Access control tower

Information

  • Patent Grant
  • 12198130
  • Patent Number
    12,198,130
  • Date Filed
    Monday, March 27, 2023
    a year ago
  • Date Issued
    Tuesday, January 14, 2025
    19 days ago
Abstract
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information.
Description
TECHNICAL FIELD

Embodiments of the present disclosure relate to systems and methods for managing user data and user preferences across a plurality of platforms.


BACKGROUND

Many customers link information (e.g., account types, account balances, payment account information, etc.) maintained by a financial institution to devices (e.g., in a mobile wallet on a smartphone, wearable devices, Internet of Things devices, etc.) and to third-party systems (e.g., financial health monitoring services, merchant e-commerce systems, social media platforms, mobile wallet systems, etc.). Often, to enable access to the information maintained by the financial institution, the customer provides the third-party login credentials or authorizes the third-party to access the information maintained by the financial institution via an application program interface (“API”) offered by the financial institution. The customer may share the information with a plurality of different services. For example, the customer may authorize the financial institution to provide account information to a financial health monitoring service, payment card information to a plurality of different mobile wallet services, payment card information to their favorite retailers, and the like. Once the access is provided, the customer can manage preferences relating to the access at each of the third-party systems (e.g., via a third-party website or smartphone application). However, this process can be cumbersome when the customer has authorized a plurality of third-parties to have access to the information maintained by the financial institution.


SUMMARY

Various example embodiments relate to systems and methods for providing a centralized system for providing, modifying, and revoking third-party access to information maintained by a financial institution. One such example embodiment relates to a method of managing access to customer information associated with a customer of a financial institution. The method includes providing, by a financial institution computing system associated with the financial institution, access to a data control portal to a computing device associated with the customer. The method further includes receiving, by the financial institution computing system and from the computing device, access permissions associated with the customer information that change. The access permissions define how an external device or system can access or utilize the customer information. The method includes implementing, by the financial institution computing system, the access permissions. The method further includes updating, by the financial institution computing system, a user interface of the data control portal displayed at the computing device to reflect the access permissions.


Another example embodiment relates to a financial institution computing system associated with a financial institution. The system includes a network interface structured to facilitate data communication via a network. The system further includes an accounts database structured to customer information associated with customers of the financial institution. The system includes a processing circuit comprising a processor and memory. The processing circuit is structured to provide access to a data control portal to a computing device associated with a customer of the financial institution. The processing circuit is further structured to receive, from the computing device, access permissions associated with the customer information that change. The access permissions define how an external device or system can access customer information associated with the customer. The processing circuit is structured to implement the access permissions, and to update a user interface of the data control portal displayed at the computing device to reflect the access permissions.


These and other features, together with the organization and manner of operation thereof, will become apparent from the following detailed description when taken in conjunction with the accompanying drawings.





BRIEF DESCRIPTION OF THE FIGURES


FIG. 1 is a view of a system that facilitates the sharing of customer information from a financial institution to customer devices and to third-parties according to an example embodiment.



FIG. 2 is a view of a flow diagram of a method of managing access to customer information maintained by a financial institution according to an example embodiment.



FIGS. 3 through 5 each show example data control tower user interfaces according to example embodiments.





DETAILED DESCRIPTION

Referring to the figures generally, systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information.


Referring to FIG. 1, a view of a system 100 is shown according to an example embodiment. As described below in further detail, the system 100 facilitates the sharing of customer information associated with a customer 102 and maintained by a financial institution 104 to third-parties systems 106 and customer devices 108. The shared customer information can include any combination of account information associated with financial accounts held by the customer 102 with the financial institution 104 (e.g., types of accounts owned, account numbers, account balances, transaction information, bill due dates, etc.) and customer personal information stored by the financial institution 104.


The customer 102 is an account holder with the financial institution 104. The financial institution 104 includes a financial institution (FI) computing system 110. The FI computing system 110 maintains information about accounts held with the financial institution 104 and facilitates the movement of funds into and out of the accounts. Additionally, the FI computing system 110 facilitates the sharing of and the provision of access to information associated with customer accounts to the customer 102, to customer devices 108, and to third-party systems 106. The financial institution computing system 110 includes a network interface 112. The network interface 112 is structured to facilitate data communication with other computing systems (e.g., the customer devices 108, the third-party systems 106, etc.) via a network 126. The network interface 112 includes hardware and program logic that facilitates connection of the FI computing system 110 to the network 126. For example, the network interface 112 may include a wireless network transceiver (e.g., a cellular modem, a Bluetooth transceiver, a WiFi transceiver, etc.) and/or a wired network transceiver (e.g., an Ethernet transceiver). In some arrangements, the network interface 112 includes the hardware and programming logic sufficient to support communication over multiple channels of data communication (e.g., the Internet and an internal financial institution network). Further, in some arrangements, the network interface 112 is structured to encrypt data sent over the network 126 and decrypt received encrypted data.


The financial institution computing system 110 includes a processing circuit 114 having a processor 116 and memory 118. The processor 116 may be implemented as a general-purpose processor, an application specific integrated circuit (ASIC), one or more field programmable gate arrays (FPGAs), a digital signal processor (DSP), a group of processing components, or other suitable electronic processing components. The memory 118 includes one or more memory devices (e.g., RAM, NVRAM, ROM, Flash Memory, hard disk storage, etc.) that store data and/or computer code for facilitating the various processes described herein. Moreover, the memory 118 may be or include tangible, non-transient volatile memory or non-volatile memory.


The FI computing system 104 includes an account management circuit 120 and an access control circuit 122. Although shown as separate circuits in FIG. 1, in some arrangements, the account management circuit 120 and/or the access control circuit 122 are part of the processing circuit 116. Other arrangements may include more or less circuits without departing from the spirit and scope of the present disclosure. Further, some arrangements may combine the activities of one circuit with another circuit to form a single circuit. Therefore, those of ordinary skill in the art will appreciate that the present arrangement is not meant to be limiting. The account management circuit 120 is structured to perform various account management functions, including maintaining an accounts database 124, updating account balances, applying interest to accounts, processing payments related to accounts, and the like. The access control circuit 122 is structured to manage the sharing and provision of customer information to third-party systems 106 and to customer devices 108 based on permissions and preferences of the customer 102.


The FI computing system 104 includes the accounts database 124. In some arrangements, the accounts database 124 is part of the memory 118. The accounts database 124 is structured to hold, store, categorize, and otherwise serve as a repository for information associated with accounts (e.g., loan accounts, savings accounts, checking accounts, credit accounts, etc.) held by the financial institution 104. For example, the accounts database 124 may store account numbers, account balances, transaction information, account ownership information, and the like. The accounts database 124 is structured to selectively provide access to information relating to accounts at the financial institution 104 (e.g., to the customer 102 via a customer device 108).


Still referring to FIG. 1, the system 100 includes at least one third-party system 106. Each third-party system 106 is affiliated with a third-party that the customer 102 can authorize to access information associated with the customer 102 that is stored, generated, maintained, and/or controlled in part by the financial institution 104. For example, the third-party systems 106 may be affiliated with any combination of merchants (e.g., brick-and-mortar retailers, e-commerce merchants, etc.), financial health companies (e.g., investment firms, Mint®, etc.), mobile wallet systems (e.g., third-party mobile wallet systems not affiliated with or operated by the financial institution 104, mobile wallet systems affiliated with or operated by the financial institution 104), payment networks (e.g., payment networks affiliated with credit cards offered by the financial institution 104), social media networks, service providers, utility providers (e.g., electric companies, cable companies, cell phone providers, gas companies, etc.), messaging networks, personal organizers (e.g., calendar and scheduling services, bill pay services, e-mail systems, etc.), governments, or the like. Each of the third-parties may be provided access to different portions of the information associated with the customer 102 that is stored, generated, maintained, and/or controlled in part by the financial institution 104. For example, an e-commerce merchant may be provided access to payment account and billing address information, while a financial health company may be provided access to account balance information and transaction information. As described in further detail below, the customer 102 can provide a given third-party access to designated information, limit access to information, and revoke access to information through an access control portal (“access control tower”) provided by the financial institution 104.


The customer 102 is associated with various customer devices 108. The customer devices 108 may include, for example, smartphones, tablet computes, laptop computers, desktop computers, wearables (e.g., smart watches, smart glasses, fitness trackers, etc.), interne of things (“IOT”) devices (e.g., Amazon Echo®, smart appliances, etc.). Each of the customer devices 108 may be provided access to different portions of the information associated with the customer 102 that is stored, generated, maintained, and/or controlled in part by the financial institution 104. For example, a smartphone may be provided access to payment account and billing address information for a mobile wallet running on the smartphone, while an IOT device may be provided access to payment information, account balance information, and transaction information to execute purchases and review transactions. As described in further detail below, the customer 102 can provide a given customer device 102 access to designated information, limit access to information, and revoke access to information through the access control tower provided by the financial institution 104. In some arrangements, the customer devices 108 do not communicate with the FI computing system 110 via the network 126. For example, the customer devices 108 can include payment cards (e.g., credit cards, debit cards, smart cards, etc.) that have account information that can be linked by the FI computing system 110 to account information and customer preferences stored at the FIG. computing system 110.


The devices of the system 100 communicate via the network 126. The network 126 may include any combination of the Internet and an internal private network (e.g., a private network maintained by the financial institution 104). Through data communication over the network 126, the FI computing system 110 can share customer information with the third-party systems 106 and the customer devices 108. The FI computing system 110 includes customer information APIs 128 that define how the FI computing system 110 communicates customer information with the third-party systems 106 and the customer devices 108. The APIs facilitate the sharing of and access to the customer information stored at the FI computing system 110 based on permissions and preferences provided by the customer 102. The access control circuit 122 access to the customer information by the third-party systems 106 and the customer devices 108 via the APIs 128. In some arrangements, the FI computing system 110 provisions requested customer data to a given third-party system 106 or customer device 108 for local storage on the third-party system 106 or the customer device 108. For example, the FI computing system 110 can provision payment information, such as payment tokens associated with payment accounts, to a mobile wallet system for local storage at the mobile wallet system. In other arrangements, the FI computing system 110 provides access to remotely display, present, or analyze customer information stored at the FI computing system while the FI computing system 110 retains control over the customer information. For example, the FI computing system 110 can provide access to a financial health system to present designated customer account information through a financial health website, such as balances, transaction information, and the like, when the financial health system requests the information, without directly transmitting the data to the financial health system.


