Abstract: Present disclosure discloses a system (102) enabling detection of anomalies in data stream processing and method thereof. The system includes an interactive e-commerce platform and acquires an user profile associated with the at least one user associated with one or more computing device from a user environment to a source environment by a connection system. System (102) authenticates an user proximity and analyses the user profile to allow the user to access one or more resources in the source environment. System (102) stores and secures one or more details pertaining to the interaction of the user with the resources to allow the user to access the details each time the user connects to the connection system. System (102) facilitates a secure and smart way for the user to interact and access the resources by generating the one or more content recommendations along with the one or more reward options.
Description:TECHNICAL FIELD
[0001] The present disclosure relates to the field of e-commerce platforms. In particular, it relates to a smart and secure system facilitating content recommendations along with reward options, and method thereof.
BACKGROUND
[0002] Background description includes information that may be useful in understanding the present disclosure. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed disclosure, or that any publication specifically or implicitly referenced is prior art.
[0003] The e-commerce sector expanded quickly over a few decades and is still expanding today as a result of consumers' practical and emotional needs being met. The easily accessible e-commerce industry draws customers by offering incentives and making product recommendations while interacting with the customer. Another kind is proximity marketing or location-based direct marketing in which a business or other organization sends offers, promotions, alerts, or other messages to a person's smartphone based on the device’s location. To increase sales and user engagement, the e-commerce sector is investing a sizeable portion of its profits in providing relevant and individualized advertisements and suggestions to the customer. In a way, the customers gain from being able to purchase goods fitting their preferences and find new, pertinent ones.
[0004] In online shopping, the users can shop at merchant websites through e-commerce platforms without having to log in or provide much information until they are ready to make a transaction. Users usually have to provide financial and personal details to the e-commerce site at the time of transaction in order to authenticate themselves and finish the purchase. Many customers would prefer to finish their transactions without having to register or create an account in the e-commerce sites. The users can only redeem the rewards by registering to the e-commerce sites. Such merchant websites provide individualized advertisements and suggestions to the customer based on the recent purchase the user has performed.
[0005] In offline shopping, like a shopping mall type environment, the users are engaged to the e-commerce platforms through displays and billboards provided. The majority of proximity marketing is offered through beacons, which are positioned thoughtfully across a store and use Bluetooth to connect with nearby cell phones that have signed up for the service. The proximity marketing allows retailers to be in front of potential customers at the exact moment they are thinking about making a purchase and actively searching. The proximity marketing is more effective than traditional advertising, which reaches customers before they enter a store.
[0006] The accuracy of the recommendations and the reward options increases with the extent to which the ecommerce industry has access to consumer purchase patterns and history. Most of the e-commerce industry tracks the user history through cookies in online mode. In offline mode like the shopping mall type environment, the e-commerce industry tracks the user by different methods including real-time video monitoring, mobile Bluetooth, and the likes.
[0007] One of the US patent applications US2011302005A1 titled “Framework for promotions”, discloses a framework or tool through which e-commerce store owners may build promotional packages for e-commerce, and the same acts as a promotion engine or kit for promotions or incentives. Another existing US patent publication US11087351B2 titled “System and method for managing e-commerce”, discloses an online shopping platform permitting a shopper to discover and buy products from different merchants but in a single transaction by different payment methods including payment in the form of loyalty program points. Another US patent publication US10269042B2 titled “Customer relationship management system for physical locations”, discloses a system and method for outputting information about a person, such as a customer, includes an object carried by the person, which is capable of being identified by a wireless system. A wireless interface communicates with the object, a computing device correlates the identification of the object with the person and an output device outputs information relating to the person. Another US patent publication US10546315B2 titled “Systems and methods to enable offer and rewards marketing, and customer relationship management (CRM) network platform”, discloses a Systems and methods for providing and operating a customer loyalty and rewards platform including network-based and merchant-based registration and management, including mobile messaging, remote and local customer registration options, enrollment and automated payment card account association. The main problem with the existing systems is the reward options provided to the users are limited in time and limited in number. Also, said system employs real-time monitoring of the users and user purchase history to provide recommendations and reward options without user consent. Said systems provide such recommendations even after the user leaves the store or the website.
[0008] Hence, there is a need for a system which can provide accurate and highly close recommendations and reward options to the user by considering user privacy and user proximity both in offline mode and online mode.
OBJECTS OF THE PRESENT DISCLOSURE
[0009] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as listed herein below.
[0010] It is an object of the present disclosure to provide a smart and secure system facilitating content recommendations along with reward options, and method thereof.
[0011] It is another object of the present disclosure to provide a system and method which provides an interactive platform and associated technique for performance-based rewards through confirming the user proximity using multiple methods.
[0012] It is another object of the present disclosure to provide a system and method which provides content recommendations and performance-based rewards without breaching user privacy.
[0013] It is another object of the present disclosure to provide a system and method which preserves dynamic environment nature to prevent tampering the authenticity of any user proximity.
[0014] It is another object of the present disclosure to provide a system and method which achieves the data security to the user rewards and the user personalised data utilising the data encryption
SUMMARY
[0015] The present disclosure relates to the field of e-commerce platforms. In particular, it relates to a smart and secure system facilitating content recommendations along with reward options, and method thereof.
[0016] An aspect of the present disclosure pertains to a smart and secure system facilitating content recommendations along with reward options. The system comprising an interactive e-commerce platform configured to provide one or more resource providers associated with one or more tools and one or more features to create and manage an online store by providing one or more services to at least one user. The system further including one or more pre-processor associated with the interactive e-commerce platform, and a memory coupled to the one or more processor. The memory includes processor-executable instructions to cause the system to acquire an user profile associated with the at least one user associated with one or more computing device from a user environment to a source environment by a connection system. Further, the system can be configured to authenticate an user proximity to the connection system by based on one or more authentication techniques. Further, the system can be configured to analyse the user profile to allow the at least one user to access one or more resources in the source environment by generating one or more content recommendations and one or more reward options by an analytics engine. Further, the system can be configured to store one or more details pertaining to the interaction of the at least one user with the one or more resources in the connection system by securing with one or more encryption techniques and allow the at least one user to access the one or more details each time the at least one user connects to the connection system.
[0017] Further, the system can be configured to provide the at least one user at least one of a product and a service by employing an IoT system based on the interaction of the at least one user with the one or more resources. Furthermore, the system can be configured to facilitate the interactive e-commerce platform in forming a secure and smart way for the at least one user to interact and access the one or more resources by generating the one or more content recommendations along with the one or more reward options by confirming the user proximity at the connection system.
[0018] In an aspect, the user environment is at least one entity trying to connect to the connection system and access the one or more resources in the source environment. The user environment includes any or a combination of a physical user, a digital user, a user profile attached digital entity, and a user profile attached physical entity.
[0019] In an aspect, the one or more computing devices employed by the at least one user based on an access enabling technique and perform validation to connect to the source environment. The one or more computing devices is configured to a process, a render, a connect, and a respond to the one or more resources in the source environment. The one or more computing devices includes at least one of a mobile phone, a smart phone, a virtual reality device, an augmented reality device, and a tablet.
