Connected payment card systems and methods

Information

  • Patent Grant
  • 12112313
  • Patent Number
    12,112,313
  • Date Filed
    Wednesday, March 15, 2023
    a year ago
  • Date Issued
    Tuesday, October 8, 2024
    a month ago
Abstract
Methods and systems of managing payment cards are disclosed. A financial institution computing system includes a token database storing a plurality of tokens and token information, a network interface circuit enabling the financial institution computing system to exchange information over a network; and a token management circuit. The token management circuit enables a graphical user interface on a customer device over the network that can be used to generate new token requests, re-provision token requests, and management requests. The management requests enable and disable tokens, such that transactions against a payment card account using an enabled token are completed, and transactions against the payment card account using a disabled token are denied.
Description
BACKGROUND

Payment cards can be provided in many forms beyond a plastic card with a magstripe. Payment cards can be provided with on-board integrated circuits and can be provisioned to mobile devices for mobile wallet transactions. Such arrangements can be used for both in-person and on-line transactions. However, while payment cards reduce the need to carry physical currency, payment card transactions can entail security risks. Further, many existing systems manage security issues on an account-by-account basis. As such, a customer may have to freeze or close an entire payment card account as a result of a security breach at a single merchant. Resorting to an account-wide freeze can be significantly disruptive, particularly where the customer has a limited number of available payment source accounts.


SUMMARY

One example embodiment relates to a financial institution computing system. The system includes a token database, a network interface circuit, and a token management circuit. The token database retrievably stores a plurality of tokens and token information associated with each of the plurality of tokens. The network interface circuit enables the financial institution computing system to exchange information over a network. The token management circuit is configured to enable a graphical user interface on a customer device over the network. The token management circuit is further configured to cause a new token to be provisioned in response to a new token command generated by the graphical user interface. The token management circuit is configured to cause a token to be re-provisioned in response to a re-provision token command generated by the graphical user interface. The token management circuit is further configured to enable and disable tokens in the token database in response to management commands generated by the graphical user interface. Transactions against a customer payment card account using an enabled token are completed, and transactions against the customer payment card account using a disabled token are denied.


Another example embodiment relates to a method of enabling real time payment card account management for customers of a financial institution, including management of physical payment cards, as performed by one or more circuits at a financial institution computing system. The method includes retrievably storing, by a token database, a plurality of tokens and token information associated with each of the plurality of tokens. The method further includes enabling, by a network interface circuit, the financial institution computing system to exchange information over a network. The method includes enabling, by a token management circuit, a graphical user interface on a customer device over the network. The method further includes responding, by the token management circuit, to requests provided by the graphical user interface, including causing a new token to be provisioned in response to a new token request, causing a token to be re-provisioned in response to a re-provision token request, and enabling and disabling tokens in the token database in response to management requests. A transaction against a customer payment card account using an enabled token is completed, and wherein a transaction against the customer payment card account using a disabled token is denied.


Yet another arrangement relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a processor of a financial institution computing system, cause the financial institution computing system to perform operations to enable real time payment card account management for customers of a financial institution, including management of physical payment cards. The operations include retrievably storing, by a token database, a plurality of tokens and token information associated with each of the plurality of tokens. The operations further include enabling, by a network interface circuit, the financial institution computing system to exchange information over a network. The operations include enabling, by a token management circuit, a graphical user interface on a customer device over the network. The operations further include responding, by the token management circuit, to requests provided by the graphical user interface, including causing a new token to be provisioned in response to a new token request, causing a token to be re-provisioned in response to a re-provision token request, and enabling and disabling tokens in the token database in response to management requests. A transaction against a customer payment card account using an enabled token is completed, and wherein a transaction against the customer payment card account using a disabled token is denied.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram illustrating a payment card and token provisioning system, according to an example embodiment.



FIG. 2 is a block diagram illustrating additional features of the payment card and token provisioning system shown in FIG. 1.



FIGS. 3A-3D are depictions of various screens generated on a user interface, which may be used to facilitate a payment transaction, according to example embodiments.



FIG. 4 is a flowchart of a method of provisioning a payment card, according to an example embodiment.





DETAILED DESCRIPTION

Referring to FIG. 1, a payment processing system 100 includes a financial institution computing system 102, a customer device 104, a merchant computing system 106, and a card network computing system 108. A network 110 enables components of the system 100 to communicate with each other. The network 110 is a data exchange medium, which may include wireless networks (e.g., cellular networks, Bluetooth®, WiFi, Zigbee®, etc.), wired networks (e.g., Ethernet, DSL, cable, fiber-based, etc.), or a combination thereof. In some arrangements, the network 110 includes the internet.


In example embodiments, payment processing system 100 uses payment tokens to facilitate payments to merchants. In example embodiments, payment tokens may be surrogate values that replace the primary account number (PAN) associated with a payment card, such as a credit card, debit card, stored value card, etc. Payment tokens may pass basic validation rules of an account number. Hence, the payment token for a credit card in many respects “looks like” a real credit card number, but in fact is only a token. As part of the token generation process, steps are taken such that the generated payment token does not have the same value as or conflict with a real primary account number (e.g., a real credit card number). Payment tokens may be provisioned to various locations for use in various types of payment scenarios, including remote storage at a merchant (e.g., a card-on-file database) for on-line transactions with the merchant, a secure storage element (“secure element”) located in a payment card for a point-of-sale transaction using the payment card, local device storage (e.g., internal memory of a mobile device) for a mobile/digital wallet transaction, and so on.


In example embodiments, to process payment transactions, a payment is processed using a payment token in lieu of a primary account number (e.g., the 16-digit account number on the front of a credit card). The merchant obtains the payment token from a customer device or from the payment card, and then submits the payment token through a payment network to a computing system associated with a card network (e.g., Visa®, MasterCard®, American Express®, Discover®, Diners Club®, etc.). The card network computing system detokenizes the payment token to obtain the PAN, i.e., replaces the payment token for its associated PAN value based on the payment token-to-PAN mapping information stored in a token database (sometimes referred as a “token vault”). The card network computing system then transmits the PAN to the card issuer (e.g., the customer's financial institution) for processing in a manner similar to a traditional credit card transaction. For example, the card issuer may approve the transaction, in which case the transaction with the merchant is completed and payment to the merchant is made. The token database may also maintain other information that may be used to apply restrictions or other controls during transaction processing.


In example embodiments, processing payment transactions using such payment tokens provides enhanced security in connection with the payment card transactions. The payment tokens may be limited to use, e.g., only in connection with a specific merchant or a specific channel (e.g., payment via a specific mobile wallet). For example, in the event of a data breach at a merchant, the risk of subsequent fraud is reduced because only the payment tokens are exposed instead of primary account numbers. In this example, the payment tokens are merchant-specific and therefore cannot be used at other merchants. Although the examples provided herein relate primarily to the use of payment tokens (which may be used to originate payment transactions), the systems and methods described herein may also be used with and non-payment tokens (which may be used for ancillary processes, such as loyalty tracking), as described in greater detail below.


Referring again in detail to FIG. 1, the financial institution computing system 102 is a computing system at a financial institution that is capable of maintaining customer accounts (e.g., payment card accounts, such as credit card accounts, demand deposit accounts having an associated debit card, stored value card accounts, and so on) and databases of customer information. In the context of the present disclosure, the financial institution can include commercial or private banks, credit unions, investment brokerages, and so on.


The customer device 104 is a computing system associated with a customer of the financial institution. The customer device 104 includes one or more processors and non-transitory storage mediums housing one or more logics configured to allow the customer device 104 to exchange data over the network 110, execute software applications, access websites, generate graphical user interfaces, and perform other operations. Examples of the customer device 104 include laptop computers, desktop computers, mobile devices (tablets, smartphones, wearable computing devices such as eyewear, etc.), and so on.


The merchant computing system 106 is a computing system associated with a merchant with which a customer of the financial institution may transact. Examples of merchants include, for example, retailers, wholesalers, marketplace operators, service providers (e.g., loan servicers, cleaning services, transportation providers, digital wallet services, and so on), and so on. In some arrangements, the merchant computing system 106 is used to create and store data relating to customer transactions (e.g., purchases and refunds). In some such arrangements, the merchant computing system 106 can store databases of information relating to customers such as names, shipping addresses, contact information, and so on. Further, the merchant computing system 106 may be able to operate customer loyalty programs (e.g., membership programs, points programs, frequent shopper discounts, and so on).


The card network computing system 108 is a computing system associated with a card network. Examples of card networks include Visa®, MasterCard®, American Express®, Discover®, Diners Club®, etc. In some embodiments, the card network computing system 108 generates tokens for payment cards. The card network computing system 108 performs operations associated with the generation and issuance of payment tokens. The card network computing system 108 also maintains the established mapping of payment tokens-to-PANs in a token database (or token vault). The card network computing system 108 also detokenizes payment tokens during processing of payment transactions to determine actual account numbers.


Referring now to FIG. 2, system 100 is shown in greater detail according to one example embodiment. In FIG. 2, the financial institution computing system 102 includes a FI customer database 202, a token database 204, a token management circuit 206, a data exchange circuit 208, and an FI network interface circuit 210. The FI network interface circuit 210 is configured to allow the financial institution computing system 102 and the various components therein to exchange data over the network 110.


The FI customer database 202 allows the financial institution computing system 102 to retrievably store customer information relating to the various operations discussed herein, and may include non-transient data storage mediums (e.g., hard drives, local network servers, and the like) or remote data storage facilities (e.g., cloud servers). The FI customer database 202 includes personal customer information (e.g., names, addresses, phone numbers, and so on), identification information (e.g., social security numbers, driver's license numbers, biometric data, and so on), customer financial information (e.g., account numbers, account balances, available credit, credit history, transaction histories, etc.), and so on.


The token database 204 is a storage medium which may be similar to the FI customer database 202, except that the token database 204 stores token information. The token database 204 may be a token vault that is maintained by the FI computing system 102. Hence, in some embodiments, the payment tokens are generated by the card network computing system 108, and payment token-to-PAN mapping information is maintained by the card network computing system 108; and, in addition, the payment token-to-PAN mapping information is also maintained by the FI computing system 102. For example, in some embodiments, the FI computing system 102 may provide additional token-related management services to customers that are not available through the card network computing system 108. Such services may be useful in situations where customers have multiple different types of accounts, e.g., multiple different types of credit cards, such that a single card network computing system does not have a global view of all of the payment tokens in existence for a given customer. Such services may also be useful in situations in which information in addition to account numbers is tokenized by FI computing system 102 (or other computing systems), thereby creating tokens that are not payment tokens.


To this end, in some embodiments, the token management circuit 206 is configured to enable such services. The services may be provided both in connection with non-payment tokens and in connection with payment tokens. Regarding non-payment tokens, in one aspect, the token management circuit 206 can generate a new unique code to be provisioned as a token, and associate a discrete piece of data with the new unique code (e.g., information other than a payment card number). The new unique code then becomes a token, which may be exchanged among computing devices.


