In today's commerce, merchants often utilize an array of different point-of-sale (POS) devices, including mobile POS devices. Merchants may use these POS devices to engage in transactions with customers at different locations. For instance, a taxi driver may use a mobile POS device to charge a passenger for a taxi ride. In another example, a street vendor may use a mobile POS device to charge a customer for an item purchased from the street vendor.
The detailed description is set forth with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical items or features.
Some implementations described herein include techniques and arrangements for capturing payments in transactions. A payment service may, in various examples, attempt to authorize a payment instrument tendered in a transaction to satisfy a cost. In some instances, the payment instrument may be declined (i.e., the payment instrument may fail to authorize) with respect to the cost of the transaction. One or more of the payment-capture techniques described herein may be utilized in such instances to capture a payment that satisfies at least a portion of the cost of the transaction.
As will be described in further detail below with reference to the figures, the payment-capture techniques may, in some cases, include authorizing the payment instrument with respect to an available balance of the payment instrument. In various cases, the payment-capture techniques may additionally or alternatively include re-attempting to authorize the payment instrument during one or multiple future time periods. Additionally or alternatively, the payment-capture techniques may include providing a customer an opportunity to resolve a failed authorization (e.g., by requesting that the customer cooperate in satisfying at least a portion of the cost of the transaction).
For clarity, various examples in this disclosure describe payment-capture techniques performed or otherwise implemented by a payment service. However, it should be understood that, in various instances, any other suitable service, entity, device, system, or any combination thereof, can perform/implement the payment-capture techniques described herein.
In some implementations, a customer may provide a payment instrument (e.g., a prepaid card, a debit card, a credit card, and/or a gift card, etc.) to pay for a good or a service that the customer receives from a merchant. The customer and/or the merchant may then input an identifier associated with the payment instrument into a POS device by, for example, swiping the payment instrument, typing in a number of the payment instrument, or the like.
Additionally or alternatively, the customer and/or the merchant may transmit payment instrument information (including, e.g., an identifier) associated with the payment instrument to the POS device. For example, the customer may possess an electronic device capable of storing or accessing the payment instrument information. In this example, the customer may use the electronic device to transmit the payment instrument information to the POS device. In some cases, the electronic device of the customer may transmit the payment instrument information to the POS device via near-field communication (NFC) technology. In other cases, the electronic device of the customer may additionally or alternatively transmit the payment instrument information to the POS device via one or more wired or wireless networks, such as a WiFi network, a cellular network, or the like. It should be understood, however, that the electronic device of the customer may transmit the payment instrument information to the POS device via any other suitable transmission method and/or technology in addition to, or instead of, those described herein.
When the POS device is operating in an online mode, the POS device sends transaction information including the identifier of the payment instrument to a payment service for authorization of the payment instrument. In some instances, the POS device sends this information to the payment instrument substantially contemporaneously with the POS device receiving the identifier of the payment instrument. Usually after a short delay, the POS device may receive an indication of whether the payment instrument has been approved (i.e., authorized) or declined (i.e., failed to authorize) for an amount of the transaction, such as a cost of the good or service. However, this “authorization delay” may increase based on certain factors, such as an increase in network latency or a slowdown in the authorization process at a payment service. These delays may be unacceptable during certain peak hours at the merchant (e.g., when the merchant has a long line and wishes to avoid customers from having a negative experience due to a long wait). Accordingly, for various reasons, the merchant may at times operate the POS device in an offline mode instead of operating the POS device in the online mode.
When the POS device operates in the offline mode, however, the POS device may locally store transaction information including the identifier of the payment instrument for later sending to the payment service after the POS device transitions back into the online mode. POS devices of this nature may transition to this offline mode when the devices lose network connectivity (e.g., due to being at a location that lacks network connectivity) or in response to an operator manually transitioning to the offline mode using a merchant application executing on the device. In some instances, however, the POS device may be configured to automatically transition between the modes based on factors other than network connectivity.
In some examples, the payment service may receive transaction information/data from the POS device after the POS device transitions from operating in the offline mode to operating in the online mode. That is, the POS device may process a transaction while operating in the offline mode, and then send the corresponding transaction information to the payment service while operating in the online mode.
The payment service may determine that a payment instrument associated with the received transaction information is yet to be authorized. That is, the payment service may determine that an authorization status of the payment instrument has not been determined. In some cases, the payment service may make such a determination based at least in part on the received transaction information. For instance, the payment service may receive, from the POS device, a request to authorize the payment instrument. The payment service, in some cases, may determine that the payment instrument has not been authorized based at least in part on the request received from the POS device. In some instances, the transaction information received from the POS device may include an indication that the authorization status of the payment instrument has been determined with respect to the transaction.
After receiving the transaction information, the payment service may attempt to authorize the payment instrument with respect to the cost of the transaction. This authorizing may include communicating with computing devices of a card payment network (e.g., MasterCard®, Visa®, etc.) and/or an issuing bank associated with the payment instrument to determine whether the payment instrument is authorized for the cost of the transaction.
If the payment instrument is declined with respect to the cost of the transaction, then the payment service may utilize one or more intelligent payment-capture techniques to mitigate loss of payment in the transaction.
In various examples, the payment-capture techniques of this disclosure may be utilized in “offline-to-online” contexts, i.e., scenarios in which a POS device processes a transaction while operating in an offline mode and sends the corresponding transaction information to a payment service after transitioning to an online mode. In the offline mode, a POS device of a merchant may be unable to request an authorization status of a payment instrument tendered to satisfy a cost of a transaction between the merchant and a customer/holder of the payment instrument. By the time the POS device transitions to the online mode, the customer may no longer be as accessible to the merchant as during the transaction. Accordingly, in the status quo, these circumstances may result in the merchant failing to capture a payment in the transaction. Although various examples in this disclosure involve payment-capture techniques being utilized in the “offline-to-online” contexts described above, it should be understood that the payment-capture techniques are not limited to such contexts.
For discussion purposes, some example implementations are described below with reference to the corresponding figures. However, implementations herein are not limited to the particular examples provided, and may be extended to other environments, other system architectures, other types of merchants, and so forth, as will be apparent to those of skill in the art in light of the disclosure herein.
At 104, the POS device transitions from the offline mode to the online mode and, in response, sends transaction information, including information regarding the payment instrument, over a network and to a remote service for authorization. For instance, the POS device may send a request to authorize the payment instrument for an amount/cost of the transaction. In some cases, the transaction information may include an identifier that identifies the payment instrument. Additionally or alternatively, the transaction information may include an indication indicating that an authorization status of the payment instrument has not yet been determined for the transaction. For example, the POS device may include such an indication in the transaction information if the corresponding transaction was processed while the POS was operating in the offline mode.
At 106, the remote service receives the transaction information and attempts to authorize the payment instrument. This authorizing may include communicating with computing devices of a card payment network (e.g., MasterCard®, Visa®, etc.) and/or an issuing bank associated with the payment instrument to determine whether the payment instrument is authorized for the cost of the transaction.
In some examples, the remote service may determine that the payment instrument has been declined based on an indication received in response to an attempt to authorize the payment instrument. For instance, the remote service may generate a request for an authorization status with respect to the payment instrument. The remote service may send the request to one or more computing devices of a card payment network (e.g., MasterCard®, Visa®, etc.) and/or an issuing bank associated with the payment instrument. The remote service may then receive an authorization status indicating whether the payment instrument is authorized.
If the payment instrument has been declined, the remote service may receive a decline reason indicating the reason(s) why the payment instrument was declined. For instance, the decline reason may indicate that the payment instrument was declined due to insufficient funds. That is, the decline reason may indicate that a value of the payment instrument failed to satisfy the cost of the transaction. As another non-limiting example, the decline reason may indicate that the payment instrument was declined due to a fraud alert being placed in association with the payment instrument.
At 110, after determining that the payment instrument has been declined, the remote service implements one or more intelligent payment-capture techniques. In some implementations, the payment-capture techniques may include authorizing a payment instrument for an available balance of the payment instrument, at 112(1). For example, upon or after determining that the payment instrument has been declined with respect to the cost of the transaction, the remote service may determine an available balance of the payment instrument. The available balance may correspond to a monetary value of the payment instrument at the time of determining the available balance. The available balance may change from time to time, however, depending on, for example, a transfer of money to or from an account associated with the payment instrument.
In some instances, the remote service may compare the available balance of the payment instrument with a payment threshold, and determine whether the available balance satisfies the payment threshold. The payment threshold may represent, or otherwise correspond to, an acceptable payment towards the cost of the transaction. For example, a merchant associated with the transaction may determine a percentage (or the like) of the transaction that the merchant would accept in the event that the payment instrument is declined with respect to the cost of the transaction. In some cases, the merchant may additionally or alternatively express the payment threshold/acceptable payment in absolute terms. For instance, in a $100 transaction, the merchant may indicate a payment threshold of 50% and/or indicate a payment threshold of $50.