Generally, through the system 100, the customer 102 can provision access to customer information to third-party systems 106 and to customer devices 108 (e.g., by permitting the third-party system 106 or the customer device 108 to communicate with the FI computing system 110 to retrieve the customer information). The customer information is maintained by the financial institution 104 via the FI computing system 110. The customer information can include any information associated with the customer 102 that is generated by or maintained by the financial institution 104, including customer account information (e.g., account numbers, billing address, balance information, transaction information, account type information, etc.) and personal information (e.g., date of birth, social security number, tax identifications, addresses, phone numbers, e-mail addresses, aliases, etc.). The customer 102 can provision access to the customer information through the third-party, the customer device 108, or via the FI computing system data control tower. Additionally, the customer 102 can manage all previously provided access permissions via the data control tower to change an access level, set permissions, revoke access, or the like. The provision of the customer information can be managed on an account level (e.g., managing all third-party and device access to a specific account) or on a channel level (e.g., managing all the information that a given customer device 108 or third-party system 106 can access). The operation of the system 100 is described in further detail below with respect to FIGS. 2 through 5.


Referring to FIG. 2, a flow diagram of a method 200 of managing access to customer information maintained the by the financial institution 104 is shown according to an example embodiment. The method 200 is performed by the FI computing system 110 (e.g., by the access control circuit 122, by the processor 116, etc.).


The method 200 begins when a customer is authenticated at 202. The FI computing system 110 receives an authentication request from the customer 102 via a computing device associated with the customer (e.g., a smartphone via a mobile banking application, a computing device via a web-based banking portal, etc.). In an alternate arrangement, the request may be received via an ATM associated with the financial institution 104. The authentication request indicates that an individual purporting to be the customer 102 is attempting to access the access control tower to manage access to the customer information associated with the customer 102. The authentication request includes customer authentication information (e.g., username, password, biometric, debit card dip in an ATM, PIN, etc.). Based on the customer authentication information, the request is either granted or denied. If the request is denied, step 202 of the method 200 does not occur, and the method 200 ends. The description of the method 200 continues for situations in which the customer 102 is authenticated.


Access to the data control tower portal is provided at 204. After the customer 102 is authenticated, the FI computing system 110 provides the customer 102 access to the data control tower portal. The access to the data control tower portal may be facilitated through a computing device associated with the customer (e.g., a smartphone via a mobile banking application, a computing device via a web-based banking portal, etc.). The computing device presents interactive graphical user interfaces to the customer 102 through which the customer 102 can manage the access controls for the customer information. The data control tower portal may be part of a mobile banking application or a remote banking website associated with the financial institution 104. As noted above, the access to the customer information can be managed on an account level (e.g., managing all third-party and device access to a specific account) and on a channel level (e.g., managing all the information that a given customer device 108 or third-party system 106 can access). FIGS. 3 through 5 show example user interfaces associated with the data control tower that demonstrate various management features of the data control tower.


Referring to FIG. 3, a data control tower user interface 300 is shown according to an example embodiment. The user interface 300 is shown as a displayed on a mobile device 302. The user interface 300 includes an account toggle 304 and a channel toggle 306. As shown by the bolded outline of the account toggle 304, the account toggle 304 is selected. Accordingly, the user interface 300 is an account level management user interface. While in the account level management user interface, the customer 102 can select an account held with the financial institution 104 via the drop down box 308. As shown in FIG. 3, the customer 102 has selected a checking account. After selecting a specific account, a listing 310 of connected account access channels is populated. The listing 310 identifies each channel that the customer 102 has previously configured to access the checking account. Each entry in the listing 310 identifies a specific channel (e.g., a debit card, mobile wallet 1, mobile wallet 2, etc.), a channel access mechanism (e.g., a debit card number, a token identifier, an account number, etc.), and whether the channel access is currently active or inactive via a slider toggle 312 (where “Y” means the channel is active, and “N” means the channel is inactive). A channel may be a customer device 108 (e.g., a wearable device, a payment card, etc.) or a third-party system 106 (e.g., a mobile wallet, a retailer bill pay system, a utility company system, etc.).


The customer 102 can interact with a given slider toggle 312 to activate or deactivate a given channel's access to the selected account. For example, as shown in the user interface 300, the debit card is active (as shown by the associated slider toggle 312 being in the “Y” position). Accordingly, when the customer 102 attempts to use the debit card to make a payment (e.g., a purchase with a merchant) or withdraw cash from an ATM, the debit card is linked to the checking account identified in the drop down box 308, and the payment can go through or funds can be withdrawn (assuming the checking account has the appropriate balance). If the customer 102 interacts with the slider toggle 312 to deactivate the debit card's access to the checking account (e.g., by sliding the toggle 312 to the “N” position), the debit card is no longer linked to the checking account. If the sliding toggle 312 is in the “N” position and the customer 102 attempts to use the debit card at a merchant point-of-sale system or an ATM, the transaction will be denied or not processed from the checking account.


The user interface 300 also includes an add button 312 and a delete button 314. If the customer 102 interacts with the add button 312, the customer can add a new channel to the listing 310 of approved channels that are linked to the identified account. In doing so, the customer may need to register the customer device 108 (e.g., by providing a device identifier, by providing a primary account number of a payment card, by logging into an application or website via the customer device 108, etc.) or the third-party system 106 (e.g., by logging into a third-party website or application associated with the third-party system 106) with the financial institution 104 to pair the channel with the FI computing system 110. If the customer 102 interacts with the delete button 314, the customer 102 can select a channel in the listing 310 to revoke access of the selected channel to the account.


Referring to FIG. 4, a data control tower user interface 400 is shown according to an example embodiment. The user interface 400 is similar to the user interface 300. As such, like numbering is used between FIGS. 3 and 4 to designate like components of the user interfaces 300 and 400. The user interface 400 is shown as a displayed on the mobile device 302. As with the user interface 300, the user interface 400 includes the account toggle 304 and the channel toggle 306. As shown by the bolded outline of the channel toggle 306, the channel toggle 306 is selected. Accordingly, the user interface 400 is a channel level management user interface. While in the channel level management user interface, the customer 102 can select a channel that is paired with the financial institution 104 via the drop down box 408. A channel may be a customer device 108 (e.g., a wearable device, a payment card, etc.) or a third-party system 106 (e.g., a mobile wallet, a retailer bill pay system, a utility company system, etc.). As shown in FIG. 4, the customer 102 has selected a mobile wallet as the channel to manage. After selecting a specific channel, a listing 410 of accounts associated with the channel is populated. The listing 410 identifies each account that that the customer 102 has previously configured to be accessed by the selected channel. Each entry in the listing 410 identifies a specific account (e.g., a debit card, a credit card, etc.), an account access mechanism (e.g., a payment token), and whether the account is currently active or inactive via a slider toggle 412 (where “Y” means the account is active, and “N” means the account is inactive).


The customer 102 can interact with a given slider toggle 412 to activate or deactivate the selected channel's access to an account associated with the slider toggle 412. For example, as shown in the user interface 400, the token associated with credit card 1 is active (as shown by the associated slider toggle 412 being in the “Y” position). Accordingly, when the customer 102 attempts to make a payment with the mobile wallet (e.g., a purchase with a merchant) credit card 1 is listed as an option for the payment source of the transaction. If the customer 102 interacts with the slider toggle 412 to deactivate the channel's access to the token associated with credit card 1 (e.g., by sliding the toggle 412 to the “N” position), the credit card 1 is no longer listed as a payment source in the mobile wallet (or is listed as an unavailable payment source).


Each entry in the listing 410 also includes a default payment indicator 414 and a delete payment button 416. The default payment indicator 414 is highlighted to indicate the default payment source of the mobile wallet. As shown in FIG. 4, the selected default payment method for the mobile wallet is the debit card. If the customer 102 interacts with the default payment indicator 414 of a different entry (e.g., credit card 1 or credit card 2), the customer 102 can change the default payment source for the mobile wallet even though the customer is not interacting directly with the mobile wallet. If the customer 102 interacts with the delete payment button 416 for a given entry, the customer 102 can remove the associated payment source from the mobile wallet.


Still referring to FIG. 4, the user interface 400 also includes an add new payment source button 418. If the customer 102 interacts with the add new payment source button 418, the customer 102 can provision a payment token associated with a new payment source to the mobile wallet. The customer 102 can manually input the payment card information (e.g., primary account number, expiration date, billing address, card security code, card verification value, etc.) or select a payment card that the customer 102 has that is associated with (i.e., issued by) the financial institution 104. When the payment card information is provided by the customer 102, the FI computing system 110 can automatically request a payment card token (e.g., from a payment network associated with the payment card) and transmit the payment card token to the mobile wallet system (e.g., a third-party system 106 associated with the mobile wallet) such that the payment card is provisioned to the mobile wallet.


