CROSS-REFERENCE TO RELATED APPLICATIONS- The present application claims the benefit of U.S. Provisional App. No. 60/880,772, filed Jan. 16, 2007, which is hereby incorporated by reference in its entirety for all purposes. 
FIELD OF THE INVENTION- The present invention relates generally to systems and methods for electronic gifting. In particular, exemplary embodiments of the invention relate to systems and methods for authenticating a gift recipient. 
BACKGROUND OF THE INVENTION- It is known in the art to use gift cards for an increasing variety of events in which gifts are normally exchanged and for an increasing variety of products and services. For the recipient of gift cards, keeping track of the cards and tracking the balance of the stored value associated therewith has been arduous. For the retailer, issues such as fraud and security management have inhibited the success of gift cards. Moreover, as gift card sales increase and more consumers become anonymous, retailers are losing the ability to target the marketing at their real customers, e.g., recipients of gift cards. This may hinder merchants who might otherwise benefit from the tendency of gift card recipients to spend more money in the store than that which was loaded on the gift card. Additional problem issues include unused gift cards and breakage of gift cards. Although it is known in the art to utilize electronic gifting to manage the stored value conventionally associated with tangible gift cards, fraud, security management, marketing, and other issues remain of concern. What is needed in the art are systems and methods for electronic gifting. that overcome the disadvantages and shortcomings of the prior art. 
SUMMARY OF THE INVENTION- The present invention overcomes the disadvantages and shortcomings of the prior art by providing a control system for the gifting of an electronic gift certificate. In an exemplary gift purchasing method of the present invention, a control system receives a gift purchase request from a purchaser, including a payment amount, payment information associated with the purchaser, the identity of a vendor, and a mobile telephone number (or other unique telephonic identifier) associated with a wireless gift recipient system, e.g., the cell phone of a gift recipient. The gift purchase request can include information, such as a purchaser name, and recipient information, such as a name of the gift recipient. The control system sends to a payment authorization system a payment authorization request, including the payment information, payment amount, and a service fee amount, and the control system receives a payment authorization from the payment authorization system and adds the payment amount to a gift account balance. The control system notifies the wireless gift recipient system of the electronic gift certificate, preferably by sending a text message addressed to the wireless gift recipient system. 
- In the exemplary gift redemption method of the present invention, the control system receives a gift redemption request from a point-of-sale (POS) system associated with the vendor of the gift purchase request, whereby the gift redemption request includes a redemption amount and the mobile telephone number (or other unique telephonic identifier) of the gift recipient. The control system identifies whether the gift account balance associated with the mobile telephone number has stored value exceeding that of the redemption amount, and, if so, sends an authentication request to the wireless carrier system that is addressed to the wireless gift recipient system. The authentication request is preferably in an electronic messaging format, such as the short-messaging-service (SMS) format, though it is contemplated that an interactive voice response (IVR) system can be used to implement authentication. If the control system receives from the wireless carrier system, for example, an authentication confirmation originating from the wireless gift recipient system, the control system sends a redemption authorization to the vendor POS system. 
- Additional features, functions and benefits of the disclosed systems and methods will be apparent from the detailed description which follows, particularly when read in conjunction with the accompanying figures corresponding thereto. For example, is shall be apparent that the present invention, in some embodiments thereof, can be provided as at least one computer readable medium collectively storing a program, which, when executed by a computer system, causes the computer system to perform a method. 
BRIEF DESCRIPTION OF THE DRAWINGS- For a more complete understanding of the present invention, reference is made to the following detailed description of exemplary embodiment(s) considered in conjunction with the accompanying drawings, in which: 
- FIG. 1 is a network diagram showing a communications network that includes a purchasing system, a plurality of vendor point of safe (POS) systems, a payment authorization system, a wireless carrier system, a wireless gift recipient system, and a control system having a Web server, an application server, a database server, a middleware server, and an IVR system; 
- FIG. 2 is a flow chart showing a method for purchasing an electronic gift certificate; 
- FIG. 3 is a flow chart showing a method for redeeming the electronic gift certificate ofFIG. 2; 
- FIG. 4 is a flow chart showing a method for administering the control system ofFIG. 1; 
- FIG. 5 is a diagram showing an inherency tree for administering rights for the control system ofFIG. 1; 
- FIG. 6 is a flow chart showing a method for managing a marketing campaign that includes the sending of marketing content to the wireless gift recipient system ofFIG. 1; and 
- FIG. 7 is a flow chart showing a method for receiving a response to the marketing content ofFIG. 6 from the wireless gift recipient system ofFIG. 1. 
DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS- Referring toFIG. 1, acommunications network10 is shown to include acontrol system12 constructed in accordance with an exemplary embodiment of the present invention. Thecommunications network10 further includes apurchasing system14, apayment authorization system16, a plurality of vendor point of safe (POS)systems18a,18b,18c, awireless carrier system20, and a wirelessgift recipient system22. Each of thecontrol system12, thepurchasing system14, thepayment authorization system16, thevendor POS systems18a,18b,18c, thewireless carrier system20, and the wirelessgift recipient system22 shall be discussed below in detail. 
