108 used to facilitate dynamic-link communications. As illustrated by the diagram and the many initiator forms 802-814, it can be seen that an initiator 108 may take the form of anything that allows the user to interact 850 with the initiator 108 such that a device used to engage with the initiator can be commanded to auto-populate a message on the device 852. Tappable content on a mobile device or clickable links from a desktop for laptop computer may be used 802. Phone numbers on a printed advertisem*nt can be dialed by the user in which an automated system on the other end of the line automatically responds with a text message to the calling device 804. QR codes are suited very well for this purpose as they may embed a plurality of information pertinent to efficient two-way communications 806. Another example may be a voice command that may be displayed to a user such that the user may say the voice command to a virtual assistant 808 on his or her device to initiate the communication. According to another embodiment, a purpose-built application for a dynamic-link communication platform may comprise its own virtual assistant and may also add increased functionality to a dynamic-link communication platform system. Advertisem*nts embedded within applications and software programs 810, interactive voice response robocalls 812, and near field communication technologies 814 are all other examples that may be used as initiators 108. Other types of initiators that may be used to facilitate dynamic-link communications can further include clicking a push notification, making a purchase within an application or software, performing a search, or a referral from a social media network.

FIG. 9 is a flow diagram illustrating an exemplary method for initializing a dynamic-link communication platform. Regarding the steps in this diagram, there is no strict requirement for the steps to be in this particular order. For example, content and rules may be received at the same time and stored before the initiator ID is generated. It will be appreciated by those skilled in the art that the general process is to populate a database with the content to be served, the rules related to how that content is served and to whom, and then to generate and link an initiator and initiator ID such that it may actually be served.

In a first and second step 901/902 content and one or more rules related to the content are received. In a third step 903, an initiator ID is generated or retrieved for the campaign, where the campaign is all of the data associated with that particular product or service. Initiator IDs may be issued sequentially or according to an algorithm, and the initiator ID's may also be used to identify campaigns, if so desired. In a fourth step 904, the content, rules, and initiator ID are stored in a database as a campaign. In a fifth step 905, an initiator is generated according to the provisions of the campaign. It is also anticipated that an initiator does not necessarily have to be generated, but may also be received along with the content and rules. It should be understood that whether an initiator is generated or received, it is inherently linked with the initiator ID of the associated campaign. In a sixth step 906, the initiator is deployed according to the stipulations of the campaign. It is anticipated that there may be many initiators taking various forms of which all link to one initiator ID.

FIG. 10 is a flow diagram illustrating an exemplary method for implementing a dynamic-link communication platform. In a first step 1001, a message is received comprising at least the originating source address and an initiator ID. In a second step 1002, rules associated with the initial ID are retrieved. In a third step 1003, content associated with the initiator ID is retrieved. In a fourth step 1004, the content is sent, or the action triggered by the rules is executed, only upon compliance with the rules associated with that campaign.

FIG. 11 is a flow diagram illustrating an exemplary method for facilitating multimodal communications. In a first step 1101, a message comprising at least an originating source address and an initiator ID is received. In this case, the campaign—via the initiator—generating the message is intended to initiate a communication between the user and an agent. More particularly, initiate and facilitate a privacy-compliant communication between a user's device and an agent's device. In a second step 1102, the initiator ID is used to retrieve the rules for the campaign. In a third step 1103, the rules are used to determine which agent contact and when. In a fourth step 1104, the selected agent's mode of communication is identified. Additionally, in this scenario, the mode of communication of the user and the mode of communication of the agent or not the same. In a fifth step 1105, personally identifiable information is masked or removed in the message received in step 1101. In a sixth step 1106, the message received in step one 1101 is reformatted to match the agent's mode of communication. In a seventh step 1107, the masked and reformatted message is sent to the agent. In an eighth step 1108, all subsequent messages of the communication between the user's device and the agent's device are formatted and masked appropriately until the communication is terminated.