In some cases, the merchant may indicate multiple payment thresholds, and the multiple payment thresholds may include at least one payment threshold that is different from the rest of the payment thresholds. For example, the merchant may determine multiple payment thresholds that individually correspond to different authorization attempts. As another example, the merchant may set different payment thresholds that decrease as a number of authorization attempts increases and/or as a passage of time increases.
In a particular illustrative and non-limiting example, the cost of the transaction may be $100. The merchant may indicate: a first payment threshold of 90% of the cost of the transaction to be applied after a first time the payment instrument is declined, a second payment threshold of 80% of the cost of the transaction to be applied after a second time the payment instrument is declined, and so on. That is, in this example, if the available balance does not satisfy the first payment threshold of 90% after the payment instrument is declined a first time, then the remote service may determine not to authorize the payment instrument with respect to the available balance. Instead, the remote service may determine a future time period during which a value of the payment instrument is expected to increase, and then, during the future time, the remote service may attempt to authorize the payment instrument with respect to the full cost of the transaction. If the payment instrument is declined a second time, then the remote service may determine if the available balance of the payment instrument (which may have changed) satisfies the second payment threshold of 80% of the cost of the payment instrument. In this manner, the merchant may initially attempt to capture a high-value payment for the transaction, and then incrementally relax the payment threshold to capture a lower, but acceptable payment.
In various cases, the merchant may provide the payment threshold via one or more inputs to the POS device. The POS device may communicate these inputs to the remote service. In some cases, the remote service may utilize the payment threshold provided by the merchant. In other cases, however, the remote service may additionally or alternatively determine and utilize a different payment threshold. For example, the remote service may determine a payment threshold based on various parameters, which may include the payment threshold provided by the merchant and/or payment threshold input provided by other entities.
In various examples, the payment threshold may apply to a particular transaction, a set of transactions, transactions from a particular merchant, transactions from a set of merchants, transactions involving a particular payment instrument, transactions involving a class of payment instruments, transactions involving a particular customer, etc., or any combination thereof.
In some implementations, upon or after authorizing the payment instrument with respect to the available balance, the remote service may calculate a remaining amount of the cost of the transaction. That is, the remote service may calculate an amount of the cost of the transaction that remains after subtracting, or otherwise accounting for, an amount of the available balance for which the payment instrument has been authorized. In some instances, the remote service may determine that an authorizable value of the payment instrument is expected to increase during a future time period. Accordingly, the remote service may attempt to authorize, during the future time period, the payment instrument with respect to the remaining amount of the cost of the transaction.
As used herein, the term “authorizable value” means the value for which the payment instrument would be successfully authorized (e.g., in response to a request to authorize the payment instrument). For instance, the authorizable value of a debit card may correspond to the available balance of the debit card. As another example, the authorizable value of a credit card may correspond to the difference in value between the credit limit associated with the credit card and the unpaid balance of the credit card. The authorizable value of a payment instrument may change from time to time (e.g., based on a transfer of money to or from an account associated with the payment instrument, a credit limit increase, a credit limit decrease, etc.).
In various implementations, the payment-capture techniques may include re-attempting to authorize the payment instrument with respect to at least a portion of the cost of the transaction, at 112(2). For example, the remote service may re-attempt to authorize the payment instrument with respect to the cost of the transaction at least partly in response to one or more of: determining that the payment instrument has been declined, determining that an authorizable value of the payment instrument is expected to increase during a future time period, inferring that the authorizable value of the payment instrument has increased, or determining that the POS device processed the transaction in the offline mode.
In some cases, the remote service may determine that an authorizable value of the payment instrument is expected to increase during a future time period based at least in part on historical transaction data. The historical transaction data may include data corresponding to transactions that occurred over a period of time before the time at which the remote service determines that the authorizable value of the payment instrument is expected to increase. In some cases, the remote service may access the historical transaction data from one or more data stores accessible to the remote service, including data stores that are local to the remote service and/or data stores that are located remotely.
In various non-limiting examples, the historical transaction data may include data associated with a particular transaction, a set of transactions, transactions corresponding to a particular merchant, transactions corresponding to a set of merchants, transactions involving a particular payment instrument, transactions involving a class of payment instruments, transactions involving a particular customer, etc., or any combination thereof. In some cases, the remote service may analyze historical data pertaining to a particular payment instrument to determine when the holder of the payment instrument typically pays off a balance associated with the payment instrument or otherwise increases the authorizable value of the payment instrument.
In various examples, the remote service may determine that the authorizable value of the payment instrument is expected to increase periodically. Additionally or alternatively, the remote service may determine that the authorizable value of the payment instrument is expected to increase during one or multiple time periods that individually correlate to a standard pay period, a standard credit card bill payment period or the like, and/or a period during which a holder of the payment instrument typically pays or is assumed to make a payment towards a credit card bill or the like. For example, the remote service may determine that the authorizable value of the payment instrument is expected to increase during the first (1st) and/or fifteenth (15th) days of each month.
Likewise, the remote service may determine the authorizable value of the payment instrument is expected to increase during a time period that is offset a predetermined amount of time (e.g., a predetermined number of days) from a standard pay period. For example, the remote service may determine that the authorizable value of the payment instrument typically increases on the first Pt day of the month because it correlates to a standard pay day. In some cases, the remote service may determine that the authorizable value of the payment instrument
However, in some cases, an increased value of the payment instrument may be in a “pending” status for a short period of time (e.g., a day or two) during which the payment instrument would be declined with respect to the increased value. In such cases, the remote service may determine the authorizable value of the payment instrument actually increases for authorization purposes on the 2nd or 3rd day of the month, for example.
In some instances, the remote service may re-attempt to authorize the payment instrument with respect to the cost of the transaction at least partly in response to inferring that an authorizable value of the payment instrument has increased. For example, the remote service may receive an indication indicating that the payment instrument has been authorized for a different transaction. In this example, the remote service may infer that the authorizable value of the payment instrument has increased based at least in part on the indication indicating that the payment instrument has been authorized for a different transaction.
In some cases, a merchant in the transaction may be allowed to determine when the remote service is to re-attempt to authorize the payment instrument. For instance, the merchant may be able to select one or multiple time periods that may prompt the remote service to re-attempt to authorize the payment instrument.
In various implementations, the payment-capture techniques may include providing a customer/holder of the payment instrument an opportunity to resolve the issue(s) causing the payment instrument to be declined, at 112(3). For example, the remote service and/or a merchant with a stake in the transaction may communicate with the customer to request that the customer cooperate in satisfying at least a portion of the cost of the transaction via the payment instrument. Additionally or alternatively, the remote service and/or the merchant may communicate with the customer to request that the customer submit an alternative form of payment (i.e., request that the customer cooperate in satisfying at least a portion of the cost of the transaction via another payment instrument).
In some examples, the remote service may receive a decline reason indicating the reason(s) why the payment instrument was declined. The remote service may retrieve the contact information of the customer and communicate with the customer directly, provide the contact information to the merchant such that the merchant is capable of communicating with the customer, or both.
In some instances, the customer may provide contact information at the time of the transaction and/or at the time of any other transaction. For example, the customer may provide an e-mail address, a physical address, a mailing address, and/or a phone number. However, it should be understood that the customer can additionally or alternatively provide any other identifier associated with a suitable communication vehicle enabling the merchant and/or the remote service to contact the customer.
In some cases, however, the customer might not have provided any contact information at the time of the transaction. In such cases, the remote service may attempt to locate the contact information in one or more databases accessible to the remote service. For example, the remote service may retrieve contact information of the customer by searching through one or more databases that link an identifier of the payment instrument with the contact information of the buyer.
In various examples, the remote service and/or the merchant may communicate with the customer by one or more of: sending the customer an automated e-mail, sending the customer an e-mail requesting permission to re-attempt to authorize the payment instrument, sending the customer a form for inputting valid payment instrument information, or sending the customer a copy of a digital receipt that includes transaction information associated with the transaction. Additionally or alternatively, communicating with the customer may include placing phone calls to the customer via, for example, an automated calling system and/or a human agent.
In some cases, the remote server may determine to proceed directly to communicating with the customer in response to the payment instrument being declined. For instance, the remote server may determine that a type of payment instrument (e.g., a prepaid debit card), upon being depleted in value, may be unlikely to increase in authorizable value in the future. In such instances, the remote server may determine to communicate with the customer as a next step instead of re-attempting to authorize the card without seeking customer cooperation.