- Thepurchasing system14 preferably includes a personal computer system in communication with thecontrol system12 via a wired and/or wireless network, such as the Internet. As will be discussed in further detail below, a consumer, e.g., a purchaser, who desires to purchase an electronic gift certificate, e.g., stored value, for a gift recipient can do so by interfacing with thepurchasing system14 to send a gift purchase request to thecontrol system12. The gift purchase request includes, for example, a mobile telephone number associated with the gift recipient, a gift payment amount, purchaser information, and payment information associated with the purchaser, e.g., a credit card number, etc. Though discussion is had herein of a “mobile telephone number,” it shall be understood that the purchase request can include any unique telephonic identifier, such as a mobile telephone number, etc., suitable for identifying a wirelessgift recipient system22 or other device having telephonic capabilities. 
- Thepurchasing system14 includes a network interface device, a permanent and/or temporary memory device, a display device, at least one user input device, and an electronic processing device. Thepurchasing system14 preferably has resident thereon Microsoft Windows (and/or another operating system), a Web browser, such as Microsoft Internet Explorer, and other software suitable for implementing the methods described herein. 
- It is contemplated that thepurchasing system14 can include any device type for interfacing with thecontrol system12. For example, it is contemplated that thepurchasing system14 can include a portable communications device that communicates with thecontrol system12 via a protocol corresponding with the device, such as the wireless access protocol (WAP). It shall be clear to one skilled in the art that thecommunications network10 preferably includes more than onepurchasing system14, and that the purchasing systems can have heterogeneous and/or homogeneous communication protocols. 
- It is also contemplated that thepurchasing system14 can be a kiosk positioned in a physical facility, such as a retail store and/or hospitality provider associated with one of thevendor POS systems18a,18b,18c, etc. Thepurchasing system14 can include a customer service computer workstation, such that the purchaser can call or otherwise communicate with a customer service operator, who will then input information into thepurchasing system14 for the gift purchase request 
- Continuing with reference toFIG. 1, thecontrol system12 includes aWeb server24, anapplication server26, adatabase server28, and amiddleware server30. Theservers24,26,28,30 each have at least one network interface device, temporary and/or permanent memory devices, an electronic processing device, and other hardware suitable for performing the methods discussed herein. Although it is contemplated that each of theservers24,26,28,30 includes a three gigahertz processor and two gigabytes of random access memory, thecontrol system12 is scalable, and theservers24,26,28,30 can have any hardware suitable for implementing the methods described herein. Moreover, any suitable number of servers can n be utilized to implement the methods herein described. Each one of theservers24,26,28,30 preferably has the Microsoft Windows 2003 operating system and/or another suitable operating system resident thereon. Software modules are resident on theservers24,26,28,30 for enabling performance of the methods discussed herein, though it is contemplated that theservers24,26,28,30 can be hard-wired with suitable logic. In some embodiments of the invention, thecontrol system12 can include anIVR system21, which is discussed with further detail below. 
- Thedatabase server28 preferably utilizes structured query language (SQL). Thedatabase server28 can be queried by theapplication server26 and has a data store resident thereon that stores data and relationships therebetween. For example, the data store includes the payment amount, the payment information, the identity of the vendor, purchaser, and gift recipient associated with a purchase, the mobile telephone number associated with the wirelessgift recipient system22, the redemption amount, status of authorizations, status of authentications, etc. It is contemplated that thedatabase server28 can include a stored data map for mapping data elements between thecontrol system12 and thevendor POS systems18a,18b,18c. For example, the data map can define data internal to thecontrol system12 to correspond with data acquired at one or more of thePOS systems18a,18b,18c, such as item SKU number, the price of such item, a description of such item, etc. 
- TheWeb server24 is in communication with thepurchasing system14 and hosts a secure Web portal, whereby the purchaser can provide at least part of the gift purchase request. The portal is accessible over the Internet as a Web portal and/or over a mobile network, such as a WAP portal. The portal(s) are preferably database/template driven and appear with the identity of a vendor and/or merchant associated therewith. A uniform resource locator (URL) attribute determines that vendor which is to be displayed in connection with portal. In some embodiments of the invention, theWeb server24 and portal hosts web services that are provided by the vendor, such as by a vendor server (not shown) and Web site thereof. It is contemplated that the vendor, e.g., vendor server, can host an interface to the user and control the user's interaction with the vendor-driven Web portal. In some embodiments, the vendor's server can host the secure Web portal for the purchaser and would communicate with the Web Server,24, using a set of XML based web services. 
- Theapplication server26 has resident thereon a credit card processing module in communication with thepayment authorization system16 for facilitating authentication of the payment information. In exemplary embodiments, theapplication server26 is in communication with thedatabase server28 for storing, retrieving, and associating information. Theapplication server26 preferably incorporates a Microsoft .NET based application that provides the business logic for implementing the methods herein described. The application server is preferably in communication with themiddleware server30, e.g., a Microsoft BizTalk server, for managing communications between theapplication server26 and heterogeneousvendor POS systems18a,18b. It is contemplated that theapplication server26 can have one or more dedicated communications adapter(s) for communications with a vendor POS system, e.g., the thirdvendor POS system18cofFIG. 1, without the aid of themiddleware server30. Thus, while amiddleware server30 is shown inFIG. 1, it shall be understand that themiddleware server30 is not required. Moreover, in embodiments of the invention that include the middleware server, it shall be understood that it is not required for themiddleware server30 to have Microsoft BizTalk resident thereon. 