[0020] In an aspect, the source environment pertains to the one or more resources provided by the one or more resource providers accessible by the at least one user. The one or more resources includes any or a combination of a coupons, an offer, a rewards, a gamification, a crypto currency, a shopping, a banking, an augmented reality, an advertisement, a media resources, a quiz, a poll, a review, a sticker, a message, a certificate, and an e-commerce system. The one or more content recommendations and the one or more reward options are generated based on the one or more resources. The one or more content recommendations includes any or combination of a commercial product showcase, a food menu, and a shop of interest. The one or more reward options includes any or a combination of a coupons, an offer, a reward, a virtual gift card, an early access to premium contents, a free access to a premium website, a free trial of samples, a discount, an invitation to an event, and a virtual currency.
[0021] In an aspect, form part of the source environment, and the connection system is configured to allow the one or more computing device from the user environment to connect and access to the one or more resources in the source environment. The connection system includes any or a combination of a real-world physical objects, a print, and a digital display device.
[0022] In an aspect, the connection system employs the access enabling technique to allow the at least one user to connect to the connection system. The access enabling technique pertains to a unique code system configured to generate one or more digital objects dynamically and enable validation from the user environment entities. The unique code system varies dynamically. The unique code system includes any or combination of a Quick Response (QR) code, a combination of QR code, a physical image, a physical object, and a digital QR code. The unique code system can be accessed through the one or more computing devices by scanning the unique code system based on one or more dynamic instructions provided by the connection system during the scanning. The one or more dynamic instructions includes any or combination of a scan, a swipe, a click, a movement, a question, and a quiz.
[0023] In an aspect, the connection system employs a user connect gateway. The user connect gateway is configured to ensure to capture one or more footfalls of the connection system and the at least one user to deliver smart insights to the interactive platform and to the source environment. The one or more footfalls includes any or combination of a total footfalls, an average footfall, a peak time of the service, a downtime of the service, a service insight, an audience analytics, a purchasing pattern. The connection gate way employs any or combination of a user access manager and a user footfall manager. The connection gate way includes any or combination of a QR code prints, a dynamic QR code, a sensor, a camera, an electronics devices capturing the user proximity.
[0024] In an aspect, the connection system undergoes a switched on mode and a switched off mode to enable power consumption by providing a smart signal to the system by employing a footfall analytics on at least one user interaction count and a time of interaction.
[0025] In an aspect, the one or more authentication techniques is configured to confirm the user proximity, and includes any or combination of a non-digital source environment connection, a digital source environment connection, and a capture data from the external world.
[0026] In an aspect, the one or more details associated to interaction of the at least one user with the one or more resources includes any or combination of a content viewed, a resource accessed, a transaction performed, a reward gained, a time of user access, a user preference, and a duration of user interaction. The transaction performed by the at least one user is record in a digital ledger. The digital ledger includes at least one of a block chain. The analytics engine employs one or more deep learning techniques to analyse and secure the interaction of the at least one user with the one or more resources to assist the system to perform one or more actions. The one or more actions includes at least one of an enhance privacy, a perform crowd analytics to create informed choices, an enable programmatic advertisement recommendation, and a select effective locations for advertisements.
[0027] In an aspect, the one or more encryption techniques includes at least one of a two-way encryption, and a three way of encryption. The two-way encryption pertains to the encryption of the one or more details with one or more encryption key of the system. The three-way of pertains to the encryption of the one or more details with the one or more encryption key of the system and the one or more encryption key of the connection system and the one or more details in the connection system is accessed by the at least one user after making an authenticated connection employing the one or more encryption keys of the connection system. The one or more encryption keys includes a public key and a private key.
[0028] In an aspect, the system is configured to allow the one or more resource providers to acquire one or more information regarding the one or more resources displayed on the connection system by sending a request to the system. The one or more information includes any or combination of a screen shot of the one or more resources displayed, a time of displaying the one or more resources, a frequency of displaying the one or more resources, and the request send by the one or more resource providers. The one or more source providers includes at least one of an advertising company, a content management system, a shop owner, a banking service provider, and an e-commerce company.
[0029] In an aspect, a method facilitating content recommendations together with reward options by a smart and secure system. The method includes steps of acquiring, by the system, an user profile associated with the at least one user associated with one or more computing device from a user environment to a source environment by a connection system. Further, the method includes the step of authenticating, by the system, an user proximity to the connection system by based on one or more authentication techniques. Further, the method includes the step of analysing, by the system, the user profile to allow the at least one user to access one or more resources in the source environment by generating one or more content recommendations and one or more reward options by an analytics engine. Further, the method includes the step of storing, by the system, one or more details pertaining to the interaction of the at least one user with the one or more resources in the connection system by securing with one or more encryption techniques and allow the at least one user to access the one or more details each time the at least one user connects to the connection system. Further, the method includes the step of providing, by the system, the at least one user at least one of a product and a service by employing an IoT system based on the interaction of the at least one user with the one or more resources. Furthermore, the method includes the step of facilitating, by the system, the interactive e-commerce platform in forming a secure and smart way for the at least one user to interact and access the one or more resources by generating the one or more content recommendations along with the one or more reward options by confirming the user proximity at the connection system.
[0030] In an aspect, the at least one user acquires the one or more content recommendation and the one or more rewards from the source environment through the connection device in one or more ways. The one or more ways includes at least one of a feed forward, and a no feed-forward. The feed-forward is the system allows the at least one user to connect to the source environment to access the one or more resources already accessed by the at least one user in a later time by employing one or more encryption keys at the connection system.
[0031] In an aspect, the user proximity is authenticated by a method for confirming the user proximity. The method includes steps of scanning, a unique code in the unique code displayed on the connection system by the one or more computing devices associated with the at least one user. The method includes steps of instructing, the at least one user to perform one or more instructions to complete the unique code scanning. Further, the method includes steps of connecting, the one or more computing devices to a server to receive one or more dynamic configuration on the one or more computing devices based on at least one status of the connection system. Further, the method includes steps of validating, the one or more dynamic configuration received by the at least one user employing the one or more computing devices. Furthermore, the method includes steps of validating, the user proximity from the one or more dynamic configuration validated by the at least one user for allowing access to the one or more resources in the source environment.
[0032] In an aspect, the unique code displayed on the connection system is accessed by scanning the unique code by at least one imaging device associated with the one or more computing devices. The unique code includes at least one of a dynamic QR code and static QR code. The at least one status of the connection system includes at least one of a non-digital, and a digital.
[0033] In an aspect, the one or more instructions from the connection system for the one or more computing devices is validated back through the at least one imaging device associated with the one or more computing devices employed to access the unique code.
[0034] In an aspect, the one or more dynamic configuration is a combination of the unique code with at least one of a unique and a dynamic interactive graphical object and a non-interactive graphical object. The interactive graphical object includes any or combination of a geometrical shapes, a symbol, and a pattern.
[0035] In an aspect, the one or more computing devices operates on at least one mode includes a quick validate and an instruction driven validate. The quick validate pertains to the one or more computing devices scanning and validating one or more interactive objects mentioned in an active configuration from an active screen displaying the unique code to authenticate the user proximity by the one or more computing devices. The instruction driven pertains to providing the one or more instruction to the one or more computing devices to reconfirm the user proximity authenticated by the unique code.
[0036] Various objects, features, aspects, and advantages of the inventive subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.
BRIEF DESCRIPTION OF DRAWINGS
[0037] The accompanying drawings are included to provide a further understanding of the present disclosure, and are incorporated in, and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure, and together with the description, serve to explain the principles of the present disclosure.