In another aspect, with regard to payment tokens, the token management circuit 206 may be configured to cooperate with card network computing system 108 to activate and deactivate individual payment tokens. In other words, the token management circuit 206 may be configured to provide token-related management services to customers to activate and deactivate individual payment tokens or to otherwise configure permissions associated with such tokens. For example, a customer opening a new credit card account may be assigned a primary account number (PAN) specifically identifying that new account (e.g., a sixteen-digit credit card account number) by the FI computing system 102 and/or by the card network computing system 108. The customer may engage in transactions with one or more merchants, each of which may be assigned a payment token specific to each merchant or to a specific payment channel (e.g., a specific brand of mobile wallet). The card network computing system 108 may generate each of the payment tokens and provide information about the payment tokens to the FI computing system 102. The token management circuit 206 may be configured to cooperate with card network computing system 108 to maintain the payment tokens over their lifecycle in the databases 204 and 228.


In some embodiments, the token management circuit 206 provides a token management hub tool accessible via the customer device 104. The token management hub may be provided as a graphical user interface and presented to a customer via the customer device 104. The customer can access the management hub through via an online banking website, via a mobile banking tool provided to a mobile device, and/or in another manner. The customer may be required to provide login credentials (e.g., username and password, biometrics, etc.). Upon authenticating the customer, the data exchange circuit 208 may transmit account information for that customer from the FI customer database 202 and/or the token database 204 to the customer device 104 to provide the token management hub.


The management hub provides the customer with information relating to tokens provisioned by the card network computing system 108 and/or the FI computing system 102 and related permissions, and allows the customer to manage the tokens. The management hub may also allow the customer to monitor payment tokens issued for a given payment account. For example, the management hub may serve as an interface between the financial institution computing system 102 and the customer, wherein the customer can selectively allow and disallow transactions involving specific payment card accounts with individual merchants, service providers, and digital wallet services. In some arrangements, allowing and disallowing transactions can be performed by activating and deactivating individual payment tokens. Further, PANs may be activated or deactivated at the management hub to selectively enable and disable all transactions involving a particular payment card account. In addition, in some arrangements, the management hub can provide the customer with an alert that a payment token has been reprovisioned when a given payment token is compromised (e.g., in the event of a security breach at a corresponding merchant computing system 106, or a new PAN where a physical credit card is lost).


For example, after a customer opens a new payment card account, the customer may subsequently lose the payment card associated with the card account. However, the customer may be unsure whether the payment card has simply been temporarily misplaced, or whether the payment card has been permanently lost. The customer may be provided with the ability to access the token management hub to temporarily deactivate the payment card for use with all merchants. Subsequently, the customer may locate the payment card, and utilize the token management circuit to reactivate the payment card. Alternatively, the customer may decide that the payment card is permanently lost, and the token management circuit 206 may interact with the card network computing system 108 to deactivate the payment card and cause a new payment card to be issued. Once the new payment card is created, the card network computing system 108 may operate to generate new payment tokens to replace the payment tokens associated with the old payment card, and circulate the new payment tokens to the respective merchants associated with the old payment tokens.


As another example, the management hub may also allow the customer to monitor payment tokens issued for a given payment account. For example, the management hub can provide a list of all merchants having a payment token corresponding to a given payment card account. As such, the customer may be able to see whether any new or unusual payment tokens have been provided without the permission of the customer (e.g., where a fraudster in possession of the payment card attempts to transact with a new merchant). A new or unusual payment token appearing in the management hub circuit 212 may indicate that the payment card has been compromised. For example, a fraudster may obtain a user's credit card information, and use that credit card information in an online transaction, thereby triggering the creation of a fraudulent payment token at the online merchant. The customer may subsequently realize that the payment card has been compromised and may have the payment card deactivated. However, the customer may also recognize the existence of the unusual/fraudulently-created payment token at the unknown merchant prior to the deactivation. The customer may then deactivate that specific payment token for that merchant, thereby causing the financial institution computing system 102 to deny any future transactions for the payment card involving that merchant using the fraudulently-created payment token.


Additionally, the customer may choose to allow or disallow future transactions with a given merchant by updating permissions associated with a corresponding payment token. For example, a customer may visit a merchant once (e.g., while on vacation, while purchasing a gift for a relative, etc.). Such a merchant may be a merchant that the customer is unlikely to visit again. Hence, the customer may decide to deactivate the payment token for that merchant, since the customer is unlikely to visit that merchant again. As another example, the customer may have purchased an item from a service that provides automatic renewals, such that the customer is charged on a periodic basis (e.g., the customer is charged a $24.99 monthly service fee unless the customer takes steps to prevent the fee). In such a situation, the customer may deactivate the payment token for that merchant to prevent such unwanted recurring fees from being charged in the future.


As another example, the management hub may permit the customer to sort tokens according to various parameters, such as by merchant category, most recent transaction date, transaction amount and so on. For example, the customer may be provided with the ability to sort merchant-specific payment tokens by merchant classification code. In this manner, the customer may identify payment tokens associated with merchants that do not fit into the categories of merchants from which the user normally purchases goods/services, which may suggest that those tokens were fraudulently created. On this basis, the user may decide to deactivate such tokens or the entire payment card. Likewise, the customer may sort payment tokens by most recent transaction date and decide, e.g., to deactivate any payment token that has not been used in the past year.


As another example, the management hub can be used to provide information to customers about token activity. For example, if there is a data breach at a particular merchant, the card network computing system 108 may deactivate the payment token for that merchant and reprovision a new payment token for use with that merchant. The management hub can provide the customer with an alert that a payment token has been reprovisioned responsive to the data breach.


The data exchange circuit 208 of the FI computing system 102 is configured to exchange data among the FI customer database 202, the token database 204, the merchant computing system 106, and the customer device 104. In one aspect, the data exchange circuit 208 may be configured to exchange tokens and permissions with the token database 204 and external computing systems (e.g., the merchant computing system 106 and the customer device 104). For example, the data exchange circuit 208 may provide a new token received from the card network computing system 108 to a customer device 104.


The customer device 104 includes customer network interface circuit 212 and customer I/O devices 214. The customer network interface circuit 212 is configured to allow the customer device 104 to exchange data over the network 110. The customer I/O 214 includes hardware and associated logics configured to enable a customer to exchange information with the customer device 104. An input aspect of the customer I/O 214 allows the customer to provide information to the customer device 104, and can include, for example, a mechanical keyboard, a touchscreen, a microphone, a camera, a fingerprint scanner, a user input device engageable to the customer device 104 (e.g., via a USB, mini USB, or micro USB port, etc.), and so on. In turn, an output aspect of the customer I/O 214 allows the customer to receive information from the customer device 104, and can include, for example, a digital display, a speaker, LEDs, and so on.


In some situations, the customer device 104 may receive and display screens including account information, transaction instructions, and so on. In one embodiment, a screen may be used to request a username and password information from the user, to prompt the user to provide information regarding the amount of a payment and which merchant or individual (e.g., name, address, phone number or e-mail, a selection of a recipient by the user from his/her memory or from the customer device 104, etc.) is to receive the payment. Such screens are presented to the user via the display device portion of the customer I/O 214. An input device portion of the customer I/O 214 may be used to permit the user to initiate account access and to facilitate receiving requested information from the user.


In some situations, the customer device 104 may be a mobile device, such as a cellular phone, smart phone, mobile handheld wireless e-mail device, wearable device, portable gaming device, or other suitable device. In some embodiments, the mobile device may include a mobile wallet client application 216. The mobile wallet client application 216 or mobile wallet circuit may include program logic executable by mobile device 104 to implement at least some of the functions described herein. In order to make the mobile wallet circuit 216, the FI computing system 102 may provide a software application and make the software application available to be placed on the mobile device 104. For example, the FI computing system 102 may make the software application available to be downloaded (e.g., via the online banking website of the mobile wallet bank, via an app store, or in another manner). Responsive to a user selection of an appropriate link, the mobile wallet application may be transmitted to the mobile device and may cause itself to be installed on the mobile device 104. Installation of the software application creates the mobile wallet circuit on the mobile device 104. Specifically, after installation, the thus-modified mobile device 104 includes the mobile wallet circuit (embodied as a processor and instructions stored in non-transitory memory that are executed by the processor).


In some situations, payment is made using a payment card 218. The payment card 218 is a physical payment card associated with a payment card account (e.g., a credit card account, a checking account, a prepaid account, etc.) for a given customer, and is capable of exchanging information stored in memory in the payment card 218. The payment card 218 can also include visible information on the face of the card.


The payment card 218 includes a chip 219, a magstripe 220, and a PAN indicator field 221. The PAN indicator field 221 conveys an account number corresponding to a customer payment card account, and may be printed or embossed on the physical payment card 218 (e.g., along with a customer name, expiration date, security codes, etc.). The magstripe 220 is a magnetically-responsive strip disposed on the face of the payment card 218. The magstripe 220 is configured to store a limited amount of information (e.g., a payment card account number, a customer name, expiration date, etc.), e.g., in Track 1/Track 2 format. The chip 219 is a defining feature of the “smart” aspect of the payment card 218. The chip 219 is a small circuitry system configured to exchange data via electrical contacts, RFID communication, NFC communication, or in another manner. The chip 219 can be configured to be able to selectively transmit various types of information, including payment card information (e.g., account numbers, issuing entities, and so on), identifying customer information (e.g., customer name, billing address, phone number, and so on).


In some arrangements, in addition to the PAN which is displayed in PAN indicator field 221, the payment card 218 is further provided with channel-specific payment tokens in the chip 219 and the magstripe 220. The PAN displayed in indicator field 221, the channel-specific token stored in the chip 219, and the channel-specific token stored in the magstripe 220 may each be different numbers. Hence, rather than being programmed with the PAN, the chip 219 and the magstripe 220 are programmed with channel-specific payment tokens which are each different than the PAN. Accordingly, if a transaction involves the customer entering payment card information into an online interface (e.g., a checkout section of an online merchant), then the transaction is completed using the PAN of the payment card as presented in indicator field 221. Specifically, the merchant may transmit the PAN to the card network computing system 108 via the payment network, and the card network computing system 108 may return a payment token to the merchant computing system 106 to store in database 222 for future card-on file transactions. Likewise, if a transaction involves the customer swiping the payment card at a point of sale, then the transaction is completed using the payment token stored in the magstripe 220. Likewise, if a transaction involves the customer inserting the payment card into a chip reader at a point of sale, then the transaction is completed using the payment token stored in the chip 219. As such, the FI computing system 102 may be able to distinguish customer transactions completed via the PAN displayed on the front of the card (e.g., where a payment card account number is provided to an online merchant), the magstripe 220 (e.g., at a magstripe reader at a merchant point of sale), or the use of the chip 219 (e.g., at a chip reader at a merchant point of sale).


In some arrangements, the chip 219 stores customer information in addition to payment card account information. For example, customer identification information may be stored at the chip 219 (e.g., a name and address of the customer, driver's license number, a customer portrait image, etc.). In some embodiments, rather than storing the identification information itself, a token is stored that may be exchanged for the identification information. As such, the chip 219 may be used by a merchant computing device 106 for personal identification of the customer (e.g., to pick up airline tickets at an automated kiosk). For example, the merchant computing system 106 may read the identification information directly from the chip 219, or may submit the token to the FI computing system 102, depending on where the identification information is stored.


In some embodiments, e.g., in situations where a token is stored rather than the identification information itself, the customer may access token management circuit 206 in order to update the information associated with the token. Hence, each time a transaction occurs, the merchant computing system 106 may submit the token to the FI computing system 102 in order to verify that the address information stored by the merchant computing system 106 for the customer is the most recent/up-to-date information.