- Theapplication server26 preferably has modules resident thereon for short message service (SMS) and/or multimedia messaging service (MMS) wireless messaging with thewireless carrier system20. Also, it is contemplated that theapplication server26 can include location adapter modules, which, in cooperation with thecarrier system20, utilize a global positioning system (GPS) to identify the location of the gift recipient (for example, to facilitate sending thegift recipient system22 an electronic coupon for a store when thegift recipient system22 is physically proximate to such store). The SMS, MMS, and location adapter modules are preferably distributed for resilience and to facilitate scalability. In some embodiments of the invention, it is contemplated that theapplication server26 has modules resident thereon for communicating with theIVR system21, which is discussed with further detail below. 
- Themiddleware server30 preferably has Microsoft BizTalk resident thereon. Themiddleware server30 is preferably the communication channel between theapplication server26 and heterogeneousvendor POS systems18a,18b(and/or enterprise systems). 
- Theapplication server26 has point-of-sale (POS) communication modules stored thereon for communicating with thevendor POS system18cvia the dedicated adapter and with thevendor POS systems18a,18bvia themiddleware server30. Theapplication server26 preferably includes a middleware adapter for communicating with themiddleware server30 using a version of Extensible Markup Language (XML) formatted for compatibility with themiddleware server30. It is contemplated that the POS communication modules can be distributed across a plurality of servers for scalability and resilience. The POS communications modules emulate a point-of-sale vendor system and provide at least a portion of the business logic for balance inquiries, credit card authorizations, receiving redemption requests, and sending redemption authorizations. 
- It is contemplated that thecontrol system12 can include anIVR system21 for interfacing between theapplication server26 and thecarrier system20 to implement authentication by IVR. Suitable IVR systems are known in the art and include, for example, a network interface device, a permanent and/or temporary memory device, an electronic processing device, etc. It is preferred that theIVR system21 include a server with an application programming interface (API) resident thereon for secure communications with theapplication server26 over the Internet and with thecarrier system20 over the Internet. TheIVR system21 is configured for communications with the wirelessgift recipient system22 via thecarrier system22. TheIVR system21 can have resident thereon publicly available IVR software, such as that offered under the general public license by “Asterisk” and/or commercially available IVR systems from manufacturers such as Nortel, Avaya, Genesis, and/or Cisco, for example. 
- It is contemplated that theIVR system21 can be included as part of thewireless carrier system20, theapplication server26 itself, one of thevendor POS systems18a,18b,18c, and/or as part of another system. As further discussed below, it is contemplated that a vendor can select IVR in addition to or as an alternative to text messaging, etc. as the vehicle for authentication, and the vendor may, for business reasons, be empowered by the entity operating thecontrol system12 to provide the specifications for theIVR system21. For example, theapplication server26 can be configured such that, to authenticate a gift purchaser, theapplication server26 sends a message to theIVR system21 addressed for the wirelessgift recipient system22 to establish a voice call, and the gift recipient is asked by an automated voice to authenticate and/or deny by pressing keys on the wireless gift recipient system. 
- Continuing with reference toFIG. 1, each of thevendor POS systems18a,18bpreferably includes a middleware adapter, e.g., a BizTalk adapter, to facilitate communications with themiddleware server30, e.g., a BizTalk server. In this regard, themiddleware server30 and adapters therefor enable thecontrol system12 to communicate with heterogeneousvendor POS systems18a,18b, such as where the firstvendor POS system18aoperates on a platform different from that of the secondvendor POS system18b. As shown InFIG. 1, it is contemplated that theapplication server26 can have software resident thereon and/or hardware for direct communications with a vendor POS system, such as thevendor POS system18c. 
- Suitable vendor POS systems are known in the art and can include a plurality of terminals on a network, where each terminal includes a network interface device, a permanent and/or temporary memory device, an electronic processing device, a display device, and at least one user input device, such as a keyboard, a scanner, a pin pad (a keypad configured to receive a personal identification number), a magnetic credit card swipe, etc. As will be discussed further below with reference toFIG. 3, thePOS systems18a,18b,18care configured to have inputted therein a gift redemption request. Thevendor POS systems18a,18b,18care also configured to receive a gift redemption authorization from theapplication server26. 
- Thepayment authorization system16 communicates with theapplication server26, which sends the payment information and the payment amount to thepayment authorization system16. Suitable payment authorization systems are known in the art and can include, for example, a network interface device, a permanent and/or temporary memory device, and an electronic processing device. It is preferred that thepayment authorization system16 include a server with a API resident thereon for secure communications with theapplication server26 over the Internet. In an exemplary embodiment of the invention, the payment authorization system is operated by a third party that manages credit cards, bank accounts, and/or other electronic accounts having stored value. 
- Continuing with reference toFIG. 1, thewireless carrier system20 is preferably a mobile telephone wireless carrier system configured for telephone data communications, such as text messages, and includes an SMS network for communicating messages in the SMS and/or MMS format. Suitable wireless carrier systems are known in the art and include, for example, a network interface device, a permanent and/or temporary memory device, an electronic processing device, and wireless communications hardware, e.g., towers, etc. It is preferred that thewireless carrier system20 include a server with an API resident thereon for secure communications with theapplication server26 over the Internet. It is contemplated that thecarrier system20 is configured to utilize GPS and/or other location-based technology to identify the geographic location of agift recipient system22 and communicate such location via the API to thecontrol system12 for processing in accordance with methods for advertising, such as when thecontrol system12 sends a coupon to thegift recipient system22, wherein the coupon corresponds to a vendor having a physical store to which thegift recipient system22 is physically proximate to. 