[0038] In the figures, similar components, and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
[0039] FIG. 1 illustrates an exemplary network architecture of the proposed smart and secure system 102 facilitating content recommendations along with reward options, in accordance with an embodiment of the present disclosure.
[0040] FIG. 2 illustrates an exemplary architecture of the proposed smart and secure system 102 facilitating content recommendations along with reward options, in accordance with an embodiment of the present disclosure.
[0041] FIG. 3A illustrates an exemplary flow diagram 300 of the method for facilitating content recommendations along with reward options by a smart and secure system 102, in accordance with an embodiment of the present disclosure.
[0042] FIG. 3B illustrates an exemplary flow diagram 300A of the method for confirming the user proximity employed in the method for facilitating content recommendations along with reward options by a smart and secure system 102, in accordance with an embodiment of the present disclosure.
[0043] FIG. 4 illustrates an exemplary computer system 102 in which or with which embodiments of the present disclosure can be utilized, in accordance with embodiments of the present disclosure.
DETAILED DESCRIPTION
[0044] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0045] The present disclosure relates to the field of e-commerce platforms. In particular, it relates to a smart and secure system facilitating content recommendations along with reward options, and method thereof.
[0046] Various aspects of the present disclosure are described with respect to FIG 1-4.
[0047] FIG. 1 illustrates an exemplary network architecture of the proposed smart and secure system 102 facilitating content recommendations along with reward options, in accordance with an embodiment of the present disclosure.
[0048] In an embodiment, referring to FIG. 1, the system 102 will be connected to a network 116, which is further connected to one or more computing devices 112-1, 112-2, … 112-N (collectively referred as computing device 112, herein) associated with one or more users 114-1, 114-2, … 114-N (collectively referred as user 114, herein) in a user environment 110. Further, the network 116 can be configured with a centralized server 118 that stores compiled data from all the secure transactions.
[0049] In an embodiment, the system 102 may include an interactive e-commerce platform configured to provide one or more resource providers associated with one or more tools and one or more features to create and manage an online store by providing one or more services to the user 114. The one or more source providers can include, but not limited to: an advertising company, a content management system, a shop owner, a banking service provider, an e-commerce company, and the likes. Further, the system 102 may include a source environment 108 connected to the interactive e-commerce platform. The source environment 108 pertains to the one or more resources provided by the one or more resource providers accessible by the user 114. The one or more resources can include, but not limited to: a coupons, an offer, a rewards, a gamification, a crypto currency, a shopping, a banking service, an augmented reality, an advertisement, a media resources, a quiz, a poll, a review, a sticker, a message, a certificate, an e-commerce system, and the likes.
[0050] In an embodiment, the system 102 may include a connection system 106 forming the part of the source environment 108. The connection system 106 can be configured to allow the one or more computing device from the user environment to connect and access to the one or more resources in the source environment 108. The connection system 106 can include, but not limited to: a real-world physical object, a print, a digital display device, and the likes.
[0051] In an embodiment, the system 102 may receive at least one input data from the one or more computing devices 112. A person of ordinary skill in the art will understand that the one or more computing devices 112 may be individually referred to as computing device 112 and collectively referred to as computing devices 112. In an embodiment, the computing device 112 may also be referred to as User Equipment (UE). Accordingly, the terms “computing device” and “User Equipment” may be used interchangeably throughout the disclosure.
[0052] In an embodiment, the computing device 112 may transmit the at least one received data packet over a point-to-point or point-to-multipoint communication channel or network 104 to the system 102.
[0053] In an embodiment, the computing device 112 may involve collection, analysis, and sharing of data received from the system 102 via the communication network 104.
[0054] In an embodiment, the system 102 may execute one or more instruction for a smart and secure system facilitating content recommendations along with reward options, and method thereof.
[0055] In an exemplary embodiment, the system 102 may include, but not be limited to, a computer enabled device, a mobile phone, a tablet, a display device, a display projector, a AR/VR/MR, a camera, a sensors, a NFC, a network (Wired or Wireless), an apparatus to dispatch gift, prints, ecommerce, instructions, a Remote Detection Service (Detection Device) enabled devices such as iBeacon technologies, NFC, IR/RF services, bluetooth to detect the devices nearby, a connect signs objects, an apparatus, a vending machine, a gift claw machine, a combination of the vending machine, and the gift claw machine, a drone, a robot, an advertisement displays, or some combination thereof.
[0056] In an exemplary embodiment, the communication network 116 may include, but not be limited to, at least a portion of one or more networks having one or more nodes that transmit, receive, forward, generate, buffer, store, route, switch, process, or a combination thereof, etc. one or more messages, packets, signals, waves, voltage or current levels, some combination thereof, or so forth. In an exemplary embodiment, the communication network 104 may include, but not be limited to, a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, or some combination thereof.
[0057] In an embodiment, the one or more computing devices 112 employed by the at least one user 114 based on an access enabling technique and perform validation to connect to the source environment 108. The one or more computing devices 112 is configured to a process, a render, a connect, and a respond to the one or more resources in the source environment 108.
[0058] In an embodiment, the one or more computing devices 112 may communicate with the system 102 via a set of executable instructions residing on any operating system. In an embodiment, the one or more computing devices 112 may include, but not be limited to, any electrical, electronic, electro-mechanical, or an equipment, or a combination of one or more of the above devices such as mobile phone, smartphone, Virtual Reality (VR) devices, Augmented Reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device, wherein the one or more computing devices 112 may include one or more in-built or externally coupled accessories including, but not limited to, a visual aid device such as camera, audio aid, a microphone, a keyboard, input devices such as touch pad, touch enabled screen, electronic pen, receiving devices for receiving any audio or visual signal in any range of frequencies, and transmitting devices that can transmit any audio or visual signal in any range of frequencies. It may be appreciated that the one or more computing devices 112 may not be restricted to the mentioned devices and various other devices may be used. The computing device 112 can connect to a network as an IoT (Internet of Things) device.
[0059] In an embodiment, the system 102 can be configured to acquire an user profile associated with the user 114 associated with one or more computing device from a user environment to the source environment 108 by the connection system 106. The user profile can include, but not limited to: a user name, a phone number of the user, an e-mail id of the user, a user browse history, and the likes. The system is configured to connect the user 114 associated with the computing devices 112 from the user environment to the source environment 108 by the connection system 106 employing an access enabling technique.
[0060] In an embodiment, the user environment is at least one entity trying to connect to the connection system 106 and access the one or more resources in the source environment 108. The user environment can include, but not limited to: a physical user, a digital user, a user profile attached digital entity, a user profile attached physical entity, and the likes.
[0061] In an embodiment, the connection system 106 may employ the access enabling technique to allow the user 114 to connect to the connection system 106. The access enabling technique pertains to a unique code system configured to generate one or more digital objects dynamically and enable validation from the user environment entities. The unique code system varies dynamically. The unique code system can include, but not limited to: a QR code, a combination of QR code, a physical image, a physical object, a pattern, a digital QR code, and the likes. The unique code system can be accessed through the one or more computing devices 112 by scanning the unique code system based on one or more instructions provided by the connection system 106 during the scanning. The one or more instructions can include, but not limited to: a scan, a swipe, a click, a movement, a question, a quiz, and the likes.