In some embodiments, the information that is stored (either locally on the chip 219 or remotely accessible via a token) may include information for the merchant to establish a loyalty account. Hence, rather than ask the customer to fill out a form to provide information to establish a loyalty account, the merchant computing system 106 may instead read the information used to create the loyalty account from the payment card 218.


In some embodiments, merchant or financial institution loyalty programs may be implemented with loyalty account numbers that are specific to each customer, and the loyalty account numbers (or tokens representing the loyalty account numbers) may be stored on the chip 219. As such, the loyalty account numbers may be retrieved from a chip reader (e.g., at every transaction involving the payment card 218), e.g., thereby avoiding the need for the customer to separately present a loyalty card or a phone number associated with the loyalty account at the point of sale. In other embodiments, each customer may be assigned a unique ID that is universal across multiple loyalty programs. Hence, the merchant computing system 106 may be configured to identify the customer based on the unique ID, and then provide loyalty program rewards to the customer using the unique ID as the basis for identifying the customer.


As another example, in some embodiments, the chip 219 may be read/writable by the merchant computing system 106 (e.g., the merchant point-of sale-device can read from and write to the chip 219). In such embodiments, rewards balance information may be stored directly on the payment card 218, and used as currency in future transactions with the merchant.


The merchant computing system 106 includes a merchant customer database 222 and a merchant network interface circuit 224. The merchant network interface circuit 224 is configured to allow the merchant computing system 106 to exchange data over the network 110. The merchant customer database 222 is a local or remote data storage system, and may be configured to store customer information relevant for completing purchase transactions. For example, the merchant customer database 222 can include customer names, shipping addresses, billing addresses, payment card information (e.g., tokens), phone numbers, and so on.


The card network computing system 108 comprises a token management circuit 226 and a token database 228. The token management circuit 226 is configured to generate and manage tokens associated with payment cards. The token database 228 maintains the mapping of payment tokens-to-PANs, such that payment tokens may be detokenized during processing of payment transactions to determine actual account numbers. The card network computing system 108 also includes a network interface circuit 230 which is configured to allow the card network computing system 108 to exchange data over the network 110.


Referring now to FIGS. 3A-3D, as previously indicated, the customer may use the customer device 104 to manage payment tokens via the token management circuit 206. For example, the customer may enable and disable financial transactions with individual merchants (e.g., merchants associated with the merchant computing system 106) against one or more payment cards. Further, in some arrangements, the customer may also be able to selectively enable and disable exchanges of customer data (e.g., customer names, shipping addresses, contact information, and the like), by type of customer data and/or by individual merchants. The customer device 104 may also be used to secure a payment card account in the event that the payment card account is compromised at a specific merchant, or the new payment card account itself is compromised. Such an arrangement is shown in greater detail in FIGS. 3A-3D.


Referring first in detail to FIG. 3A, an example graphical user interface (“GUI”) 300 is provided on a user device 104 (e.g., via the customer I/O 214). The GUI 300 is generated by the token management circuit 206. In one arrangement, the GUI 300 presents a customer with a welcome page 310 after the user provides authorizing credentials (e.g., a username and password, an entry of biometric data, or the like via the customer I/O 214). The welcome labeled with a corresponding action that the token management circuit 206 may perform (e.g., see account information, send payments, etc.). Included among the menu buttons 304 is a labeled button corresponding to the management hub.


Referring now to FIG. 3B, in response to a user selection of the management hub option within the menu buttons 304 provided in FIG. 3A, the GUI 300 has refreshed to show a management hub page 320. Information provided on the management hub page 320 includes information from the token database 204, which may be accessed and transmitted by the data exchange circuit 208 over the network 110 via the FI network interface circuit 210. In one arrangement, the management hub page 320 is organized into a first payment card account section 321 and a second payment card account section 322. Each payment card account section corresponds to a payment card account provided by the financial institution associated with the financial institution computing system 102. As shown in FIG. 3B, two payment card account sections are provided, indicating that the user is associated with two payment card accounts.


A sample window 323 (i.e., highlighted for illustrative purposes) of a portion of the first payment card account section 321 is provided to indicate various types of information provided in a given payment card account section. The sample window 323 includes a payment card account identifier 324 (e.g., identifying a credit card with a PAN ending in “−0123”). In one arrangement, a user can select a PAN reprovisioning button 325, thereby causing the management circuit 206 to initiate issuance of a new payment card with a new PAN to the customer. (As will be appreciated, although certain terminology is used in the user interface example of FIGS. 3A-3D, other terminology may also be used in practice.) The token management circuit 206 may then cooperate with the card network computing system 108 to generate a new PAN for a new payment card, generate new payment tokens for the new payment card, distribute those payment tokens to merchants and other channels, and update the token databases 204 and 228.


The sample window 323 also includes a merchant identifier 326. The merchant identifier 326 specifies a merchant to which a payment token has been assigned. Using a pair of enabling toggles 327, a user may adjust the payment token permissions stored at the token database 204 for each merchant associated with a given payment card account. Upon choosing to disable a given payment token via the corresponding enabling toggle 327, the token management circuit 206 disallows any additional transactions for the merchant corresponding to the merchant identifier 326 involving the payment card account associated with the payment card account identifier 324. Disabling the payment token may involve updating corresponding data in the token database 204. In turn, choosing to enable the payment token will cause the token management circuit 206 to allow such transactions.


In addition, if a user no longer wishes to transact with a given merchant, or if a payment token was created accidentally or fraudulently, the user may select a payment token deletion button 329 to remove a corresponding payment token from the token database 204 altogether.


Referring now to FIG. 3C, in some arrangements, the GUI 300 can provide an account page 330 specific to a given payment card account. The account page 330 can include a single payment card account section 331 having information and functionalities similar to that offered by payment card account sections (e.g., the first payment card account section 321 and the second payment card account section 322) in the account security hub page 320 (e.g., token management functions).


In some arrangements, the account page 330 includes a representative card image 332. The card image 332 may represent the appearance of a physical payment card corresponding to a given payment card account. For example, where a customer was provided a physical payment card bearing a customized image on a front side of the card (e.g., a favorite picture such as a picture of a family member(s), a pet, a landscape, etc.), the card image 332 may include the customized image as well. The card image 332 may be stored in the FI customer database 202, and provided to the customer device 104 over the network 110 after the customer hub circuit 212 is set up (e.g., via the data exchange circuit 208 in cooperation with the FI network interface circuit 210).


In some embodiments, the card image (e.g., as presented via mobile wallet circuit 216) can change at a point of sale to reflect characteristics of the point of sale transaction. For example, if the customer is at a pet store, the card image may change to show a picture of the customer's pet. Conversely, if the customer is at a floral shop, the card image may change to show a picture of the customer's spouse/significant other. The mobile wallet circuit 216 may be configured to determine point of sale characteristics via, for example, a GPS functionality at the customer device 104, or access to a local wireless network associated with a given merchant.


The card image 332 may also include a notification 333. In some arrangements, the notification 333 is incorporated into the card image 332 (e.g., as a symbol as shown, as an indicative color of a corresponding color code, or the like). The notification 333 can provide notice to a user of some status or condition relating to the payment card account corresponding to the account page 330. For example, information in the FI customer database 202 may show that a card payment is coming due, that a certain amount of a balance or credit limit or budget has been expended, or some other aspect may need attention. Such information may be reflected in the notification 333 as a color (e.g., red for approaching or exceeding spending limits), a symbol (e.g., an exclamation mark for an upcoming due date), or the like. In some arrangements, the notification 333 is a selectable button, wherein the GUI 300 refreshes to provide the user with an appropriate screen (e.g., a payments screen, a transaction history screen, etc.).


Referring now to FIG. 3D, the GUI 300 may provide a customer information page 340 (e.g., responsive to a user selection of a menu button 304 on the welcome page 310 corresponding to customer information). In some arrangements, the customer information page 340 includes an information listing 341 corresponding to personal and identifying information in textual form. For example, the information listing 341 may include a name, address, phone number, and email address. Other similar types of information may be included in the information listing 341 as well. Further, in some arrangements, the customer information page 340 may reflect successful collection of customer biometric data. For example, a stored fingerprint 342 and iris scan 343 specific to the user may be included or acknowledged in the customer information page 340. Such information may then, for example, also be propagated to other user devices, such that the user can use the same biometrics to access other devices.


In some arrangements, a user may be able to select an update button 344 in order to update or revise the information in the customer information page 340. Information in the customer information page 340 may be stored in the FI customer database 202 at the financial institution computing system 102, and exchanged with the customer device 104 and the merchant computing system 106 via the data exchange circuit 208 (e.g., over the network 110 by the FI network interface 210). Further, some or all of the information in the customer information page 340 may be stored in the chip 219 of the issued payment card 218. Upon selecting the update button 344, updated or revised information can be received by the customer device 104 (e.g., via an appropriate aspect of the customer I/O 214), and then transmitted to the data exchange circuit 208 over the network 110. The data exchange circuit 208 may store the updated or revised information in the FI customer database 202 as well as circulate it to the merchant computing system 106. The data exchange circuit 208 may also cause the chip 219 to be updated, for example during a data exchange with the financial institution computing system 102 at a point of sale or a brick and mortar banking location, or by issuing a new payment card 218 with an updated chip 219.


As such, the GUI 300 can be configured to provide a way for the customer to update information at the FI customer database 202. For example, after a customer moves to a new residence, the customer may access the customer information page 340 on the customer device 104, select the update button 344, and enter an updated mailing address into the customer device 104. The customer device 104 subsequently transmits the updated mailing address to the financial institution computing system 102 over the network 110, where it is received by the data exchange circuit 208. The data exchange circuit 208 may store the updated mailing address in the FI customer database 202.


In some arrangements, the data exchange circuit 208 may also provide the updated mailing address to one or more merchant computing systems 106. In one such arrangement, the data exchange circuit 208 accesses the token database 204 to identify merchants corresponding to customer-enabled payment tokens (e.g., via the enabling toggles 327). Upon identifying such merchants, the data exchange circuit 208 may transmit the updated mailing address to their respective merchant computing systems 106 over the network 110 via the FI network interface circuit 210.


In another such arrangement, the data exchange circuit 208 accesses the FI customer database 202 to identify merchants corresponding to previous payment transactions. For example, the data exchange circuit 208 may be configured to search through transaction histories of a customer in the FI customer database 202 to identify such merchants. In some arrangements, the data exchange circuit 208 may be configured to limit the search to transactions within a specific timeframe (e.g., within the past year, within the past six months, etc.). Further, the data exchange circuit 208 may be configured to also confirm that any merchants identified in the transaction histories correspond to customer-enabled tokens in the manner discussed above.


The data exchange circuit 208 may transmit the updated mailing address to a merchant computing system 106 upon receiving and processing the updated mailing address on a rolling basis or in batches. Alternatively, the data exchange circuit 208 may provide the updated mailing address to a merchant computing system 106 upon receiving a transaction request from the merchant computing system 106. In effect, the next time the customer orders from one of the customer-enabled merchants, the customer may not need to provide the updated mailing address to complete the transaction. Other types of customer information (e.g., phone numbers, email addresses, identification information, loyalty program information, etc.) may be updated in a similar manner.