In various implementations, multiple payment-capture techniques described herein can be performed with respect to a single transaction. For example, in response to the payment instrument being declined, the remote service may attempt to authorize the payment instrument with respect to an available balance before re-attempting to authorize the payment during a future time period, or vice-versa.
As used herein, a merchant may include any business engaged in the offering of goods or services for acquisition by customers. Actions attributed to a merchant may include actions performed by owners, employees, or other agents of the merchant and thus no distinction is made herein unless specifically discussed. In addition, as used herein, a customer may include any entity that acquires goods or services from a merchant, such as by purchasing, renting, leasing, borrowing, licensing, or the like. Hereinafter, goods and/or services offered by merchants may be referred to as items. Thus, a merchant and a customer may interact with each other to conduct a transaction in which the customer acquires an item from a merchant, and in return, the customer provides payment to the merchant.
As used herein, a transaction may include a financial transaction for the acquisition of goods and/or services that is conducted between a customer and a merchant. For example, when paying for a transaction, the customer can provide the amount that is due to the merchant using a payment instrument (e.g., a debit card, a credit card, a stored-value or gift card, a check, through an electronic payment application on a device carried by the customer, or the like). The merchant can interact with the POS device 104 to process the transaction, such as by inputting (e.g., manually, via a magnetic card reader or an RFID reader, etc.) an identifier associated with the payment instrument. For example, a payment instrument of one of the customers 206 may include one or more magnetic strips for providing card and customer information when swiped in a card reader. In other examples, other types of payment cards may be used, such as smart cards having a built-in memory chip, a radiofrequency identification tag, or so forth.
During the transaction, the POS device 204 can determine transaction information describing the transaction, such as the identifier of the payment instrument, an amount of payment received from the customer, the item(s) acquired by the customer, a time, place and date of the transaction, and so forth. The POS device 204 can send the transaction information to a payment service 208 over a network 210, either substantially contemporaneously with the conducting of the transaction (in the case of online transactions) or later when the device 204 is in the online mode (in the case offline transactions).
In an offline transaction, the POS device 204 may store one or more characteristics associated with the transaction (i.e., the transaction information), such as a cost of the transaction, a time of day at which the transaction occurred, a day of the week at which the transaction occurred, a location at which the transaction took place, an item that the customer obtained, and a payment instrument used in the transaction. After conducting an offline transaction with one of the customers 206, the POS device 204 may provide the stored information to the payment service 208 over the network 210. The network 210 may represent any one or more wired or wireless networks, such as a WiFi network, a cellular network, or the like.
The POS device 204 may be configured to automatically transition between the online mode and the offline mode based on an array of different reasons other than simply a loss of network connectivity. For instance, the POS device 204 may transition to the offline mode in order to increase an efficiency of transactions conducted between the merchant 202 and the customers 206. The POS device 204 may make this transition in response to a rate increase in sales volume being greater than a threshold, in response to an amount of transactions over a given time being greater than a threshold, in response to anticipating an increase in future transactions (e.g., based on historical sales data), or the like. In some instances, the POS device 204 may provide an option to the user to transition to the offline mode, rather than automatically transition to the offline mode.
As illustrated, the payment service 208 may include one or more processors 212 and memory 214, which may store a payment processing module 216, a mode transition module 218, a payment capture module 220, an inference module 222, transaction information via a transaction information data store 224, and customer profiles via a customer profiles data store 226.
The payment processing module 216 may function to receive information regarding a transaction from the POS device 204 and attempt to authorize the payment instrument used to conduct the transaction. The payment processing module 216 may store the received transaction information in the transaction information data store 224. In some cases, the payment processing module 216 may then send an indication of whether the payment instrument has been approved or declined back to the POS device 204.
Generally, when a customer and a merchant enter into an electronic payment transaction, the transaction is processed by electronically transferring funds from a financial account associated with the customer to a financial account associated with the merchant. As such, the payment processing module 216 may communicate with one or more computing devices of a card payment network, e.g., MasterCard®, VISA®, over the network 210 to conduct financial transactions electronically. The payment processing module 216 can also communicate with one or more computing devices of one or more banks over the network 210. For example, the payment processing module 216 may communicate with an acquiring bank, an issuing bank, and/or a bank maintaining customer accounts for electronic payments.
An acquiring bank may be a registered member of a card association (e.g., Visa®, MasterCard®), and may be part of a card payment network. An issuing bank may issue credit cards to buyers, and may pay acquiring banks for purchases made by cardholders to which the issuing bank has issued a payment card. Accordingly, in some examples, the computing device(s) of an acquiring bank may be included in the card payment network and may communicate with the computing devices of a card-issuing bank to obtain payment. Further, in some examples, the customer may use a debit card instead of a credit card, in which case the bank computing device(s) of a bank corresponding to the debit card may receive communications regarding a transaction in which the customer is participating. Additionally, there may be computing devices of other financial institutions involved in some types of transactions or in alternative system architectures, and thus, the foregoing are merely several examples for discussion purposes.
The mode transition module 218 may function to determine when to instruct the POS device 204 to transition modes, such as when to transition from an online mode to an offline mode, and vice-versa. While the mode transition module 218 is illustrated at the payment service 208, in some implementations a merchant application executing on the POS device 204 (discussed with reference to
The payment capture module 220 may function to determine which of the payment-capture techniques to utilize, and when to utilize them, after a payment instrument has been declined. That is, the payment capture module 220 may drive implementation of the payment-capture techniques. In some cases, the payment capture module 220 may determine to authorize a payment instrument with respect to an available balance of the payment instrument. Additionally or alternatively, the payment capture module 220 may determine to re-attempt to authorize the payment instrument for at least a portion of a cost of a transaction. In some cases, the payment capture module 220 may additionally or alternatively provide a customer an opportunity to resolve a failed authorization.
The inference module 222 may infer and/or determine that an authorizable value of the payment instrument has increased, or that an authorizable value of the payment instrument is expected to increase during a future time period. The inference module 222 may obtain data from one or more data stores, including, for example, the transaction information data store 224 and the customer profiles data store 226. It should be understood, however, that the inference module 222 may also base its determinations/inferences on data obtained from any other suitable local and/or remote source.
The process 300 and other processes described herein are illustrated as collections of blocks in logical flow diagrams, which represent a sequence of operations, some or all of which can be implemented in hardware, software or a combination thereof. In the context of software, the blocks may represent computer-executable instructions stored on one or more computer-readable media that, when executed by one or more processors, program the processors to perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular functions or implement particular data types. The order in which the blocks are described should not be construed as a limitation. Any number of the described blocks can be combined in any order and/or in parallel to implement the process, or alternative processes, and not all of the blocks need be executed. For discussion purposes, the processes are described with reference to the environments, architectures and systems described in the examples herein, although the processes may be implemented in a wide variety of other environments, architectures and systems. The process 300 and other processes described herein may be performed by a POS device, by a payment service, by another entity, or by a combination thereof.
At 302, the process 300 may receive a request from a point-of-sale (POS) device to authorize a payment instrument corresponding to a transaction. In various cases, the POS device may have processed the transaction while operating in an offline mode.
At 304, the process 300 may attempt to authorize the payment instrument with respect to a cost of the transaction. For example, suppose a customer purchased an item from a merchant for a $100 cost. In this example, the process 300 may attempt to authorize the payment instrument for $100.
At 306, the process 300 may determine that the payment instrument has been declined with respect to the cost of the transaction. Keeping with the previous example, the process 300 may determine that the payment instrument has been declined with respect to the $100 cost. In some cases, this may be due to “insufficient funds.” For instance, at the time of the attempted authorization, the authorizable value of the payment instrument may have been $80, and therefore insufficient to satisfy the $100 cost of the transaction. In the context of a payment instrument associated with a credit line, an available amount of the credit line may be insufficient to satisfy the cost of the transaction.
At 308, the process 400 may implement one or multiple payment-capture techniques. For instance, in some cases, the process 400 may implement a single payment capture technique to capture a payment (or multiple payments) that satisfies at least a portion of the cost of the transaction. In other cases, the process 400 may implement multiple payment-capture techniques to capture a payment (or multiple payments) that satisfies at least a portion of the cost of the transaction. The process 400 may implement the payment-capture techniques in various sequences and/or combinations.
At 402, the process 400 may determine an available balance of the payment instrument. For instance, the process 400 may receive a decline reason and an indication of an available balance of the payment instrument upon or after the payment instrument being declined. The process 400 may determine the available balance based at least in part on the received indication.
At 404, the process 400 may determine that the available balance satisfies a payment threshold. The payment threshold may represent, or otherwise correspond to, an acceptable payment towards the cost of the transaction. For example, a merchant associated with the transaction may determine a percentage (or the like) of the transaction that the merchant would accept in the event that the payment instrument is declined with respect to the cost of the transaction.