Referring to FIG. 5, a data control tower user interface 500 is shown according to an example embodiment. The user interface 500 is similar to the user interfaces 300 and 400. As such, like numbering is used between FIGS. 3 through 5 to designate like components of the user interfaces 300, 400, and 500. The user interface 500 is shown as a displayed on the mobile device 302. As with the user interfaces 300 and 400, the user interface 500 includes the account toggle 304 and the channel toggle 306. As shown by the bolded outline of the channel toggle 306, the channel toggle 306 is selected. Accordingly, the user interface 500 is a channel level management user interface. While in the channel level management user interface, the customer 102 can select a channel that is paired with the financial institution 104 via the drop down box 408. As shown in FIG. 5, the customer 102 has selected a debit card as the channel to manage. The debit card channel of FIG. 5 has different manageable features than the mobile wallet of FIG. 4. Accordingly, the specific channel level management user interfaces presented to the customer 102 while accessing the access control tower portal may differ depending on the channel selected by the user.


The debit card specific user interface 500 includes a linked account drop down box 502. The linked account drop down box 502 allows the customer 102 to change the account associated with the selected debit card. As shown in FIG. 5, the debit card is currently linked to a checking account ending in “5678”. If the customer 102 has additional demand deposit accounts with the financial institution 104, the customer 102 selects a different account to associate the debit card with via the drop down box 502.


Additionally, the user interface 500 includes a plurality of different purchase controls 504. Each of the purchase controls 504 includes a toggle slider 506 that allows the customer 102 to activate or deactivate a particular control associated with the debit card (where “Y” means the feature is active, and “N” means the feature is inactive). The purchase controls 504 may include a point of sale control that either permits or blocks the debit card from being used at a merchant point of sale system, an ATM control that either permits or blocks the debit card from being used at an ATM, a mobile wallet control that either permits or blocks the debit card from being used in a mobile wallet, a merchant e-commerce control that either permits or blocks the debit card from being stored at a merchant e-commerce site as a stored payment method, a travel fraud detection control that turns on or off a fraud detection feature, and the like. The customer 102 can interact with a given toggle slider 506 to activate or deactivate the associated purchase control 504. The available purchase controls may vary by channel.


Referring again to FIG. 2 and the method 200, updated access permissions or settings are received at 206. The FIG. computing system 110 receives the updated access permissions or settings from the customer 102 via the access control tower portal (e.g., from a computing device that the customer 102 is using to access the access control tower portal). The updated access permissions or settings may relate to any change to access permissions or settings for a specific account held by the customer 102 with the financial institution 104 or for a specific information access channel being registered with or that has already been registered with the financial institution 104. For example, the updated access permissions or settings may relate to any of the updated access permissions or settings that are described above with respect to FIGS. 3 through 5.


The FI computing system 110 determines if external action is required to implement the updated access permissions or settings at 208. In some arrangements, the type of access permission or setting being updated requires that the FI computing system 110 transmits commands to a customer device 108 or to a third-party system 106 to implement the updated access permissions or settings. For example, if the updated access permission or setting relates to revoking or provisioning a payment token stored on a customer device 108, the FI computing system 110 may need to send a command to either (1) deactivate or remove the payment token from the customer device 108 or the third-party systems 106 affiliated with the mobile wallet (e.g., a third-party mobile wallet server, a payment network server that manages a token vault associated with the payment token, etc.) or (2) activate or provision the token to the mobile wallet via the customer device 108 and/or the third-party systems 106. In other arrangements, the type of access permission or setting being updated can be performed at the FI computing system 110 without additional commands sent to a customer device 108 or a third-party system 106. For example, if the updated access permission or setting relates to revoking a third-party's access to account balance information, the FI computing system 110 can perform an internal update at the FI computing system 110 adjusting the API permissions associated with the third-party without the need to send a command to the third-party system 106 associated with the affected third-party.


If external action is required, commands are transmitted to the appropriate recipient at 210. The FI computing system 110 transmits the update commands to the appropriate third-party systems 106 and/or customer devices 108. If no external action is required, the updated access permissions or settings are implemented at 212. The FI computing system 110 updates internal account access permissions or settings in the accounts database 124. Additionally, in some arrangements, the update to the account access permissions or settings requires both external and internal action. In such arrangements, both steps 210 and 212 are performed. Based on the updated settings and permissions, the FI computing system 110 facilitates the sharing (or denial of requests to access) customer information to the external systems (e.g., customer devices 108 and third-party systems 106).


The above-described authentication systems and methods provide for more secure transactions and more secure computer access systems. The systems and methods utilize location information related to a user device associated with a user involved with a transaction or login attempt. The location information may be packaged as a digital fingerprint, which can only be recreated by the specific user device associated with the user. Accordingly, the digital fingerprint is difficult—if not impossible—to spoof by a fraudster or by another device associated with the fraudster.


The embodiments described herein have been described with reference to drawings. The drawings illustrate certain details of specific embodiments that implement the systems, methods and programs described herein. However, describing the embodiments with drawings should not be construed as imposing on the disclosure any limitations that may be present in the drawings.


It should be understood that no claim element herein is to be construed under the provisions of 35 U.S.C. § 112(f), unless the element is expressly recited using the phrase “means for.”


As used herein, the term “circuit” may include hardware structured to execute the functions described herein. In some embodiments, each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein. The circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc. In some embodiments, a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.” In this regard, the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein. For example, a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).


The “circuit” may also include one or more dedicated processors communicatively coupled to one or more dedicated memory or memory devices. In this regard, the one or more dedicated processors may execute instructions stored in the dedicated memory or may execute instructions otherwise accessible to the one or more dedicated processors. In some embodiments, the one or more dedicated processors may be embodied in various ways. The one or more dedicated processors may be constructed in a manner sufficient to perform at least the operations described herein. In some embodiments, the one or more dedicated processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example embodiments, may execute instructions stored, or otherwise accessed, via different areas of memory). Alternatively or additionally, the one or more dedicated processors may be structured to perform or otherwise execute certain operations independent of one or more co-processors. In other example embodiments, two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution. Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components structured to execute instructions provided by memory. The one or more dedicated processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc.


Any foregoing references to currency or funds are intended to include fiat currencies, non-fiat currencies (e.g., precious metals), and math-based currencies (often referred to as cryptocurrencies). Examples of math-based currencies include Bitcoin, Litecoin, Dogecoin, and the like.


It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present disclosure as defined in the appended claims.


The foregoing description of embodiments has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from this disclosure. The embodiments were chosen and described in order to explain the principals of the disclosure and its practical application to enable one skilled in the art to utilize the various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the present disclosure as expressed in the appended claims.

Claims
  • 1. A method of changing accessibility of accounts administered by a financial institution computing system, the method comprising: receiving, by the financial institution computing system, a first selection to disable a first third-party account from accessing a financial account of a user;configuring, by the financial institution computing system, in response to the first selection, an application programming interface (API) to disallow access to the financial account by the first third-party account, wherein configuring the API comprises updating, by the financial institution computing system, in response to the first selection, a permission for the API via which a first external device or system accesses the financial account for the first third-party account;receiving, by the financial institution computing system, from the first external device or system via the API, a first request to access the financial account;transmitting, by the financial institution computing system, to the first external device or system via the API, based on the updated permission, a denial of the first request received via the API from the first external device or system;receiving, by the financial institution computing system, a second selection to enable a second third-party account to access the financial account;provisioning, by the financial institution computing system responsive to the second selection, a payment token that corresponds to the financial account, the second third-party account, and a second external device or system corresponding to the second third-party account;receiving, by the financial institution computing system, from the second external device or system via the API, a second request to access the financial account using the payment token; andtransmitting, by the financial institution computing system, to the second external device or system via the API, based on the payment token, the account data corresponding to the financial account in response to the second request.
  • 2. The method of claim 1, further comprising transmitting, by the financial institution computing system, to a computing device of the user, an identification that the financial account of the user is accessible to the first third-party account and inaccessible to the second third-party account for display by the computing device.
  • 3. The method of claim 1, further comprising displaying, via a graphical user interface of a computing device of the user, a listing comprising (i) the first third-party account that is administered by the first external device or system, (ii) a first indication that the financial account is accessible to the first third-party account, (iii) the second third-party account that is administered by the second external device or system, and (iv) a second indication that the financial account is inaccessible to the second third-party account.
  • 4. The method of claim 1, further comprising displaying, via a graphical user interface of a computing device of the user, a first toggle state corresponding to the first third-party account, and a second toggle state corresponding to the second third-party account, wherein a first toggle in the first toggle state visually indicates that the financial account of the user is accessible to the first third-party account, and a second toggle in the second toggle state visually indicates that the financial account is inaccessible to the second third-party account.
  • 5. The method of claim 3, wherein the first selection is detected via the first toggle and the second selection is detected via the second toggle.
  • 6. The method of claim 3, further comprising updating the first toggle to visually indicate that the financial account is not accessible to the first third-party account in response to the first selection, and updating the second toggle to visually indicate that the financial account is accessible to the second third-party account in response to the second selection.
  • 7. The method of claim 1, further comprising: receiving, by the financial computing system from the second external device or system via the API, prior to the first selection, a third request to access the financial account; andtransmitting, by the financial institution computing system, to the second external device or system via the API, account data corresponding to the financial account in response to the third request.
  • 8. The method of claim 1, further comprising: receiving, by the financial institution computing system, a third selection to enable access by the first third-party account to the financial account; andtransmitting, by the financial institution computing system, and in response to the third selection, a command to the first external device or system to add a second payment token associated with the financial account to a mobile wallet in order to add the financial account to the mobile wallet.
  • 9. The method of claim 8, wherein the financial institution computing system is associated with a financial institution, and wherein the mobile wallet is not operated by the financial institution.
  • 10. The method of claim 8, further comprising: receiving, by the financial institution computing system, a fourth selection to disable access by the first third-party account to the financial account; andtransmitting, by the financial institution computing system, and in response to the fourth selection, a second command to the first external device or system to remove the second payment token associated with the financial account from the mobile wallet in order to remove the financial account from the mobile wallet.
  • 11. The method of claim 1, further comprising applying, based on the first and second selections, purchase controls to a payment card associated with the financial account, wherein the purchase controls prevent the payment card from being used at one or both of an automated teller machine or a merchant point of sale.
  • 12. The method of claim 1, further comprising: receiving, by the financial institution computing system, a third selection to enable access by the first third-party account to the financial account; andconfiguring, by the financial institution computing system, the API to communicate with the first external device or system and permit the first external device or system to access the financial account.
  • 13. A financial institution computing system comprising one or more processors configured to: receive a first selection to disable a first third-party account from accessing a financial account of a user;configuring, in response to the first selection, an application programming interface (API) to disallow access to the financial account by the first third-party account, wherein configuring the API comprises updating, by the financial institution computing system, in response to the first selection, a permission for the API via which a first external device or system accesses the financial account for the first third-party account;receiving, from the first external device or system via the API, a first request to access the financial account;transmitting, to the first external device or system via the API, based on the updated permission, a denial of the first request received via the API from the first external device or system;receiving a second selection to enable a second third-party account to access the financial account;provisioning, responsive to the second selection, a payment token that corresponds to the financial account, the second third-party account, and a second external device or system corresponding to the second third-party account;receiving, from the second external device or system via the API, a second request to access the financial account using the payment token; and
  • 14. The financial institution computing system of claim 13, the one or more processors further configured to transmit, to a computing device of the user, an identification that the financial account of the user is accessible to the first third-party account and inaccessible to the second third-party account for display by the computing device.
  • 15. The financial institution computing system of claim 13, the one or more processors further configured to: receive, from the second external device or system via the API, prior to the first selection, a third request to access the financial account; andtransmit, to the second external device or system via the API, account data corresponding to the financial account in response to the third request.
  • 16. The financial institution computing system of claim 13, the one or more processors further configured to: receive a third selection to enable access by the first third-party account to the financial account; andtransmit, in response to the third selection, a command to the first external device or system to add a second payment token associated with the financial account to a mobile wallet in order to add the financial account to the mobile wallet.
  • 17. The financial institution computing system of claim 16, wherein the financial institution computing system is associated with a financial institution, and wherein the mobile wallet is not operated by the financial institution.
  • 18. The financial institution computing system of claim 13, the one or more processors further configured to: receive a fourth selection to disable access by the first third-party account to the financial account; andtransmit, in response to the fourth selection, a second command to the first external device or system to remove the second payment token associated with the financial account from the mobile wallet in order to remove the financial account from the mobile wallet.
  • 19. The financial institution computing system of claim 13, the one or more processors further configured to apply, based on the first and second selections, purchase controls to a payment card associated with the financial account, wherein the purchase controls prevent the payment card from being used at one or both of an automated teller machine or a merchant point of sale.
  • 20. The financial institution computing system of claim 13, the one or more processors further configured to: receive a third selection to enable access by the first third-party account to the financial account; andconfigure the API to communicate with the first external device or system and permit the first external device or system to access the financial account.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 15/629,423 filed Jun. 21, 2017 (now U.S. Pat. No. 11,615,402), which claims priority to U.S. Provisional Patent Application No. 62/357,737 filed Jul. 1, 2016, each of which is incorporated herein by reference in its entirety.

