Field of the Invention
The present invention relates generally to the field of payment processing and, more particularly, to a payment processing platform.
Description of the Related Art
As is known, several methods of payment for goods or services exist today, including cash, check, credit card, and debit card. Some of the most popular methods of payment include payment by credit card and by debit card. When credit/debit cards were first introduced, there was no concept of online payments, online banking, or payments via mobile phone. Today, these forms of payment are also very common.
As is known, a credit/debit card system is one where an issuer, usually a financial institution, issues a credit/debit card to a customer. The customer may then pay for goods or services using the credit/debit card. Essentially, the issuer is lending money to the customer to pay for the good or services.
When payment for goods or services is initiated with a credit/debit card, the transaction details are sent to a card network for processing. Each credit/debit card has a unique prefix that allows for proper routing of the transaction to the proper card network and to the proper financial institution. When the transaction is received by the financial institution, the transaction is processed and either approved or denied based on well-defined criteria.
However, existing payment products, including credit/debit cards, are based on legacy systems of financial institutions that are hard to change. Many financial institution systems use older generation software and mainframe computers. The rigidity of the legacy systems and infrastructure, along with the large amount of information technology resources that get spent on compliance and maintenance, do not allow financial institutions to keep pace with current payment technologies and customer demands.
For these reasons, other non-financial institution based companies have stepped in to fill the void. Payment processing services, like Paypal®, have been introduced to meet the market needs unmet by the financial institutions. However, these prior art payment processing services pose a problem for financial institutions in that these services disintermediate customers from the financial institutions and take away revenue from the financial institutions.
Accordingly, there exists a need in the art for a payment processing platform that allows financial institutions to offer more sophisticated payment processing methods with minimal changes to their legacy systems.
Embodiments of the present invention provide a method for generating a child product that is linked to a core account. A payment processing platform receives a user selection of control parameters that define use restrictions for the child product. The payment processing platform also receives a user selection of the core account that provides financial backing for the child product. The child product is generated and may be used for payment transactions within the use restrictions defined by the control parameters. The child product is delivered to a recipient as a physical card or as a virtual card (non-physical manifestation) or both as a physical card and a virtual card and may be used to make payment transactions.
Additional embodiments of the present invention provide a method for processing a child transaction involving a child product that is linked to a core account and is to be used for payment transactions within use restrictions defined by one or more control parameters. A payment processing platform receives one or more attributes defining the child transaction that is initiated at a merchant entity and compares the one or more attributes to the one or more control parameters. A child card number associated with the child transaction is determined, and a core account number, which is associated with the core account based on the child card number, is identified.
Advantageously, the financial institution needs to modify its legacy payment processing infrastructure minimally in order to process payment transactions made using the child product. In addition, child products significantly reduce financial institutions' expenses related to fraud or identity theft when child products are lost or stolen. From a user perspective, child products protect consumers from fraud or identity theft, and limit a customer's exposure when child products are lost or stolen.
So that the manner in which the above recited features of the invention are attained and can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
The user device 102 may be any type of individual computing device such as, for example, a desktop computer, a laptop computer, a hand-held mobile device, a personal digital assistant, or the like. Alternatively, the user device 102 may be any other device, such as a standard telephone, or an ATM terminal for a financial institution, or a terminal used by a customer representative at a financial institution, or the like. In one embodiment, the user device 102 is configured to be in communication with the other components in the system 100 via the network 104. The network 104 may be any type of data network, such as a local area network (LAN), a wide area network (WAN), cellular communications network, the Internet, a voice network such as a standard telephone network, or the like.
As is described in greater detail below, a user may generate a “child product” that is linked to a “core account” held with a financial institution. In one embodiment, the core account may be any standard account held with a financial institution 106, including a checking account, savings account, home equity line of credit, money market account, credit card account, healthcare savings account, educational savings account, or the like. The child product may be used to make payment transactions and the payment transactions may be processed as if the payment transactions were made using the core account. For example, a child product that is linked to a credit card core account is processed by the financial institution legacy system in the same manner as a regular credit card transaction. In further embodiments, control parameters may be added to the child product, restricting the usage of the child product, as described in greater detail below.
In one embodiment, when a user wishes to generate the child product, the user may direct the user device 102 to navigate to a webpage of the financial institution 106. In another embodiment, the user may use an ATM terminal at the financial institution to generate the child product. In yet another embodiment, the user may request the generation of a child product through a customer service representative at a branch location of the financial institution 106. In yet another embodiment, the user may request the generation of a child product through a customer service representative at a customer support call center of the financial institution 106.