- The wirelessgift recipient system22 is preferably a portable communications device, e.g., a cellular telephone, a personal digital assistant (PDA), etc. The components of the wirelessgift recipient system22, such as a cellular telephone, are well known in the art. It is preferable for the wirelessgift recipient system22 to include keys, a display, an electronic processor, and a graphical user interface (GUI) for displaying text and graphics and for facilitating input from the gift recipient. The wirelessgift recipient system22 is in communication with thewireless carrier system20 and is preferably configured for telephone data communications, such as text messages, including those in the SMS format and/or MMS format. Thewireless carrier system20 and the wirelessgift recipient system22 can be configured to communicate in SMS, MMS, and/or any other suitable telephonic messaging format, e.g., a messaging service that is compatible at least with wireless cell phones. It is contemplated that the wirelessgift recipient system22 can include hardware suitable for identifying the geographic location of the wirelessgift recipient system22. 
- With reference toFIGS. 2 and 3, an exemplary purchasing method and an exemplary redemption method shall be described with further detail. Briefly, in the exemplary purchasing method, thecontrol system12 receives a gift purchase request from thepurchasing system14, sends a payment authorization request to thepayment authorization system16, receives a payment authorization from thepayment authorization system16, adds stored value to a new or existing gift account, and sends to the wireless carrier system20 a text message addressed to the wirelessgift recipient system22. Briefly, in the exemplary redemption method, thecontrol system12 receives a gift redemption request from a corresponding one of thevendor POS systems18a,18b,18cevaluates the gift account balance to confirm sufficient stored value, messages, for example, notice of the gift redemption request to the wirelessgift recipient system22 via thewireless carrier system20, receives an authentication confirmation from the wirelessgift recipient system22 via thewireless carrier system20, decrements stored value from the gift account balance, and sends a redemption authorization to corresponding one of thevendor POS systems18a,18b,18c 
- Continuing with reference toFIG. 2, exemplary purchaser-side methods shall now be described with further detail. Instep32, the purchaser uses thepurchasing system14 to connect to a Web portal (or WAP portal) hosted by theWeb server24. The Web portal is driven by the template, vendor content, and other information stored in thedatabase server28. As indicated above, it is also contemplated that the vendor, e.g., a vendor server (not shown), hosts the web presence and communicates to thecontrol system12, e.g., theapplication server26, via a set of web services hosted by theWeb server24 of thecontrol system12. 
- Theapplication server26 creates the Web portal from a template suitable for implementing the methods described herein, and an instance of the template can be populated for each vendor, such that the Web portal appears to the purchaser as being branded by the vendor and customized by the vendor. Thecontrol system12 is scalable to perform the methods described herein for a plurality of heterogeneous vendors, e.g., a vendor that sells footwear, a vendor that sells musical equipment, etc. The vendor-specific Web portal is displayed dynamically based on the template and information stored in thedatabase server28. From such vendor-specific Web portal, electronic gift certificates can be purchased for that vendor, the balance of gift accounts associated therewith can be checked, parties can enroll in vendor specific loyally programs, and the points/dollar balances associated with the loyalty programs can be reviewed. 
- The uniform resource locator (URL) of the Web portal includes a vendor identification portion. The Web portal utilizes dynamic linking, such that the vendor identification portion includes a reference pointer to the vendor content populating the corresponding instance of the template. In the event that the reference pointer to the vendor content is omitted from the URL, the purchaser will be directed to a generic Web page associated with the party operating thecontrol system12, wherein the purchaser can purchase electronic gift certificates for any of the vendors having an association with thecontrol system12. 
- Instep32, the purchaser is provided with the option of buying an electronic gift certificate associated with the vendor, viewing and/or modifying an existing account associated with the purchaser, contacting the party managing thecontrol system12, following a link to a corporate Web site associated with the party managing thecontrol system12, etc. If the purchaser selects the option to buy an electronic gift certificate, then thepurchasing method34 proceeds atstep36. 
- Instep36 of thepurchasing method34, the purchaser uses thepurchasing system14 to indicate whether the purchaser had previously set-up a purchaser account with thecontrol system12. If the purchaser had not previously created a purchaser account, the purchaser can input purchaser information such as the purchaser name, purchaser billing address, purchaser correspondence address, purchaser e-mail, etc. The purchaser provides information for the gift purchase request, which preferably includes the payment information (e.g., a purchaser credit card company, credit card number, security code, etc.), the name of the gift recipient, the gift payment amount, e.g., 100.00 U.S. Dollars, 10,000 Yen, etc. The gift purchase request preferably also includes the identity of the vendor associated therewith. The purchaser information and the gift purchase request are stored in thedatabase server28, the purchaser is provided with login information for future access, e.g., a user name and password, and thepurchasing method38 proceeds fromstep36 to step42. 
- Instep36, if there is already a purchaser account set-up with thecontrol system12, the purchaser inputs login information at thepurchasing system14 for communication to theWeb server24, and thepurchasing method34 proceeds to step38. Instep38, the login information is provided to theapplication server26, which queries thedatabase server28 to check for the purchaser, e.g., to authenticate the purchaser and retrieve the purchaser information. Instep38, the purchaser is provided with an opportunity to update the purchaser information. After purchaser authentication, thepurchasing method34 proceeds fromstep38 to step40, wherein the purchaser provides information for the gift purchase request, e.g., payment information, gift payment amount, name of the gift recipient, etc. Thepurchasing method34 proceeds fromstep40 to step42. 