In addition, in some arrangements, token management circuit 206 is configured to provide some or all aspects of the GUI 300 on multiple channels, enabling the GUI 300 to be viewed and manipulated by multiple users. For example, a financial institution I/O (e.g., similar to the customer I/O 214, but disposed at a financial institution facility) may be configured to allow a customer service representative to interface with the financial institution computing system 102. The token management circuit 206 may be configured to provide the GUI 300 at both the financial institution I/O and the customer I/O 214 simultaneously (e.g., over the network 110 via the FI network interface circuit 210). As such, the customer service representative may be able to guide a customer through GUI 300 in real time. In addition, both the customer service representative and the customer may perform any of the operations discussed above while simultaneously viewing the same pages of the GUI 300.



FIG. 4 illustrates a process 400 that may be implemented by the system of FIGS. 1-2. By way of example, FIG. 4 shows a mobile wallet transaction. As will be appreciated, the system 100 supports other types of transactions as well, such as card on file transactions, card present transactions, and so on.


When a user wishes to make a payment at a merchant, for example, the user may access the mobile wallet client application 216 by entering a PIN or other login credentials and then selecting a “pay now” or similar button. For example, the user may be located at a merchant location and may wish to pay for a good or service. As another example, the user may be located away from the merchant location or be engaged in an online transaction.


At step 401, the mobile device 104 may transmit a payment token to merchant computer system 140 (e.g., using a QR code, NFC, wireless, Bluetooth, low energy Bluetooth, RFID, hypersonic, Wi-Fi, cellular 3G, 4G, GSM, LiFi, or other method). In some embodiments, the payment token is provisioned to the mobile wallet circuit 216 in advance and is reused for many mobile wallet transactions. In other embodiments, the payment token is dynamically provisioned to the mobile wallet circuit 216. For example, when the user selects the “pay now” button, the mobile wallet circuit 216 may send a request to a mobile wallet computer system (not shown) which, in response, provisions a one-time payment token to the mobile wallet circuit 216.


At step 403, after receiving the payment token, the merchant computer system 104 sends the transaction to an acquirer processor computer system 112 for processing. Next, at step 405, the acquirer processor computer system 112 sends the payment token to the card network computer system 108 for processing a payment. The card network computer system 108 detokenizes the payment token, thereby resulting in the actual card number (PAN). At step 407, the card network computer system 108 sends the PAN to the FI computer system 102. The FI computer 102 then processes the transaction, for example, by approving the transaction based on the account status of the user (e.g., by confirming that the user has not exceed the credit limit of their credit card). The FI computer system 102 may then send an approval to the merchant computing system 106 via the card network computer system 108, the acquirer processor 112 (steps 409-413), and the payment to the merchant is made. Upon receiving the approval message, the point of sale system 140 may generate a receipt for the user. In some embodiments, the receipt may be sent to the mobile device 110 electronically. In other embodiments, the receipt may be printed physically at the point of sale location.


In the preceding example, it is assumed that the user pays the merchant with a pre-existing payment card (i.e., from a payment card account that was in existence prior to the user visiting the merchant). In other situations, the user may pay the merchant with a new payment card. For example, the user may be at a merchant that has an online mechanism for creating a credit application for a merchant-specific payment card (e.g., a store-branded credit card). For example, the customer may use the mobile device 104 to download and install a merchant software application. Using the software application, at the point of sale, the customer may apply for and open a new payment card account (e.g., a new credit card account). The financial institution associated with the merchant-specific payment card may then electronically activate the new payment card and provision the new payment card to the customer (e.g., to a mobile wallet application executed by the customer device 104). The customer may then use the new payment card at the point of sale. At the same time, the physical payment card may be mailed to the customer, and the customer may activate the physical payment card upon receipt in the mail.


The scope of this disclosure should be determined by the claims, their legal equivalents and the fact that it fully encompasses other embodiments which may become apparent to those skilled in the art. All structural, electrical and functional equivalents to the elements of the below-described disclosure that are known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the present claims. A reference to an element in the singular is not intended to mean one and only one, unless explicitly so stated, but rather it should be construed to mean at least one. No claim element herein is to be construed under the provisions of 35 U.S.C. § 112, sixth paragraph, unless the element is expressly recited using the phrase “means for.” Furthermore, no element, component or method step in the present disclosure is intended to be dedicated to the public, regardless of whether the element, component or method step is explicitly recited in the claims.


The embodiments in the present disclosure have been described with reference to drawings. The drawings illustrate certain details of specific embodiments that implement the systems, methods and programs of the present disclosure. However, describing the embodiments with drawings should not be construed as imposing any limitations that may be present in the drawings. The present disclosure contemplates methods, systems and program products on any machine-readable media for accomplishing its operations. The embodiments of the present disclosure may be implemented using an existing computer processor, or by a special purpose computer processor incorporated for this or another purpose or by a hardwired system.


As used herein, “circuit” may include program logic executable by hardware disposed at a computing system to implement at least some of the functions described herein. Embodiments within the scope of the present invention include program products comprising non-transitory machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media may be any available media that may be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media may comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to carry or store desired program code in the form of machine-executable instructions or data structures and which may be accessed by a general purpose or special purpose computer or other machine with a processor. Thus, any such a connection is properly termed a machine-readable medium. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.


Embodiments in the present disclosure have been described in the general context of method steps which may be implemented in one embodiment by a program product including machine-executable instructions, such as program code, for example, in the form of program modules executed by machines in networked environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Machine-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such steps.


As previously indicated, embodiments in the present disclosure may be practiced in a networked environment using logical connections to one or more remote computers having processors. Those skilled in the art will appreciate that such network computing environments may encompass many types of computers, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and so on. Embodiments in the disclosure may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.


An exemplary system for implementing the overall system or portions of the disclosure might include one or more computers including a processor, a system memory or database, and a system bus that couples various system components including the system memory to the processor. The database or system memory may include read only memory (ROM) and random access memory (RAM). The database may also include a magnetic hard disk drive for reading from and writing to a magnetic hard disk, a magnetic disk drive for reading from or writing to a removable magnetic disk, and an optical disk drive for reading from or writing to a removable optical disk such as a CD ROM or other optical media. The drives and their associated machine-readable media provide nonvolatile storage of machine-executable instructions, data structures, program modules and other data for the computer. User interfaces, as described herein, may include a computer with a monitor, a keyboard, a keypad, a mouse, a joystick or other input devices performing a similar function.


It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present disclosure. Such variations will depend on the software and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the disclosure. Likewise, software and web implementations of the present invention could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps.


The foregoing description of embodiments has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the subject matter to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the subject matter disclosed herein. The embodiments were chosen and described in order to explain the principals of the disclosed subject matter and its practical application to enable one skilled in the art to utilize the disclosed subject matter in various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the presently disclosed subject matter.


Throughout the specification, numerous advantages of the exemplary embodiments have been identified. It will be understood, of course, that it is possible to employ the teachings herein without necessarily achieving the same advantages. Additionally, although many features have been described in the context of a particular data processor, it will be appreciated that such features could also be implemented in the context of other hardware configurations.


While the exemplary embodiments illustrated in the figures and described above are presently preferred, it should be understood that these embodiments are offered by way of example only. Other embodiments may include, for example, structures with different data mapping or different data. The disclosed subject matter is not limited to a particular embodiment, but extends to various modifications, combinations, and permutations that nevertheless fall within the scope and spirit of the appended claims.

Claims
  • 1. A computing system for managing customer tokens, the system comprising: a customer database configured to store customer account information;a token database configured to store one or more tokens and token information associated with the one or more tokens; andone or more processors in communication with a remote device presenting a graphical user interface on, the one or more processors configured to: receive, via the graphical user interface, instructions to either enable or disable a first token of the one or more tokens associated with a corresponding merchant;update the token database according to the instructions to either enable or disable the first token;cause display, on the graphical user interface of the remote device, a first image, wherein the first image is associated with a payment account, wherein the first image is stored in association with the customer account information in the customer database, wherein the first image is stored In associated with the first token;receive, from the remote device, data corresponding to a point of sale device that is proximate to the remote device;determine, based on the data received from the remote device, a set of characteristics of the point of sale device; anddynamically cause display, on the graphical user interface of the remote device, a second image selected based on the set of characteristics of the point of sale device.
  • 2. The computing system of claim 1, wherein the second image comprises a notification.
  • 3. The computing system of claim 2, wherein the notification indicates at least one of an exceeded spending limit, a due date, or a selectable button.
  • 4. The computing system of claim 1, wherein the data corresponding to the point of sale device comprises global positioning system (GPS) information of the remote device.
  • 5. The computing system of claim 1, wherein the data corresponding to the point of sale device indicates access to a local wireless network associated with the point of sale device.
  • 6. The computing system of claim 1, wherein the data corresponding to the point of sale device indicates a transaction using the payment card account.
  • 7. The computing system of claim 2, wherein the notification indicates a due date associated with the payment card account.
  • 8. The computing system of claim 1, wherein the one or more processors are further configured to: receive, via the graphical user interface, second instructions to change the customer account information; andmodify, on the graphical user interface, the first image associated with the payment card account in response receiving the second instructions to change the customer account information.
  • 9. A method for managing customer tokens, the method comprising: receiving, by one or more processors of a computing system, via a graphical user interface, instructions to either enable or disable a first token of one or more tokens associated with a corresponding merchant, the one or more tokens stored in a token database;updating, by the one or more processors, the token database according to the instructions to either enable or disable the first token;causing display, by the one or more processors of a computing system, on the graphical user interface of a remote device, a first image, wherein the first image is associated with a payment card account, wherein the first image is stored in association with customer account information in a customer database, wherein the first image is stored in associated with the first token;receiving, by the one or more processors, from the remote device, data corresponding to a point of sale device that is proximate to the remote device;determining, by the one or more processors, based on the data received from the remote device, a set of characteristics of the point of sale device; anddynamically causing display, by the one or more processors, on the graphical user interface of the remote device, a second image selected based on the set of characteristics of the point of sale device.
  • 10. The method of claim 9, wherein the second image comprises a notification.
  • 11. The method of claim 10, wherein the notification indicates at least one of an exceeded spending limit, a due date, or a selectable button.
  • 12. The method of claim 9, wherein the data corresponding to the point of sale device comprises global positioning system (GPS) information of the remote device.
  • 13. The method of claim 9, wherein the data corresponding to the point of sale device indicates access to a local wireless network associated with the point of sale device.
  • 14. The method of claim 9, wherein the data corresponding to the point of sale device indicates a transaction using the payment card account.
  • 15. The method of claim 10, wherein the notification indicates a due date associated with the payment card account.
  • 16. The method of claim 9, further comprising receiving, by the one or more processors, via the graphical user interface, second instructions to change the customer account information; andmodifying, by the one or more processors, on the graphical user interface, the first image associated with the payment card account in response receiving the second instructions to change the customer account information.
  • 17. A non-transitory computer-readable medium with instructions embodied thereon that, when executed by one or more processors, cause the one or more processors to perform operations comprising: receiving, via a graphical user interface of a remote device, first instructions to either enable or disable a first token of one or more tokens associated with a corresponding merchant, the one or more tokens stored in a token database;updating the token database according to the first instructions to either enable or disable the first token;causing display, on a graphical user interface of a remote device, a first image, wherein the first image is associated with a payment account, wherein the first image is stored in association with customer account information in a customer database, wherein the first image is stored in associated with the first token;receiving, from the remote device, data corresponding to a point of sale device that is proximate to the remote device;determining, based on the data received from the remote device, a set of characteristics of the point of sale device; anddynamically causing display on the graphical user interface of the remote device, a second image selected based on the set of characteristics of the point of sale device.
  • 18. The non-transitory computer-readable medium of claim 17, wherein the second image comprises a notification.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 17/217,002, filed Mar. 30, 2021, which is a continuation of U.S. patent application Ser. No. 15/360,343, filed Nov. 23, 2016, now U.S. Pat. No. 10,970,707, which is a continuation U.S. patent application Ser. No. 15/054,633, filed Feb. 26, 2016, which claims the benefit of priority to U.S. Patent Application No. 62/199,783, filed Jul. 31, 2015, all of which are hereby incorporated by reference in their respective entireties.