As described in greater detail below, the user may need to authenticate with the financial institution 106 before the child product is generated. In one embodiment, authentication includes the user being prompted to enter a username and/or password. In alternate embodiments, the user may be prompted to swipe an ATM card and enter a PIN number to authenticate. In yet additional embodiments, the user may be asked to show a driver's license or a government-issued photo identification to authenticate with the financial institution 106. In still further embodiments, the user may place a telephone call to the financial institution customer service phone number to generate a child product. Authentication may involve the user being asked questions to verify the identity of the user. In alternative embodiments, a third-party other than a financial institution, may offer the ability to generate child products. In these embodiments, the user may be authenticated using any of the authentication methods described in relation to authenticating with a financial institution.
In another embodiment, to provide an additional layer of security, the user device 102 may include a security agent 114 and device profile 116. After the user has been authenticated with the financial institution 106, the payment processing platform 110 may prompt the security agent 114 installed on the user device 102 for the device profile 116 of the user device 102. The security agent 114 transmits the device profile 116 to the payment processing platform 110. The received device profile 116 is compared to data stored in the device finger print authentication server 112 that may include a listing of approved/authenticated user devices associated with each user. In one embodiment, each time that a user attempts to authenticate with a different user device 102, a confirmation code is sent to an email address for the user that the user enters before the user device is authenticated. In alternative embodiments, the confirmation code may be sent to the user via a Short Message Service (SMS), a text message, or via any other electronic means including by telephone. Once a particular user device 102 has been confirmed, the device profile 116 of the user device 102 is stored in the database of the device finger print authentication server 112. The next time the user attempts to authenticate using that particular user device 102, the device profile 116 of the user device is recognized by the device finger print authentication server 112 and the user is authenticated. Once the user is properly authenticated, the user may generate the child product.
As is known, in a debit transaction, a debit card or bank card is used to make a payment. The use of a debit card is functionally similar to writing a check, as the funds are withdrawn directly from the financial institution account of the user. In a conventional PIN-debit card transaction at a physical merchant location, the user may swipe or insert the debit card into a terminal and the transaction is authenticated by entering a personal identification number (PIN). However, PIN-debit transactions are not initiated on the Internet because users are wary of entering their PIN number into a browser webpage for security reasons.
The PIN debit child product 202 allows for PIN debit transactions on the Internet. From a payment page of an online merchant, a user may select a “Pay From My Financial Institution” payment option. At this point, the user is authenticated through the financial institution's user authentication server 108, as described above in
A virtual card child product 204 is a payment method for which non physical manifestation of child card is generated. A user may create a virtual card child product 204 as a virtual credit or debit card, having a seemingly “normal” credit/debit card number, which can be used for card-not-present transactions such as online transaction, or mail-order telephone orders (MOTO) transactions. In alternative embodiments, a virtual card child product 204 may be generated and the card number may be associated with the contactless payment options enabled by a mobile device such as a radio-frequency identification (RFID) tag of a mobile device to allow a user to make contactless payments at a point-of-sale location. In further embodiments, a virtual card child product 204 may be generated and the user may print-out an image of the virtual card child product, optionally including other identifying information such as a bar code, and take the print-out to a merchant location as a form of payment.
The prepaid card child product 206 may be generated with a pre-loaded balance. A user may load the prepaid card child product 206 with a limit that cannot be exceeded. Additional control parameters may limit a per-transaction limit, or impose further restrictions, as described below. The prepaid card child product 206 may be a physical card, a virtual card, or both a physical card and a virtual card.
A secure card child product 208 is a payment method where child product is generated that is linked to a core account. In one embodiment, transaction made using the secure card child product 208 may be processed similar to transactions made using the core account. Additional control parameters may limit a per-transaction limit, or impose further restrictions, as described below. The secure card child product 208 may be a physical card, a virtual card, or both a physical card and a virtual card.
The gift card child product 210 is a payment method that may be given to another as a gift. The gift card child product 210 may be a physical card, a virtual card, or both a physical card and a virtual card. A gift card child product 210 is different from a prepaid card child product 206 because no funds are withdrawn/charged to the core account when a gift card child product 210 is generated. A gift card child product 210 may still include a limit; however, funds are only withdrawn/charges to the core account when transactions are initiated with the gift card child product 210. In other words, a portion of credit available in the core account is allocated for use by a recipient of the gift card child product 210. This differs from the prepaid card child product 206 which is generated with a pre-loaded balance.