- Instep42, theapplication server26 queries thedatabase server28 to identify if the gift recipient is new, and, if so, have the purchaser provide the mobile telephone number of the gift recipient for storage in thedatabase server28. If the mobile telephone number of the gift recipient had been provided in a previous transaction, the mobile telephone number is retrieved from thedatabase server28, and the purchaser is provided with the opportunity to update the mobile telephone number. It is contemplated that the purchaser can utilize thepurchasing system14 instep42 to customize the text and images for the text message to be provided to the wirelessgift recipient system22. Updates to the purchaser information, payment information, etc. are stored in thedatabase server28 and thepurchasing method34 proceeds fromstep42 to step44. 
- Instep44, theapplication server26 communicates with thepayment authorization system16 via an API to authenticate the purchaser and obtain payment authorization for the gift amount and one or more service fees charged by the entity (e.g., company) managing thecontrol system12. In some embodiments of the invention, instep44, theapplication server26 opens a check with a corresponding one of thevendor POS systems18a,18b,18c, such that the corresponding one of thevendor POS system18a,18b,18ccan clear and authenticate payment using its payment authorization systems in place and maintain its own record of the gift purchase request. 
- If the payment authorization system16 (or corresponding one of thevendor POS system18a,18b,18c) does not authenticate the purchaser and/or does not authorize payment, theapplication server26 receives one or more error message, which may be logged in thedatabase server28 and sent to theWeb server24 for communication to thepurchasing system14. If the payment authorization system16 (or corresponding one of thevendor POS systems18a,18b,18c) authenticates the purchaser and authorizes payment, theapplication server26 receives such authentication and authorization and notes same in thedatabase server28. 
- Thepurchasing method34 proceeds fromstep44 to step46, where theapplication server26 sends notice of the electronic gift certificate to the gift recipient. Although it is contemplated that such notice can be provided by any suitable method known in the art, it is preferred that such notice be provided by way of a text message in the SMS format or another messaging format, e.g., MMS, etc. In the case of an SMS message, the SMS messaging adapter of theapplication server26 sends such notice over the network via an API to thewireless carrier system20 corresponding to the mobile telephone number. Such notice includes, for example, the gift amount, the identity of the vendor, the identity of the purchaser, and potentially an advertisement for the entity managing the control system, e.g., a corporate name, logo, etc. In the case of an SMS message, for example, such notice may be included in the body of the message, while the header of the message might include the mobile telephone number and/or a reference pointer associated with the mobile telephone number. Thepurchasing method34 proceeds fromstep46 to step48, wherein confirmation of purchase is communicated to thepurchasing system14 via theWeb server24. In the exemplary embodiment, the purchaser is then directed to a Web site operated by the vendor associated with the gift purchase request. 
- In some exemplary embodiments of the present invention, the vendor secures redemption of the electronic gift certificate using a personal identification number (PIN). In such circumstances, the notice of the electronic gift certificate includes instructions to the gift recipient for creating a PIN with the vendor. It is contemplated that such PIN can be created using a text message, a secure WAP portal, a Web portal, calling a customer service center, etc. 
- Continuing with reference toFIG. 2, it is noted that exemplary embodiments provide the user with additional functionality at the Web portal. For example, instep32, the user can click on a link entitled “My Account” to access the purchaser information stored on thedatabase server28. To do so, the purchaser provides login information instep50, and, instep52, thedatabase server28 is queried. Instep52, the purchaser can preferably also view and modify purchaser information. The purchaser can also view purchasing history, which may include a purchase of a first electronic gift certificate that is redeemable with the firstvendor POS system18a, a second gift certificate that is redeemable with the secondvendor POS system18b, etc. 
- As another example, instep32, the purchaser clicks on a link, entitled “Contact Us.” In this regard, the purchaser is presented with a Web page instep56, with contact information for the entity managing thecontrol system12, such as its telephone number, e-mail address, and/or contact information for the specific vendor associated with the electronic gift certificate purchased. As yet another example, instep32, the purchaser clicks on a link, and, instep58, the purchaser is presented with a corporate Web site that is for the entity managing the control system and that includes corporate information, partnering information for vendors, etc. 
- Referring toFIG. 3, an exemplarygift redemption method60 shall. now be described with further detail. A gift recipient associated with the wirelessgift recipient system22 shops for goods and/or services in a physical store of the vendor associated with the gift purchase request, e.g., a physical store associated the firstvendor POS system18a. The recipient selects good/services for purchase and has information concerning same entered by a store clerk at the register into the correspondingvendor POS system18aby suitable means known in the art, such as a scanner, a keyboard, etc. The gift recipient indicates to the store clerk that the gift recipient had previously received an electronic gift certificate, and provides the store clerk with the mobile telephone number associated with the wirelessgift recipient system22. The store clerk then opens a session between the firstvendor POS system18aand thecontrol system12 to provide thecontrol system12 with a gift redemption request that includes the mobile telephone number, the redemption amount, etc. In some embodiments of the invention, the gift recipient enters the mobile telephone number directly into the pin pad of a terminal on thevendor POS system18a. In embodiments of the invention where the gift recipient had created a secure PIN with the vendor, the store clerk will collect the PIN from the gift recipient via the pin pad of the firstvendor POS system18aand include the secure PIN in the gift redemption request. 