[0062] In an exemplary embodiment, the connection system 106 displays a QR code on the screen. QR code is dynamic and change every 30-45 seconds. Along with the QR code graphics objects like shape, coloured box, patterns are also changing dynamically. The user employs mobile device and open the platform application to scan the QR code. The application instructs the user to perform instructions such as point towards the QR Code, graphic objects, tilt phone, swipe, and click at the phone. Once the device able to capture the QR code, the device connects to the connection system 106 server.
[0063] In an embodiment, the connection system 106 reads and streams one or more data from an external world by employing one or more techniques to refine the system performance and bring the at least one user one or more personalised experiences. The one or more techniques can include, but not limited to: a camera, a digital camera, a web camera, a drone camera, and the likes. The personalised experiences can include, but not limited to: a video, an images, a shopping preferences, an offers, a rewards, a recommendations, and the likes.
[0064] In an embodiment, the connection system 106 employs a user connect gateway. The user connect gateway is configured to ensure to capture one or more footfalls of the connection system 106 and the user 114 to deliver smart insights to the interactive platform 104 and to the source environment 108. The one or more footfalls can include, but not limited to: a total footfalls, an average footfall, a peak time of the service, a downtime of the service, a service insight, an audience analytics, a purchasing pattern, and the likes. The connection gate way employs any or combination of a user access manager and a user footfall manager. The connection gate way can include, but not limited to: a QR code prints, a dynamic QR code, a sensor, a camera, an electronics devices capturing the user proximity, and the likes.
[0065] In an embodiment, the connection system 106 undergoes a switched on mode and a switched off mode to enable power consumption by providing a smart signal to the system by employing a footfall analytics on at least one user interaction count and a time of interaction.
[0066] In an embodiment, the system 102 can be configured to authenticate an user proximity to the connection system 106 by based on one or more authentication techniques. The one or more authentication techniques is configured to confirm the user proximity. The one or more authentication techniques can include, but not limited to: a non-digital source environment connection, a digital source environment connection, a capture data from the external world, and the likes.
[0067] In an embodiment, the non-digital source environmental connection instructs the user 114 with the one or more dynamic instruction to capture the real-world physical objects and authenticate the user proximity through the one or more computing devices 112. The digital source environmental connection instructs the user 114 with the one or more dynamic instructions from a dynamic configuration system to capture the dynamic environment attached to a digital QR code managed by a content management system. The capture data from the external world allows an imaging device attached the connection system 106 to capture one or more visual contents from the external world and analysis the user 114 from the one or more visual contents locally by a computer enabled system.
[0068] In an embodiment, the system 102 can be configured to analyse the user profile to allow the user 114 to access one or more resources in the source environment 108 by generating one or more content recommendations and one or more reward options by an analytics engine 122. The one or more resources can include, but not limited to: a coupons, an offer, a rewards, a gamification, a crypto currency, a shopping, a banking service, an augmented reality, an advertisement, a media resources, a quiz, a poll, a review, a sticker, a message, a certificate, an e-commerce system, and the likes. The one or more content recommendations and the one or more reward options may be generated based on the one or more resources. The one or more content recommendations can include, but not limited to: a commercial product showcase, a product related content, a food menu, a shop of interest, and the likes. The one or more reward options can include, but not limited to: a coupons, an offer, a reward, a virtual gift card, an early access to premium contents, a free access to a premium website, a free trial of samples, a discount, an invitation to an event, a virtual currency, and the likes.
[0069] In an exemplary embodiment, the system generates a product showcase on the connection system 106 based on the analysed user profile. Based on the product showcase displayed the user 114 accesses the one or more resources related to the product. In an instance, the system generates an apple iPhone image. The user 114 clicks on the image and get access to an online store selling the apple iPhone.
[0070] In an exemplary embodiment, the system generates an offer as the reward option on the connection system 106 based on the analysed user profile. Based on the offer displayed the user 114 accesses the one or more resources related to the product. In an instance, the system generates an instant discount offer on a purchase on an online clothing store. The user 114 clicks on the offer and get access to the online cloth store.
[0071] In an embodiment, the system 102 can be configured to store one or more details pertaining to the interaction of the user 114 with one or more resources in the connection system 106 by securing with one or more encryption techniques and allow the user 114 to access the one or more details each time the user 114 connects to the connection system 106.
[0072] In an embodiment, the one or more details associated to interaction of the user 114 with the one or more resources can include, but not limited to: a content viewed, a resource accessed, a transaction performed, a reward gained, a time of user access, a user preference, a duration of user interaction, and the likes. The transaction performed by the user 114 is record in a digital ledger 120. The digital ledger 120 can include, but not limited to: a block chain, and the likes.
[0073] In an exemplary embodiment, the transaction performed by the at least one user is in block chain-based transactions. The block chain technology enables storing immutable records and attaching the records to digital currencies. The block chain-based transactions attributes can include a system generated unique IDs, a MAC IDs, a timestamps of the transactions, a user profile data, and a references to previous block chain transactions making part of a decentralized and tamperproof ledger.
[0074] In an embodiment, the analytics engine 122 employs one or more deep learning techniques to analyse and secure the interaction of the user 114 with the one or more resources to assist the system to perform one or more actions. The one or more actions can include, but not limited to: an enhance privacy, a perform crowd analytics to create informed choices, an enable programmatic advertisement recommendation, a select effective locations for advertisements, and the likes.
[0075] In an exemplary embodiment, the analytics engine 122 employs a deep learning technique, a machine learning technique and a computer vision to analyse and analyse and secure the interaction of the user 114 with the one or more resources. In an instance, the analytics engine 122 employs the deep learning technique to transform images of the user into animated representations to enhance privacy by obfuscating facial features while retaining visual information. In another instance, the analytics engine 122 employs deep learning techniques to detect
faces of the users and approximate footfall in crowds using live video feeds from webcams to enables real-time monitoring of crowd movement and density in public
spaces such as shopping malls, train stations, and event venues. Further, to accurately estimate the number of users present in a given area at any given time, providing valuable insights into crowd dynamics. In still another instance, the analytics engine 122 employs the machine learning technique and the computer vision to dynamically analyse live data streams such as timings, and customer footprint to dynamically adjust the content showcased on a digital billboard. In still another instance, the analytics engine 122 employs the machine learning technique together with predictive techniques to predicts the most effective locations for outdoor ads based on traffic patterns, demographic data, and historical performance.
[0076] In an embodiment, the one or more encryption techniques can include, but not limited to: a two-way encryption, a three way of encryption, and the likes. The two-way encryption pertains to the encryption of the one or more details with one or more encryption key of the system. The three-way of pertains to the encryption of the one or more details with the one or more encryption key of the system and the one or more encryption key of the connection system 106 and the one or more details in the connection system 106 is accessed by the user 114 after making an authenticated connection employing the one or more encryption keys of the connection system 106. The one or more encryption keys may include a public key and a private key.
[0077] In an embodiment, the system 102 can be configured to provide the user 114 at least one of a product and a service by employing an IoT system based on the interaction of the user 114 with the one or more resources. The IoT system is a combination of one or more IoT devices and is automated and configured to respond back to the connection system 106 based on the interaction of the user 114 with the one or more resources. IoT system employs one or more data captured from the user environments including, but not limited to: a user data, a proximity data, a connection data, a configuration and IoT devices data to bring the system runs smarts and fast. The IoT system can include, but not limited to: a drone, a robot, a smart shelves, a beacon,
[0078] In an embodiment, the IoT system employs one or more sensors to identify the user 114 and the user environment. The one or more sensors can include, but not limited to: a temperature sensor, a camera, a fire safety sensor, a gas sensor, an air quality sensor, a pressure sensor, a motion sensor, and an air movement sensor.