At 406, the process 400 may authorize, or cause to authorize, the payment instrument with respect to the available balance to satisfy at least a portion of the cost of the transaction. For example, the process 400 may generate a request to authorize the payment instrument with respect to the available balance. The process 400 may send the request to one or more computing devices of a card payment network and/or an issuing bank associated with the payment instrument. The process 400 may then receive an indication indicating that the payment instrument has been authorized with respect to the available balance. In some cases, the process 400 may authorize the payment instrument with respect to the available balance in response to determining, at 404, that the available balance satisfies the payment threshold. However, in other cases, the process 400 may authorize the payment instrument with respect to the available balance without checking the available balance against a payment threshold.
At 502, the process 500 may determine that an authorizable value of the payment instrument has increased and/or determine that the authorizable value of the payment instrument is expected to increase during one or multiple future time periods. For instance, the process 500 may analyze historical transaction data to determine one or multiple future time periods during which the authorizable value of the payment instrument is expected to increase. Then, at 504, the process 500 may re-attempt to authorize the payment instrument during one or multiple time periods corresponding to an increase/expected increase in the authorizable value of the payment instrument.
At 602, the process 600 may determine a decline reason corresponding to why the payment instrument has been declined. For example, the decline reason may correspond to the payment instrument lacking sufficient funds to satisfy the cost of the transaction. In some instances, the decline reason may correspond to a fraud alert placed on the payment instrument.
At 604, the process 600 may retrieve contact information of a customer. For instance, the customer may have provided contact information at the time of the transaction. In some cases, the process 600 may retrieve the contact information by searching for the contact information in one or more databases.
At 606, the process 600 may communicate with the customer to request that the customer cooperate in satisfying at least a portion of the cost of the transaction. For instance, the customer may be asked to satisfy at least a portion of the cost of the transaction via one or more of the payment instrument or another payment instrument. In various examples, the process 600 may communicate with the customer by one or more of: sending the customer an automated e-mail, sending the customer an e-mail requesting permission to re-attempt to authorize the payment instrument, sending the customer a form for inputting valid payment instrument information, or sending the customer a copy of a digital receipt that includes transaction information associated with the transaction. Additionally or alternatively, communicating with the customer may include placing phone calls to the customer via, for example, an automated calling system and/or a human agent.
In the illustrated example, the POS device 700 includes at least one processor 702, memory 704, a display 706, one or more input/output (I/O) components 708, one or more network interfaces 710, at least one card reader 712, at least one location component 714, and at least one power source 716. Each processor 702 may itself comprise one or more processors or processing cores. For example, the processor 702 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. In some cases, the processor 702 may be one or more hardware processors and/or logic circuits of any suitable type specifically programmed or configured to execute the algorithms and processes described herein. The processor 702 can be configured to fetch and execute computer-readable processor-executable instructions stored in the memory 704.
Depending on the configuration of the POS device 700, the memory 704 may be an example of tangible non-transitory computer storage media and may include volatile and nonvolatile memory and/or removable and non-removable media implemented in any type of technology for storage of information such as computer-readable processor-executable instructions, data structures, program modules or other data. The memory 704 may include, but is not limited to, RAM, ROM, EEPROM, flash memory, solid-state storage, magnetic disk storage, optical storage, and/or other computer-readable media technology. Further, in some cases, the POS device 700 may access external storage, such as RAID storage systems, storage arrays, network attached storage, storage area networks, cloud storage, or any other medium that can be used to store information and that can be accessed by the processor 702 directly or through another computing device or network. Accordingly, the memory 704 may be computer storage media able to store instructions, modules or components that may be executed by the processor 702. Further, when mentioned, non-transitory computer-readable media exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
The memory 704 may be used to store and maintain any number of functional components that are executable by the processor 702. In some implementations, these functional components comprise instructions or programs that are executable by the processor 702 and that, when executed, implement operational logic for performing the actions and services attributed above to the POS device 700. Functional components of the POS device 700 stored in the memory 704 may include a merchant application 718, discussed above. The merchant application 718 may present an interface on the POS device 700 to enable the merchant to conduct transactions, receive payments, and so forth, as well as communicating with the payment service 208 for processing payments and sending transaction information. Further, the merchant application 718 may present an interface to enable the merchant to manage the merchant's account, and the like. The merchant application 718 may also include some or all of the functionality described above with reference to the payment processing module 216, the mode transition module 218, the payment capture module 220, or the inference module 222. Additional functional components may include an operating system 720 for controlling and managing various functions of the POS device 700 and for enabling basic user interactions with the POS device 700. The memory 704 may also store transaction information/data 722 that is received based on the merchant associated with the POS device 700 engaging in various transactions with customers, such as the example customers 206 from
In addition, the memory 704 may also store data, data structures and the like, that are used by the functional components. For example, this data may include item information that includes information about the items offered by the merchant, which may include images of the items, descriptions of the items, prices of the items, and so forth. Depending on the type of the POS device 700, the memory 704 may also optionally include other functional components and data, which may include programs, drivers, etc., and the data used or generated by the functional components. Further, the POS device 700 may include many other logical, programmatic and physical components, of which those described are merely examples that are related to the discussion herein.
The network interface(s) 710 may include one or more interfaces and hardware components for enabling communication with various other devices over the network or directly. For example, network interface(s) 710 may enable communication through one or more of the Internet, cable networks, cellular networks, wireless networks (e.g., Wi-Fi) and wired networks, as well as close-range communications such as Bluetooth®, Bluetooth® low energy, and the like, as additionally enumerated elsewhere herein.
The I/O components 708, meanwhile, may include speakers, a microphone, a camera, various user controls (e.g., buttons, a joystick, a keyboard, a keypad, etc.), and/or a haptic output device, and so forth.
In addition, the POS device 700 may include or may be connectable to a payment instrument reader 712. In some examples, the reader 712 may plug in to a port in the merchant device, such as a microphone/headphone port, a data port, or other suitable port. In other instances, the reader 712 is integral with the entire POS device 700. The reader may include a read head for reading a magnetic strip of a payment card, and further may include encryption technology for encrypting the information read from the magnetic strip. Alternatively, numerous other types of card readers may be employed with the POS devices 700 herein, depending on the type and configuration of a particular POS device 700.
The location component 714 may include a GPS device able to indicate location information, or the location component 714 may comprise any other location-based sensor. The POS device 700 may also include one or more additional sensors (not shown), such as an accelerometer, gyroscope, compass, proximity sensor, and the like. Additionally, the POS device 700 may include various other components that are not shown, examples of which include removable storage, a power control unit, and so forth.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as example forms of implementing the claims.