US Referenced Citations (702)
Number Name Date Kind
5485510 Colbert Jan 1996 A
5573457 Watts et al. Nov 1996 A
5737423 Manduley Apr 1998 A
5953710 Fleming Sep 1999 A
5999978 Angal et al. Dec 1999 A
6047268 Bartoli et al. Apr 2000 A
6105006 Davis et al. Aug 2000 A
6188309 Levine Feb 2001 B1
6193152 Fernando et al. Feb 2001 B1
6408330 Delahuerga Jun 2002 B1
6422462 Cohen Jul 2002 B1
6494367 Zacharias Dec 2002 B1
6575361 Graves et al. Jun 2003 B1
6717592 Gusler et al. Apr 2004 B2
6845906 Royer et al. Jan 2005 B2
6865547 Brake et al. Mar 2005 B1
6879965 Fung et al. Apr 2005 B2
6910021 Brown et al. Jun 2005 B2
6931382 Laage et al. Aug 2005 B2
6980969 Tuchler et al. Dec 2005 B1
7014107 Singer et al. Mar 2006 B2
7016877 Steele et al. Mar 2006 B1
7107243 McDonald et al. Sep 2006 B1
7155411 Blinn et al. Dec 2006 B1
7219833 Cantini et al. May 2007 B2
7225156 Fisher et al. May 2007 B2
7249099 Ling Jul 2007 B2
7264154 Harris Sep 2007 B2
7319986 Praisner et al. Jan 2008 B2
7331518 Rable Feb 2008 B2
7347361 Lovett Mar 2008 B2
7359880 Abel et al. Apr 2008 B2
7383988 Slonecker, Jr. Jun 2008 B2
7383998 Parker et al. Jun 2008 B2
7392224 Bauer et al. Jun 2008 B1
7398248 Phillips et al. Jul 2008 B2
7401731 Pletz et al. Jul 2008 B1
7413113 Zhu Aug 2008 B1
7451395 Brants et al. Nov 2008 B2
7512563 Likourezos et al. Mar 2009 B2
7552088 Malcolm Jun 2009 B2
7571142 Flitcroft et al. Aug 2009 B1
7587365 Malik et al. Sep 2009 B2
7594258 Mao et al. Sep 2009 B2
7653597 Stevanovski et al. Jan 2010 B1
7685037 Reiners et al. Mar 2010 B2
7689502 Lilly et al. Mar 2010 B2
7698221 Blinn et al. Apr 2010 B2
7707082 Lapstun et al. Apr 2010 B1
7712655 Wong May 2010 B2
7740170 Singh et al. Jun 2010 B2
7753265 Harris Jul 2010 B2
7778932 Yan Aug 2010 B2
7818319 Henkin et al. Oct 2010 B2
7857212 Matthews Dec 2010 B1
7873573 Realini Jan 2011 B2
7930228 Hawkins et al. Apr 2011 B1
7937325 Kumar et al. May 2011 B2
7941534 De La Huerga May 2011 B2
7949572 Perrochon et al. May 2011 B2
7954704 Gephart et al. Jun 2011 B1
8090346 Cai Jan 2012 B2
8099109 Altman et al. Jan 2012 B2
8127982 Casey et al. Mar 2012 B1
8160933 Nguyen et al. Apr 2012 B2
8175938 Olliphant et al. May 2012 B2
8196131 Von Behren et al. Jun 2012 B1
8245909 Pletz et al. Aug 2012 B2
8249983 Dilip et al. Aug 2012 B2
8255323 Casey et al. Aug 2012 B1
8266031 Norris et al. Sep 2012 B2
8266205 Hammad et al. Sep 2012 B2
8280786 Weiss et al. Oct 2012 B1
8280788 Perlman Oct 2012 B2
8296228 Kloor Oct 2012 B1
8297502 McGhie et al. Oct 2012 B1
8301566 Mears Oct 2012 B2
8332294 Thearling Dec 2012 B1
8359531 Grandison et al. Jan 2013 B2
8360952 Wissman et al. Jan 2013 B2
8364556 Nguyen et al. Jan 2013 B2
8396808 Greenspan Mar 2013 B2
8407136 Bard et al. Mar 2013 B2
8407142 Griggs Mar 2013 B1
8423349 Huynh et al. Apr 2013 B1
8473394 Marshall Jun 2013 B2
8489761 Pope et al. Jul 2013 B2
8489894 Comrie et al. Jul 2013 B2
8543506 Grandcolas et al. Sep 2013 B2
8589335 Smith et al. Nov 2013 B2
8595074 Sharma et al. Nov 2013 B2
8595098 Starai et al. Nov 2013 B2
8625838 Song et al. Jan 2014 B2
8630952 Menon Jan 2014 B2
8635687 Binder Jan 2014 B2
8639629 Hoffman Jan 2014 B1
8655310 Katzer et al. Feb 2014 B1
8655719 Li et al. Feb 2014 B1
8660926 Wehunt et al. Feb 2014 B1
8666411 Tokgoz et al. Mar 2014 B2
8682753 Kulathungam Mar 2014 B2
8682802 Kannanari Mar 2014 B1
8700729 Dua Apr 2014 B2
8706625 Vicente et al. Apr 2014 B2
8712839 Steinert et al. Apr 2014 B2
8725601 Ledbetter et al. May 2014 B2
8762211 Killian et al. Jun 2014 B2
8762237 Monasterio et al. Jun 2014 B2
8768838 Hoffman Jul 2014 B1
8781957 Jackson et al. Jul 2014 B2
8781963 Feng et al. Jul 2014 B1
8793190 Johns et al. Jul 2014 B2
8794972 Lopucki Aug 2014 B2
8851369 Bishop et al. Oct 2014 B2
8868458 Starbuck et al. Oct 2014 B1
8868666 Hellwege et al. Oct 2014 B1
8880047 Konicek et al. Nov 2014 B2
8887997 Barret et al. Nov 2014 B2
8910304 Tsujimoto Dec 2014 B2
8924288 Easley et al. Dec 2014 B1
8925099 Saxe et al. Dec 2014 B1
8954839 Sharma et al. Feb 2015 B2
9043609 Calman May 2015 B2
9076134 Grovit et al. Jul 2015 B2
9105021 Tobin Aug 2015 B2
9195984 Spector et al. Nov 2015 B1
9256871 Anderson et al. Feb 2016 B2
9256904 Haller et al. Feb 2016 B1
9305155 Vo Apr 2016 B1
9351193 Raleigh et al. May 2016 B2
9372849 Gluck et al. Jun 2016 B2
9390417 Song et al. Jul 2016 B2
9396491 Isaacson et al. Jul 2016 B2
9444824 Balazs et al. Sep 2016 B1
9489694 Haller et al. Nov 2016 B2
9514456 England et al. Dec 2016 B2
9519934 Calman et al. Dec 2016 B2
9524525 Manyam et al. Dec 2016 B2
9558478 Zhao Jan 2017 B2
9569473 Holenstein et al. Feb 2017 B1
9569766 Kneen Feb 2017 B2
9576318 Caldwell Feb 2017 B2
9646300 Zhou et al. May 2017 B1
9647855 Deibert et al. May 2017 B2
9690621 Kim et al. Jun 2017 B2
9699610 Chicoine et al. Jul 2017 B1
9710566 Ainslie et al. Jul 2017 B2
9740543 Savage et al. Aug 2017 B1
9760871 Pourfallah et al. Sep 2017 B1
9775029 Lopez Sep 2017 B2
9792636 Milne Oct 2017 B2
9792648 Haller et al. Oct 2017 B1
9849364 Tran et al. Dec 2017 B2
9853959 Kapczynski et al. Dec 2017 B1
9858405 Ranadive et al. Jan 2018 B2
9858576 Song et al. Jan 2018 B2
9978046 Lefebvre et al. May 2018 B2
9996837 Siddens et al. Jun 2018 B2
10032146 Caldwell Jul 2018 B2
10044501 Bradley et al. Aug 2018 B1
10044647 Karp et al. Aug 2018 B1
10050779 Alness et al. Aug 2018 B2
10055747 Sherman et al. Aug 2018 B1
10096006 Loevenguth et al. Oct 2018 B2
10096043 Beck et al. Oct 2018 B2
10097356 Zinder Oct 2018 B2
10115155 Haller et al. Oct 2018 B1
10152756 Isaacson et al. Dec 2018 B2
10157420 Narayana et al. Dec 2018 B2
10187483 Golub Jan 2019 B2
10204327 Katzin et al. Feb 2019 B2
10216548 Zhang et al. Feb 2019 B1
10250453 Singh et al. Apr 2019 B1
10275602 Bjorn et al. Apr 2019 B2
10282741 Yu et al. May 2019 B2
10359915 Asai Jul 2019 B2
10373129 James et al. Aug 2019 B1
10402817 Benkreira et al. Sep 2019 B1
10402818 Zarakas et al. Sep 2019 B2
10417396 Bawa et al. Sep 2019 B2
10423948 Wilson et al. Sep 2019 B1
10438290 Winklevoss et al. Oct 2019 B1
10445152 Zhang et al. Oct 2019 B1
10460395 Grassadonia Oct 2019 B2
10521798 Song et al. Dec 2019 B2
10592882 Viswanath et al. Mar 2020 B1
10614478 Georgi Apr 2020 B1
10650448 Haller et al. May 2020 B1
10657503 Ebersole et al. May 2020 B1
10673862 Threlkeld Jun 2020 B1
10742655 Taylor et al. Aug 2020 B2
10762478 Maeng Sep 2020 B1
10867298 Duke et al. Dec 2020 B1
10872005 Killis Dec 2020 B1
10878496 Duong et al. Dec 2020 B1
10936711 Jain et al. Mar 2021 B2
10963589 Fakhraie et al. Mar 2021 B1
10984482 Thangarajah et al. Apr 2021 B1
10992679 Fakhraie et al. Apr 2021 B1
11107561 Matthieu et al. Aug 2021 B2
11144903 Ready Oct 2021 B2
11151529 Nolte et al. Oct 2021 B1
11200569 James et al. Dec 2021 B1