[0079] In an exemplary embodiment, the user purchases a product through the online store displayed in the connection system 106 and the system delivers the product to the user employing the IoT system. In an instance, the user purchases a bottle from the online store of shop in a shopping mall and the product is delivered to the user by a drone by tracking the user location employing a camera feed.
[0080] In an embodiment, the system 102 can be configured to facilitate the interactive e-commerce platform 104 in forming a secure and smart way for the user 114 to interact and access the one or more resources by generating the one or more content recommendations along with the one or more reward options by confirming the user proximity at the connection system 106.
[0081] In an embodiment, the system is configured to allow the one or more resource providers to acquire one or more information regarding the one or more resources displayed on the connection system 106 by sending a request to the system. The one or more information can include, but not limited to: a screen shot of the one or more resources displayed, a time of displaying the one or more resources, a frequency of displaying the one or more resources, the request send by the one or more resource providers, and the likes.
[0082] Although FIG. 1 shows exemplary components of the network architecture 100, in other embodiments, the network architecture 100 may include fewer components, different components, differently arranged components, or additional functional components than depicted in FIG. 1. Additionally, or alternatively, one or more components of the network architecture 100 may perform functions described as being performed by one or more other components of the network architecture 100.
[0083] FIG. 2 illustrates an exemplary architecture of the proposed smart and secure system 102 facilitating content recommendations along with reward options, in accordance with an embodiment of the present disclosure.
[0084] In an aspect, referring to FIG. 2, the system 102 may comprise one or more processor(s) 202. The one or more processor(s) 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, edge or fog microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that process data based on operational instructions. Among other capabilities, the one or more processor(s) 202 may be configured to fetch and execute computer-readable instructions stored in a memory 204 of the system 102. The memory 204 may be configured to store one or more computer-readable instructions or routines in a non-transitory computer readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory 204 may comprise any non-transitory storage device including, for example, volatile memory such as Random Access Memory (RAM), or non-volatile memory such as Erasable Programmable Read-Only Memory (EPROM), flash memory, and the like.
[0085] Referring to FIG. 2, the system 102 may include an interface(s) 206. The interface(s) 206 may comprise a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) 206 may facilitate communication to/from the system 102. The interface(s) 206 may also provide a communication pathway for one or more components of the system 102. Examples of such components include, but are not limited to, processing unit/engine(s) 208 and a local database 210.
[0086] In an embodiment, the processing unit/engine(s) 208 may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) 208. In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) 208 may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) 208 may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) 208. In such examples, the system 102 may comprise the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the system 102 and the processing resource. In other examples, the processing engine(s) 208 may be implemented by electronic circuitry.
[0087] In an embodiment, the local database 210 may comprise data that may be either stored or generated as a result of functionalities implemented by any of the components of the processor 202 or the processing engines 208. In an embodiment, the local database 210 may be separate from the system 102.
[0088] In an exemplary embodiment, the processing engine 208 may include one or more engines selected from any of a user profile acquisition module 212, a user proximity authenticating module 214, a user assessment and resource accessing module 216, a user interaction securing module 218, and other modules 220 having functions that may include but are not limited to testing, storage, and peripheral functions, such as wireless communication unit for remote operation, audio unit for alerts and the like.
[0089] In an embodiment, the user profile acquisition module 212 may include means of acquiring the user profile associated with the user 114 associated with one or more computing device from a user environment to the source environment 108 by a connection system 106.
[0090] In an embodiment, the user proximity authenticating module 214 may be configured to authenticate an user proximity to the connection system 106 by based on one or more authentication techniques.
[0091] In an embodiment, the user assessment and resource accessing module 216 may be configured to analyse the user profile to allow the user 114 to access one or more resources in the source environment 108 by generating one or more content recommendations and one or more reward options by the analytics engine 122.
[0092] In an embodiment, the user interaction securing module 218 may be configured to store one or more details pertaining to the interaction of the user 114 with one or more resources in the connection system 106 by securing with one or more encryption techniques and allow the user 114 to access the one or more details each time the user 114 connects to the connection system 106.
[0093] FIG. 3A illustrates an exemplary flow diagram 300 of the method for facilitating content recommendations along with reward options by a smart and secure system 102, in accordance with an embodiment of the present disclosure.
[0094] In an embodiment, referring to FIG. 3A, the flow diagram 300 of the method for facilitating content recommendations together with reward options by the system 102. At step 302, the user 114 approaches the system with the user equipment 112 to connect with system 102. At step 304, the connection system 106 may display the unique code by which the user 114 can connect to the system 102. At step 306, the user 114 employs the user connect interface to scan the unique code displayed on the connection system 106 form step 304. At step 308, the system validates the user 114 by the unique code scanned to allow the user 114 to connect to the system 102. At step 310, the user 114 may connect to the platform 104 to start interaction. At step 310, the system may instruct the user 114 through the platform 104 to perform the dynamic instructions provided to the user equipment 112 to confirm the user proximity. Once, the user proximity is confirmed, at step 314, the system may acquire the user profile from the user equipment 112 to enable connect to the system to and allow the user 114 to access the resources from the source environment 108. Once the user 114 accesses the resources and based on user profile, at step 316 the platform 104 starts to recommend contents and reward to the user 114 to promote more user interaction with the system.
[0095] Further, at step 318, the user 114 interacts with the system through the recommendations and perform transactions based on the interaction acquire a product or a service and achieves rewards. At step 320, the user interaction and the rewards achieved are encrypted by the system and stored in the connection system 106 for later time access by the user 114 in next visit. The transactions performed by the user 114 may be stored in the digital ledger 120 at step 322 for tamper free storage. At step 324, the system may connect to the IoT devices nearby using a network and at step 326, assigns the IoT devices to provide the rewards and products to the user 114 at user spot. At step 328, the IoT system identifies the user 114 by sensor systems provided in the IoT devices for spot product and reward delivery to the user 114. At step 330, the IoT device delivers the rewards and products to the user 114.
[0096] In an embodiment, the method facilitating content recommendations together with reward options by the smart and secure system 102. The method includes step of acquiring, by the system, the user profile associated with the user 114 associated with one or more computing device from the user environment to the source environment 108 by the connection system 106. Further, the method includes the step of authenticating, by the system, the user proximity to the connection system 106 by based on one or more authentication techniques. Further, the method includes the step of analysing, by the system, the user profile to allow the user 114 to access one or more resources in the source environment 108 by generating one or more content recommendations and one or more reward options by the analytics engine 122. Further, the method includes the step of storing, by the system, one or more details pertaining to the interaction of the user 114 with one or more resources in the connection system 106 by securing with one or more encryption techniques and allow the user 114 to access the one or more details each time the user 114 connects to the connection system 106. Further, the method includes the step of providing, by the system, the at user 114 at least one of a product and a service by employing an IoT system based on the interaction of the user 114 with the one or more resources. Furthermore, the method includes the step of facilitating, by the system, the interactive e-commerce platform 104 in forming a secure and smart way for the user 114 to interact and access the one or more resources by generating the one or more content recommendations along with the one or more reward options by confirming the user proximity at the connection system 106.