The person-to-person payment child product 212 may be generated and used as a form of payment from one person/entity to another as a form of payment. In one embodiment, the person-to-person payment child product 212, like other child products, may be used to pay for goods or services in merchant transactions. In alternative embodiments, the person-to-person payment child product 212 may be converted to cash. The conversion may be a dollar-for-dollar conversion based on the card limits of the person-to-person payment child product 212, or may be some other ratio.
Mobile banking child products 214 and mobile payment child products 216 may be generated using a mobile device. Similarly, transactions made using other child products may be made with a mobile device.
As shown, the method 350 begins at step 300 where a user is authenticated. In one embodiment, the user may be authenticated by entering a username and password into a log-on screen of a financial institution website. In alternative embodiments, a third-party other than a financial institution may offer the ability to generate child products. In these embodiments, the user may be authenticated by entering a username and password into a log-on screen of the third-party website. In yet further embodiments, the device with which the user is attempting to authenticate himself is verified by comparing a device profile for the user device against a database of user devices previously registered by the user, as described in reference to
In alternate embodiments, the user may be prompted to swipe an ATM card and enter a PIN number to authenticate. In yet additional embodiments, the user may be asked to show a driver's license or a government-issued photo identification to authenticate with the financial institution 106. In still further embodiments, the user may place a telephone call to the financial institution customer service phone number to generate a child product. Authentication may involve the user being asked questions to verify the identity of the user. For example, the user may be asked to verify a social security number and/or mother's maiden name. In yet other embodiments, the user may be authenticated using biometric characteristics.
Referring back to
As shown, the method 360 begins at step 362 where the financial institution 106 sends a session identifier (session ID) to the payment processing platform 110 to begin the trust establishment process. Next, at step 364, the payment processing platform 110 sends the session ID back to the financial institution 106 through a back door to verify that the financial institution 106 had indeed sent that session ID, rather than a hacker, for instance. It should be noted that the exchange of the session ID is not the only means of establishing trust between the systems 106, 110; rather, trust may be established by any means known in the art without departing from the principles of the present invention. Then, at step 366, the financial institution 106 sends a customer identifier (customer ID) to the payment processing platform 110. In one embodiment, within the servers of the payment processing platform 110, the customer ID may be used to translate from a child product card number to a “real” account number, as described in greater detail below.
Referring back to
When a child product is attempted to be used in a transaction, the transaction details may be checked against the control parameters stored for the child product. In one embodiment, if at least one of the control parameters is not satisfied, then the transaction is rejected. If each of the control parameters match those stored for the child product, the transaction is processed as described in greater detail below in
As shown, the control parameters may optionally include a monthly reset parameter 902. In one embodiment, the monthly reset parameter 902 may be used to initiate recurring transactions, such as paying bills. For example, a user may pay a cell phone bill once a month on the first day of the month. The user may set a monthly reset control parameter 902 that may allow for the transmission of a payment for the user's cell phone bill once each month on the second day of the month. After the payment is transacted, the child product may be deactivated until the following month, at which time the child product may again be used to pay the user's cell phone bill. Similarly, a control parameter may restrict use to a particular merchant 904. In one embodiment, any transactions initiated with other merchants are denied.
If the parental control option 1106 is enabled, the purchaser of the child product is able to view the details of the transactions made using the child product, even if the child product is used by someone else. For example, a user may generate a child product to give to the user's daughter so that the daughter may purchase textbooks for college. By enabling the parental control option, the user may view the transaction details for any transactions made with the child product to determine if the child product is actually being used to purchase textbooks.
Referring back to
Referring now to
Referring back to
Referring back to
In one embodiment, a transaction initiated with a child product is known as a “child transaction.” As described above, a child product may be delivered in the form of a physical card mailed to a purchaser or to a recipient. Alternatively, the child product may be delivered electronically as a virtual card. Alternatively, the child product may be delivered both physically and electronically as a physical and a virtual card. Both the physical card child product and the virtual child card product may be used at any physical merchant 1502, MOTO merchant 1503, online merchant 1504 or other merchant 1505 that accepts regular credit/debit cards.