FIG. 13 is a flow diagram illustrating a method for verifying a user via a mobile device and reverse lookup. As described in various previous figures, the general invention is a system and method for initiating some form of communication between at least two entities. This communication is initialized by providing a user with a mobile device some means by which they may initiate a communication related to some product or service the person is interested in. Such means may comprise a billboard with a phone number or a URL, or an advertisem*nt on a bus stop with a QR code, or may comprise an online advertisem*nt that is selected or clicked by the user, among many other options and combinations. When the user interacts with the advertisem*nt (e.g., goes to the URL, clicks on the advertisem*nt, scans a QR code, etc.) a text message is auto populated on the user's device. As fully described in the previous figures, but generally re-described here, is that the means to produce both the content of the text message and the text message itself may happen in various ways. The content of the text message may be retrieved from the URL, or may be embedded within the QR code, or originate from the advertisem*nt that was selected. As with the exemplary means in the previous statement, each means may also have a way to embed other contextual information for the purposes of communication satisfaction. This “other context” may include the time the interaction was initiated, locality data, identifying information from the mobile device or user, campaign matching information, and other data and metadata useful for such interactions. Once the text message and all of its content is populated on the user's device the user may just simply hit the send button. That text message is now received by a service that facilitates a privacy compliant communication relevant to the advertisem*nt/product/service. One example is when a user selects an online advertisem*nt, say to buy specific car, information from the user's device and information contained by or retrieved by the advertisem*nt campaign is used to auto populate a message which is then sent by the user. That text message and the relevant information is used by service to find and connect the user with an agent at the dealership and even further mask any private information on both ends of the communication, i.e., remove all personally identifiable information such as phone numbers and names.

FIG. 13 comprises a method of adding a validation service to the system and method described above. Where a user will still interact with some form of media, advertisem*nt, or content, but where the interaction further requires that the user be validated. Many levels of verification are anticipated. One verification method comprises using the phone number of the mobile device which initiated the communication to perform a reverse lookup and compare the person associated with the phone number (or billing information) with the person attempting to initiate the interaction. This verification method can be supplemented with any level of authentication so desired. This may mean a username and password, biometrics, some third party authentication service, and other types of authentication services in use. If the user has been successfully verified, then an approval to complete the transaction, allow entry, or some other action may occur. Using the example of the car advertisem*nt, a user may be pre-verified or preauthorized for the vehicle purchase just by authenticating themselves when they click on the advertisem*nt. This can apply generally to any ecommerce platform. Furthermore, the validation service may comprise a federated data store or a distributed ledger, private or public, or other forms of robust data services needed to facilitate authentication transactions. Databases and data store services may be local or distributed or some combination thereof. For example, a local database may be populated from a federated data store as users are validated, removing the need to query the federated data store if a user already exists as validated in the local database. The validation service may also comprise a set of rules, also the rules may be local or retrieved from some rules database, and the rules tell the service how to validate, at what level to validate, and at what level each person is validated—if there is more than one level of validation. One example of this, is where a person requesting access into a public venue is provided access to certain areas only if they have received one or more vaccines. In such a case it may be that the person is not verified of receiving the vaccine if any of the databases within the federated data store reflect as much, but the person has received a valid vaccination card that can be verified manually by someone at the gate/entry. Such a case may happen if the person has just received a vaccine and that information has not been entered into any of the databases. And if that is the case, then it is possible to flag the user as validated and allow them access to the venue but perhaps not into specific areas or that the person is only allowed access for a specific period of time and must always be reverified until the federated or local data store reflects the manual verification of the vaccine card. The local database may use many types of technologies, one anticipated method is to use a private blockchain to better protect against privacy and HIPAA violations.

In a first step 1301, a request for validation is received by a validation service. This request may comprise information pertaining to the person or device for which the validation is requested. The request may also comprise information relating to the type of validation or reason for the validation which may be used to determine which rules are relevant to completing the validation request 1302. There may be many rules contained within a rules database or within the validation service. For example, the validation service may be used to perform validations of vaccinations, e-commerce transactions, sales leads, etc. In other words, a request for validating a person or device is received which comprises information which allows the validation service to know how to validate and where to validate from for the request. With the proper rules selected, the validation service now selects the appropriate data sources 1303 from which to query for the purposes of obtaining validation information related to the validation request of the person or device 1304. The rules may tell the validation service where to find the address or location of one or more data sources. The rules may point to a local table, array, or any other type of data storage means by which the logical addresses of data stores may be contained. Once a response to the query containing the appropriate validation information is received 1305, the validation information is compared to the rules which provide a means to know whether the person or device is validated and at what level—should more than one or two levels exist, i.e., the rules confirm approval or denial of the validation request based on the validation information which may then be forwarded onto the requester of the validation 1306.