US Referenced Citations (672)
Number Name Date Kind
5485510 Colbert Jan 1996 A
5573457 Watts et al. Nov 1996 A
5737423 Manduley Apr 1998 A
5953710 Fleming Sep 1999 A
5999978 Angal et al. Dec 1999 A
6047268 Bartoli et al. Apr 2000 A
6105006 Davis et al. Aug 2000 A
6188309 Levine Feb 2001 B1
6193152 Fernando et al. Feb 2001 B1
6408330 Delahuerga Jun 2002 B1
6422462 Cohen Jul 2002 B1
6494367 Zacharias Dec 2002 B1
6575361 Graves et al. Jun 2003 B1
6717592 Gusler et al. Apr 2004 B2
6845906 Royer et al. Jan 2005 B2
6865547 Brake et al. Mar 2005 B1
6879965 Fung et al. Apr 2005 B2
6910021 Brown et al. Jun 2005 B2
6931382 Laage et al. Aug 2005 B2
6980969 Tuchler et al. Dec 2005 B1
7014107 Singer et al. Mar 2006 B2
7016877 Steele et al. Mar 2006 B1
7107243 Mcdonald et al. Sep 2006 B1
7155411 Blinn et al. Dec 2006 B1
7219833 Cantini et al. May 2007 B2
7225156 Fisher et al. May 2007 B2
7249099 Ling Jul 2007 B2
7264154 Harris Sep 2007 B2
7319986 Praisner et al. Jan 2008 B2
7331518 Rable Feb 2008 B2
7347361 Lovett Mar 2008 B2
7359880 Abel et al. Apr 2008 B2
7383988 Slonecker, Jr. Jun 2008 B2
7383998 Parker et al. Jun 2008 B2
7392224 Bauer et al. Jun 2008 B1
7398248 Phillips et al. Jul 2008 B2
7401731 Pletz et al. Jul 2008 B1
7413113 Zhu Aug 2008 B1
7451395 Brants et al. Nov 2008 B2
7512563 Likourezos et al. Mar 2009 B2
7552088 Malcolm Jun 2009 B2
7571142 Flitcroft et al. Aug 2009 B1
7587365 Malik et al. Sep 2009 B2
7594258 Mao et al. Sep 2009 B2
7653597 Stevanovski et al. Jan 2010 B1
7685037 Reiners et al. Mar 2010 B2
7689502 Lilly et al. Mar 2010 B2
7698221 Blinn et al. Apr 2010 B2
7707082 Lapstun et al. Apr 2010 B1
7712655 Wong May 2010 B2
7740170 Singh et al. Jun 2010 B2
7753265 Harris Jul 2010 B2
7778932 Yan Aug 2010 B2
7818319 Henkin et al. Oct 2010 B2
7857212 Matthews Dec 2010 B1
7873573 Realini Jan 2011 B2
7930228 Hawkins et al. Apr 2011 B1
7937325 Kumar et al. May 2011 B2
7941534 De La Huerga May 2011 B2
7949572 Perrochon et al. May 2011 B2
7954704 Gephart et al. Jun 2011 B1
8090346 Cai Jan 2012 B2
8099109 Altman et al. Jan 2012 B2
8127982 Casey et al. Mar 2012 B1
8160933 Nguyen et al. Apr 2012 B2
8175938 Olliphant et al. May 2012 B2
8196131 Von Behren et al. Jun 2012 B1
8245909 Pletz et al. Aug 2012 B2
8249983 Dilip et al. Aug 2012 B2
8255323 Casey et al. Aug 2012 B1
8266031 Norris et al. Sep 2012 B2
8266205 Hammad et al. Sep 2012 B2
8280786 Weiss et al. Oct 2012 B1
8280788 Perlman Oct 2012 B2
8296228 Kloor Oct 2012 B1
8297502 Mcghie et al. Oct 2012 B1
8301566 Mears Oct 2012 B2
8332294 Thearling Dec 2012 B1
8359531 Grandison et al. Jan 2013 B2
8360952 Wissman et al. Jan 2013 B2
8364556 Nguyen et al. Jan 2013 B2
8396808 Greenspan Mar 2013 B2
8407136 Bard et al. Mar 2013 B2
8407142 Griggs Mar 2013 B1
8423349 Huynh et al. Apr 2013 B1
8473394 Marshall Jun 2013 B2
8489761 Pope et al. Jul 2013 B2
8489894 Comrie et al. Jul 2013 B2
8543506 Grandcolas et al. Sep 2013 B2
8589335 Smith et al. Nov 2013 B2
8595074 Sharma et al. Nov 2013 B2
8595098 Starai et al. Nov 2013 B2
8625838 Song et al. Jan 2014 B2
8630952 Menon Jan 2014 B2
8635687 Binder Jan 2014 B2
8639629 Hoffman Jan 2014 B1
8655310 Katzer et al. Feb 2014 B1
8655719 Li et al. Feb 2014 B1
8660926 Wehunt et al. Feb 2014 B1
8666411 Tokgoz et al. Mar 2014 B2
8682753 Kulathungam Mar 2014 B2
8682802 Kannanari Mar 2014 B1
8700729 Dua Apr 2014 B2
8706625 Vicente et al. Apr 2014 B2
8712839 Steinert et al. Apr 2014 B2
8725601 Ledbetter et al. May 2014 B2
8762211 Killian et al. Jun 2014 B2
8762237 Monasterio et al. Jun 2014 B2
8768838 Hoffman Jul 2014 B1
8781957 Jackson et al. Jul 2014 B2
8781963 Feng et al. Jul 2014 B1
8793190 Johns et al. Jul 2014 B2
8794972 Lopucki Aug 2014 B2
8851369 Bishop et al. Oct 2014 B2
8868458 Starbuck et al. Oct 2014 B1
8868666 Hellwege et al. Oct 2014 B1
8880047 Konicek et al. Nov 2014 B2
8887997 Barret et al. Nov 2014 B2
8924288 Easley et al. Dec 2014 B1
8925099 Saxe et al. Dec 2014 B1
8954839 Sharma et al. Feb 2015 B2
9043609 Calman May 2015 B2
9076134 Grovit et al. Jul 2015 B2
9105021 Tobin Aug 2015 B2
9195984 Spector et al. Nov 2015 B1
9256871 Anderson et al. Feb 2016 B2
9256904 Haller et al. Feb 2016 B1
9305155 Vo et al. Apr 2016 B1
9351193 Raleigh et al. May 2016 B2
9372849 Gluck et al. Jun 2016 B2
9390417 Song et al. Jul 2016 B2
9396491 Isaacson et al. Jul 2016 B2
9444824 Balazs et al. Sep 2016 B1
9489694 Haller et al. Nov 2016 B2
9514456 England et al. Dec 2016 B2
9519934 Calman et al. Dec 2016 B2
9524525 Manyam et al. Dec 2016 B2
9558478 Zhao Jan 2017 B2
9569473 Holenstein et al. Feb 2017 B1
9569766 Kneen Feb 2017 B2
9576318 Caldwell Feb 2017 B2
9646300 Zhou et al. May 2017 B1
9647855 Deibert et al. May 2017 B2
9690621 Kim et al. Jun 2017 B2
9699610 Chicoine et al. Jul 2017 B1
9710566 Ainslie et al. Jul 2017 B2
9740543 Savage et al. Aug 2017 B1
9792636 Milne Oct 2017 B2
9792648 Haller et al. Oct 2017 B1
9849364 Tran et al. Dec 2017 B2
9853959 Kapczynski et al. Dec 2017 B1
9858405 Ranadive et al. Jan 2018 B2
9858576 Song et al. Jan 2018 B2
9978046 Lefebvre et al. May 2018 B2
10032146 Caldwell Jul 2018 B2
10044501 Bradley et al. Aug 2018 B1
10044647 Karp et al. Aug 2018 B1
10050779 Alness et al. Aug 2018 B2
10055747 Sherman et al. Aug 2018 B1
10096006 Loevenguth et al. Oct 2018 B2
10097356 Zinder Oct 2018 B2
10115155 Haller et al. Oct 2018 B1
10152756 Isaacson et al. Dec 2018 B2
10157420 Narayana et al. Dec 2018 B2
10187483 Golub et al. Jan 2019 B2
10204327 Katzin et al. Feb 2019 B2
10216548 Zhang et al. Feb 2019 B1
10250453 Singh et al. Apr 2019 B1
10275602 Bjorn et al. Apr 2019 B2
10282741 Yu et al. May 2019 B2
10359915 Asai Jul 2019 B2
10373129 James et al. Aug 2019 B1
10402817 Benkreira et al. Sep 2019 B1
10402818 Zarakas et al. Sep 2019 B2
10417396 Bawa et al. Sep 2019 B2
10423948 Wilson et al. Sep 2019 B1
10438290 Winklevoss et al. Oct 2019 B1
10445152 Zhang et al. Oct 2019 B1
10460395 Grassadonia Oct 2019 B2
10521798 Song et al. Dec 2019 B2
10592882 Viswanath et al. Mar 2020 B1
10614478 Georgi Apr 2020 B1
10650448 Haller et al. May 2020 B1
10657503 Ebersole et al. May 2020 B1
10742655 Taylor et al. Aug 2020 B2
10867298 Duke et al. Dec 2020 B1
10872005 Killis Dec 2020 B1
10878496 Duong et al. Dec 2020 B1
10936711 Jain et al. Mar 2021 B2
10963589 Fakhraie et al. Mar 2021 B1
10984482 Thangarajah et al. Apr 2021 B1
10992679 Fakhraie et al. Apr 2021 B1
11107561 Matthieu et al. Aug 2021 B2
11144903 Ready et al. Oct 2021 B2
11151529 Nolte et al. Oct 2021 B1
11200569 James et al. Dec 2021 B1
20010001856 Gould et al. May 2001 A1
20010032183 Landry Oct 2001 A1
20010051920 Joao et al. Dec 2001 A1
20010056398 Scheirer Dec 2001 A1
20020016749 Borecki et al. Feb 2002 A1
20020035539 O'Connell Mar 2002 A1
20020038289 Lawlor et al. Mar 2002 A1
20020062249 Iannacci May 2002 A1
20020095386 Maritzen et al. Jul 2002 A1
20020143655 Elston et al. Oct 2002 A1
20020169720 Wilson et al. Nov 2002 A1
20030046246 Klumpp et al. Mar 2003 A1
20030055786 Smith et al. Mar 2003 A1
20030061163 Durfield Mar 2003 A1
20030097331 Cohen May 2003 A1
20030172040 Kemper et al. Sep 2003 A1
20030195847 Felger Oct 2003 A1
20030200179 Kwan Oct 2003 A1
20030216997 Cohen Nov 2003 A1
20030217001 Mcquaide et al. Nov 2003 A1
20040054564 Fonseca et al. Mar 2004 A1
20040054591 Spaeth et al. Mar 2004 A1
20040073903 Melchione et al. Apr 2004 A1
20040078325 O'Connor Apr 2004 A1
20040090825 Nam et al. May 2004 A1
20040128243 Kavanagh et al. Jul 2004 A1
20040143632 Mccarty Jul 2004 A1
20040148259 Reiners et al. Jul 2004 A1
20040178907 Cordoba Sep 2004 A1
20040225606 Nguyen et al. Nov 2004 A1
20040249710 Smith et al. Dec 2004 A1
20040249753 Blinn et al. Dec 2004 A1
20040263901 Critelli et al. Dec 2004 A1
20050010483 Ling Jan 2005 A1
20050014705 Cheng et al. Jan 2005 A1
20050039041 Shaw et al. Feb 2005 A1
20050060233 Bonalle et al. Mar 2005 A1
20050114705 Reshef et al. May 2005 A1
20050131815 Fung et al. Jun 2005 A1
20050171898 Bishop et al. Aug 2005 A1
20050199714 Brandt et al. Sep 2005 A1
20050205662 Nelson Sep 2005 A1
20050224587 Shin et al. Oct 2005 A1
20050228750 Olliphant et al. Oct 2005 A1