- It is contemplated that theexemplary redemption method60 discussed above can be used in connection with an e-commerce Web site of an online merchant. For example, a gift recipient can select goods/services to purchase from a Web site of the merchant by entering items into a virtual shopping cart. The gift recipient “checks out” by selecting a payment option corresponding to thecontrol system12. The Web site of the online merchant is hosted by a server, which communicates with thecontrol system12 over the Internet. In connection with the gift recipient's entry of information for the purchase, e.g., the redemption amount, the shipping address, etc., the gift recipient is prompted to enter the mobile telephone number of the wirelessgift recipient system22. In this regard, the mobile telephone number and redemption amount can be passed from the hosting server of the online merchant to thecontrol system12. 
- Continuing with reference toFIG. 3, instep62 of theexemplary redemption method60, thecontrol system12 receives the redemption request, which is associated with the vendor of the firstvendor POS system18a, and which includes the mobile telephone number, the redemption amount, etc. In the case of thevendor POS system18a, themiddleware server30 receives the redemption request and, to any extent necessary, translates the redemption request into a protocol and/or language compatible with theapplication server26. As indicated above, however, it is contemplated that thevendor POS system18ccan communicate with a dedicated POS adapter of theapplication server26. Theapplication server26 checks for communications error, and, if errors are found, logs same in thedatabase server28 instep64. If errors are not found and/or are reconciled, theredemption method60 proceeds to step66. 
- Instep66, theapplication server26 queries thedatabase server28 with the mobile telephone number to confirm that thedatabase server28 has resident thereon a stored association between the mobile telephone number and a wirelessgift recipient system22. Also, theapplication server26 queries thedatabase server28 to confirm whether the gift account associated with the mobile telephone number has stored value equal to or exceeding that of the redemption amount. If there are insufficient funds, e.g., the redemption amount exceeds the stored value, then, instep68, thecontrol system12 logs an error, sends a redemption denial to the firstvendor POS system18a, and proceeds to step62 to receive another potential redemption authorization request. If the redemption amount is equal to or less than the stoned value, then the redemption method proceeds to step70. In some embodiments of the invention, should the redemption amount exceed the stored value, it is contemplated that the redemption method would also proceed to step70, enabling the gift recipient to apply the stored value as partial payment for the goods/services, such that the gift recipient can make payment to the vendor by other means, e.g., cash, credit card, etc, for the remaining payment balance for the goods/services. 
- Instep70, thecontrol system12 identifies whether the gift recipient is to be authenticated using the secure PIN, IVR, and/or using a text message, such as an SMS and/or MMS message. If it is identified that authentication is to be implemented by messaging, the redemption method proceeds to step72 fromstep70, which is further discussed below. 
- Instep70, if it is identified that authentication is to be implemented by the secure PIN, the redemption method proceeds to step74 fromstep70. Instep74, theapplication server26 generates a PIN request to thevendor POS system18a. Thevendor POS system18ain turn obtains user input of the PIN on the pin pad and sends same to thecontrol system12. Theredemption method60 proceeds fromstep74 to step76, which is discussed below after further discussion ofstep72. 
- Instep70, if it is identified that authentication is to be implemented by IVR, theapplication server26 generates a PIN request to thevendor POS system18a. Thevendor POS system18ain turn obtains user input of the PIN on the pin pad and sends same to thecontrol system12. Theapplication server26 sends a message to theIVR system21 to establish a voice call to the gift recipient's stored mobile phone number and prompt the gift recipient with a spoken message to depress a particular key on the wirelessgift recipient system22 to provide an authentication confirmation and/or authentication failure, e.g., to approve the transaction or depress a different key to deny the transaction. Theredemption method60 proceeds fromstep70 to step76, which is discussed below after further discussion ofstep72. 
- Instep72, where it has been determined that authentication is to be implemented by messaging, theapplication server26 generates an authentication request that is addressed to the wirelessgift recipient system22, preferably in an SMS format, MMS format, etc. The authentication request preferably includes a message header designating the mobile telephone number and a message body including content, such as the redemption amount, identifying indicia of the first vendor, and identifying indicia of the entity, e.g., company, owning thecontrol system12. Thecontrol system12 sends the authentication request to thewireless carrier system20, such as one operated by T-Mobile, AT&T, etc. More particularly, thewireless carrier system20 has an API addressable over a network, such as the Internet, and the authorization request is passed to the API. It is contemplated that thecontrol system12 can be compatible with multiple wireless carrier systems. 
- The gift recipient receives the SMS/MMS message at the wirelessgift recipient system22, where the content of the message is shown in the display thereof. The gift recipient authenticates herself by replying to the SMS/MMS message with an authentication confirmation. In some embodiments, the gift recipient may select between an approval and a denial, whereby a reply including approval would constitute authentication confirmation and a reply including denial would constitute an authentication failure. The authentication confirmation and/or authentication failure is sent from the wirelessgift recipient system22 to theapplication server26 via thewireless carrier system20, and theredemption method60 proceeds fromstep72 to step76. 
- Instep76, theapplication server26 determines if it has received an authentication confirmation. If theapplication server26 identifies an authentication confirmation, then theredemption method60 proceeds fromstep76 to step78, wherein the stored value of the gift account is debited by the gift redemption amount. Instep78, theapplication server26 sends a redemption authorization addressed for the firstvendor POS system18ato themiddleware server30 for communications with the firstvendor POS system18a. The store clerk, after receiving the redemption authorization at the firstvendor POS system18a, provides the good/services to the gift recipient. 