As previously stated, it is anticipated that a local data store may save the results of these validation requests such that any subsequent validation requests matching the initial request may be first retrieved from the local data store thus increasing the speed and efficacy of the request process rather than querying federated data stores each iteration.

FIG. 15 is a flow diagram illustrating an exemplary method for handling two or more subsequent messages or interactions between a user mobile device and the dynamic-link communication platform, according to an embodiment. According to the embodiment, the process begins at step 1501 when platform 100 receives a first message/interaction comprising at least a source address and an initiator ID. In some aspects, the first message may further comprise metadata associated with the user, the user mobile device, the initiator, or some combination thereof. For example, the metadata which may be included in the first message may be device information (e.g., details about the user's device type and operating system) which can be used to determine an appropriate way to transmit and format content from platform 100 to the mobile device. At step 1502, both rules and content associated with the initiator ID may be retrieved from database 106. Some initiator IDs may not be associated with any rules, in which case only the content associated with it may be retrieved and sent directly to the mobile device. At step 1503, platform 100 can send a first set of content to a destination address contingent on compliance with the retrieved rules (if applicable). As a next step 1504, a second (or subsequent) message/interaction is received from the same user/mobile device, the second message/interaction comprising at least a source address and the initiator ID. In an embodiment, both the first message and subsequent message may be associated with the same initiator/initiator ID. For example, a user may perform a first scan of a QR code for an event, wherein the first scan causes platform 100 to retrieve and/or generate and send a first set of content (e.g., a deep link to page where the user can register for the event) directly to the user's mobile device in the form of an auto-populated text message in the default messaging application on the mobile device. Continuing the example, the user may perform a second scan of the QR code for the same event, but this time platform 100 can utilize stored data and metadata associated with the second scan to identify that the user has already received the first set of content, and then send a second, different set of content (e.g., a deep link to an application which states the event venue dress rules or code of conduct) to the user's mobile device in the form of an auto-populated text message in the default messaging application on the mobile device.

At step 1505, upon receiving the second or subsequent message/interaction platform 100 may perform a check to see if there is any previous interaction data available between the user/mobile device and the platform 100. In some implementations, campaign manager 402 may perform this check by searching/querying database 106 for a record/profile associated with user/mobile device and comparing against any stored historical interaction information. If there is no previous data found in database 106, then this interaction must be a first interaction with a particular initiator and the process loops back to step 1502. If, instead, there is previous interaction data available, then campaign manager 402 may forward the second (or subsequent) message to a rules engine 1402 at step 1506.

FIG. 16 is a flow diagram illustrating an exemplary method for generating a second set of content for subsequent interactions between a user/mobile device and platform 100, according to some embodiments. According to an embodiment, the process begins at step 1601 when platform 100 or one or more of its components, such as rules engine 1402, receives a second or subsequent message and/or interaction from a mobile device which has previous and/or historical interaction data associated with the mobile device and is applicable to context of the second or subsequent message/interaction. At step 1602, rules engine 1402 may obtain any metadata associated with a first, the second, or any subsequent message/interaction. Either of the first, second, or subsequent messages may comprise various metadata associated with the initiator, user, device, or context which the subsequent messages were received. As a simple example, metadata may comprise temporal-spatial data which correlates the received subsequent message with specific time and location from which the interaction with an initiator occurred. Metadata may comprise device information, referral source information, time, and context data, and/or the like. Metadata may comprise session context, for example, information about the user's current session, such as items in their shopping cart or content in progress.