11227064 Fakhraie et al. Jan 2022 B1
11386223 Fakhraie et al. Jul 2022 B1
11507935 Ellis et al. Nov 2022 B1
20010001856 Gould et al. May 2001 A1
20010032183 Landry Oct 2001 A1
20010051920 Joao et al. Dec 2001 A1
20010056398 Scheirer Dec 2001 A1
20020016749 Borecki et al. Feb 2002 A1
20020035539 O'Connell Mar 2002 A1
20020038289 Lawlor et al. Mar 2002 A1
20020062249 Iannacci May 2002 A1
20020095386 Maritzen et al. Jul 2002 A1
20020143655 Elston et al. Oct 2002 A1
20020169720 Wilson et al. Nov 2002 A1
20030046246 Klumpp et al. Mar 2003 A1
20030055786 Smith et al. Mar 2003 A1
20030061163 Durfield Mar 2003 A1
20030097331 Cohen May 2003 A1
20030172040 Kemper et al. Sep 2003 A1
20030195847 Felger Oct 2003 A1
20030200179 Kwan Oct 2003 A1
20030216997 Cohen Nov 2003 A1
20030217001 McQuaide et al. Nov 2003 A1
20040054564 Fonseca et al. Mar 2004 A1
20040054591 Spaeth et al. Mar 2004 A1
20040073903 Melchione et al. Apr 2004 A1
20040078325 O'Connor Apr 2004 A1
20040090825 Nam et al. May 2004 A1
20040128243 Kavanagh et al. Jul 2004 A1
20040143632 McCarty Jul 2004 A1
20040148259 Reiners et al. Jul 2004 A1
20040178907 Cordoba Sep 2004 A1
20040225606 Nguyen et al. Nov 2004 A1
20040249710 Smith et al. Dec 2004 A1
20040249753 Blinn et al. Dec 2004 A1
20040263901 Critelli et al. Dec 2004 A1
20050010483 Ling Jan 2005 A1
20050014705 Cheng et al. Jan 2005 A1
20050027431 Todoroki et al. Feb 2005 A1
20050039041 Shaw et al. Feb 2005 A1
20050060233 Bonalle et al. Mar 2005 A1
20050114705 Reshef et al. May 2005 A1
20050131815 Fung et al. Jun 2005 A1
20050171898 Bishop Aug 2005 A1
20050199714 Brandt et al. Sep 2005 A1
20050205662 Nelson Sep 2005 A1
20050224587 Shin et al. Oct 2005 A1
20050228750 Olliphant et al. Oct 2005 A1
20050273431 Abel et al. Dec 2005 A1
20060046742 Zhang Mar 2006 A1
20060046745 Davidson Mar 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060178986 Giordano et al. Aug 2006 A1
20060184456 De Janasz Aug 2006 A1
20060190374 Sher Aug 2006 A1
20060202012 Grano et al. Sep 2006 A1
20060206912 Klarfeld et al. Sep 2006 A1
20060235795 Johnson et al. Oct 2006 A1
20060278698 Lovett Dec 2006 A1
20070051797 Randolph-Wall et al. Mar 2007 A1
20070083463 Kraft Apr 2007 A1
20070100773 Wallach May 2007 A1
20070112673 Protti May 2007 A1
20070123305 Chen et al. May 2007 A1
20070143831 Pearson et al. Jun 2007 A1
20070203836 Dodin Aug 2007 A1
20070226086 Bauman et al. Sep 2007 A1
20070255653 Tumminaro et al. Nov 2007 A1
20070266257 Camaisa et al. Nov 2007 A1
20080000052 Hong et al. Jan 2008 A1
20080005037 Hammad et al. Jan 2008 A1
20080017702 Little et al. Jan 2008 A1
20080021787 Mackouse Jan 2008 A1
20080029608 Kellum et al. Feb 2008 A1
20080052226 Agarwal et al. Feb 2008 A1
20080066185 Lester et al. Mar 2008 A1
20080086398 Parlotto Apr 2008 A1
20080115104 Quinn May 2008 A1
20080149706 Brown et al. Jun 2008 A1
20080154772 Carlson Jun 2008 A1
20080170156 Kim Jul 2008 A1
20080191878 Abraham Aug 2008 A1
20080208726 Tsantes et al. Aug 2008 A1
20080226142 Pennella et al. Sep 2008 A1
20080229383 Buss et al. Sep 2008 A1
20080244724 Choe et al. Oct 2008 A1
20080260119 Marathe et al. Oct 2008 A1
20080283590 Oder et al. Nov 2008 A1
20080301043 Unbehagen Dec 2008 A1
20080319889 Hammad et al. Dec 2008 A1
20090005269 Martin et al. Jan 2009 A1
20090007231 Kaiser et al. Jan 2009 A1
20090012898 Sharma et al. Jan 2009 A1
20090055269 Baron Feb 2009 A1
20090055642 Myers et al. Feb 2009 A1
20090089113 Rousso et al. Apr 2009 A1
20090112763 Scipioni et al. Apr 2009 A1
20090132351 Gibson May 2009 A1
20090164324 Bishop et al. Jun 2009 A1
20090205014 Doman et al. Aug 2009 A1
20090228381 Mik et al. Sep 2009 A1
20090254447 Blades Oct 2009 A1
20090254971 Herz et al. Oct 2009 A1
20090287603 Lamar et al. Nov 2009 A1
20090292599 Rampell et al. Nov 2009 A1
20090319638 Faith et al. Dec 2009 A1
20100036769 Winters et al. Feb 2010 A1
20100036906 Song et al. Feb 2010 A1
20100063906 Nelsen et al. Mar 2010 A1
20100082445 Hodge et al. Apr 2010 A1
20100082487 Nelsen Apr 2010 A1
20100094735 Reynolds et al. Apr 2010 A1
20100100470 Buchanan et al. Apr 2010 A1
20100114768 Duke et al. May 2010 A1
20100132049 Vernal May 2010 A1
20100199098 King Aug 2010 A1
20100228671 Patterson Sep 2010 A1
20100274691 Hammad et al. Oct 2010 A1
20100276484 Banerjee et al. Nov 2010 A1
20100312700 Coulter et al. Dec 2010 A1
20100327056 Yoshikawa et al. Dec 2010 A1
20110023129 Vernal Jan 2011 A1
20110035288 Clyne Feb 2011 A1
20110035318 Hargrove et al. Feb 2011 A1
20110035596 Attia et al. Feb 2011 A1
20110078010 Postrel Mar 2011 A1
20110106698 Isaacson et al. May 2011 A1
20110162057 Gottumukkala et al. Jun 2011 A1
20110172837 Forbes, Jr. Jul 2011 A1
20110176010 Houjou et al. Jul 2011 A1
20110178929 Durkin et al. Jul 2011 A1
20110191177 Blackhurst et al. Aug 2011 A1
20110191239 Blackhurst et al. Aug 2011 A1
20110196791 Dominguez Aug 2011 A1
20110202462 Keenan Aug 2011 A1
20110218849 Rutigliano et al. Sep 2011 A1
20110247055 Guo et al. Oct 2011 A1
20110276479 Thomas Nov 2011 A1
20110307826 Rivera et al. Dec 2011 A1
20110320246 Tietzen et al. Dec 2011 A1
20120024946 Tullis et al. Feb 2012 A1
20120030006 Yoder et al. Feb 2012 A1
20120030109 Dooley Maley et al. Feb 2012 A1
20120041881 Basu et al. Feb 2012 A1
20120046994 Reisman Feb 2012 A1
20120047072 Larkin Feb 2012 A1
20120096534 Boulos et al. Apr 2012 A1
20120099780 Smith et al. Apr 2012 A1
20120101938 Kasower Apr 2012 A1
20120117467 Maloney et al. May 2012 A1
20120117476 Siegrist et al. May 2012 A1
20120123841 Taveau et al. May 2012 A1
20120123933 Abel et al. May 2012 A1
20120124658 Brudnicki et al. May 2012 A1
20120158590 Salonen Jun 2012 A1
20120173387 Talker Jul 2012 A1
20120197691 Grigg et al. Aug 2012 A1
20120214577 Petersen et al. Aug 2012 A1
20120227094 Begen et al. Sep 2012 A1
20120239417 Pourfallah et al. Sep 2012 A1
20120239479 Amaro et al. Sep 2012 A1
20120239670 Horn et al. Sep 2012 A1
20120240235 Moore Sep 2012 A1
20120246122 Short et al. Sep 2012 A1
20120253852 Pourfallah et al. Oct 2012 A1
20120254038 Mullen Oct 2012 A1
20120259782 Hammad Oct 2012 A1
20120265682 Menon Oct 2012 A1
20120265685 Brudnicki et al. Oct 2012 A1
20120270522 Laudermilch et al. Oct 2012 A1
20120296725 Dessert et al. Nov 2012 A1
20120296831 Carrott Nov 2012 A1
20120310760 Phillips et al. Dec 2012 A1
20120317036 Bower et al. Dec 2012 A1
20130006847 Hammad et al. Jan 2013 A1
20130031006 McCullagh et al. Jan 2013 A1
20130046607 Granville, III Feb 2013 A1
20130046690 Calman et al. Feb 2013 A1
20130055378 Chang et al. Feb 2013 A1
20130073388 Heath Mar 2013 A1
20130080219 Royyuru et al. Mar 2013 A1
20130090998 Shimogori Apr 2013 A1
20130091452 Sorden et al. Apr 2013 A1
20130103391 Millmore et al. Apr 2013 A1