This application claims priority to and is a Continuation Application of U.S. patent application Ser. No. 14/567,118, filed on Dec. 11, 2014, the entire contents of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5692233 | Garman | Nov 1997 | A |
5778173 | Apte | Jul 1998 | A |
5892900 | Ginter et al. | Apr 1999 | A |
6096096 | Murphy et al. | Aug 2000 | A |
6259672 | Lohrbach | Jul 2001 | B1 |
6328208 | Artino et al. | Dec 2001 | B1 |
6603487 | Bennett et al. | Aug 2003 | B1 |
6693897 | Huang | Feb 2004 | B1 |
6725444 | Fergus | Apr 2004 | B2 |
6798870 | Lines et al. | Sep 2004 | B1 |
6879965 | Fung et al. | Apr 2005 | B2 |
6975717 | Smith et al. | Dec 2005 | B1 |
6980638 | Smith et al. | Dec 2005 | B1 |
7039015 | Vallone et al. | May 2006 | B1 |
7092380 | Chen et al. | Aug 2006 | B1 |
7096003 | Joao et al. | Aug 2006 | B2 |
7225156 | Fisher et al. | May 2007 | B2 |
7272635 | Longtin et al. | Sep 2007 | B1 |
7466689 | Halpern et al. | Dec 2008 | B1 |
7478266 | Gatto et al. | Jan 2009 | B2 |
7610040 | Cantini et al. | Oct 2009 | B2 |
7818811 | Kirovski et al. | Oct 2010 | B2 |
7835942 | Pavlic et al. | Nov 2010 | B1 |
7853525 | Yeates et al. | Dec 2010 | B2 |
7865400 | Rogers et al. | Jan 2011 | B2 |
7866546 | Vance | Jan 2011 | B1 |
7962418 | Wei | Jun 2011 | B1 |
7970669 | Santos | Jun 2011 | B1 |
7983423 | Agarwal et al. | Jul 2011 | B1 |
8041338 | Chen et al. | Oct 2011 | B2 |
8121945 | Rackley, III et al. | Feb 2012 | B2 |
8223951 | Edelhaus et al. | Jul 2012 | B1 |
8224709 | Hirson | Jul 2012 | B2 |
8090654 | Kowalchyk et al. | Oct 2012 | B2 |
8297501 | Kowalchyk et al. | Oct 2012 | B1 |
8317094 | Lehman et al. | Nov 2012 | B2 |
8378485 | Laracey | Feb 2013 | B2 |
8380177 | Bachman et al. | Feb 2013 | B2 |
8396808 | Greenspan | Mar 2013 | B2 |
8396810 | Cook | Mar 2013 | B1 |
8452704 | Barbara et al. | May 2013 | B2 |
8494478 | Ponnangath | Jul 2013 | B1 |
8499355 | Goncharov | Jul 2013 | B1 |
8608064 | Xu et al. | Dec 2013 | B2 |
8626579 | Fordyce, III et al. | Jan 2014 | B2 |
8635354 | Martino et al. | Jan 2014 | B2 |
8660911 | Hirson et al. | Feb 2014 | B2 |
8694438 | Jernigan et al. | Apr 2014 | B1 |
8712888 | Chisholm et al. | Apr 2014 | B2 |
8724815 | Roth et al. | May 2014 | B1 |
8868859 | Schmidt et al. | Oct 2014 | B2 |
8964533 | Moore et al. | Feb 2015 | B2 |
9037491 | Lee | May 2015 | B1 |
9281945 | Voice et al. | Mar 2016 | B2 |
9466055 | Kulasooriya et al. | Oct 2016 | B2 |
9741035 | White et al. | Aug 2017 | B1 |
9875493 | Nuzzi | Jan 2018 | B2 |
9881302 | White et al. | Jan 2018 | B1 |
9911110 | Scott et al. | Mar 2018 | B2 |
9911154 | Baker et al. | Mar 2018 | B2 |
10002198 | Felt et al. | Jun 2018 | B2 |
10007900 | Royyuru et al. | Jun 2018 | B2 |
10037517 | Chi et al. | Jul 2018 | B1 |
10037521 | Botros et al. | Jul 2018 | B1 |
10055721 | Mocko et al. | Aug 2018 | B1 |
10055722 | Chen et al. | Aug 2018 | B1 |
10147077 | Mestre et al. | Dec 2018 | B2 |
10217110 | Chen et al. | Feb 2019 | B1 |
10366378 | Han et al. | Jul 2019 | B1 |
10467618 | White et al. | Nov 2019 | B2 |
10496977 | Ruder | Dec 2019 | B2 |
10523767 | Ewe | Dec 2019 | B2 |
20010019614 | Madoukh | Sep 2001 | A1 |
20010051920 | Joao et al. | Dec 2001 | A1 |
20020016769 | Barbara et al. | Feb 2002 | A1 |
20020026374 | Moneymaker et al. | Feb 2002 | A1 |
20020132662 | Sharp et al. | Sep 2002 | A1 |
20020156727 | LeVake et al. | Oct 2002 | A1 |
20020194137 | Park et al. | Dec 2002 | A1 |
20020194590 | Pong | Dec 2002 | A1 |
20030005251 | Wilson et al. | Jan 2003 | A1 |
20030009382 | D'Arbeloff et al. | Jan 2003 | A1 |
20030046235 | Lacivita | Mar 2003 | A1 |
20030065556 | Takanashi et al. | Apr 2003 | A1 |
20030105688 | Brown et al. | Jun 2003 | A1 |
20030120608 | Pereyra | Jun 2003 | A1 |
20030132918 | Fitch et al. | Jul 2003 | A1 |
20030191709 | Elston et al. | Oct 2003 | A1 |
20030204560 | Chen et al. | Oct 2003 | A1 |
20030212660 | Kerwin | Nov 2003 | A1 |
20030222138 | Oppenlander et al. | Dec 2003 | A1 |
20030225883 | Greaves et al. | Dec 2003 | A1 |
20030229793 | McCall et al. | Dec 2003 | A1 |
20040015954 | Tuerke et al. | Jan 2004 | A1 |
20040034684 | Payne | Feb 2004 | A1 |
20040088737 | Donlan et al. | May 2004 | A1 |
20040107356 | Shamoon et al. | Jun 2004 | A1 |
20040112959 | Jun | Jun 2004 | A1 |
20040122685 | Bunce | Jun 2004 | A1 |
20040158510 | Fisher | Aug 2004 | A1 |
20040168055 | Lord et al. | Aug 2004 | A1 |
20040210519 | Oppenlander et al. | Oct 2004 | A1 |
20040210566 | Smith et al. | Oct 2004 | A1 |
20040215560 | Amalraj | Oct 2004 | A1 |
20040215781 | Pulsipher et al. | Oct 2004 | A1 |
20050021462 | Teague | Jan 2005 | A1 |
20050033688 | Peart et al. | Feb 2005 | A1 |
20050102518 | Wada | May 2005 | A1 |
20050134683 | Quintana et al. | Jun 2005 | A1 |
20050149455 | Bruesewitz et al. | Jul 2005 | A1 |
20050187873 | Labrou et al. | Aug 2005 | A1 |
20050279827 | Mascavage et al. | Dec 2005 | A1 |
20060031466 | Kovach | Feb 2006 | A1 |
20060034255 | Benning et al. | Feb 2006 | A1 |
20060036134 | Tarassenko et al. | Feb 2006 | A1 |
20060036541 | Schleicher | Feb 2006 | A1 |
20060039290 | Roden et al. | Feb 2006 | A1 |
20060059268 | Victor et al. | Mar 2006 | A1 |
20060123088 | Simmons et al. | Jun 2006 | A1 |
20060143239 | Battat et al. | Jun 2006 | A1 |
20060218228 | Mouline | Sep 2006 | A1 |
20060253338 | Metzger | Nov 2006 | A1 |
20060277111 | Bevis | Dec 2006 | A1 |
20070051794 | Glanz et al. | Mar 2007 | A1 |
20070106558 | Mitchell et al. | May 2007 | A1 |
20070194110 | Esplin et al. | Aug 2007 | A1 |
20070194113 | Esplin et al. | Aug 2007 | A1 |
20070223408 | Thielke et al. | Sep 2007 | A1 |
20070255617 | Maurone et al. | Nov 2007 | A1 |
20070262139 | Fiebiger et al. | Nov 2007 | A1 |
20070266130 | Mazur et al. | Nov 2007 | A1 |
20070274291 | Diomelli | Nov 2007 | A1 |
20070280288 | Ma | Dec 2007 | A1 |
20080033880 | Fiebiger et al. | Feb 2008 | A1 |
20080035725 | Jambunathan et al. | Feb 2008 | A1 |
20080039980 | Pollack et al. | Feb 2008 | A1 |
20080052233 | Fisher et al. | Feb 2008 | A1 |
20080091616 | Helwin et al. | Apr 2008 | A1 |
20080091944 | von Mueller et al. | Apr 2008 | A1 |
20080097851 | Bemmel et al. | Apr 2008 | A1 |
20080126213 | Robertson et al. | May 2008 | A1 |
20080133419 | Wormington et al. | Jun 2008 | A1 |
20080183621 | Evans | Jul 2008 | A1 |
20080189186 | Choi et al. | Aug 2008 | A1 |
20080203151 | Dixon et al. | Aug 2008 | A1 |
20080203170 | Hammad et al. | Aug 2008 | A1 |
20080208681 | Hammad et al. | Aug 2008 | A1 |
20080219453 | Chang et al. | Sep 2008 | A1 |
20080223918 | Williams et al. | Sep 2008 | A1 |
20080270302 | Beenau et al. | Oct 2008 | A1 |
20080275760 | Easterly et al. | Nov 2008 | A1 |
20080283590 | Oder, II et al. | Nov 2008 | A1 |
20080283592 | Oder, II et al. | Nov 2008 | A1 |
20090004998 | Aaron | Jan 2009 | A1 |
20090030885 | DePasquale et al. | Jan 2009 | A1 |