[0097] In an embodiment, the user 114 acquires the one or more content recommendation and the one or more rewards from the source environment 108 through the connection device in one or more ways. The one or more ways includes at least one of a feed forward, and a no feed-forward. The feed-forward is the system allows the user 114 to connect to the source environment 108 to access the one or more resources already accessed by the user 114 in a later time by employing one or more encryption keys at the connection system 106.
[0098] In an embodiment, the system encrypts and store the user interactions and the rewards received by the user 114 in the connection system 106. The system employs one or more encryption techniques to secure the user interactions and the rewards received by the user 114 in the connection system 106. The one or more encryption techniques can include, but not limited to: a two-way encryption, a three way of encryption, and the likes.
[0099] In an exemplary embodiment, to secure the resources received by the user 114 from the connection system 106, the user 114 first receives the public key A from the platform 104. Further, the user 114 receives the public key B from the platform 104 server. The user 114 received resources may be encrypted by public key A and public key B. In the next time visit the resources received by the user 114 can only accessed by the user 114 after making an authenticated connection to the connection system 106 and employing the public key A and its related private key along with the public key B and related private key. Thus, the user received resources get hyper secured.
[00100] FIG. 3B illustrates an exemplary flow diagram 300A of the method for confirming the user proximity employed in the method for facilitating content recommendations along with reward options by a smart and secure system 102, in accordance with an embodiment of the present disclosure.
[00101] In an embodiment, referring to FIG. 3B, the method 300A for confirming the user proximity employed in the method for facilitating content recommendations along with reward options by a smart and secure system 102. The method includes step 308-1 of scanning, a unique code in the unique code displayed on the connection system 106 by the one or more computing devices 112 associated with the user 114. The method includes step 308-2 of instructing, the user 114 to perform one or more instructions to complete the unique code scanning. Further, the method includes step 308-3 of connecting, the one or more computing devices 112 to a server to receive one or more dynamic configurations on the one or more computing devices 112 based on at least one status of the connection system 106. Further, the method includes step 308-4 of validating, the one or more dynamic configurations received by the user 114 employing the one or more computing devices 112. Furthermore, the method includes step 308-5 of validating, the user proximity from the one or more dynamic configurations validated by the user 114 for allowing access to the one or more resources in the source environment 108.
[00102] In an embodiment, the unique code displayed on the connection system 106 can be accessed by scanning the unique code by at least one imaging device associated with the one or more computing devices 112. The unique code can include, but not limited to: a dynamic QR code, a static QR code, and the likes. The at least one status of the connection system 106 can include, but not limited to: a non-digital, and a digital.
[00103] In an embodiment, the one or more instructions from the connection system 106 for the one or more computing devices 112 is validated back through the at least one imaging device associated with the one or more computing devices 112 employed to access the unique code.
[00104] In an embodiment, the one or more dynamic configuration is a combination of the unique code with at least one of a unique and a dynamic interactive graphical object and a non-interactive graphical object. The interactive graphical object can include, but not limited to: a geometrical shapes, a symbol, a pattern, and the likes.
[00105] In an embodiment, the one or more computing devices 112 operates on at least one mode including a quick validate and an instruction driven validate. The quick validate pertains to the one or more computing devices 112 scanning and validating one or more interactive objects mentioned in an active configuration from an active screen displaying the unique code to authenticate the user proximity by the one or more computing devices 112. The instruction driven pertains to providing the one or more instruction to the one or more computing devices 112 to reconfirm the user proximity authenticated by the unique code.
[00106] In an exemplary embodiment, the source system is a restaurant
the user frequently visits for dine in and hang out and the connection system 106 is non digital. The connection system is table tent card. The user came to the restaurant to order a food. The user observed the table tent card placed in the dining table. The table tent card displays a QR code. The QR is not simple print rather it is lenticular image enabled QR code. The user employs the mobile phone and open the platform application to scan the QR code. The user employs the camera feature to scan the QR code. The application instructed the user to perform instructing including a Tilt phone, a Swipe, a Click, and the likes at the mobile phone. All the instruction are dynamic it is attached to time and user attributes. The user followed the instruction one by one to scan the QR code successfully, and making the system believe that the user is nearby the connection system. Once the system validated the user proximity, the user may be authenticated to access all the resources which are entitled under the current source system.
[00107] In another exemplary embodiment, the source system is a restaurant
the user frequently visits for dine in and hang out and the connection system is digital and works on a simple and non-feed forward way. The user came to the restaurant to order food. The user observed the digital display device (connection system) placed in the dining table. The QR code displayed at the connection system utilising part of full area of the display. The QR code is dynamic and change every 30-45 seconds. Along with the QR code graphics objects like shape, coloured box, patterns are also visible which changes dynamically. The user employs the mobile phone and open the platform application to scan the QR code. The user employs the camera feature to scan the QR code. The application instructed the user to perform instructing including a tilt phone, a swipe, a click, and the likes at the mobile phone. All the instruction are dynamic it is attached to time and user attributes. Once the mobile phone able to capture the QR code, the mobile phone connects to the server to get the dynamic configurations which is recently pushed to the connection system. The mobile phone validates the received dynamic configuration with the connection system through the same mobile phone (camera connected). In an instance, the dynamic configuration created 2016-01-08 15:16:44.000Z does have unique QR codes and two red circle and green circle bottom of the screen. The user may validate the two red circles and green circles placed at the bottom of the screen. Once the system validates the user proximity, the user may be authenticated to access all the resources which are entitled under the current source system. The data security and end to end encryption aids to transform one-time customers into repetitive customers and recurring customers. Providing connected periodical subscriptions offers digital coupons, which can be claimed one after another.
[00108] In still another exemplary embodiment, the source system is a restaurant
the user frequently visits for dine in and hang out and the connection system is digital and works on a feed forward way. The user came to the restaurant to order food. The user observed the digital display device (connection system) placed in the dining table. The QR code displayed at the connection system utilising part of full area of the display. The QR code is dynamic and change every 30-45 seconds. Along with the QR code graphics objects like shape, coloured box, patterns are also visible which changes dynamically. The user employs the mobile phone and open the platform application to scan the QR code. The user employs the camera feature to scan the QR code. The application instructed the user to perform instructing including a tilt phone, a swipe, a click, and the likes at the mobile phone. All the instruction are dynamic it is attached to time and user attributes. Once the mobile phone able to capture the QR code, the mobile phone connects to the server to get the dynamic configurations which is recently pushed to the connection system. The mobile phone validates the received dynamic configuration with the connection system through the same mobile phone (camera connected). In an instance, the dynamic configuration created 2016-01-08 15:16:44.000Z does have unique QR codes and two red circle and green circle bottom of the screen. The instructions are
either questions which are generated dynamically or commands such as point
towards the QR Code, graphic objects, tilt phone, swipe, click and the likes, at the phone. The User device is allowed to scan through and shapes, coloured box, or text, interactive objects on the Connected System. Once the source system connected with the QR (first authentication), the connected system would be able to reserve fully display space or part of the display (kind of screen quadrant) for the mobile phone to interact and perform validation using static display object or with interactive display objects. Once the system validates the user proximity, the user may be authenticated to access all the resources which are entitled under the current source system. The secured system with three ways of encryption allows the user to
unlock the rewards, and perks received through the connection system.