20130117696 Robertson et al. May 2013 A1
20130132854 Raleigh et al. May 2013 A1
20130151405 Head et al. Jun 2013 A1
20130159178 Colon et al. Jun 2013 A1
20130166332 Hammad Jun 2013 A1
20130173402 Young et al. Jul 2013 A1
20130174244 Taveau et al. Jul 2013 A1
20130191213 Beck et al. Jul 2013 A1
20130204894 Faith Aug 2013 A1
20130212666 Mattsson et al. Aug 2013 A1
20130218649 Beal Aug 2013 A1
20130218758 Koenigsbrueck et al. Aug 2013 A1
20130226813 Voltz Aug 2013 A1
20130240618 Hall Sep 2013 A1
20130246258 Dessert Sep 2013 A1
20130246272 Kirsch Sep 2013 A1
20130254079 Murali Sep 2013 A1
20130254115 Pasa et al. Sep 2013 A1
20130282542 White Oct 2013 A1
20130297400 Nagarajan et al. Nov 2013 A1
20130301392 Zhao Nov 2013 A1
20130317893 Nelson et al. Nov 2013 A1
20130332256 Faith et al. Dec 2013 A1
20130339124 Postrel Dec 2013 A1
20130346302 Purves et al. Dec 2013 A1
20130346306 Kopp Dec 2013 A1
20130346310 Burger et al. Dec 2013 A1
20140006209 Groarke Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140024354 Haik et al. Jan 2014 A1
20140026193 Saxman et al. Jan 2014 A1
20140032410 Georgiev et al. Jan 2014 A1
20140032419 Anderson et al. Jan 2014 A1
20140032723 Nema Jan 2014 A1
20140040134 Ciurea Feb 2014 A1
20140040144 Plomske et al. Feb 2014 A1
20140046827 Hochstatter et al. Feb 2014 A1
20140053069 Yan Feb 2014 A1
20140058912 Bajaj Feb 2014 A1
20140067503 Ebarle Grecsek et al. Mar 2014 A1
20140067683 Varadarajan Mar 2014 A1
20140068030 Chambers et al. Mar 2014 A1
20140076967 Pushkin et al. Mar 2014 A1
20140081736 Blackhurst et al. Mar 2014 A1
20140108140 Crawford Apr 2014 A1
20140108260 Poole et al. Apr 2014 A1
20140108263 Ortiz et al. Apr 2014 A1
20140114780 Menefee et al. Apr 2014 A1
20140114855 Bajaj et al. Apr 2014 A1
20140122328 Grigg May 2014 A1
20140123312 Marcotte May 2014 A1
20140129357 Goodwin May 2014 A1
20140129448 Aiglstorfer May 2014 A1
20140136419 Kiyohara May 2014 A1
20140143886 Eversoll May 2014 A1
20140149198 Kim et al. May 2014 A1
20140149293 Laracey May 2014 A1
20140149368 Lee et al. May 2014 A1
20140162598 Villa-Real Jun 2014 A1
20140164220 Desai et al. Jun 2014 A1
20140172576 Spears et al. Jun 2014 A1
20140172707 Kuntagod et al. Jun 2014 A1
20140180854 Bryant, II Jun 2014 A1
20140198054 Sharma et al. Jul 2014 A1
20140200957 Biggs Jul 2014 A1
20140207672 Kelley Jul 2014 A1
20140236792 Pant et al. Aug 2014 A1
20140237236 Kalinichenko et al. Aug 2014 A1
20140248852 Raleigh Sep 2014 A1
20140250002 Isaacson et al. Sep 2014 A1
20140258104 Harnisch Sep 2014 A1
20140258109 Jiang et al. Sep 2014 A1
20140258110 Davis et al. Sep 2014 A1
20140279309 Cowen et al. Sep 2014 A1
20140279474 Evans et al. Sep 2014 A1
20140279551 Samid Sep 2014 A1
20140279559 Smith et al. Sep 2014 A1
20140282852 Vestevich Sep 2014 A1
20140297438 Dua Oct 2014 A1
20140306833 Ricci Oct 2014 A1
20140324527 Kulkarni et al. Oct 2014 A1
20140337188 Bennett et al. Nov 2014 A1
20140337215 Howe Nov 2014 A1
20140344149 Campos Nov 2014 A1
20140344153 Raj et al. Nov 2014 A1
20140344877 Ohmata et al. Nov 2014 A1
20140357233 Maximo et al. Dec 2014 A1
20140365291 Shvarts Dec 2014 A1
20140372308 Sheets Dec 2014 A1
20140379575 Rogan Dec 2014 A1
20150019443 Sheets et al. Jan 2015 A1
20150019944 Kalgi Jan 2015 A1
20150026026 Calman et al. Jan 2015 A1
20150026049 Theurer et al. Jan 2015 A1
20150026057 Calman et al. Jan 2015 A1
20150032625 Dill et al. Jan 2015 A1
20150032626 Dill et al. Jan 2015 A1
20150032627 Dill et al. Jan 2015 A1
20150039457 Jacobs et al. Feb 2015 A1
20150039496 Shuster Feb 2015 A1
20150046338 Laxminarayanan et al. Feb 2015 A1
20150046339 Wong et al. Feb 2015 A1
20150066768 Williamson et al. Mar 2015 A1
20150070132 Candelore Mar 2015 A1
20150073989 Green et al. Mar 2015 A1
20150079932 Zelinka Mar 2015 A1
20150081349 Johndrow et al. Mar 2015 A1
20150082042 Hoornaert et al. Mar 2015 A1
20150088633 Salmon et al. Mar 2015 A1
20150088756 Makhotin et al. Mar 2015 A1
20150095238 Khan et al. Apr 2015 A1
20150095999 Toth Apr 2015 A1
20150096039 Mattsson et al. Apr 2015 A1
20150100477 Salama et al. Apr 2015 A1
20150100495 Salama et al. Apr 2015 A1
20150106239 Gaddam et al. Apr 2015 A1
20150112870 Nagasundaram et al. Apr 2015 A1
20150121500 Venkatanaranappa et al. Apr 2015 A1
20150127524 Jacobs et al. May 2015 A1
20150127547 Powell et al. May 2015 A1
20150128215 Son et al. May 2015 A1
20150132984 Kim et al. May 2015 A1
20150134700 Macklem et al. May 2015 A1
20150142673 Nelsen et al. May 2015 A1
20150149272 Salmon et al. May 2015 A1
20150149357 Ioannidis et al. May 2015 A1
20150154595 Collinge et al. Jun 2015 A1
20150178724 Ngo et al. Jun 2015 A1
20150180836 Wong et al. Jun 2015 A1
20150186856 Weiss et al. Jul 2015 A1
20150193639 Esposito et al. Jul 2015 A1
20150193764 Haggerty et al. Jul 2015 A1
20150193866 Van Heerden et al. Jul 2015 A1
20150199679 Palanisamy et al. Jul 2015 A1
20150199689 Kumnick et al. Jul 2015 A1
20150200495 Yu et al. Jul 2015 A1
20150213435 Douglas et al. Jul 2015 A1
20150220917 Aabye et al. Aug 2015 A1
20150220999 Thornton et al. Aug 2015 A1
20150221149 Main et al. Aug 2015 A1
20150229622 Grigg et al. Aug 2015 A1
20150242853 Powell Aug 2015 A1
20150248405 Rudich et al. Sep 2015 A1
20150254635 Bondesen et al. Sep 2015 A1
20150254638 Bondesen et al. Sep 2015 A1
20150254646 Harkey et al. Sep 2015 A1
20150254647 Bondesen et al. Sep 2015 A1
20150254655 Bondesen et al. Sep 2015 A1
20150254656 Bondesen et al. Sep 2015 A1
20150269566 Gaddam et al. Sep 2015 A1
20150277712 Ratcliffe et al. Oct 2015 A1
20150286834 Ohtani et al. Oct 2015 A1
20150287133 Marlov et al. Oct 2015 A1
20150295906 Ufford et al. Oct 2015 A1
20150312038 Palanisamy Oct 2015 A1
20150319158 Kumnick Nov 2015 A1
20150319198 Gupta et al. Nov 2015 A1
20150324592 Dutta Nov 2015 A1
20150332067 Gorod Nov 2015 A1
20150339663 Lopreiato et al. Nov 2015 A1
20150339664 Wong et al. Nov 2015 A1
20150348083 Brill et al. Dec 2015 A1
20150371221 Wardman Dec 2015 A1
20150372999 Pi-Sunyer Dec 2015 A1
20150379508 Van Dec 2015 A1
20160004741 Johnson et al. Jan 2016 A1
20160026997 Tsui et al. Jan 2016 A1
20160028550 Gaddam et al. Jan 2016 A1
20160028735 Francis et al. Jan 2016 A1
20160036790 Shastry et al. Feb 2016 A1
20160042381 Braine et al. Feb 2016 A1
20160063497 Grant, IV Mar 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160078428 Moser et al. Mar 2016 A1
20160080403 Cunningham et al. Mar 2016 A1
20160086222 Kurapati Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160092870 Salama et al. Mar 2016 A1
20160092872 Prakash et al. Mar 2016 A1
20160092874 O'Regan et al. Mar 2016 A1
20160098577 Lacey et al. Apr 2016 A1
20160098692 Johnson et al. Apr 2016 A1
20160109954 Harris et al. Apr 2016 A1