A child transaction may be initiated at the physical merchant 1502. For example, a cashier at the physical merchant 1502 may swipe the physical child product through a card reader. Alternatively, a child product may be delivered virtually on a user's mobile device and a user at the physical merchant 1502 may wave his/her mobile device in front of a contact-less card reader.
In one embodiment, the network 1506 is a card network. In alternative embodiments, the network 1506 is an electronic funds transfer (EFT) network or a private network. In one embodiment, the child product may be a credit card child product, in which case child transaction information is sent to the appropriate credit card network. Similarly, the child product may be a signature debit card child product, in which case the child transaction information is sent to the appropriate debit card network. In other embodiments, the child product may be a PIN debit card in which case the child transaction information is sent to the appropriate EFT network. Additionally, the child product may be a special card in which case the child transaction information is sent to the appropriate private network.
In one embodiment, when a child transaction is received by the network 1506 and identified as having a BIN number range associated with the payment processing platform 1508 that issued the child product, then the child transaction is routed to the payment processing platform 1508. In another embodiment, when a child transaction is received by the network 1506 and identified as having a special BIN number range associated with a financial institution of the core account, then the child transaction is routed to the payment processing platform 1508.
When a child transaction is received by the payment processing platform 1508, the payment processing platform 1508 may then compare the child transaction details with control parameters stored for that particular child product in the first database 1510. As described above, the comparison may require that each control parameter stored for the child product is satisfied, that a minimum number of control parameters are satisfied, or that a sum of the weights assigned to control parameters that are satisfied exceeds a minimum threshold. In one embodiment, if at least one of the control parameters is not satisfied, then the payment processing platform may return a decline response to the network 1506 and the child transaction is denied. If each of the control parameters is satisfied, then the card number of the child product is linked to the “real” account number of the core account to which the child product is linked. In one embodiment, the second database 1514 contains the mapping from child product card numbers to core account numbers, and may be located on the systems of the financial institution 1512. In alternative embodiments, the second database 1514 may reside on systems operated by the payment processing platform 1508. Once the core account number is determined, a core account transaction is generated and is transmitted to the network 1506 for normal routing and processing as a core account transaction. The core account transaction is sent to the financial institution that issued the core account. The processing system at the financial institution that issued the core account processes the core account transaction in normal fashion and approves or denies the transaction based on a normal set of processing rules.
A similar child transaction may be initiated from an online merchant 1504, from a MOTO merchant 1503, or from any other merchant 1505. In one embodiment, the user may input the child product card number into a payment webpage and an online child transaction is initiated. In another embodiment, the user may submit the child product card number to a customer service representative at a MOTO merchant 1503. In yet another embodiment, the user may submit the child product card number in a mail order form to a MOTO merchant 1503. A child transaction initiated at a MOTO merchant 1503, at an online merchant 1504, or at any other merchant 1505 may be processed in similar fashion to a child transaction initiated at the physical merchant location 1502.
As shown, the method 1600 begins at step 1602 where a merchant receives a child transaction initiated using a child product. In one embodiment, the merchant is a physical merchant and the child transaction is initiated by the child product (physical card) being swiped through a credit card reader or virtual card waved in front of a contactless card reader or virtual card read by a bar code reader, or merchant reading a card number from device or a print out. In alternative embodiments, the merchant is an online merchant, MOTO merchant, or other merchant receives a child product card number that is input into a payment webpage of the online merchant website, over the phone, via a mail-order, or via any other means.
At step 1604, the child transaction is routed to the payment processing platform that generated the child product. As described above, a child product includes a BIN number range that identifies it being a child product. In one embodiment, the child transaction is passed directly to the payment processing platform, bypassing the network. In alternative embodiments, the child transaction is passed to a network. As described, the child product may be a credit card in which case the child transaction information is sent to the appropriate credit card network. Alternatively, the child product may be a signature debit card in which case the child transaction information is sent to the appropriate debit card network. The child product may be a PIN debit card in which case the child transaction information is sent to the appropriate EFT network. The child product may be a special card in which case the child transaction information is sent to the appropriate private network. In yet further embodiments, the child transaction is processed through multiple networks before ultimately being routed to the payment processing platform. To the merchant, the child transaction may proceed as though the payment processing platform is the “issuer” of the child product with which the child transaction is initiated.
At step 1606, the payment processing platform compares the child transaction details with control parameters of the child product. As described above, each child product is associated with a series of control parameters that are stored in a first database DB1, referenced by child product. When the child transaction is received by the payment processing platform, the child product card number may be used as a reference pointer to determine the associated control parameters stored in the first database DB1.