[00109] FIG.4 illustrates an exemplary computer system in which or with which embodiments of the present disclosure can be utilized, in accordance with embodiments of the present disclosure.
[00110] Referring to FIG. 4, computer system includes an external storage device 410, a bus 420, a main memory 430, a read only memory 440, a mass storage device 450, communication port 460, and a processor 470. A person skilled in the art will appreciate that computer system may include more than one processor and communication ports. Examples of processor 470 include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™ system on a chip processors or other future processors. Processor 470 may include various modules associated with embodiments of the present disclosure. Communication port 460 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port 460 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[00111] In an embodiment, the memory 430 can be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. Read only memory 440 can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor 470. Mass storage 460 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7102 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
[00112] In an embodiment, the bus 420 communicatively couples processor(s) 470 with the other memory, storage and communication blocks. Bus 420 can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects processor 470 to software system.
[00113] In another embodiment, operator and administrative interfaces, e.g. a display, keyboard, and a cursor control device, may also be coupled to bus 420 to support direct operator interaction with computer system. Other operator and administrative interfaces can be provided through network connections connected through communication port 460. External storage device 410 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities.
[00114] If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
[00115] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[00116] It is to be appreciated by a person skilled in the art that while various embodiments of the present disclosure have been elaborated for a smart and secure system facilitating content recommendations along with reward options, and method thereof. However, the teachings of the present disclosure are also applicable for other types of applications as well, and all such embodiments are well within the scope of the present disclosure. However, the smart and secure system facilitating content recommendations along with reward options, and method thereof is also equally implementable in other industries as well, and all such embodiments are well within the scope of the present disclosure without any limitation.
[00117] Accordingly, the present disclosure provides a smart and secure system facilitating content recommendations along with reward options, and method thereof.
[00118] Moreover, in interpreting the specification, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refer to at least one of something selected from the group consisting of A, B, C….and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[00119] While the foregoing describes various embodiments of the disclosure, other and further embodiments of the disclosure may be devised without departing from the basic scope thereof. The scope of the disclosure is determined by the claims that follow. The disclosure is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the disclosure when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
[00120] The present disclosure provides a smart and secure system facilitating content recommendations along with reward options, and method thereof.
[00121] The present disclosure provides a system and method which provides an interactive platform and associated technique for performance-based rewards through confirming the user proximity using multiple methods.
[00122] The present disclosure provides a system and method which provides content recommendations and performance-based rewards without breaching user privacy.
[00123] The present disclosure provides a system and method which preserves dynamic environment nature to prevent tampering the authenticity of any user proximity.
[00124] The present disclosure provides a system and method which ensures the entitled resources under the source environment are secure.
[00125] The present disclosure provides a system and method which achieves the data security to the user rewards and the user personalised data utilising the data encryption.
, Claims:1. A smart and secure system (102) facilitating content recommendations along with reward options, the system (102) comprising:
an interactive e-commerce platform (104) configured to provide one or more resource providers associated with one or more tools and one or more features to create and manage an online store by providing one or more services to at least one user (114);
one or more processors (202) associated with the interactive e-commerce platform; and
a memory coupled to the one or more processors (202), wherein said memory (204) stores instructions which when executed by the one or more processors (202) cause the system (102) to:
acquire an user profile associated with the at least one user (114) associated with one or more computing devices (112) from a user environment to a source environment (108) by a connection system (106);
authenticate an user proximity to the connection system (106) by based on one or more authentication techniques;
analyse the user profile to allow the at least one user (114) to access one or more resources in the source environment (108) by generating one or more content recommendations and one or more reward options by an analytics engine (122);
store one or more details pertaining to the interaction of the at least one user (114) with the one or more resources in the connection system (106) by securing with one or more encryption techniques and allow the at least one user (114) to access the one or more details each time the at least one user (114) connects to the connection system (106);
provide the at least one user (114) at least one of a product and a service by employing an IoT system based on the interaction of the at least one user (114) with the one or more resources; and
facilitate the interactive e-commerce platform (104) in forming a secure and smart way for the at least one user (114) to interact and access the one or more resources by generating the one or more content recommendations along with the one or more reward options by confirming the user proximity at the connection system (106).
2. The system (102) as claimed in claim 1, wherein the user environment is at least one entity trying to connect to the connection system (106) and access the one or more resources in the source environment (108),
wherein the user environment comprises any or a combination of a physical user, a digital user, a user profile attached digital entity, and a user profile attached physical entity.
3. The system (102) as claimed in claim 1, wherein the one or more computing devices (112) employed by the at least one user (114) based on an access enabling technique and perform validation to connect to the source environment (108),
wherein the one or more computing devices 112 is configured to a process, a render, a connect, and a respond to the one or more resources in the source environment (108),
wherein the one or more computing devices (112) comprises at least one of a mobile phone, a smart phone, a virtual reality device, an augmented reality devices, and a tablet.
4. The system (102) as claimed in claim 1, wherein the source environment (108) pertains to the one or more resources provided by the one or more resource providers accessible by the at least one user (114),
wherein the one or more resources comprises any or a combination of a coupons, an offer, a rewards, a gamification, a crypto currency, a shopping, a banking service, an augmented reality, an advertisement, a media resources, a quiz, a poll, a review, a sticker, a message, a certificate, and an e-commerce system,
wherein the one or more content recommendations and the one or more reward options are generated based on the one or more resources,
wherein the one or more content recommendations comprises any or combination of a commercial product showcase, a food menu, and a shop of interest,
wherein the one or more reward options comprises any or a combination of a coupons, an offer, a reward, a virtual gift card, an early access to premium contents, a free access to a premium website, a free trial of samples, a discount, an invitation to an event, and a virtual currency.
5. The system (102) as claimed in claim 1, wherein the connection system (106) form part of the source environment (108), and the connection system (106) is configured to allow the one or more computing device from the user environment to connect and access to the one or more resources in the source environment (108),
wherein the connection system (106) comprises any or a combination of a real-world physical objects, a print, and a digital display device.
6. The system (102) as claimed in claim 5, wherein the connection system (106) employs the access enabling technique to allow the at least one user (114) to connect to the connection system (106),
wherein the access enabling technique pertains to a unique code system configured to generate one or more digital objects dynamically and enable validation from the user environment entities,
wherein the unique code system varies dynamically, and the unique code system comprises any or combination of a Quick Response (QR) code, a combination of QR code, a physical image, a physical object, and a digital QR code,
wherein the unique code system can be accessed through the one or more computing devices (112) by scanning the unique code system based on one or more instructions provided by the connection system (106) during the scanning,
wherein the one or more instructions comprises any or combination of a scan, a swipe, a click, a movement, a question, and a quiz.
7. The system (102) as claimed in claim 5, wherein the connection system (106) employs a user connect gateway, and the user connect gateway is configured to ensure to capture one or more footfalls of the connection system (106) and the at least one user (114) to deliver smart insights to the interactive platform and to the source environment (108),
wherein the one or more footfalls comprises any or combination of a total footfalls, an average footfall, a peak time of the service, a downtime of the service, a service insight, an audience analytics, and a purchasing pattern,
wherein the connection gate way employs any or combination of a user access manager and a user footfall manager,
wherein the connection gate way comprises any or combination of a QR code prints, a dynamic QR code, a sensor, a camera, and an electronics devices capturing the user proximity.