- If, instep76, theapplication server26 identifies an authentication failure, then theredemption method60 proceeds to step80, wherein theapplication server26 identifies how many attempts at authentication have been attempted. If the number of attempts has not exceeded a predetermined number (N) of attempts, then theredemption method60 proceeds fromstep80 to step70 discussed above. If the number of attempts has exceeded the predetermined number (N) of attempts, then theredemption method60 proceeds fromstep80 to step82, wherein theapplication server26 logs the authentication failure in thedatabase server28, sends an error to the firstvendor POS system18a, and returns to step62. 
- Referring toFIG. 4, a method of administering thecontrol system12 is shown. Instep84, a control system administrator can access an administrative area of the Web portal or another address to configure thecontrol system12, view and print reports concerning data gathered by thecontrol system12, control rights and security management of thecontrol system12, and administer a marketing method, which is discussed below with reference toFIG. 6. 
- Referring to step84 ofFIG. 4, the control system administrator selects to configure the control system, and the administration method proceeds to step86. Instep86, the control system administrator can select to modify the look and feel of the Web portal. In such circumstances, the administration method proceeds to step88, wherein the control system administrator can modify color, graphics, text, and other attributes of the Web portal template, vendor content therefor, and the SMS/MMS message to be displayed by the wirelessgift recipient system22. 
- If, instep86, the control system administrator selects to configure attributes related to the POS system, such as field mapping and security, then the administration method proceeds to step90, wherein such configuration can be implemented. Instep90, the control system administrator configures settings for communications with thevendor POS systems18a,18b,18c. Such setting include, for example, whether themiddleware server30 or dedicated POS adapter of theapplication server26 are to be used in connection with a particular one of thevendor POS systems18a,18b,18cand any sub-address for themiddleware server30. Such settings further include security settings, if any, for secure communications with thevendor POS systems18a,18b,18cand for field mapping and transposing data elements of thevendor POS systems18a,18b,18cto corresponding data elements stored in the database server28 (and vice versa). 
- If, instep86, the control system administrator selects to configure the business logic of thecontrol system12, then the administration method proceeds to step92, wherein such configuration can be implemented. Instep92, the control system administrator configures business rules specific to a vendor's business, including authentication method (e.g., PIN, IVR, text message, etc.), payment authorization method (e.g., from the application server, from the vendor POS system, etc.), and other vendor configuration specific attributes. 
- If, instep84, the control system administrator selects to modify rights access to the control system, the administration method proceeds fromstep84 to step94. Instep94, the control system administrator can add administrators, delete administrators, and modify the existing rights of the existing administrators. 
- Referring toFIG. 5, an exemplary inherency tree is shown for administering rights for thecontrol system12. The control system administrator, having both read and write access to thecontrol system12, may grant certain read access to control system accounts receivable personnel for identifying billing information, such as the service fees authorized by thepayment authorization system16. As another example, the control system administrator can grant read/write access to an administrator for the first vendor, such that the vendor can modify the vendor content filling the template and read the accounts payable to the vendor. Similarly, rights can be granted to a second vendor administrator, a third vendor administrator, etc. The first vendor administrator, for example, can allocate the rights granted to the first vendor administrator to various personnel within the first vendor, such as first vendor accounts payable personnel and/or a low-level first vendor'technical administrator. 
- Continuing with reference toFIG. 4, if, instep84, the control system administrator selects to manage reporting features, the administration method proceeds to step98. Instep98, the control system administrator views and prints customized reports, which are preferably statistical in nature. For example, for text messages, both the delivery and any response thereto had been recorded on a user-by-user basis, and the control system administrator can sort reports based on same. As another example, in the context of e-mail authentication, both an opened e-mail (using a hidden html call) and any response are recorded. 
- It is contemplated that the control system administrator can view and print reports showing attributes relating to, for example, the purchase of electronic gift certificates, the redemption of electronic gift certificates, etc. Custom reports can be generated. Reports can also be created based on the purchaser's name, the cell number thereof, purchase date, vendor, payment amount, recipient's name, the mobile telephone number thereof, redemption date, transaction type (in-store and/or online), transaction amount, sku number and price of items in a transaction/order, etc. 
- Also, it is contemplated that the control system administrator can view and print reports showing attributes relating to themarketing method96 discussed below with reference toFIG. 6. Themarketing method96 is implemented when, instep84 ofFIG. 4, the control system administrator selects to do so. 
- Referring toFIG. 6, themarketing method96 enables the control system administrator to create marketing campaigns, view active marketing campaigns, delete campaigns, and view and print sorted reports concerning campaigns. In exemplary embodiments of the invention, a marketing campaign is targeted advertisement for selected purchasers and/or gift recipients, in which marketing content is communicated to the purchasers and/or gift recipients during a period of time. 
- For example, instep102 ofFIG. 6, the control system administrator chooses to create a new marketing campaign using a campaign “wizard,” and themarketing method96 proceeds to step104. Instep104, theapplication server26 receives inputs from the control system administrator that include the name of the marketing campaign, the marketing content (e.g., text, graphics, a WAP link, etc.), the mobile telephone numbers of those gift recipients to receive the marketing content, the begin date (or “drop date”) of the marketing campaign, and the end date of the marketing campaign. It is contemplated that the mobile telephone numbers can be those selected from thedatabase server26 that satisfy selected attributes, e.g., all gift recipients associated with a vendor who sells shoes, all gift recipients associated with a certain geographic area, etc. After the marketing campaign has been created, themarketing method96 proceeds to step106, wherein the marketing campaign is stored in thedatabase server28. Themarketing method96 ofFIG. 6 includes additional steps that shall be further discussed below. 