20050273431 Abel Dec 2005 A1
20060046742 Zhang Mar 2006 A1
20060046745 Davidson Mar 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060178986 Giordano et al. Aug 2006 A1
20060184456 De Janasz Aug 2006 A1
20060190374 Sher Aug 2006 A1
20060202012 Grano et al. Sep 2006 A1
20060206912 Klarfeld et al. Sep 2006 A1
20060235795 Johnson et al. Oct 2006 A1
20060278698 Lovett Dec 2006 A1
20070051797 Randolph-Wall et al. Mar 2007 A1
20070083463 Kraft Apr 2007 A1
20070100773 Wallach May 2007 A1
20070112673 Protti May 2007 A1
20070123305 Chen et al. May 2007 A1
20070143831 Pearson et al. Jun 2007 A1
20070203836 Dodin Aug 2007 A1
20070226086 Bauman et al. Sep 2007 A1
20070255653 Tumminaro et al. Nov 2007 A1
20070266257 Camaisa et al. Nov 2007 A1
20080000052 Hong et al. Jan 2008 A1
20080005037 Hammad et al. Jan 2008 A1
20080017702 Little et al. Jan 2008 A1
20080021787 Mackouse Jan 2008 A1
20080029608 Kellum et al. Feb 2008 A1
20080052226 Agarwal et al. Feb 2008 A1
20080066185 Lester et al. Mar 2008 A1
20080086398 Parlotto Apr 2008 A1
20080115104 Quinn May 2008 A1
20080149706 Brown et al. Jun 2008 A1
20080154772 Carlson Jun 2008 A1
20080170156 Kim Jul 2008 A1
20080191878 Abraham Aug 2008 A1
20080208726 Tsantes et al. Aug 2008 A1
20080226142 Pennella et al. Sep 2008 A1
20080229383 Buss et al. Sep 2008 A1
20080244724 Choe et al. Oct 2008 A1
20080260119 Marathe et al. Oct 2008 A1
20080283590 Oder et al. Nov 2008 A1
20080301043 Unbehagen Dec 2008 A1
20080319889 Hammad et al. Dec 2008 A1
20090005269 Martin et al. Jan 2009 A1
20090007231 Kaiser et al. Jan 2009 A1
20090012898 Sharma et al. Jan 2009 A1
20090055269 Baron Feb 2009 A1
20090055642 Myers et al. Feb 2009 A1
20090089113 Rousso et al. Apr 2009 A1
20090112763 Scipioni et al. Apr 2009 A1
20090132351 Gibson May 2009 A1
20090164324 Bishop et al. Jun 2009 A1
20090205014 Doman et al. Aug 2009 A1
20090228381 Mik et al. Sep 2009 A1
20090254447 Blades Oct 2009 A1
20090254971 Herz et al. Oct 2009 A1
20090287603 Lamar et al. Nov 2009 A1
20090319638 Faith et al. Dec 2009 A1
20100036769 Winters et al. Feb 2010 A1
20100036906 Song et al. Feb 2010 A1
20100063906 Nelsen et al. Mar 2010 A1
20100082445 Hodge et al. Apr 2010 A1
20100082487 Nelsen Apr 2010 A1
20100094735 Reynolds et al. Apr 2010 A1
20100100470 Buchanan et al. Apr 2010 A1
20100114768 Duke et al. May 2010 A1
20100132049 Vernal et al. May 2010 A1
20100199098 King Aug 2010 A1
20100228671 Patterson Sep 2010 A1
20100274691 Hammad et al. Oct 2010 A1
20100276484 Banerjee et al. Nov 2010 A1
20100312700 Coulter et al. Dec 2010 A1
20100327056 Yoshikawa et al. Dec 2010 A1
20110023129 Vernal et al. Jan 2011 A1
20110035288 Clyne Feb 2011 A1
20110035318 Hargrove et al. Feb 2011 A1
20110035596 Attia et al. Feb 2011 A1
20110078010 Postrel Mar 2011 A1
20110106698 Isaacson et al. May 2011 A1
20110162057 Gottumukkala et al. Jun 2011 A1
20110172837 Forbes, Jr. Jul 2011 A1
20110176010 Houjou et al. Jul 2011 A1
20110178929 Durkin et al. Jul 2011 A1
20110191177 Blackhurst et al. Aug 2011 A1
20110191239 Blackhurst et al. Aug 2011 A1
20110196791 Dominguez Aug 2011 A1
20110202462 Keenan Aug 2011 A1
20110218849 Rutigliano et al. Sep 2011 A1
20110247055 Guo et al. Oct 2011 A1
20110276479 Thomas Nov 2011 A1
20110307826 Rivera et al. Dec 2011 A1
20110320246 Tietzen et al. Dec 2011 A1
20120024946 Tullis et al. Feb 2012 A1
20120030109 Dooley Maley et al. Feb 2012 A1
20120041881 Basu et al. Feb 2012 A1
20120046994 Reisman Feb 2012 A1
20120047072 Larkin Feb 2012 A1
20120096534 Boulos et al. Apr 2012 A1
20120099780 Smith et al. Apr 2012 A1
20120101938 Kasower Apr 2012 A1
20120117467 Maloney et al. May 2012 A1
20120117476 Siegrist et al. May 2012 A1
20120123841 Taveau et al. May 2012 A1
20120123933 Abel et al. May 2012 A1
20120124658 Brudnicki et al. May 2012 A1
20120158590 Salonen Jun 2012 A1
20120173387 Talker et al. Jul 2012 A1
20120197691 Grigg et al. Aug 2012 A1
20120214577 Petersen et al. Aug 2012 A1
20120227094 Begen et al. Sep 2012 A1
20120239417 Pourfallah et al. Sep 2012 A1
20120239479 Amaro et al. Sep 2012 A1
20120239670 Horn et al. Sep 2012 A1
20120240235 Moore Sep 2012 A1
20120246122 Short et al. Sep 2012 A1
20120254038 Mullen Oct 2012 A1
20120259782 Hammad Oct 2012 A1
20120265682 Menon Oct 2012 A1
20120265685 Brudnicki et al. Oct 2012 A1
20120270522 Laudermilch et al. Oct 2012 A1
20120296725 Dessert et al. Nov 2012 A1
20120296831 Carrott Nov 2012 A1
20120310760 Phillips et al. Dec 2012 A1
20120317036 Bower et al. Dec 2012 A1
20130006847 Hammad et al. Jan 2013 A1
20130031006 Mccullagh et al. Jan 2013 A1
20130046607 Granville, III Feb 2013 A1
20130046690 Calman et al. Feb 2013 A1
20130055378 Chang et al. Feb 2013 A1
20130080219 Royyuru et al. Mar 2013 A1
20130090998 Shimogori Apr 2013 A1
20130091452 Sorden et al. Apr 2013 A1
20130103391 Millmore et al. Apr 2013 A1
20130117696 Robertson et al. May 2013 A1
20130132854 Raleigh et al. May 2013 A1
20130151405 Head et al. Jun 2013 A1
20130159178 Colon Jun 2013 A1
20130173402 Young et al. Jul 2013 A1
20130174244 Taveau et al. Jul 2013 A1
20130191213 Beck et al. Jul 2013 A1
20130204894 Faith Aug 2013 A1
20130212666 Mattsson et al. Aug 2013 A1
20130218649 Beal Aug 2013 A1
20130218758 Koenigsbrueck et al. Aug 2013 A1
20130226813 Voltz Aug 2013 A1
20130240618 Hall Sep 2013 A1
20130246258 Dessert Sep 2013 A1
20130246272 Kirsch Sep 2013 A1
20130254079 Murali Sep 2013 A1
20130254115 Pasa et al. Sep 2013 A1
20130282542 White Oct 2013 A1
20130301392 Zhao Nov 2013 A1
20130317893 Nelson et al. Nov 2013 A1
20130332256 Faith et al. Dec 2013 A1
20130339124 Postrel Dec 2013 A1
20130346302 Purves et al. Dec 2013 A1
20130346306 Kopp Dec 2013 A1
20130346310 Burger et al. Dec 2013 A1
20140006209 Groarke Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140024354 Haik et al. Jan 2014 A1
20140026193 Saxman et al. Jan 2014 A1
20140032419 Anderson et al. Jan 2014 A1
20140032723 Nema Jan 2014 A1
20140040134 Ciurea Feb 2014 A1
20140040144 Plomske et al. Feb 2014 A1
20140046827 Hochstatter et al. Feb 2014 A1
20140053069 Yan Feb 2014 A1
20140058912 Bajaj Feb 2014 A1
20140067503 Ebarle Grecsek et al. Mar 2014 A1
20140067683 Varadarajan Mar 2014 A1
20140068030 Chambers et al. Mar 2014 A1
20140076967 Pushkin et al. Mar 2014 A1
20140081736 Blackhurst et al. Mar 2014 A1
20140108260 Poole et al. Apr 2014 A1
20140108263 Ortiz et al. Apr 2014 A1
20140114780 Menefee et al. Apr 2014 A1
20140114855 Bajaj et al. Apr 2014 A1
20140122328 Grigg May 2014 A1
20140123312 Marcotte May 2014 A1
20140129357 Goodwin May 2014 A1
20140129448 Aiglstorfer May 2014 A1
20140136419 Kiyohara May 2014 A1
20140143886 Eversoll et al. May 2014 A1
20140149198 Kim et al. May 2014 A1
20140149293 Laracey May 2014 A1
20140149368 Lee et al. May 2014 A1
20140162598 Villa-Real Jun 2014 A1
20140164220 Desai et al. Jun 2014 A1
20140172576 Spears et al. Jun 2014 A1
20140172707 Kuntagod et al. Jun 2014 A1
20140180854 Bryant, II Jun 2014 A1
20140198054 Sharma et al. Jul 2014 A1
20140200957 Biggs Jul 2014 A1
20140207672 Kelley Jul 2014 A1
20140236792 Pant et al. Aug 2014 A1
20140237236 Kalinichenko et al. Aug 2014 A1
20140248852 Raleigh et al. Sep 2014 A1
20140250002 Isaacson et al. Sep 2014 A1
20140258104 Harnisch Sep 2014 A1
20140258109 Jiang et al. Sep 2014 A1
20140258110 Davis et al. Sep 2014 A1
20140279309 Cowen et al. Sep 2014 A1
20140279474 Evans et al. Sep 2014 A1
20140279551 Samid Sep 2014 A1
20140279559 Smith et al. Sep 2014 A1
20140282852 Vestevich Sep 2014 A1
20140297438 Dua Oct 2014 A1
20140306833 Ricci Oct 2014 A1
20140324527 Kulkarni et al. Oct 2014 A1
20140337188 Bennett et al. Nov 2014 A1
20140337215 Howe Nov 2014 A1
20140344149 Campos Nov 2014 A1
20140344153 Raj et al. Nov 2014 A1
20140344877 Ohmata et al. Nov 2014 A1
20140357233 Maximo et al. Dec 2014 A1
20140365291 Shvarts Dec 2014 A1
20140372308 Sheets Dec 2014 A1
20140379575 Rogan Dec 2014 A1
20150019443 Sheets et al. Jan 2015 A1
20150019944 Kalgi Jan 2015 A1
20150026026 Calman et al. Jan 2015 A1
20150026049 Theurer et al. Jan 2015 A1
20150026057 Calman et al. Jan 2015 A1