8. The system (102) as claimed in claim 5, wherein the connection system (106) undergoes a switched on mode and a switched off mode to enable power consumption by providing a smart signal to the system by employing a footfall analytics on at least one user interaction count and a time of interaction.
9. The system (102) as claimed in claim 1, wherein the one or more authentication techniques is configured to confirm the user proximity, and comprises any or combination of a non-digital source environment connection, a digital source environment connection, and a capture data from the external world.
10. The system (102) as claimed in claim 1, wherein the one or more details associated to interaction of the at least one user (114) with the one or more resources comprises any or combination of a content viewed, a resource accessed, a transaction performed, a reward gained, a time of user access, a user preference, and a duration of user interaction,
wherein the transaction performed by the at least one user (114) is record in a digital ledger (120), and the digital ledger (120) comprises at least one of a block chain.
wherein the analytics engine (122) employs one or more deep learning techniques to analyse and secure the interaction of the at least one user (114) with the one or more resources to assist the system to perform one or more actions,
wherein the one or more actions comprises at least one of an enhance privacy, a perform crowd analytics to create informed choices, an enable programmatic advertisement recommendation, and a select effective locations for advertisements.
11. The system (102) as claimed in claim 1, wherein the one or more encryption techniques comprises at least one of a two-way encryption, and a three way of encryption,
wherein the two-way encryption pertains to the encryption of the one or more details with one or more encryption key of the system,
wherein the three-way of pertains to the encryption of the one or more details with the one or more encryption key of the system and the one or more encryption key of the connection system (106) and the one or more details in the connection system (106) is accessed by the at least one user (114) after making an authenticated connection employing the one or more encryption keys of the connection system (106),
wherein the one or more encryption keys comprises a public key and a private key.
12. The system (102) as claimed in claim 1, wherein the system is configured to allow the one or more resource providers to acquire one or more information regarding the one or more resources displayed on the connection system (106) by sending a request to the system,
wherein the one or more information comprises any or combination of a screen shot of the one or more resources displayed, a time of displaying the one or more resources, a frequency of displaying the one or more resources, and the request send by the one or more resource providers,
wherein the one or more source providers comprises at least one of an advertising company, a content management system, a shop owner, a banking service provider, and an e-commerce company.
13. A method (300) for facilitating content recommendations together with reward options by a smart and secure system (102), the method (300) comprising:
acquiring, by the system (102), an user profile associated with the at least one user (114) associated with one or more computing device from a user environment to a source environment (108) by a connection system (106);
authenticating, by the system (102), an user proximity to the connection system (106) by based on one or more authentication techniques;
analysing, by the system (102), the user profile to allow the at least one user (114) to access one or more resources in the source environment (108) by generating one or more content recommendations and one or more reward options by an analytics engine (122);
storing, by the system (102), one or more details pertaining to the interaction of the at least one user (114) with the one or more resources in the connection system (106) by securing with one or more encryption techniques and allow the at least one user (114) to access the one or more details each time the at least one user (114) connects to the connection system (106);
providing, by the system (102), the at least one user (114) at least one of a product and a service by employing an IoT system based on the interaction of the at least one user (114) with the one or more resources; and
facilitating, by the system (102), the interactive e-commerce platform in forming a secure and smart way for the at least one user (114) to interact and access the one or more resources by generating the one or more content recommendations along with the one or more reward options by confirming the user proximity at the connection system (106).
14. The method as claimed in claim 13, wherein the at least one user (114) acquires the one or more content recommendation and the one or more rewards from the source environment (108) through the connection device in one or more ways,
wherein the one or more ways comprises at least one of a feed forward, and a no feed-forward,
wherein the feed-forward is the system allows the at least one user (114) to connect to the source environment (108) to access the one or more resources already accessed by the at least one user (114) in a later time by employing one or more encryption keys at the connection system (106).
15. The method as claimed in claim 13, wherein the user proximity is authenticated by a method for confirming the user proximity, the method comprising steps of:
scanning, a unique code in the unique code system displayed on the connection system (106) by the one or more computing devices (112) associated with the at least one user (114);
instructing, the at least one user (114) to perform one or more instructions to complete the unique code scanning;
connecting, the one or more computing devices (112) to a server to receive one or more dynamic configuration on the one or more computing devices (112) based on at least one status of the connection system (106),
validating, the one or more dynamic configuration received by the at least one user (114) employing the one or more computing devices (112); and
validating, the user proximity from the one or more dynamic configuration validated by the at least one user (114) to authenticate the at least one user (114) for allowing access to the one or more resources in the source environment (108).
16. The method as claimed in claim 15, wherein the unique code displayed on the connection system (106) is accessed by scanning the unique code by at least one imaging device associated with the one or more computing devices (112),
wherein the unique code comprises at least one of a dynamic QR code and static QR code,
wherein the at least one status of the connection system (106) comprises at least one of a non-digital, and a digital.
17. The method as claimed in claim 15, wherein the one or more instructions from the connection system (106) for the one or more computing devices (112) is validated back through the at least one imaging device associated with the one or more computing devices (112) employed to access the unique code.
18. The method as claimed in claim 15, wherein the one or more dynamic configuration is a combination of the unique code with at least one of a unique and a dynamic interactive graphical object and a non-interactive graphical object,
wherein the interactive object comprises any or combination of a geometrical shapes, a symbol, and a pattern.
19. The method as claimed in claim 15, wherein the one or more computing devices (112) operates on at least one mode comprises a quick validate and an instruction driven validate,
wherein the quick validate pertains to the one or more computing devices (112) scanning and validating one or more interactive objects mentioned in an active configuration from an active screen displaying the unique code to authenticate the user proximity by the one or more computing devices (112),
wherein the instruction driven validate pertains to providing the one or more instruction to the one or more computing devices (112) to reconfirm the user proximity authenticated by the unique code.
| # | Name | Date |
|---|---|---|
| 1 | 202441028011-STATEMENT OF UNDERTAKING (FORM 3) [04-04-2024(online)].pdf | 2024-04-04 |
| 2 | 202441028011-POWER OF AUTHORITY [04-04-2024(online)].pdf | 2024-04-04 |
| 3 | 202441028011-FORM FOR STARTUP [04-04-2024(online)].pdf | 2024-04-04 |
| 4 | 202441028011-FORM FOR SMALL ENTITY(FORM-28) [04-04-2024(online)].pdf | 2024-04-04 |
| 5 | 202441028011-FORM 1 [04-04-2024(online)].pdf | 2024-04-04 |
| 6 | 202441028011-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [04-04-2024(online)].pdf | 2024-04-04 |
| 7 | 202441028011-EVIDENCE FOR REGISTRATION UNDER SSI [04-04-2024(online)].pdf | 2024-04-04 |
| 8 | 202441028011-DRAWINGS [04-04-2024(online)].pdf | 2024-04-04 |
| 9 | 202441028011-DECLARATION OF INVENTORSHIP (FORM 5) [04-04-2024(online)].pdf | 2024-04-04 |
| 10 | 202441028011-COMPLETE SPECIFICATION [04-04-2024(online)].pdf | 2024-04-04 |
| 11 | 202441028011-Power of Attorney [01-07-2025(online)].pdf | 2025-07-01 |
| 12 | 202441028011-Covering Letter [01-07-2025(online)].pdf | 2025-07-01 |