At step 1608, if the control parameters of the child transaction do not match the control parameters stored in the first database DB1, then the child transaction is rejected, a denial is returned at step 1610, and the method 1600 terminates. In one embodiment, if the child transaction was routed from the merchant to the payment processing platform bypassing the network, then the denial is returned directly to the merchant. In alternative embodiments, if the child transaction was routed through a network to the payment processing platform, then the denial is returned to the network and routed to the merchant.
As described above, the determination of whether the control parameters match at step 1608 may require that each control parameter stored for the child product is satisfied, that a minimum number of control parameters are satisfied, or that a sum of the weights assigned to control parameters that are satisfied exceeds a minimum value. If at step 1608 the control parameters match, then the method 1600 proceeds to step 1612.
At step 1612, the child product is associated with a core account. As described above, a second database DB2 stores a mapping of the child product to the core account to which the child product is linked. In one embodiment, the second database DB2 resides on the financial institution system. In alternative embodiments, the second database DB2 resides within the payment processing platform system.
At step 1614, a core account transaction is generated with the core account number and other child transaction details. In one embodiment, generating the core account transaction is based on the core account number. In one embodiment, the core account transaction is transmitted to the network for normal processing. For example, the financial institution that receives the core account transaction may view the core account transaction with the payment processing platform as being the “merchant” from which the transaction was initiated. In alternative embodiments, the core account transaction is transmitted directly to the financial institution from the payment processing platform, bypassing the network.
In one embodiment, when the core account transaction is received at the financial institution, the financial institution views the core account transaction as initiating from the payment processing platform as a merchant entity. Thus, the financial institution processes the core account transaction and transfers funds to the payment processing platform, which in turn transfers the funds to the original merchant. In alternative embodiments, the financial institution that receives the core account transaction can determine the original merchant is the payee, and the funds are transferred to the merchant, bypassing the payment processing platform. In this manner, a two-part transaction is completed. The child transaction, as described at step 1602-1606, is processed as though the payment processing platform is the “issuer” of the child product. Then, the core account transaction, as described at steps 1612-1614, is processed by the financial institution as though the payment processing platform is the “merchant” that initiated the core account transaction.
One advantage of the systems and methods disclosed herein is that when processing a child transaction, the financial institution needs to modify its legacy payment processing infrastructure minimally. Financial institutions would prefer using a child product system over prior art payment processing systems because the child products could be bank-branded and the payment processing platform is transparent to the user. Additionally, because child products have a similar format as conventional cards, physical merchants, online merchants, MOTO merchants, and other merchants need to modify their systems minimally in order to accept payment from a child product.
Additional advantages of the systems and methods disclosed herein may be realized from a user perspective. For example, for a one time use child card, if the card number is stolen, then the child product has no value apart from a single transaction. Other advantages for consumers include protection from fraud or identity theft, and limited exposure when cards are lost or stolen. For example, a user that is going on a two-week vacation to another country may wish to generate a child product with control parameters of specific country of use, activation date as the first day of the vacation, expiration date as the final day of the vacation, limit of $100.00 per transaction, and a limit of $2000.00 for the card. If the child product is lost or stolen, or if the card number is compromised, then the user is only exposed for the amounts set by the control parameters. Additionally, the user does not need to close the original core account to which the child product is linked, as that information was never exposed or stolen.