20090063339 | Santora | Mar 2009 | A1 |
20090094123 | Killian et al. | Apr 2009 | A1 |
20090147698 | Potvin | Jun 2009 | A1 |
20090164375 | Saunders et al. | Jun 2009 | A1 |
20090210299 | Cowen | Aug 2009 | A1 |
20090245268 | Pugliese, IV | Oct 2009 | A1 |
20090248555 | Sada et al. | Oct 2009 | A1 |
20090298427 | Wilkinson et al. | Dec 2009 | A1 |
20090307778 | Mardikar | Dec 2009 | A1 |
20100021049 | Nikaido | Jan 2010 | A1 |
20100029265 | Khandekar et al. | Feb 2010 | A1 |
20100031049 | Shima et al. | Feb 2010 | A1 |
20100057612 | Wagenhals | Mar 2010 | A1 |
20100114744 | Gonen | May 2010 | A1 |
20100121726 | Coulter et al. | May 2010 | A1 |
20100169284 | Walter et al. | Jul 2010 | A1 |
20100211469 | Salmon et al. | Aug 2010 | A1 |
20100228672 | Karim | Sep 2010 | A1 |
20100267390 | Lin et al. | Oct 2010 | A1 |
20100293099 | Pauker et al. | Nov 2010 | A1 |
20100299212 | Graylin et al. | Nov 2010 | A1 |
20100299220 | Baskerville et al. | Nov 2010 | A1 |
20100305993 | Fisher | Dec 2010 | A1 |
20100312617 | Cowen | Dec 2010 | A1 |
20100317318 | Carter et al. | Dec 2010 | A1 |
20100318446 | Carter | Dec 2010 | A1 |
20100325039 | Radu et al. | Dec 2010 | A1 |
20100327056 | Yoshikawa et al. | Dec 2010 | A1 |
20100332351 | Stone | Dec 2010 | A1 |
20110016041 | Scragg | Jan 2011 | A1 |
20110016043 | Dornseif | Jan 2011 | A1 |
20110016054 | Dixon et al. | Jan 2011 | A1 |
20110035278 | Fordyce et al. | Feb 2011 | A1 |
20110035294 | Mizrah | Feb 2011 | A1 |
20110039585 | Rouse et al. | Feb 2011 | A1 |
20110082798 | Michaud et al. | Apr 2011 | A1 |
20110084140 | Wen | Apr 2011 | A1 |
20110106936 | Galbreath et al. | May 2011 | A1 |
20110125566 | McLaughlin et al. | May 2011 | A1 |
20110126060 | Grube et al. | May 2011 | A1 |
20110128954 | Veenstra et al. | Jun 2011 | A1 |
20110131122 | Griffin et al. | Jun 2011 | A1 |
20110153453 | Ghafoor et al. | Jun 2011 | A1 |
20110154497 | Bailey, Jr. | Jun 2011 | A1 |
20110161233 | Tieken | Jun 2011 | A1 |
20110166936 | Dixon et al. | Jul 2011 | A1 |
20110166997 | Dixon et al. | Jul 2011 | A1 |
20110196791 | Dominguez | Aug 2011 | A1 |
20110218872 | Richelson et al. | Sep 2011 | A1 |
20110238473 | Sankolli et al. | Sep 2011 | A1 |
20110238510 | Rowen | Sep 2011 | A1 |
20110270761 | Graham, III et al. | Nov 2011 | A1 |
20110313925 | Bailey, Jr. | Dec 2011 | A1 |
20120016731 | Smith et al. | Jan 2012 | A1 |
20120036076 | Vanderwall et al. | Feb 2012 | A1 |
20120072347 | Conway | Mar 2012 | A1 |
20120078789 | Harrell | Mar 2012 | A1 |
20120084162 | Smith et al. | Apr 2012 | A1 |
20120084210 | Farahmand | Apr 2012 | A1 |
20120095852 | Bauer et al. | Apr 2012 | A1 |
20120095855 | Sterling | Apr 2012 | A1 |
20120101822 | Dinerstein | Apr 2012 | A1 |
20120109802 | Griffin et al. | May 2012 | A1 |
20120143706 | Crake et al. | Jun 2012 | A1 |
20120144461 | Rathbun | Jun 2012 | A1 |
20120150601 | Fisher | Jun 2012 | A1 |
20120166311 | Dwight et al. | Jun 2012 | A1 |
20120191522 | McLaughlin et al. | Jul 2012 | A1 |
20120191569 | Shah | Jul 2012 | A1 |
20120191610 | Prasad | Jul 2012 | A1 |
20120209771 | Winner et al. | Aug 2012 | A1 |
20120233005 | White | Sep 2012 | A1 |
20120239556 | Magruder et al. | Sep 2012 | A1 |
20120265697 | Tuchman et al. | Oct 2012 | A1 |
20120271765 | Cervenka et al. | Oct 2012 | A1 |
20120284130 | Lewis et al. | Nov 2012 | A1 |
20120284187 | Hammad et al. | Nov 2012 | A1 |
20120290376 | Dryer et al. | Nov 2012 | A1 |
20120303425 | Katzin et al. | Nov 2012 | A1 |
20120310826 | Chatterjee | Dec 2012 | A1 |
20120310831 | Harris et al. | Dec 2012 | A1 |
20120330845 | Kang | Dec 2012 | A1 |
20130006872 | Chandoor et al. | Jan 2013 | A1 |
20130024366 | Mukherjee et al. | Jan 2013 | A1 |
20130054465 | Sakata et al. | Feb 2013 | A1 |
20130091042 | Shah et al. | Apr 2013 | A1 |
20130138563 | Gilder et al. | May 2013 | A1 |
20130144701 | Kulasooriya et al. | Jun 2013 | A1 |
20130151405 | Head et al. | Jun 2013 | A1 |
20130159191 | Maiya et al. | Jun 2013 | A1 |
20130173407 | Killian et al. | Jul 2013 | A1 |
20130179281 | White et al. | Jul 2013 | A1 |
20130179352 | Dwyre et al. | Jul 2013 | A1 |
20130185124 | Aaron et al. | Jul 2013 | A1 |
20130185152 | Aaron et al. | Jul 2013 | A1 |
20130185208 | Aaron et al. | Jul 2013 | A1 |
20130198075 | Sakata et al. | Aug 2013 | A1 |
20130198081 | Royyuru et al. | Aug 2013 | A1 |
20130204785 | Monk et al. | Aug 2013 | A1 |
20130211937 | Elbirt et al. | Aug 2013 | A1 |
20130212017 | Bangia | Aug 2013 | A1 |
20130238431 | Kulasooriya et al. | Sep 2013 | A1 |
20130246171 | Carapelli | Sep 2013 | A1 |
20130246187 | Chau et al. | Sep 2013 | A1 |
20130256403 | Mackinnon et al. | Oct 2013 | A1 |
20130262307 | Fasoli et al. | Oct 2013 | A1 |
20130268337 | Morello | Oct 2013 | A1 |
20130346175 | Muthu | Dec 2013 | A1 |
20130346244 | Nuzzi | Dec 2013 | A1 |
20140006194 | Xie et al. | Jan 2014 | A1 |
20140008432 | de Geer et al. | Jan 2014 | A1 |
20140019274 | Hardin et al. | Jan 2014 | A1 |
20140019340 | Ruder et al. | Jan 2014 | A1 |
20140025581 | Calman | Jan 2014 | A1 |
20140025958 | Caiman | Jan 2014 | A1 |
20140032415 | Lee et al. | Jan 2014 | A1 |
20140032470 | McCarthy et al. | Jan 2014 | A1 |
20140098671 | Raleigh et al. | Apr 2014 | A1 |
20140114853 | Guedj | Apr 2014 | A1 |
20140156534 | Quigley | Jun 2014 | A1 |
20140172680 | Prabhu | Jun 2014 | A1 |
20140236823 | Lee | Aug 2014 | A1 |
20150006407 | Lunn et al. | Jan 2015 | A1 |
20150081462 | Ozvat et al. | Mar 2015 | A1 |
20150095453 | Jain et al. | Apr 2015 | A1 |
20150170132 | Patel | Jun 2015 | A1 |
20150178712 | Angrish | Jun 2015 | A1 |
20150229623 | Grigg et al. | Aug 2015 | A1 |
20150278795 | Jiang et al. | Oct 2015 | A1 |
20150339660 | Meng et al. | Nov 2015 | A1 |
20150348040 | Bhorania et al. | Dec 2015 | A1 |
20150371216 | Olawale et al. | Dec 2015 | A1 |
20160007240 | Belghoul et al. | Jan 2016 | A1 |
20160019278 | Jadhav et al. | Jan 2016 | A1 |
20160019728 | Petrie | Jan 2016 | A1 |
20160094497 | Javed et al. | Mar 2016 | A1 |
20160110718 | Jajara et al. | Apr 2016 | A1 |
20160335618 | Koh et al. | Nov 2016 | A1 |
20180357627 | Chen et al. | Dec 2018 | A1 |
20200082376 | Ruder et al. | Mar 2020 | A1 |
20200356992 | Quigley et al. | Nov 2020 | A1 |
20220414635 | Ruder et al. | Dec 2022 | A1 |
Number | Date | Country |
---|---|---|
2 879 290 | Jan 2014 | CA |
2 903 983 | Sep 2014 | CA |
0237219 | May 2002 | WO |
WO-0250735 | Jun 2002 | WO |
2012037971 | Mar 2012 | WO |
2013034953 | Mar 2013 | WO |
2013034953 | Mar 2013 | WO |
2013036199 | Mar 2013 | WO |
2014014781 | Jan 2014 | WO |
2014089288 | Jun 2014 | WO |
2014138109 | Sep 2014 | WO |
Entry |
---|
Notice of Allowance dated Nov. 6, 2019, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Non Final Office Action dated Dec. 31, 2019, for U.S. Appl. No. 16/105,918, of Chen, G.H., et al., filed Aug. 20, 2018. |