At step 1603, rules engine 1402 can obtain historical user record information from database 106, wherein the historical user record information comprises at least previous interaction data between the user/mobile device and platform 100. In some implementations, user record information may further comprise user profile information, previous interactions, purchase history, user activity history, search queries, device information (e.g., type, OS, device orientation, device capabilities, etc.), referral source, time and context data, personal preferences (e.g., language preference), session context (e.g., session duration), app version, social media integration, authentication state (e.g., whether the user is already logged in or needs to authenticate), offline/online status, and/or the like.

At step 1604, rules engine 1402 can use the obtained metadata, obtained historical record information, and one or more rules to generate a second set of content, different from the first set of content which was sent to the mobile device responsive to the first interaction. In some embodiments, the second set of content may comprise a custom-generated deep link. In some implementations, the one or more rules may be set or created by an organization/administrator and uploaded to platform 100 at the same time that an initiator campaign (event or product and any associated rules and content) is uploaded to platform 100. In an embodiment, the uploaded rules for handling subsequent messages/interactions may be hierarchal rules. For example, a first rule may stipulate that if the subsequent message has been received a certain time period (e.g., one week) after a first message, then the second set of content should include a reminder as well as a deep link, however, a second rule may be in place which states that if the second message is received after the user has purchased the product associated with the initiator, then the second set of content should include a post-sale message (e.g., a thank you for the purchase message, a deep link to similar products/services, a deep link to a survey, a deep link to coupon or special promotion, etc.). In this example, the second rule may take precedence over the first rule, and the second set of content may comprise a post-sale message. In this way, rules engine 1402 can obtain the rules, determine the proper rules to apply to remain in compliance with said rules, and then generate the appropriate set of content responsive to a subsequent message/interaction occurring between a mobile device and an initiator.

As a last step 1605, platform 100 can send the second set of content to a destination address contingent on compliance with the rules which govern subsequent interactions after an initial initiator/user interaction.

FIG. 17 is a flow diagram illustrating an exemplary method for generating a second set of content for subsequent interactions between a mobile device and platform, according to an embodiment. According to an implementation, the process may be executed as one or more sets of programming instructions stored in the memory of a computing device and executed on at least one processor of the computing device. According to the embodiment, the process begins at step 1701 when platform 1400 generates a passive call-to-action comprising a first uniform resource identifier (URI) configured to provide a first deep link to a messaging application on a mobile device and a payload, the payload comprising a pre-populated message suitable for display in the messaging application. The messaging application may be a text message application, an email application, a social media application, a push notification application, or any other suitable messaging application stored and operating on the mobile device. For example, if the pre-populate message is a text message, then the URI may indicate the messaging application is the default messaging application operating one the mobile device. At a next step 1702, platform 1400 can receive a message substantially corresponding to the payload and receive any associated mobile device metadata. At step 1703 a check is made to determine if there is an active mobile device record associated with the mobile device from which the message was received. Database 106 may comprise a plurality of active mobile device records, each of which is associated with a mobile device. If there is no active mobile device record identified in step 1703, then an active mobile device record is created comprising at least the associated mobile device metadata and the created active mobile device record is stored in database 106 at step 1704. In some implementations, a confirmation message may be generated and transmitted to the mobile device, wherein the confirmation message comprises an indication of the creation of an active mobile device record associated with the mobile device. If, instead, an active mobile device record associated with the mobile device exists, then the message may be forwarded to rules engine 1402 at step 1705.

According to the embodiment, rules engine 1402 receives the message and retrieves historical interaction data from the identified mobile device record at step 1706. Rules engine may further retrieve one or more engagement rules associated with the payload from database 106 at step 1707. Each engagement rule may be associated with one or more sets of engagement instructions which can be used with various contextual information to generate a response to a received message. As a last step 1708, rules engine 1402 can use the active mobile device record, the historical interaction data, and the one or more engagement rules to generate a second URI configured to provide a second deep link and a second payload to the messaging application. The second deep link and the second payload being different than the first deep link and first payload.

Hardware Architecture

Generally, the techniques disclosed herein may be implemented on hardware or a combination of software and hardware. For example, they may be implemented in an operating system kernel, in a separate user process, in a library package bound into network applications, on a specially constructed machine, on an application-specific integrated circuit (ASIC), or on a network interface card.