20160119296 Laxminarayanan et al. Apr 2016 A1
20160125405 Alterman et al. May 2016 A1
20160125409 Meredith et al. May 2016 A1
20160127892 Huang May 2016 A1
20160132918 Thomas May 2016 A1
20160140221 Park et al. May 2016 A1
20160140541 Pearson et al. May 2016 A1
20160149875 Li et al. May 2016 A1
20160155156 Gopal et al. Jun 2016 A1
20160171483 Luoma et al. Jun 2016 A1
20160173483 Wong et al. Jun 2016 A1
20160180302 Bagot, Jr. Jun 2016 A1
20160189121 Best et al. Jun 2016 A1
20160217461 Gaddam et al. Jul 2016 A1
20160232600 Purves Aug 2016 A1
20160239437 Le et al. Aug 2016 A1
20160239835 Marsyla Aug 2016 A1
20160239840 Preibisch Aug 2016 A1
20160260084 Main et al. Sep 2016 A1
20160260176 Bernard et al. Sep 2016 A1
20160267467 Rutherford et al. Sep 2016 A1
20160267480 Metral Sep 2016 A1
20160292673 Chandrasekaran Oct 2016 A1
20160294879 Kirsch Oct 2016 A1
20160307229 Balasubramanian et al. Oct 2016 A1
20160314458 Douglas Oct 2016 A1
20160321643 Beck et al. Nov 2016 A1
20160321669 Beck et al. Nov 2016 A1
20160328522 Howley Nov 2016 A1
20160328577 Howley Nov 2016 A1
20160358163 Kumar et al. Dec 2016 A1
20160371471 Patton Dec 2016 A1
20160373458 Moreton et al. Dec 2016 A1
20160379211 Hoyos et al. Dec 2016 A1
20170004506 Steinman et al. Jan 2017 A1
20170004590 Gluhovsky Jan 2017 A1
20170011215 Poiesz Jan 2017 A1
20170011389 McCandless et al. Jan 2017 A1
20170011450 Frager et al. Jan 2017 A1
20170018029 Eiriz et al. Jan 2017 A1
20170024393 Choksi et al. Jan 2017 A1
20170046679 Gotlieb et al. Feb 2017 A1
20170068954 Hockey Mar 2017 A1
20170070484 Kruse et al. Mar 2017 A1
20170078299 Castinado Mar 2017 A1
20170078303 Wu Mar 2017 A1
20170091759 Selfridge et al. Mar 2017 A1
20170132633 Whitehouse May 2017 A1
20170147631 Nair et al. May 2017 A1
20170161724 Lau Jun 2017 A1
20170161973 Katta et al. Jun 2017 A1
20170237554 Jacobs et al. Aug 2017 A1
20170249478 Lovin Aug 2017 A1
20170344991 Mark et al. Nov 2017 A1
20170352028 Vridhachalam et al. Dec 2017 A1
20170364898 Ach et al. Dec 2017 A1
20170366348 Weimer Dec 2017 A1
20180005323 Grassadonia Jan 2018 A1
20180006821 Kinagi Jan 2018 A1
20180025145 Morgner et al. Jan 2018 A1
20180053200 Cronin et al. Feb 2018 A1
20180075440 Beck et al. Mar 2018 A1
20180088909 Baratta et al. Mar 2018 A1
20180096752 Ovalle Apr 2018 A1
20180121913 Unnerstall et al. May 2018 A1
20180158137 Tsantes et al. Jun 2018 A1
20180174148 Selvarajan Jun 2018 A1
20180247302 Armstrong et al. Aug 2018 A1
20180254898 Sprague et al. Sep 2018 A1
20180268382 Wasserman Sep 2018 A1
20180268408 Botros et al. Sep 2018 A1
20180270363 Guday et al. Sep 2018 A1
20180276628 Radiotis et al. Sep 2018 A1
20180293554 Johnson Oct 2018 A1
20180331835 Jackson Nov 2018 A1
20180349922 Carlson et al. Dec 2018 A1
20180357440 Brady et al. Dec 2018 A1
20180365753 Fredrich et al. Dec 2018 A1
20180373891 Barday Dec 2018 A1
20190007381 Isaacson et al. Jan 2019 A1
20190095898 Bhatia Mar 2019 A1
20190164221 Hill et al. May 2019 A1
20190171831 Xin Jun 2019 A1
20190197501 Senci et al. Jun 2019 A1
20190220834 Moshal et al. Jul 2019 A1
20190228173 Gupta Jul 2019 A1
20190228428 Bruner et al. Jul 2019 A1
20190228430 Givol et al. Jul 2019 A1
20190244214 Flores et al. Aug 2019 A1
20190295069 Pala et al. Sep 2019 A1
20190318122 Hockey Oct 2019 A1
20190318424 McWilliams Oct 2019 A1
20190325161 Zavesky Oct 2019 A1
20190332802 Barday Oct 2019 A1
20190333061 Jackson et al. Oct 2019 A1
20190347442 Marlin Nov 2019 A1
20190354979 Crawford Nov 2019 A1
20190356641 Isaacson et al. Nov 2019 A1
20190362069 Park Nov 2019 A1
20190369845 Rucker Dec 2019 A1
20190370798 Hu et al. Dec 2019 A1
20190378182 Weinflash et al. Dec 2019 A1
20190392443 Piparsaniya et al. Dec 2019 A1
20200005283 Zimmerman et al. Jan 2020 A1
20200005347 Boal Jan 2020 A1
20200074552 Shier et al. Mar 2020 A1
20200076601 Jafari Mar 2020 A1
20200090179 Song et al. Mar 2020 A1
20200118114 Benkreira et al. Apr 2020 A1
20200118132 Schmidt et al. Apr 2020 A1
20200118133 Schmidt et al. Apr 2020 A1
20200286057 Desai Sep 2020 A1
20200286076 Zhu et al. Sep 2020 A1
20200380514 Crofts Dec 2020 A1
20210012326 Maxwell Zelocchi Jan 2021 A1
20210027300 Chetia et al. Jan 2021 A1
20210035072 Awasthi Feb 2021 A1
20210124760 Klein et al. Apr 2021 A1
20210217002 Basu et al. Jul 2021 A1
20210233170 Cadet Jul 2021 A1
20210258169 Basu et al. Aug 2021 A1
20210303335 Foreman et al. Sep 2021 A1
20210350343 Gaur et al. Nov 2021 A1
20210350458 Gaur et al. Nov 2021 A1
20220029815 Basu et al. Jan 2022 A1
20220292496 Yan Sep 2022 A1
20220294630 Collen Sep 2022 A1
20230036439 Olson et al. Feb 2023 A1
20230070625 Gaur et al. Mar 2023 A1
20230206329 Cella et al. Jun 2023 A1
20230214925 Cella et al. Jul 2023 A1
20240265405 Kramme et al. Aug 2024 A1
Foreign Referenced Citations (41)
Number Date Country
2006335151 Jul 2007 AU
2015255170 Nov 2015 AU
2016285320 Jan 2017 AU
2369296 Oct 2000 CA
2751554 Aug 2010 CA
1353842 Jun 2002 CN
101303717 Nov 2008 CN
102498497 Jun 2012 CN
102804219 Nov 2012 CN
103635920 Mar 2014 CN
104106276 Oct 2014 CN
102648476 Mar 2016 CN
107230049 Oct 2017 CN
107230070 Oct 2017 CN
103413231 Nov 2017 CN
1 259 947 Nov 2002 EP
1 770 628 Apr 2007 EP
3 073 670 Sep 2016 EP
0 441 156 Jan 1936 GB
2 441 156 Feb 2008 GB
20160015375 Feb 2016 KR
WO-9013096 Nov 1990 WO
WO-0072245 Nov 2000 WO
WO-03038551 May 2003 WO
WO-2004081893 Sep 2004 WO
WO-2004090825 Oct 2004 WO
WO-2009151839 Dec 2009 WO
WO-2011017613 Feb 2011 WO
WO-2011053404 May 2011 WO
WO-2012054148 Apr 2012 WO
WO-2012150602 Nov 2012 WO
WO-2013044175 Mar 2013 WO
WO-2013075071 May 2013 WO
WO-2013082190 Jun 2013 WO
WO-2015103443 Jul 2015 WO
WO-2015135131 Sep 2015 WO
WO-2016015054 Jan 2016 WO
WO-2016025291 Feb 2016 WO
WO-2017035399 Mar 2017 WO
WO-2018005635 Jan 2018 WO
WO-2022154789 Jul 2022 WO
Non-Patent Literature Citations (50)
Entry
Other USPTO Comm. with Refs. on US DTD Nov. 22, 2023.
Eickhoff et al: “Quality through Flow and Immersion: Gamifying Crowdsourced Relevance Assessments” ,Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, Aug. 12, 2012. (Year: 2012).
“Bitcoin Off-Chain Transactions: Their Invention and Use,” by Michelle Mount. Geo. L. Tech. Rev. 4. 2020. pp. 685-698. (Year: 2020).
“The Bitcoin Lightening Network: Scalable Off-Chain Instant Payments,” by Joseph Poon; and Thaddeus Dryia. Jan. 14, 2016. (Year: 2016).
Are Central Bank Digital Currencies (CBDCs) the money of tomorrow.
NPL Search Terms (Year: 2024).
Shehnaz Ahmed, Private partners could help RBI run a digital currency.
Shiravale, et al., Blockchain Technology: A Novel Approach in Information Security Research, IEEE 2018 (Year: 2018), 4 pps.
Yang, et al., Impact of Bitcoin's Distributed Structure on the Construction of the Central Bank's Digital Currency System IEEE, 2020 (Year: 2020), 4 pps.