While the forgoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. For example, aspects of the present invention may be implemented in hardware or software or in a combination of hardware and software. In addition, one embodiment of the invention may be implemented as a program product for use with a computer system. The program(s) of the program product define functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, flash memory, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored. Such computer-readable storage media, when carrying computer-readable instructions that direct the functions of the present invention, are embodiments of the present invention. Therefore, the scope of the present invention is determined by the claims that follow.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5884271 | Pitroda et al. | Mar 1999 | A |
| 5953710 | Fleming | Sep 1999 | A |
| 6101486 | Roberts et al. | Aug 2000 | A |
| 6311194 | Sheth et al. | Oct 2001 | B1 |
| 6973625 | Lupo et al. | Dec 2005 | B1 |
| 6973627 | Appling | Dec 2005 | B1 |
| 6993712 | Ramachandran et al. | Jan 2006 | B2 |
| 7177836 | German et al. | Feb 2007 | B1 |
| 7225156 | Fisher et al. | May 2007 | B2 |
| 7284126 | Engel | Oct 2007 | B2 |
| 7546945 | Bucci et al. | Jun 2009 | B1 |
| 7548890 | Shakkarwar | Jun 2009 | B2 |
| 7567934 | Flitcroft et al. | Jul 2009 | B2 |
| 7571142 | Flitcroft et al. | Aug 2009 | B1 |
| 7593896 | Flitcroft et al. | Sep 2009 | B1 |
| 7640512 | Appling | Dec 2009 | B1 |
| 7665657 | Huh | Feb 2010 | B2 |
| 7761370 | Hicks et al. | Jul 2010 | B1 |
| 7769688 | Bent et al. | Aug 2010 | B1 |
| 7881999 | Bagheri | Feb 2011 | B2 |
| 7882203 | Sasnett et al. | Feb 2011 | B2 |
| 7904385 | Bishop et al. | Mar 2011 | B2 |
| 7912917 | Chakra et al. | Mar 2011 | B2 |
| 7941367 | Bishop et al. | May 2011 | B2 |
| 7941372 | Bishop et al. | May 2011 | B2 |
| 7953671 | Bishop et al. | May 2011 | B2 |
| 7962408 | Bishop et al. | Jun 2011 | B2 |
| 7983987 | Kranzley et al. | Jul 2011 | B2 |
| 8019664 | Tifford et al. | Sep 2011 | B1 |
| 8020763 | Kowalchyk et al. | Sep 2011 | B1 |
| 8024267 | Olliphant et al. | Sep 2011 | B2 |
| 8028041 | Olliphant et al. | Sep 2011 | B2 |
| 8032456 | Bent et al. | Oct 2011 | B1 |
| 8065610 | Xu et al. | Nov 2011 | B2 |
| 8073895 | Hamzeh et al. | Dec 2011 | B2 |
| 8121941 | Matthews et al. | Feb 2012 | B2 |
| 8260705 | Bent et al. | Sep 2012 | B1 |
| 8311939 | Bent et al. | Nov 2012 | B1 |
| 8417601 | Simons | Apr 2013 | B1 |
| 8606702 | Ruckart | Dec 2013 | B2 |
| 8676708 | Honey | Mar 2014 | B1 |
| 8688577 | Bent et al. | Apr 2014 | B1 |
| 8689012 | Bierbaum et al. | Apr 2014 | B1 |
| 8751376 | Wilkes | Jun 2014 | B1 |
| 8781931 | Bent et al. | Jul 2014 | B1 |
| 8793164 | Sendo et al. | Jul 2014 | B2 |
| 8881975 | Matthews | Nov 2014 | B1 |
| 9424603 | Hammad et al. | Aug 2016 | B2 |
| 20010001856 | Gould et al. | May 2001 | A1 |
| 20010034720 | Armes | Oct 2001 | A1 |
| 20020022966 | Horgan | Feb 2002 | A1 |
| 20020055907 | Pater et al. | May 2002 | A1 |
| 20020077978 | O'Leary et al. | Jun 2002 | A1 |
| 20020087427 | Ganesan et al. | Jul 2002 | A1 |
| 20020087469 | Ganesan et al. | Jul 2002 | A1 |
| 20020095386 | Maritzen | Jul 2002 | A1 |
| 20020111886 | Chenevich et al. | Aug 2002 | A1 |
| 20020198806 | Blagg | Dec 2002 | A1 |
| 20030191711 | Jamison et al. | Oct 2003 | A1 |
| 20040039694 | Dunn et al. | Feb 2004 | A1 |