Software/hardware hybrid implementations of at least some of the aspects disclosed herein may be implemented on a programmable network-resident machine (which should be understood to include intermittently connected network-aware machines) selectively activated or reconfigured by a computer program stored in memory. Such network devices may have multiple network interfaces that may be configured or designed to utilize different types of network communication protocols. A general architecture for some of these machines may be described herein in order to illustrate one or more exemplary means by which a given unit of functionality may be implemented. According to specific aspects, at least some of the features or functionalities of the various aspects disclosed herein may be implemented on one or more general-purpose computers associated with one or more networks, such as for example an end-user computer system, a client computer, a network server or other server system, a mobile computing device (e.g., tablet computing device, mobile phone, smartphone, laptop, or other appropriate computing device), a consumer electronic device, a music player, or any other suitable electronic device, router, switch, or other suitable device, or any combination thereof. In at least some aspects, at least some of the features or functionalities of the various aspects disclosed herein may be implemented in one or more virtualized computing environments (e.g., network computing clouds, virtual machines hosted on one or more physical computing machines, or other appropriate virtual environments).

FIG. 18 illustrates an exemplary computing environment on which an embodiment described herein may be implemented, in full or in part. This exemplary computing environment describes computer-related components and processes supporting enabling disclosure of computer-implemented embodiments. Inclusion in this exemplary computing environment of well-known processes and computer components, if any, is not a suggestion or admission that any embodiment is no more than an aggregation of such processes or components. Rather, implementation of an embodiment using processes and components described in this exemplary computing environment will involve programming or configuration of such processes and components resulting in a machine specially programmed or configured for such implementation. The exemplary computing environment described herein is only one example of such an environment and other configurations of the components and processes are possible, including other relationships between and among components, and/or absence of some processes or components described. Further, the exemplary computing environment described herein is not intended to suggest any limitation as to the scope of use or functionality of any embodiment implemented, in whole or in part, on components or processes described herein.

The exemplary computing environment described herein comprises a computing device 10 (further comprising a system bus 11, one or more processors 20, a system memory 30, one or more interfaces 40, one or more non-volatile data storage devices 50), external peripherals and accessories 60, external communication devices 70, remote computing devices 80, and cloud-based services 90.

System bus 11 couples the various system components, coordinating operation of and data transmission between, those various system components. System bus 11 represents one or more of any type or combination of types of wired or wireless bus structures including, but not limited to, memory busses or memory controllers, point-to-point connections, switching fabrics, peripheral busses, accelerated graphics ports, and local busses using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) busses, Micro Channel Architecture (MCA) busses, Enhanced ISA (EISA) busses, Video Electronics Standards Association (VESA) local busses, a Peripheral Component Interconnects (PCI) busses also known as a Mezzanine busses, or any selection of, or combination of, such busses. Depending on the specific physical implementation, one or more of the processors 20, system memory 30 and other components of the computing device 10 can be physically co-located or integrated into a single physical component, such as on a single chip. In such a case, some or all of system bus 11 can be electrical pathways within a single chip structure.

Computing device may further comprise externally-accessible data input and storage devices 12 such as compact disc read-only memory (CD-ROM) drives, digital versatile discs (DVD), or other optical disc storage for reading and/or writing optical discs 62; magnetic cassettes, magnetic tape, magnetic disk storage, or other magnetic storage devices; or any other medium which can be used to store the desired content and which can be accessed by the computing device 10. Computing device may further comprise externally-accessible data ports or connections 12 such as serial ports, parallel ports, universal serial bus (USB) ports, and infrared ports and/or transmitter/receivers. Computing device may further comprise hardware for wireless communication with external devices such as IEEE 1394 (“Firewire”) interfaces, IEEE 802.11 wireless interfaces, BLUETOOTH® wireless interfaces, and so forth. Such ports and interfaces may be used to connect any number of external peripherals and accessories 60 such as visual displays, monitors, and touch-sensitive screens 61, USB solid state memory data storage drives (commonly known as “flash drives” or “thumb drives”) 63, printers 64, pointers and manipulators such as mice 65, keyboards 66, and other devices 67 such as joysticks and gaming pads, touchpads, additional displays and monitors, and external hard drives (whether solid state or disc-based), microphones, speakers, cameras, and optical scanners.