ASB, “How to command your cards with ASB Card Control” Apr. 20, 2015, https://www.youtube.com/watch?v=O1sfxvVUL74 (Year: 2015).
Austin Telco Federal Credit Union, “Lost or Stolen Cards”, www.atfcu.org/lost-stolen-cards.htm; Apr. 9, 2004. 6 pages.
Authorize.Net. Authorize.Net Mobile Application: IOS User Guide. Sep. 2015. Authorize.Net LLC. Ver.2.0, 1-23. https://www.authorize.net/content/dam/anet-redesign/documents/iosuserguide.pdf (Year: 2015).
BancFirst, “Lost Card”, https://www.bancfirst.com/contact.aspx, Oct. 28, 2003. 1 page.
CM/ECF, “CM/ECF Internet Credit Card Payment Guide”, https://www.vaeb.uscourts.gov/wordpress/?page_id=340, Mar. 16, 2005. 12 pages.
CO-OP Think, Rachna Ahlawat at CO-OP Think—Evolution Sessions from THINK14, Dec. 22, 2014, 26:22. https://www.youtube.com/watch?v=yEp-qfZoPhl (Year: 2014).
Cronian, Darrin “Credit card companies Freeze Spending whilst Abroad”, published Jun. 9, 2007, Available at: http://www.travel-rants.com/2007/06/09/credit-card-companies-freeze-spending-whilst-abroad/.
Demiriz et al. “Using Location Aware Business Rules for Preventing Retail Banking Frauds” Jan. 15, 2015, IEEE (Year: 2015).
Diversinet enables new consumer mobile services from intersections inc.; MobiSecure wallet and vault helps identity management leader get closer to its customers. (May 30, 2007). PR Newswire Retrieved from https://dialog.proquest.com/professional/docview/ 450976918?accountid=131444 on Feb. 22, 2023 (Year: 2007).
Fiserv. CardValet: Mobile Application Training. Fiserv, Inc. 1-93. https://www.westernbanks.com/media/1664/ cardvalet-application .pdf (Year: 2015).
Fort Knox Federal Credit Union, “Lost or Stolen VISA Card”, http://www.fortknoxfcu.org/loststolen.html, Feb. 1, 2001. 2 pages.
IEEE Xplore; 2009 First Asian Himalayas International Conference on Internet: Emergence of Payment Systems in the age of Electronic Commerce.; The state off Art. Author S Singh Nov. 1, 2009 pp. 1-18 (Year: 2009).
IP.com Search Query; May 5, 2020 (Year: 2020).
Konsko: “Credit Card Tokenization: Here's What You Need to Know”, Credit Card Basics, Credit Card—Advertisement Nerdwallet (Year: 2014).
Merrick Bank, “Reporting Lost or Stolen Card Help Return to the Cardholder Center FAQs”, http://www.merrickbank.com/Frequent-Asked-Questions/Report-Stolen-Card.aspx, Aug. 9, 2004. 1 page.
Microsoft, “Automatically summarize a document”, 2016. 3 pages.
Notre Dame FCU “Irish Card Shield: How to Control Transaction Types” Jan. 15, 2016, 0:27, https://youtube.com/watch?v=0eZG1c6Bn38 (Year: 2016).
PCM Credit Union, “CardValet Tutorial” Jun. 24, 2015, https://www.youtube.com/watch?v=uGPh9Htw0Wc (Year: 2015).
Purchasing charges ahead. (1994). Electronic Buyers' News,, 68. Retrieved from https://dialog.proquest.com/professional/docview/681599288?accountid=131444 on Nov. 13, 2020 (Year: 1994).
RBC Royal Bank, “If Your Card is Lost or Stolen”, http://www.rblbank.com/pdfs/CreditCard/FAQs.pdf, Oct. 1, 2002. 2 pages.
Smartphones as Practical and Secure Location Verification Tokens for Payments. (Year: 2014).
State Employees Credit Union, “Lost or Stolen Account Info”, https://www.secumd.org/advice-planning/money-and-credit/privacy-fraud-protection/lost-or-stolen-account-info.aspx, May 20, 2005. 2 pages.
Transaction aggregation as a strategy for credit card fraud detection. (Year: 2009).
Union Bank & Trust, “Report Lost or Stolen Card”, http://www.ubt.com/security-fraud/report-lost-or-stolen-cards , Jul. 10, 2005. 13 pages.
Urein et al.: “A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards”, 2011 International Conference on Collaboration Technologies and Systems (CTS) (Year: 2011).
US Office Action on U.S. Appl. No. 15/353,582 DTD Jul. 15, 2021.
US Office Action on U.S. Appl. No. 16/719,419 DTD May 12, 2021.
US Office Action on U.S. Appl. No. 17/005,113 DTD Mar. 23, 2021.
US Office Action on U.S. Appl. No. 17/020,603 DTD Apr. 13, 2021.
Using location aware business rules for preventing retail banking frauds. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7351936 (Year: 2015).
Yang MH. Security enhanced EMV-based mobile payment protocol. Scientific World Journal. 2014.https://www.ncbi.nlm.nih.gov/ pmc/articles/PMC4181509/ (Year: 2014).
Hinze et al.; Event-Based Applications and Enabling Technologies. https://www.researchgate.net/profile/Annika-Hinze/publication/220796268_Event-based_applications_and_enabling_technologies/Links/0fcfd 50b638d9592a1000000/Event-based-applications-and-enabling-technologies.pdf (Year: 2009).
Technologies for Payment Fraud Prevention: EMV, Encryption, and Tokenization, Oct. 2014, Smart Card Alliance, pp. 1-34 (Year: 2014).
Yang, Ming-Hour; Security Enhanced EMV-Based Mobile Payment Protocol. https://patents.google.com/scholar/ 15767854982483958498?q (Security Enhanced EMV-Based Mobile Payment Protocol)&patents=false&scholar&oq=Security Enhanced EMV-Based Mobile Payment Protocol (Year: 2014).
Luz et al: “A Mobile NFC Payment Terminal for the Event-Wallet on an Android Smartphone” researchgat.net, (Year: 2012).
Tene et al. Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of technology and Intellectual Property. https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article= 1191 &context=njtip (Year: 2013).
Demiriz et al., “Using location aware business rules for preventing retail banking frauds,” 2015 First International Conference on Anti-Cybercrime (ICACC), pp. 1-6. https://ieeexplore.IEEE.org/documenU7351936? source=IQplus.
Dunman et al., “A Novel and Successful Credit Card Fraud Detection System Implemented in a Turkish Bank,” 2013 IEEE 13th International Conference on Data Mining Workshops, Dallas, TX, USA. Retrieved from https://ieeexplore.IEEE.org/documenU6753916?source=IQplus.
Ivatury, G., Mobile Phone Banking and Low-Income Customers, 2006, Retrieved from https://www.cgap.org/sites/default/files/CGAP-Mobile-Phone-Banking-and-Low-Income-Customers-Evidence-from-South-Africa-Jan. 2006.pdf.
Park et al., “Leveraging Cellular Infrastructure to Improve Fraud Prevention,” 2009 Annual Computer Security Applications Conference, Honolulu, Hi, USA, https://ieeexplore.IEEE.org/documenU5380689?source= IQplus.
Trappey et al., “Patent portfolio analysis of e-payment services using technical ontology roadmaps,” 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary. Retrieved from https://ieeexplore.IEEE.org/documenU7844992?source=IQplus.
Related Publications (1)
Number Date Country
20230230072 A1 Jul 2023 US
Provisional Applications (1)
Number Date Country
62357737 Jul 2016 US
Continuations (1)
Number Date Country
Parent 15629423 Jun 2017 US
Child 18126773 US