20150032625 Dill et al. Jan 2015 A1
20150032626 Dill et al. Jan 2015 A1
20150032627 Dill Jan 2015 A1
20150039457 Jacobs et al. Feb 2015 A1
20150039496 Shuster Feb 2015 A1
20150046338 Laxminarayanan et al. Feb 2015 A1
20150046339 Wong et al. Feb 2015 A1
20150066768 Williamson et al. Mar 2015 A1
20150070132 Candelore Mar 2015 A1
20150073989 Green et al. Mar 2015 A1
20150079932 Zelinka et al. Mar 2015 A1
20150081349 Johndrow et al. Mar 2015 A1
20150082042 Hoornaert et al. Mar 2015 A1
20150088633 Salmon et al. Mar 2015 A1
20150088756 Makhotin et al. Mar 2015 A1
20150095238 Khan et al. Apr 2015 A1
20150095999 Toth Apr 2015 A1
20150096039 Mattsson et al. Apr 2015 A1
20150100477 Salama et al. Apr 2015 A1
20150100495 Salama et al. Apr 2015 A1
20150106239 Gaddam et al. Apr 2015 A1
20150112870 Nagasundaram Apr 2015 A1
20150121500 Venkatanaranappa et al. Apr 2015 A1
20150127524 Jacobs et al. May 2015 A1
20150127547 Powell et al. May 2015 A1
20150132984 Kim et al. May 2015 A1
20150134700 Macklem et al. May 2015 A1
20150142673 Nelsen May 2015 A1
20150149272 Salmon et al. May 2015 A1
20150149357 Ioannidis et al. May 2015 A1
20150154595 Collinge et al. Jun 2015 A1
20150178724 Ngo et al. Jun 2015 A1
20150180836 Wong et al. Jun 2015 A1
20150186856 Weiss et al. Jul 2015 A1
20150193639 Esposito et al. Jul 2015 A1
20150193764 Haggerty et al. Jul 2015 A1
20150193866 Van Heerden et al. Jul 2015 A1
20150199679 Palanisamy et al. Jul 2015 A1
20150199689 Kumnick Jul 2015 A1
20150200495 Yu et al. Jul 2015 A1
20150213435 Douglas et al. Jul 2015 A1
20150220917 Aabye et al. Aug 2015 A1
20150220999 Thornton et al. Aug 2015 A1
20150221149 Main et al. Aug 2015 A1
20150229622 Grigg et al. Aug 2015 A1
20150242853 Powell Aug 2015 A1
20150248405 Rudich et al. Sep 2015 A1
20150254635 Bondesen et al. Sep 2015 A1
20150254638 Bondesen et al. Sep 2015 A1
20150254646 Harkey et al. Sep 2015 A1
20150254647 Bondesen et al. Sep 2015 A1
20150254655 Bondesen Sep 2015 A1
20150254656 Bondesen et al. Sep 2015 A1
20150269566 Gaddam et al. Sep 2015 A1
20150277712 Ratcliffe et al. Oct 2015 A1
20150286834 Ohtani et al. Oct 2015 A1
20150287133 Marlov et al. Oct 2015 A1
20150295906 Ufford et al. Oct 2015 A1
20150312038 Palanisamy Oct 2015 A1
20150319158 Kumnick Nov 2015 A1
20150319198 Gupta et al. Nov 2015 A1
20150324592 Dutta Nov 2015 A1
20150332067 Gorod Nov 2015 A1
20150339663 Lopreiato et al. Nov 2015 A1
20150339664 Wong et al. Nov 2015 A1
20150348083 Brill et al. Dec 2015 A1
20150371221 Wardman Dec 2015 A1
20150379508 Van Dec 2015 A1
20160004741 Johnson et al. Jan 2016 A1
20160026997 Tsui et al. Jan 2016 A1
20160028550 Gaddam et al. Jan 2016 A1
20160028735 Francis et al. Jan 2016 A1
20160036790 Shastry et al. Feb 2016 A1
20160042381 Braine et al. Feb 2016 A1
20160063497 Grant, IV Mar 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160078428 Moser et al. Mar 2016 A1
20160080403 Cunningham et al. Mar 2016 A1
20160086222 Kurapati Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160092870 Salama et al. Mar 2016 A1
20160092872 Prakash et al. Mar 2016 A1
20160092874 O'Regan et al. Mar 2016 A1
20160098577 Lacey et al. Apr 2016 A1
20160098692 Johnson et al. Apr 2016 A1
20160109954 Harris et al. Apr 2016 A1
20160119296 Laxminarayanan et al. Apr 2016 A1
20160125405 Alterman et al. May 2016 A1
20160125409 Meredith et al. May 2016 A1
20160127892 Huang et al. May 2016 A1
20160132918 Thomas May 2016 A1
20160140221 Park et al. May 2016 A1
20160140541 Pearson et al. May 2016 A1
20160149875 Li et al. May 2016 A1
20160155156 Gopal et al. Jun 2016 A1
20160171483 Luoma et al. Jun 2016 A1
20160173483 Wong et al. Jun 2016 A1
20160180302 Bagot, Jr. Jun 2016 A1
20160189121 Best et al. Jun 2016 A1
20160217461 Gaddam et al. Jul 2016 A1
20160232600 Purves Aug 2016 A1
20160239437 Le et al. Aug 2016 A1
20160239835 Marsyla Aug 2016 A1
20160239840 Preibisch Aug 2016 A1
20160260084 Main et al. Sep 2016 A1
20160260176 Bernard et al. Sep 2016 A1
20160267467 Rutherford et al. Sep 2016 A1
20160267480 Metral Sep 2016 A1
20160292673 Chandrasekaran Oct 2016 A1
20160294879 Kirsch Oct 2016 A1
20160307229 Balasubramanian et al. Oct 2016 A1
20160314458 Douglas et al. Oct 2016 A1
20160321669 Beck et al. Nov 2016 A1
20160328522 Howley Nov 2016 A1
20160358163 Kumar et al. Dec 2016 A1
20160371471 Patton et al. Dec 2016 A1
20160373458 Moreton et al. Dec 2016 A1
20160379211 Hoyos et al. Dec 2016 A1
20170004506 Steinman et al. Jan 2017 A1
20170004590 Gluhovsky Jan 2017 A1
20170011215 Poiesz et al. Jan 2017 A1
20170011389 Mccandless et al. Jan 2017 A1
20170011450 Frager et al. Jan 2017 A1
20170018029 Eiriz et al. Jan 2017 A1
20170024393 Choksi et al. Jan 2017 A1
20170068954 Hockey et al. Mar 2017 A1
20170078299 Castinado et al. Mar 2017 A1
20170078303 Wu Mar 2017 A1
20170091759 Selfridge et al. Mar 2017 A1
20170132633 Whitehouse May 2017 A1
20170147631 Nair et al. May 2017 A1
20170161724 Lau Jun 2017 A1
20170161973 Katta et al. Jun 2017 A1
20170237554 Jacobs et al. Aug 2017 A1
20170249478 Lovin Aug 2017 A1
20170344991 Mark et al. Nov 2017 A1
20170352028 Vridhachalam et al. Dec 2017 A1
20170364898 Ach et al. Dec 2017 A1
20170366348 Weimer Dec 2017 A1
20180005323 Grassadonia Jan 2018 A1
20180006821 Kinagi Jan 2018 A1
20180025145 Morgner et al. Jan 2018 A1
20180053200 Cronin et al. Feb 2018 A1
20180075440 Beck et al. Mar 2018 A1
20180088909 Baratta et al. Mar 2018 A1
20180096752 Ovalle Apr 2018 A1
20180158137 Tsantes et al. Jun 2018 A1
20180174148 Selvarajan Jun 2018 A1
20180247302 Armstrong et al. Aug 2018 A1
20180254898 Sprague et al. Sep 2018 A1
20180268382 Wasserman Sep 2018 A1
20180268408 Botros et al. Sep 2018 A1
20180270363 Guday et al. Sep 2018 A1
20180276628 Radiotis et al. Sep 2018 A1
20180293554 Johnson Oct 2018 A1
20180331835 Jackson Nov 2018 A1
20180349922 Carlson et al. Dec 2018 A1
20180357440 Brady et al. Dec 2018 A1
20180373891 Barday et al. Dec 2018 A1
20190007381 Isaacson et al. Jan 2019 A1
20190164221 Hill et al. May 2019 A1
20190171831 Xin Jun 2019 A1
20190197501 Senci et al. Jun 2019 A1
20190220834 Moshal et al. Jul 2019 A1
20190228173 Gupta et al. Jul 2019 A1
20190228428 Bruner et al. Jul 2019 A1
20190228430 Givol et al. Jul 2019 A1
20190244214 Flores et al. Aug 2019 A1
20190295069 Pala et al. Sep 2019 A1
20190318122 Hockey et al. Oct 2019 A1
20190318424 Mcwilliams Oct 2019 A1
20190325161 Zavesky et al. Oct 2019 A1
20190332802 Barday et al. Oct 2019 A1
20190333061 Jackson et al. Oct 2019 A1
20190347442 Marlin et al. Nov 2019 A1
20190354979 Crawford Nov 2019 A1
20190356641 Isaacson et al. Nov 2019 A1
20190362069 Park et al. Nov 2019 A1
20190369845 Rucker Dec 2019 A1
20190370798 Hu et al. Dec 2019 A1
20190378182 Weinflash et al. Dec 2019 A1
20190392443 Piparsaniya et al. Dec 2019 A1
20200005283 Zimmerman et al. Jan 2020 A1
20200005347 Boal Jan 2020 A1
20200074552 Shier et al. Mar 2020 A1
20200076601 Jafari Mar 2020 A1
20200090179 Song et al. Mar 2020 A1
20200118114 Benkreira et al. Apr 2020 A1
20200118132 Schmidt et al. Apr 2020 A1
20200118133 Schmidt et al. Apr 2020 A1
20200286057 Desai Sep 2020 A1
20200286076 Zhu et al. Sep 2020 A1
20210012326 Maxwell Zelocchi Jan 2021 A1
20210027300 Chetia et al. Jan 2021 A1
20210035072 Awasthi Feb 2021 A1
20210124760 Klein et al. Apr 2021 A1
20210217002 Basu et al. Jul 2021 A1
20210233170 Cadet Jul 2021 A1
20210258169 Basu et al. Aug 2021 A1
20210303335 Foreman et al. Sep 2021 A1
20210350343 Gaur et al. Nov 2021 A1
20210350458 Gaur et al. Nov 2021 A1
20220029815 Basu et al. Jan 2022 A1
20220292496 Yan Sep 2022 A1
20220294630 Collen Sep 2022 A1
20230036439 Olson et al. Feb 2023 A1
20230070625 Gaur et al. Mar 2023 A1
20230206329 Cella et al. Jun 2023 A1
20230214925 Cella et al. Jul 2023 A1
Foreign Referenced Citations (37)
Number Date Country
2015255170 Nov 2015 AU
2016285320 Dec 2017 AU
2369296 Oct 2000 CA
2751554 Aug 2010 CA
1353842 Jun 2002 CN
102498497 Jun 2012 CN
102804219 Nov 2012 CN
103635920 Mar 2014 CN
104106276 Oct 2014 CN
102648476 Mar 2016 CN
103413231 Oct 2017 CN
107230049 Oct 2017 CN
107230070 Oct 2017 CN
1 259 947 Nov 2002 EP