Processors 20 are logic circuitry capable of receiving programming instructions and processing (or executing) those instructions to perform computer operations such as retrieving data, storing data, and performing mathematical calculations. Processors 20 are not limited by the materials from which they are formed, or the processing mechanisms employed therein, but are typically comprised of semiconductor materials into which many transistors are formed together into logic gates on a chip (i.e., an integrated circuit or IC). The term processor includes any device capable of receiving and processing instructions including, but not limited to, processors operating on the basis of quantum computing, optical computing, mechanical computing (e.g., using nanotechnology entities to transfer data), and so forth. Depending on configuration, computing device 10 may comprise more than one processor. For example, computing device 10 may comprise one or more central processing units (CPUs) 21, each of which itself has multiple processors or multiple processing cores, each capable of independently or semi-independently processing programming instructions. Further, computing device 10 may comprise one or more specialized processors such as a graphics processing unit (GPU) 22 configured to accelerate processing of computer graphics and images via a large array of specialized processing cores arranged in parallel.

System memory 30 is processor-accessible data storage in the form of volatile and/or nonvolatile memory. System memory 30 may be either or both of two types: non-volatile memory and volatile memory. Non-volatile memory 30a is not erased when power to the memory is removed, and includes memory types such as read only memory (ROM), electronically-erasable programmable memory (EEPROM), and rewritable solid state memory (commonly known as “flash memory”). Non-volatile memory 30a is typically used for long-term storage of a basic input/output system (BIOS) 31, containing the basic instructions, typically loaded during computer startup, for transfer of information between components within computing device, or a unified extensible firmware interface (UEFI), which is a modern replacement for BIOS that supports larger hard drives, faster boot times, more security features, and provides native support for graphics and mouse cursors. Non-volatile memory 30a may also be used to store firmware comprising a complete operating system 35 and applications 36 for operating computer-controlled devices. The firmware approach is often used for purpose-specific computer-controlled devices such as appliances and Internet-of-Things (IoT) devices where processing power and data storage space is limited. Volatile memory 30b is erased when power to the memory is removed and is typically used for short-term storage of data for processing. Volatile memory 30b includes memory types such as random access memory (RAM), and is normally the primary operating memory into which the operating system 35, applications 36, program modules 37, and application data 38 are loaded for execution by processors 20. Volatile memory 30b is generally faster than non-volatile memory 30a due to its electrical characteristics and is directly accessible to processors 20 for processing of instructions and data storage and retrieval. Volatile memory 30b may comprise one or more smaller cache memories which operate at a higher clock speed and are typically placed on the same IC as the processors to improve performance.

Interfaces 40 may include, but are not limited to, storage media interfaces 41, network interfaces 42, display interfaces 43, and input/output interfaces 44. Storage media interface 41 provides the necessary hardware interface for loading data from non-volatile data storage devices 50 into system memory 30 and storage data from system memory 30 to non-volatile data storage device 50. Network interface 42 provides the necessary hardware interface for computing device 10 to communicate with remote computing devices 80 and cloud-based services 90 via one or more external communication devices 70. Display interface 43 allows for connection of displays 61, monitors, touchscreens, and other visual input/output devices. Display interface 43 may include a graphics card for processing graphics-intensive calculations and for handling demanding display requirements. Typically, a graphics card includes a graphics processing unit (GPU) and video RAM (VRAM) to accelerate display of graphics. One or more input/output (I/O) interfaces 44 provide the necessary support for communications between computing device 10 and any external peripherals and accessories 60. For wireless communications, the necessary radio-frequency hardware and firmware may be connected to I/O interface 44 or may be integrated into I/O interface 44.