Non Final Office Action dated Feb. 4, 2020, for U.S. Appl. No. 16/681,217, of Ruder, E., et al., filed Nov. 12, 2019. |
“Advancing Payment Security: MasterCard Contactless Security Overview,” www.mastercard.com, retrieved from Internet URL: https://www.mastercard.com/contactless/doc/MasterCardContactless_SecurityFactSheet_2015.pdf, on Jun. 12, 2017, pp. 1-4. |
Conkling, C., “General Credit Card (CC) Approval/Payment Process,” Figure 2, dated Jan. 17, 2011, Retrieved from the Internet: URL<http:/ /craigconkling. blogspot.com/2011/01/nfc-and-mobile-payment-initiative-4.html>, on Jun. 6, 2014, p. 1-1. |
Conkling, C., “Mobile Trends Insight: NFC and the Mobile Payment Initiative-4,” dated Jan. 17, 2011, Retrieved from the Internet URL: http:/ /craigconkling. blogspot.com/2011/01/nfc-and-mobile-payment-initiative-4.html, on Jun. 6, 2014, pp. 1-15. |
Cooper, D., et al., “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” Standards Track, pp. 1-151 (May 2008). |
“Cryptography—PCI Encryption Key Management—Information Security Stack Exchange,” published Jan. 1, 2011, XP055415553, Retrieved from the Internet URL: https://security.stackexchange.com/questions/1412/pci-encryptionkey-management, Retrieved on Oct. 13, 2017, pp. 1-3. |
Denniswi, “How Can I change the Offline Mode Password in Microsoft Dynamice POS 2009?,” Microsoft Dynamics, dated Nov. 8, 2011, Retrieved from the Internet URL: <https://community.dynamics.com/f/31/t/66698.aspx>, on Jun. 4, 2014, p. 1-1. |
Evans, D. L., et al., “Security Requirements for Cryptographic Modules,” FIPS Pub 140-2 Change Notices, pp. 1-69 (May 25, 2001). |
Ferguson, R.B., “Passenger Hacks NYC computer system; The problem is more significant than GPS objections, according to the sofware engineer who hacked the system,” eWeek, dated Dec. 28, 2007, Retrieved from the Internet URL: http://search.pro quest. com/printviewfile?accountid=14753, on Apr. 24, 2017, pp. 1-2. |
“MasterCard and VeriFone Bring ‘Tap & Go’ Payments to Taxis,” Wireless News, dated Nov. 15, 2006, Retrieved from the Internet URL: http://search.proquest.com/printviewfile?accountid=14753, on Apr. 24, 2017, pp. 1-2. |
“Mobile payment,” Wikipedia, dated Jul. 9, 2012. Retrieved from the Internet URL: https://en.wikipedia.org/w/index.php?title=Mobile_payment&oldid=501410747,on Feb. 27, 2018, pp. 1-8. |
“Offline DB Support for POS,” Stack Overflow, dated Jan. 24, 2013, Retrieved from the Internet URL: <http://stackoverflow.com/questions/14495935/offline-dbsupport-for-pos>, on Jun. 4, 2014, p. 1-2. |
“Payment Card Industry (PCI) Hardware Security Module (HSM),” Security Requirements Version 1.0, XP055168869, pp. 1-26 (Apr. 2009). |
Perez, S., “Revel Systems Debuts An iPad Point-Of-Sale In A Box,” TechCrunch, dated Jun. 1, 2012, Retrieved from the Internet URL: <http://techcrunch.com/2012/06/27/revel-systems-debuts-an-ipad-point-of-sale-in-a-box>, on Jun. 4, 2014, pp. 1-5. |
“PCI DSS compliant Key Management,” published Jul. 31, 2011, XP055415555, Retrieved from the Internet URL: http://www.src-gmbh.de/pcinews/download/PCIWhitepaper-2011-07.pdf, on Oct. 13, 2017, pp. 1-3. |
“Suncorp and live TaxiEpay to provider Mobile Payment Terminals for Hypercom,” Anonymous Wireless News, dated Jun. 20, 2010, Retrieved from the Internet URL: http://search.pro quest. com/printviewfile?accountid=14753, on Apr. 21, 2017, pp. 1-2. |
Tanenbaum, A. S., “Distributed Systems: Principles and Paradigms (2nd Edition),” Pearson Prentice Hall, pp. 273-320 (2007). |
“What is ‘Offline Mode’ and How Does It Work?,” Vend, dated Dec. 20, 2011, Retrieved from the Internet URL: <http://support.vendhq.com/hc/enus/articles/201379940-What -is-Offline-Mode-and-how-does-it-work>, on Jun. 4, 2014, pp. 1-3. |
“What is the Purpose of Retail Offline Sync Service and How Does It Work?,” Microsoft Dynamics, dated Apr. 12, 2012, Retrieved from the Internet URL: <http://community.dynamics.com/ax/f/33/p/77 406/149851.aspx>, on Jun. 4, 2014, p. 1-3. |
Third Party Observation, for PCT Application No. PCT/US2013/050345 on May 30, 2014. |
Non-Final Office Action dated Jun. 13, 2014, in U.S. Appl. No. 13/786,262, of Scott J.B., et al., filed Mar. 5, 2013. |
Non-Final Office Action dated Sep. 9, 2014, for U.S. Appl. No. 14/284,125, of Chen, G.H., et al., filed May 21, 2014. |
Non-Final Office Action dated Dec. 19, 2014, in U.S. Appl. No. 13/786,262, of Scott J.B., et al., filed Mar. 5, 2013. |
Final Office Action dated Jan. 15, 2015, for U.S. Appl. No. 14/284,125, of Chen, G.H., et al., filed May 21, 2014. |
Non-Final Office Action dated Feb. 18, 2015, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Advisory Action dated Mar. 23, 2015, for U.S. Appl. No. 14/284,125, of Chen, G.H., et al., filed May 21, 2014. |
Non-Final Office Action dated Jun. 5, 2015, for U.S. Appl. No. 14/284,125, of Chen, G.H., et al., filed May 21, 2014. |
Final Office Action dated Aug. 12, 2015, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Non-Final Office Action dated Sep. 11, 2015, for U.S. Appl. No. 13/736,447, of Quigley, O.S.C., et al., filed Jan. 8, 2013. |
Non-Final Office Action dated Sep. 11, 2015, in U.S. Appl. No. 13/786,262, of Scott J.B., et al., filed Mar. 5, 2013. |
Final Office Action dated Oct. 6, 2015, for U.S. Appl. No. 14/284,125, of Chen, G.H., et al., filed May 21, 2014. |
Examiner's Requisition for Canadian Patent Application No. 2,879,290, dated Nov. 9, 2015. |
Final Office Action dated Mar. 24, 2016, in U.S. Appl. No. 13/786,262, of Scott J.B., et al., filed Mar. 5, 2013. |
Examination Report No. 1 for Australian Patent Application No. 2014225973, dated May 6, 2016. |
Advisory Action dated Jun. 1, 2016, in U.S. Appl. No. 13/786,262, of Scott, J.B., et al., filed Mar. 5, 2013. |
Examination Report for European Patent Application No. 13859656.4, dated Jun. 22, 2016. |
Office Action for Canadian Patent Application No. 2,892,511, dated Jul. 19, 2016. |
Non-Final Office Action dated Jul. 28, 2016, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Non-Final Office Action dated Aug. 16, 2016, for U.S. Appl. No. 14/578,765, of Chi, Y., et al., filed Dec. 22, 2014. |
Final Office Action dated Oct. 31, 2016, for U.S. Appl. No. 13/736,447, of Quigley, O.S.C., et al., filed Jan. 8, 2013. |
Examination Report for European Patent Application No. 13819366.9, dated Nov. 2, 2016. |
Office Action for Canadian Patent Application No. 2,903,983, dated Nov. 4, 2016. |
Examiner's Requisition for Canadian Patent Application No. 2,879,290, dated Jan. 11, 2017. |
Non-Final Office Action dated Feb. 16, 2017, for U.S. Appl. No. 14/274,481, of Chen, G.H., et al., filed May 9, 2014. |
Final Office Action dated Mar. 9, 2017, for U.S. Appl. No. 14/578,765, of Chi, Y., et al., filed Dec. 22, 2014. |
Notice of Acceptance for Australian Patent Application No. 2014225973, dated Mar. 15, 2017. |