1 770 628 Apr 2007 EP
3 073 670 Sep 2016 EP
0 441 156 Jan 1936 GB
2 441 156 Feb 2008 GB
20160015375 Feb 2016 KR
WO-9013096 Nov 1990 WO
WO-0072245 Nov 2000 WO
WO-03038551 May 2003 WO
WO-2004081893 Sep 2004 WO
WO-2004090825 Oct 2004 WO
WO-2009151839 Dec 2009 WO
WO-2011017613 Feb 2011 WO
WO-2011053404 May 2011 WO
WO-2012054148 Apr 2012 WO
WO-2012150602 Nov 2012 WO
WO-2013082190 Jun 2013 WO
WO-2015103443 Jul 2015 WO
WO-2015135131 Sep 2015 WO
WO-2016015054 Jan 2016 WO
WO-2016025291 Feb 2016 WO
WO-2017035399 Mar 2017 WO
WO-2018005635 Jan 2018 WO
WO-2022154789 Jul 2022 WO
Non-Patent Literature Citations (46)
Entry
Luz et al: “A Mobile NFC Payment Terminal for the Event-Wallet on an Android Smartphone” researchgat.net, (Year: 2012).
“Bitcoin Off-Chain Transactions: Their Invention and Use,” by Michelle Mount. Geo. L. Tech. Rev. 4. 2020. pp. 685-698. (Year: 2020).
“The Bitcoin Lightening Network: Scalable Off-Chain Instant Payments,” by Joseph Poon; and Thaddeus Dryia. Jan. 14, 2016. (Year: 2016).
Are Central Bank Digital Currencies (CBDCs) the money of tomorrow (Year: 2020).
NPL Search Terms (Year: 2024).
Shehnaz Ahmed, Private partners could help RBI run a digital currency. (Year: 2021).
Shiravale, et al., Blockchain Technology: A Novel Approach in Information Security Research, IEEE 2018 (Year: 2018), 4 pps.
Yang, et al., Impact of Bitcoin's Distributed Structure on the Construction of the Central Bank's Digital Currency System IEEE, 2020 (Year: 2020), 4 pps.
Other USPTO Comm. with Refs. on US Dtd Nov. 22, 2023.
ASB, “How to command your cards with ASB Card Control” Apr. 20, 2015, https://www.youtube.com/watch?v=O1sfxvVUL74 (Year: 2015).
Austin Telco Federal Credit Union, “Lost or Stolen Cards”, www.atfcu.org/lost-stolen-cards.htm; Apr. 9, 2004. 6 pages.
Authorize. Net. Authorize.Net Mobile Application: iOS User Guide. Sep. 2015. Authorize. Net LLC. Ver.2.0, 1-23. https://www.authorize.net/content/dam/anet-redesign/documents/iosuserguide.pdf (Year: 2015).
BancFirst, “Lost Card”, https://www.bancfirst.com/contact.aspx, Oct. 28, 2003. 1 page.
CM/ECF, “CM/ECF Internet Credit Card Payment Guide”, https://www.vaeb.uscourts.gov/wordpress/?page_id=340, Mar. 16, 2005. 12 pages.
Co-Op Think, Rachna Ahlawat at Co-Op Think—Evolution Sessions from THINK14, Dec. 22, 2014, 26:22. https://www.youtube.com/watch?v=yEp-qfZoPhl (Year: 2014).
Corrected Notice of Allowance for U.S. Appl. No. 16/945,070 dated Apr. 26, 2021.
Cronian, Darrin “Credit card companies Freeze Spending whilst Abroad”, published Jun. 9, 2007, Available at: http://www.travel-rants.com/2007/06/09/credit-card-companies-freeze-spending-whilst-abroad/.
Demiriz et al. “Using Location Aware Business Rules for Preventing Retail Banking Frauds” Jan. 15, 2015, IEEE (Year: 2015).
Diversinet enables new consumer mobile services from intersections inc.; MobiSecure wallet and vault helps identity management leader get closer to its customers. (May 30, 2017). PR Newswire Retrieved from https://dialog.proquest.com/professional/docview/ 450976918?accountid=131444 on Feb. 22, 2023 (Year: 2007).
Eickhoff et al: “Quality through Flow and Immersion: Gamifying Crowdsourced Relevance Assessments” , Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, Aug. 12, 2012. (Year: 2012).
Fiserv. CardValet: Mobile Application Training. Fiserv, Inc. 1-93. https://www.westernbanks.com/media/1664/ cardvalet-application .pdf (Year: 2015).
Fort Knox Federal Credit Union, “Lost or Stolen VISA Card”, http://www.fortknoxfcu.org/loststolen.html, Feb. 1, 2001. 2 pages.
IEEE Xplore; 2009 First Asian Himalayas International Conference on Internet: Emergence of Payment Systems in the age of Electronic Commerce.; The state off Art. Author S Singh Nov. 1, 2009 pp. 1-18 (Year: 2009).
IP.com Search Query; May 5, 2020 (Year: 2020).
KONSKO: “Credit Card Tokenization: Here's What You Need to Know”, Credit Card Basics, Credit Card—Advertisement Nerdwallet (Year: 2014).
Merrick Bank, “Reporting Lost or Stolen Card Help Return to the Cardholder Center FAQs”, http://www.merrickbank.com/Frequent-Asked-Questions/Report-Stolen-Card.aspx, Aug. 9, 2004. 1 page.
Microsoft, “Automatically summarize a document”, 2016. 3 pages.
Notre Dame FCU “Irish Card Shield: How to Control Transaction Types” Jan. 15, 2016, 0:27, https://youtube.com/watch?v=0eZG1c6Bn38 (Year: 2016).
PCM Credit Union, “CardValet Tutorial” Jun. 24, 2015, https://www.youtube.com/watch?v=uGPh9Htw0Wc (Year: 2015).
Purchasing charges ahead. (1994). Electronic Buyers' News,, 68. Retrieved from https://dialog.proquest.com/professional/docview/681599288?accountid=131444 on Nov. 13, 2020 (Year: 1994).
RBC Royal Bank, “If Your Card is Lost or Stolen”, http://www.rblbank.com/pdfs/CreditCard/FAQs.pdf, Oct. 1, 2002. 2 pages.
Smartphones as Practical and Secure Location Verification Tokens for Payments. file:///C:/Users/eoussir/Documents/e-Red% 20 Folder/ 15496961 /N PL_ Smartphones %20as %20Practical %20and %20Secu re %20 Location %20Verification %20Tokens %20for% 20Payments.pdf (Year: 2014).
State Employees Credit Union, “Lost or Stolen Account Info”, https://www.secumd.org/advice-planning/money-and-credit/privacy-fraud-protection/lost-or-stolen-account-info.aspx, May 20, 2005. 2 pages.
Transaction aggregation as a strategy for credit card fraud detection. file:///C:/Users/eoussir/Downloads/Transaction_aggregation_as_a_strategy for credit_c. pdf (Year: 2009).
Union Bank & Trust, “Report Lost or Stolen Card”, http://www.ubt.com/security-fraud/report-lost-or-stolen-cards, Jul. 10, 2005. 13 pages.
Urein et al: “A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards”, 2011 International Conference on Collaboration Technologies and Systems (CTS) (Year: 2011).
Using location aware business rules for preventing retail banking frauds. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7351936 (Year: 2015).
Yang MH. Security enhanced EMV-based mobile payment protocol. Scientific World Journal. 2014.https://www.ncbi.nlm.nih.gov/ pmc/articles/PMC4181509/ (Year: 2014).
Foreign Action other than Search Report on non-Foley case related to US Dtd Dec. 7, 2022.
Hinze et al.; Event-Based Applications and Enabling Technologies. https://www.researchgate.net/profile/Annika-Hinze/publication/220796268_Event-based_applications_and_enabling_technologies/Links/Ofcfd 50b638d9592a1000000/Event-based-applications-and-enabling-technologies.pdf (Year: 2009).
Technologies for Payment Fraud Prevention: EMV, Encryption, and Tokenization, Oct. 2014, Smart Card Alliance, pp. 1-34 (Year: 2014).
Yang, Ming-Hour; Security Enhanced EMV-Based Mobile Payment Protocol. https://patents.google.com/scholar/ 15767854982483958498?q (Security Enhanced EMV-Based Mobile Payment Protocol)&patents=false&scholar&oq=Security Enhanced EMV-Based Mobile Payment Protocol (Year: 2014).
Tene et al. Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of technology and Intellectual Property. https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article= 1191 &context=njtip (Year: 2013).
Dunman et al., “A Novel and Successful Credit Card Fraud Detection System Implemented in a Turkish Bank,” 2013 IEEE 13th International Conference on Data Mining Workshops, Dallas, TX, USA. Retrieved from https://ieeexplore.ieee.org/documenU6753916?source=IQplus.
Ivatury, G., Mobile Phone Banking and Low-Income Customers, 2006, Retrieved from https://www.cgap.org/sites/default/files/CGAP-Mobile-Phone-Banking-and-Low-Income-Customers-Evidence-from-South-Africa-Jan. 2006.pdf.
Trappey et al., “Patent portfolio analysis of e-payment services using technical ontology roadmaps,” 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary. Retrieved from https://ieeexplore.IEEE.org/documenU7844992?source=IQplus (Year: 2016).
Related Publications (1)
Number Date Country
20230214818 A1 Jul 2023 US
Provisional Applications (1)
Number Date Country
62199783 Jul 2015 US
Continuations (3)
Number Date Country
Parent 17217002 Mar 2021 US
Child 18121717 US
Parent 15360343 Nov 2016 US
Child 17217002 US
Parent 15054633 Feb 2016 US
Child 15360343 US