Non-volatile data storage devices 50 are typically used for long-term storage of data. Data on non-volatile data storage devices 50 is not erased when power to the non-volatile data storage devices 50 is removed. Non-volatile data storage devices 50 may be implemented using any technology for non-volatile storage of content including, but not limited to, CD-ROM drives, digital versatile discs (DVD), or other optical disc storage; magnetic cassettes, magnetic tape, magnetic disc storage, or other magnetic storage devices; solid state memory technologies such as EEPROM or flash memory; or other memory technology or any other medium which can be used to store data without requiring power to retain the data after it is written. Non-volatile data storage devices 50 may be non-removable from computing device 10 as in the case of internal hard drives, removable from computing device 10 as in the case of external USB hard drives, or a combination thereof, but computing device will typically comprise one or more internal, non-removable hard drives using either magnetic disc or solid state memory technology. Non-volatile data storage devices 50 may store any type of data including, but not limited to, an operating system 51 for providing low-level and mid-level functionality of computing device 10, applications 52 for providing high-level functionality of computing device 10, program modules 53 such as containerized programs or applications, or other modular content or modular programming, application data 54, and databases 55 such as relational databases, non-relational databases, and graph databases.

Applications (also known as computer software or software applications) are sets of programming instructions designed to perform specific tasks or provide specific functionality on a computer or other computing devices. Applications are typically written in high-level programming languages such as C++, Java, and Python, which are then either interpreted at runtime or compiled into low-level, binary, processor-executable instructions operable on processors 20. Applications may be containerized so that they can be run on any computer hardware running any known operating system. Containerization of computer software is a method of packaging and deploying applications along with their operating system dependencies into self-contained, isolated units known as containers. Containers provide a lightweight and consistent runtime environment that allows applications to run reliably across different computing environments, such as development, testing, and production systems.

The memories and non-volatile data storage devices described herein do not include communication media. Communication media are means of transmission of information such as modulated electromagnetic waves or modulated data signals configured to transmit, not store, information. By way of example, and not limitation, communication media includes wired communications such as sound signals transmitted to a speaker via a speaker wire, and wireless communications such as acoustic waves, radio frequency (RF) transmissions, infrared emissions, and other wireless media.

External communication devices 70 are devices that facilitate communications between computing device and either remote computing devices 80, or cloud-based services 90, or both. External communication devices 70 include, but are not limited to, data modems 71 which facilitate data transmission between computing device and the Internet 75 via a common carrier such as a telephone company or internet service provider (ISP), routers 72 which facilitate data transmission between computing device and other devices, and switches 73 which provide direct data communications between devices on a network. Here, modem 71 is shown connecting computing device 10 to both remote computing devices 80 and cloud-based services 90 via the Internet 75. While modem 71, router 72, and switch 73 are shown here as being connected to network interface 42, many different network configurations using external communication devices 70 are possible. Using external communication devices 70, networks may be configured as local area networks (LANs) for a single location, building, or campus, wide area networks (WANs) comprising data networks that extend over a larger geographical area, and virtual private networks (VPNs) which can be of any size but connect computers via encrypted communications over public networks such as the Internet 75. As just one exemplary network configuration, network interface 42 may be connected to switch 73 which is connected to router 72 which is connected to modem 71 which provides access for computing device 10 to the Internet 75. Further, any combination of wired 77 or wireless 76 communications between and among computing device 10, external communication devices 70, remote computing devices 80, and cloud-based services 90 may be used. Remote computing devices 80, for example, may communicate with computing device through a variety of communication channels 74 such as through switch 73 via a wired 77 connection, through router 72 via a wireless connection 76, or through modem 71 via the Internet 75. Furthermore, while not shown here, other hardware that is specifically designed for servers may be employed. For example, secure socket layer (SSL) acceleration cards can be used to offload SSL encryption computations, and transmission control protocol/internet protocol (TCP/IP) offload hardware and/or packet classifiers on network interfaces 42 may be installed and used at server devices.

In a networked environment, certain components of computing device 10 may be fully or partially implemented on remote computing devices 80 or cloud-based services 90. Data stored in non-volatile data storage device 50 may be received from, shared with, duplicated on, or offloaded to a non-volatile data storage device on one or more remote computing devices 80 or in a cloud computing service 92. Processing by processors 20 may be received from, shared with, duplicated on, or offloaded to processors of one or more remote computing devices 80 or in a distributed computing service 93. By way of example, data may reside on a cloud computing service 92, but may be usable or otherwise accessible for use by computing device 10. Also, certain processing subtasks may be sent to a microservice 91 for processing with the result being transmitted to computing device 10 for incorporation into a larger processing task. Also, while components and processes of the exemplary computing environment are illustrated herein as discrete units (e.g., OS 51 being stored on non-volatile data storage device 51 and loaded into system memory 35 for use) such processes and components may reside or be processed at various times in different components of computing device 10, remote computing devices 80, and/or cloud-based services 90.