- Referring toFIG. 7, theapplication server26 has stored thereon a listener, referenced herein acampaign scheduler108, which, instep110, continuously polls thedatabase server28 to identify when a marketing campaign is scheduled to start. When the begin date for a marketing date arrives, thecampaign scheduler108, instep112, sends the marketing content of the marketing campaign to the gift recipient systems via SMS/MMS format and/or to the purchasing systems via e-mail. 
- The method proceeds fromstep112 to step114. Instep114, the messages are opened and a delivery-confirming signal is generated and received by thecontrol system12. Instep114, the user may be presented with the WAP link. Fromstep114, the method proceeds to step116, wherein a marketing engine receives delivery indication, and, instep118, the confirmation of delivery is stored in thedatabase server28. Also fromstep114, the method proceeds to step120, such that the user selectively follows the WAP link. The method proceeds fromstep120 to step122, wherein confirmation of the selection (e.g., dick-thru) is sent to thecontrol system12 for storage in thedatabase server28, and wherein the user is redirected to a predetermined link. Thecampaign scheduler108 preferably processes the information obtained from opened messages, message replies (e.g., click-thru's), and any unsubscribe requests. 
- Referring toFIG. 6, the control system administrator can, instep102, select an option to view active marketing campaigns. Themarketing method96 proceeds fromstep102 to step124, wherein the control system administrator can initiate adatabase query126 to view marketing campaigns by campaign name, by date (e.g., begin date, end date, etc.), and by performance (e.g., how many gift recipients “clicked-thru” on the WAP Link, how many of such gift recipients made a purchase as a result thereof, etc.). 
- Instep102, the control system administrator selects to manage reports, in which case themarketing method96 proceeds fromstep102 to step128. Instep128, the control system administrator initiates adatabase query130 to obtain stored information for printing and/or exporting reports concerning past, present, and/or future marketing campaigns. The reporting ofstep128 preferably shares one or more modules with the reporting ofstep98. 
- Also instep102, the control system administrator can select an option to review a high-level report, entitled “Marketing Schedule at a Glance,” in which themarketing method96 proceeds to step132 fromstep102. Instep102, the control system administrator initiates adatabase query134 to populate the high-level report. Viewing of the high-level report is subject to rights management, such that each vendor is preferably prevented from viewing the high-level report associated with another vendor. 
- In some embodiments of the present invention, a user of the wirelessgift recipient system22, e.g., mobile device, is enabled to redeem stored value, e.g., gift certificates, using the wirelessgift recipient system22, where the mobile telephone number, e.g., individual cell phone number, is used as a substantially unique identifier for virtual stored value accounts, such as virtual gift certificates, generic stored value accounts, branded debit accounts, and loyalty accounts. The wirelessgift recipient system22, e.g., cell phone, can be used to check balances for stored value gift certificates (virtual or real) and for redemption of the virtual stored value account at the store or on-line using the mobile device. 
- Regarding loyalty accounts, for example, it is contemplated that the systems and methods herein described can be used in connection with the redemption of stored value, such as points that are redeemable for goods/services. For example, it is contemplated that the vendor can associate value, such as vendor-points, with a recipient thereof by associating such points with the mobile telephone number of the wireless recipient system. In an exemplary points redemption method of the present invention, thecontrol system12 receives a points redemption request from a vendor POS system associated with the vendor, whereby the points redemption request includes a redemption amount and the mobile telephone number of the recipient. Thecontrol system12 identifies whether the points balance associated with the mobile telephone number has stored value exceeding that of the redemption amount, and, if so, sends an authentication request to thewireless carrier system20 that is addressed to a wireless recipient system, e.g., cell phone, of the recipient. The authentication request is preferably in an electronic messaging format, such as the SMS and/or MMS format, though it may be by way of another vehicle for authentication, e.g., PIN, IVR, *etc. If thecontrol system12 receives from the wireless carder system an authentication confirmation originating from the wireless recipient system, thecontrol system12 sends a redemption authorization to the vendor POS system. 
- It is contemplated that some embodiments of the invention can incorporate “re-gifting capabilities,” such that thecontrol system12 provides the gift recipient with the ability to give the electronic gift certificate to another directly and/or through a virtual trading post. Moreover, the electronic gift certificate can be bought, sold, and/or swapped. It is contemplated that such re-gifting can be done by an auction and/or a “buy now” method. 
- It is also contemplated that virtual stored value “filling stations” can be provided by way of a kiosk, whereby a consumer can feed cash into the kiosk to add funds to the gift account. The kiosk provides means for moving cash into electronically available funds and enabling e-commerce without a credit card or bank account. For example, such means can be used by minors with cash from odd jobs, e.g., babysitting, cutting lawns, etc. and low-wage earners who are paid in cash, e.g., restaurant kitchen workers, waiters, laborers, etc. 
- It will be understood that the embodiments of the present invention described herein are merely exemplary and that a person skilled in the art may make many variations and modifications without departing from the spirit and the scope of the invention. All such variations and modifications, including those discussed above, are intended to be included within the scope of the invention as defined in the appended claims.