Non-Final Office dated Mar. 24, 2017, for U.S. Appl. No. 14/495,390, of Botros, P.A., et al., filed Sep. 24, 2014. |
Non-Final Office Action dated Apr. 6, 2017, for U.S. Appl. No. 14/274,524, of Mocko, C.L., et al., filed May 9, 2014. |
Final Office Action dated May 9, 2017, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Notice of Allowance for Canadian Patent Application No. 2,892,511, dated May 26, 2017. |
Non-Final Office Action dated Jun. 2, 2017, for U.S. Appl. No. 13/786,262, of Scott, J.B., et al., filed Mar. 5, 2013. |
Advisory Action dated May 24, 2019, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Final Office Action dated Jun. 17, 2019, for U.S. Appl. No. 16/105,918, of Chen, G.H., et al., filed Aug. 20, 2018. |
Notice of Allowance dated Jul. 3, 2019, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Non Final Office Action dated Aug. 7, 2019, for U.S. Appl. No. 13/736,447, of Quigley, O.S.C., et al., filed Jan. 8, 2013. |
Final Office Action dated Feb. 1, 2019, for U.S. Appl. No. 13/736,447, of Quigley, O.S.C., et al., filed Jan. 8, 2013. |
Non Final Office Action dated Feb. 14, 2019, for U.S. Appl. No. 16/105,918, of Chen, G.H., et al., filed Aug. 20, 2018. |
Notice of Allowance dated Mar. 13, 2019, for U.S. Appl. No. 15/199,466, of Han, K., et al., filed Jun. 30, 2016. |
Final Office Action dated Mar. 21, 2019, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Non-Final Office Action dated Apr. 21, 2016, for U.S. Appl. No. 14/567,145, of White, M.W., et al., filed Dec. 11, 2014. |
Final Office Action dated Dec. 29, 2016, for U.S. Appl. No. 14/567,145, of White, M.W., et al., filed Dec. 11, 2014. |
Non Final Office Action dated Mar. 3, 2017, for U.S. Appl. No. 14/567,118, of White, M.W., et al., filed Dec. 11, 2014. |
Notice of Allowance dated Apr. 17, 2017, for U.S. Appl. No. 14/567,145, of White, M.W., et al., filed Dec. 11, 2014. |
Notice of Allowance dated Sep. 15, 2017, for U.S. Appl. No. 14/567,118, of White, M.W., et al., filed Dec. 11, 2014. |
Final Office Action dated Jul. 9, 2020, for U.S. Appl. No. 16/681,217, of Ruder, E., et al., filed Nov. 12, 2019. |
Final Office Action dated Jul. 30, 2019, for U.S. Appl. No. 16/105,918, of Chen, G.H., et al., filed Aug. 20, 2018. |
Final Office Action dated Feb. 20, 2020, for U.S. Appl. No. 13/736,447, of Quigley, O.S.C., et al., filed Jan. 8, 2013. |
Advisory Action dated Sep. 21, 2020, for U.S. Appl. No. 16/681,217, of Ruder, E., et al., filed Nov. 12, 2019. |
Advisory Action dated Sep. 30, 2020, for U.S. Appl. No. 16/105,918, of Chen, G.H., et al., filed Aug. 20, 2018. |
Non-Final Office Action dated Nov. 27, 2020, for U.S. Appl. No. 16/105,918, of Chen, G.H., et al., filed Aug. 20, 2018. |
Zhang et al., “Secure Mobile Payment via Trusted Computing,” 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, (Year: 2008) pp. 98-112. |
Non-Final Office Action dated Jan. 21, 2022, for U.S. Appl. No. 16/681,217, of Ruder, E., et al., filed Nov. 12, 2019. |
Gao et al., “P2P-Paid: A Peer-to-Peer Wireless Payment System,” Second IEEE International Workshop on Mobile Commerce and Services, 2005, pp. 102-111 (Year: 2005). |
Non-Final Office Action dated Sep. 27, 2022, for U.S. Appl. No. 16/936,381, of Quigley, O. S. C., et al., filed Jul. 22, 2020. |
Labrou et al., “Wireless wallet,” The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004, Mobiquitous 2004, pp. 32-41. |
Notice of Allowance dated May 31, 2022, for U.S. Appl. No. 16/681,217, of Ruder, E., et al., filed Nov. 12, 2019. |
Final Office Action dated Jun. 2, 2017, for U.S. Appl. No. 14/274,481, of Chen, G.H., et al., filed May 9, 2014. |
Examination Report for European Patent Application No. 14760487.0, dated Jun. 28, 2017. |
Final Office Action dated Jul. 14, 2017, for U.S. Appl. No. 14/495,390, of Botros, P.A., et al., filed Sep. 24, 2014. |
Advisory Action dated Sep. 13, 2017, for U.S. Appl. No. 14/274,481, of Chen, G.H., et al., filed May 9, 2014. |
Non-Final Office Action dated Oct. 4, 2017, for U.S. Appl. No. 14/578,765, of Chi, Y., et al., filed Dec. 22, 2014. |
Notice of Allowance dated Oct. 13, 2017, for U.S. Appl. No. 13/786,262, of Scott, J.B., et al., filed May 3, 2013. |
Non-Final Office Action dated Oct. 31, 2017, for U.S. Appl. No. 14/274,481, of Chen, G.H., et al., filed May 9, 2014. |
Final Office Action dated Nov. 1, 2017, for U.S. Appl. No. 14/274,524, of Mocko, C.L., et al., filed May 9, 2014. |
Summons to attend oral proceedings for European Patent Application No. 13859656.4, mailed on Nov. 2, 2017. |
Examiner's Requisition for Canadian Patent Application No. 2,903,983, dated Nov. 6, 2017. |
Notice of Allowance for Canadian Patent Application No. 2,879,290, dated Jan. 9, 2018. |
Advisory Action dated Jan. 31, 2018, for U.S. Appl. No. 14/274,524, of Mocko, C.L., et al., filed May 9, 2014. |
Notification concerning the date of oral proceedings for European Patent Application No. 13819366.9, mailed Mar. 5, 2018. |
Notice of Allowance dated Apr. 6, 2018, for U.S. Appl. No. 14/578,765, of Chi, Y., et al., filed Dec. 22, 2014. |
Notice of Allowance dated Apr. 9, 2018, for U.S. Appl. No. 14/495,390, of Botros, P.A., et al., filed Sep. 24, 2014. |
Notice of Allowance dated Apr. 13, 2018, for U.S. Appl. No. 14/274,524, of Mocko, C.L., et al., filed May 9, 2014. |
Notice of Allowance dated Apr. 24, 2018, for U.S. Appl. No. 14/284,125, of Chen, G.H., et al., filed May 21, 2014. |
Final Office Action dated May 31, 2018, for U.S. Appl. No. 14/274,481, of Chen, G.H., et al., filed May 9, 2014. |
Non-Final Office Action dated Jul. 25, 2018, for U.S. Appl. No. 15/199,466, of Han, K., et al., filed Jun. 30, 2016. |
Non-Final Office Action dated Aug. 7, 2018, for U.S. Appl. No. 13/736,447, of Quigley, O.S.C., et al., filed Jan. 8, 2013. |
Advisory Action dated Aug. 31, 2018, for U.S. Appl. No. 14/274,481, of Chen, G.H., et al., filed May 9, 2014. |
Non-Final Office Action dated Sep. 10, 2018, for U.S. Appl. No. 13/797,390, of Ruder, E., et al., filed Mar. 12, 2013. |
Notice of Allowance mailed Oct. 22, 2018, for U.S. Appl. No. 14/274,481, of Chen, G.H., et al., filed May 9, 2014. |
Notice of Allowance for Canadian Patent Application No. 2,903,983, mailed Oct. 24, 2018. |
International Search Report and Written Opinion for International Patent Application No. PCT/US2013/050345, mailed Oct. 4, 2013. |
International Search Report and Written Opinion for International Patent Application No. PCT/US2013/073302, mailed Apr. 18, 2014. |
Extended European Search Report for European Patent Application No. 13859656.4, mailed on Sep. 4, 2015. |
Extended European Search Report for European Patent Application No. 13819366.9 mailed Feb. 19, 2016. |
Extended European Search Report for European Patent Application No. 14760487.0 mailed Jul. 7, 2016. |
Number | Date | Country | |
---|---|---|---|
Parent | 14567118 | Dec 2014 | US |
Child | 15870562 | US |