Remote computing devices 80 are any computing devices not part of computing device 10. Remote computing devices 80 include, but are not limited to, personal computers, server computers, thin clients, thick clients, personal digital assistants (PDAs), mobile telephones, watches, tablet computers, laptop computers, multiprocessor systems, microprocessor based systems, set-top boxes, programmable consumer electronics, video game machines, game consoles, portable or handheld gaming units, network terminals, desktop personal computers (PCs), minicomputers, main frame computers, network nodes, and distributed or multi-processing computing environments. While remote computing devices 80 are shown for clarity as being separate from cloud-based services 90, cloud-based services 90 are implemented on collections of networked remote computing devices 80.

Cloud-based services 90 are Internet-accessible services implemented on collections of networked remote computing devices 80. Cloud-based services are typically accessed via application programming interfaces (APIs) which are software interfaces which provide access to computing services within the cloud-based service via API calls, which are pre-defined protocols for requesting a computing service and receiving the results of that computing service. While cloud-based services may comprise any type of computer processing or storage, three common categories of cloud-based services 90 are microservices 91, cloud computing services 92, and distributed computing services 93.

Microservices 91 are collections of small, loosely coupled, and independently deployable computing services. Each microservice represents a specific computing functionality and runs as a separate process or container. Microservices promote the decomposition of complex applications into smaller, manageable services that can be developed, deployed, and scaled independently. These services communicate with each other through well-defined application programming interfaces (APIs), typically using lightweight protocols like HTTP or message queues. Microservices 91 can be combined to perform more complex processing tasks.

Cloud computing services 92 are delivery of computing resources and services over the Internet 75 from a remote location. Cloud computing services 92 provide additional computer hardware and storage on as-needed or subscription basis. Cloud computing services 92 can provide large amounts of scalable data storage, access to sophisticated software and powerful server-based processing, or entire computing infrastructures and platforms. For example, cloud computing services can provide virtualized computing resources such as virtual machines, storage, and networks, platforms for developing, running, and managing applications without the complexity of infrastructure management, and complete software applications over the Internet on a subscription basis.

Distributed computing services 93 provide large-scale processing using multiple interconnected computers or nodes to solve computational problems or perform tasks collectively. In distributed computing, the processing and storage capabilities of multiple machines are leveraged to work together as a unified system. Distributed computing services are designed to address problems that cannot be efficiently solved by a single computer or that require large-scale computational power. These services enable parallel processing, fault tolerance, and scalability by distributing tasks across multiple nodes.

Although described above as a physical device, computing device 10 can be a virtual computing device, in which case the functionality of the physical components herein described, such as processors 20, system memory 30, network interfaces 40, and other like components can be provided by computer-executable instructions. Such computer-executable instructions can execute on a single physical computing device, or can be distributed across multiple physical computing devices, including being distributed across multiple physical computing devices in a dynamic manner such that the specific, physical computing devices hosting such computer-executable instructions can dynamically change over time depending upon need and availability. In the situation where computing device 10 is a virtualized device, the underlying physical computing devices hosting such a virtualized computing device can, themselves, comprise physical components analogous to those described above, and operating in a like manner. Furthermore, virtual computing devices can be utilized in multiple layers with one virtual computing device executing within the construct of another virtual computing device. Thus, computing device 10 may be either a physical computing device or a virtualized computing device within which computer-executable instructions can be executed in a manner consistent with their execution by a physical computing device. Similarly, terms referring to physical components of the computing device, as utilized herein, mean either those physical components or virtualizations thereof performing the same or equivalent functions.

US Patent Application for SYSTEM AND METHOD FOR LINK-INITIATED USER ENGAGEMENT AND RETENTION Patent Application (Application #20240211923 issued June 27, 2024) (2024)
Top Articles
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 5981

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.