| 20040139004 | Cohen | Jul 2004 | A1 |
| 20040158522 | Brown et al. | Aug 2004 | A1 |
| 20040205593 | Kraemer | Oct 2004 | A1 |
| 20040230495 | Lotvin et al. | Nov 2004 | A1 |
| 20050004909 | Stevenson et al. | Jan 2005 | A1 |
| 20050021399 | Postrel | Jan 2005 | A1 |
| 20050033609 | Yang | Feb 2005 | A1 |
| 20050102188 | Hutchison et al. | May 2005 | A1 |
| 20050103836 | Tolley | May 2005 | A1 |
| 20050132202 | Dillaway et al. | Jun 2005 | A1 |
| 20050216354 | Bam et al. | Sep 2005 | A1 |
| 20050240522 | Kranzley et al. | Oct 2005 | A1 |
| 20050256747 | Hellrigel | Nov 2005 | A1 |
| 20050289057 | Onizuka | Dec 2005 | A1 |
| 20060064320 | Postrel | Mar 2006 | A1 |
| 20060076400 | Fletcher | Apr 2006 | A1 |
| 20060165060 | Dua | Jul 2006 | A1 |
| 20060168096 | Hayward et al. | Jul 2006 | A1 |
| 20060229959 | Heidingsfeld et al. | Oct 2006 | A1 |
| 20070017976 | Peyret et al. | Jan 2007 | A1 |
| 20070083464 | Cordero Torres et al. | Apr 2007 | A1 |
| 20070192245 | Fisher et al. | Aug 2007 | A1 |
| 20070255653 | Tumminaro et al. | Nov 2007 | A1 |
| 20070282739 | Thomsen | Dec 2007 | A1 |
| 20080021787 | Mackouse | Jan 2008 | A1 |
| 20080086424 | Jambunathan et al. | Apr 2008 | A1 |
| 20080120195 | Shakkarwar | May 2008 | A1 |
| 20080120210 | Leventhal | May 2008 | A1 |
| 20080249931 | Gilder et al. | Oct 2008 | A1 |
| 20080288404 | Pirzadeh et al. | Nov 2008 | A1 |
| 20090070260 | Flitcroft et al. | Mar 2009 | A1 |
| 20090076966 | Bishop et al. | Mar 2009 | A1 |
| 20090131025 | Sharma et al. | May 2009 | A1 |
| 20090132266 | Kao | May 2009 | A1 |
| 20090150288 | Bishop et al. | Jun 2009 | A1 |
| 20090228370 | Shakkarwar | Sep 2009 | A1 |
| 20090234751 | Chan et al. | Sep 2009 | A1 |
| 20090281944 | Shakkarwar | Nov 2009 | A1 |
| 20100010909 | Marshall et al. | Jan 2010 | A1 |
| 20100036761 | Gelerman | Feb 2010 | A1 |
| 20100037303 | Sharif et al. | Feb 2010 | A1 |
| 20100063906 | Nelsen et al. | Mar 2010 | A1 |
| 20100153224 | Livnat | Jun 2010 | A1 |
| 20100211445 | Bodington | Aug 2010 | A1 |
| 20100241518 | Mccann | Sep 2010 | A1 |
| 20100251143 | Thomas et al. | Sep 2010 | A1 |
| 20100268588 | Lal et al. | Oct 2010 | A1 |
| 20100280956 | Chutorash et al. | Nov 2010 | A1 |
| 20110010237 | Shakkarwar | Jan 2011 | A1 |
| 20110106674 | Perlman | May 2011 | A1 |
| 20110106696 | Seven | May 2011 | A1 |
| 20110246374 | Franz | Oct 2011 | A1 |
| 20120047065 | Neff | Feb 2012 | A1 |
| 20120066096 | Penide | Mar 2012 | A1 |
| 20120253852 | Pourfallah et al. | Oct 2012 | A1 |
| 20130080323 | Scipioni | Mar 2013 | A1 |
| 20130103560 | Stone et al. | Apr 2013 | A1 |
| 20130275305 | Duplan | Oct 2013 | A1 |
| 20130346305 | Mendes | Dec 2013 | A1 |
| 20140278989 | Calman et al. | Sep 2014 | A1 |
| 20140279008 | Calman et al. | Sep 2014 | A1 |
| 20140324627 | Haver et al. | Oct 2014 | A1 |
| 20150058109 | Lange | Feb 2015 | A1 |
| 20150278811 | Lalchandani et al. | Oct 2015 | A1 |
| 20170069028 | Narayana et al. | Mar 2017 | A1 |
| Number | Date | Country |
|---|---|---|
| 1 383 073 | Jan 2004 | EP |
| 1 383 079 | Jan 2004 | EP |
| 2 355 033 | Aug 2011 | EP |
| 0103033 | Jan 2001 | WO |
| WO 2005017793 | Feb 2005 | WO |
| WO 2007011791 | Jan 2007 | WO |
| 2009137716 | Nov 2009 | WO |
| Entry |
|---|
| NPL Search History. |
| ProQuest Search History. |
| PCT Search Report, PCT/US 09/43161, dated Nov. 9, 2009. |
| PCT Search Report, PCT/US09/43200, dated Jun. 16, 2009. |
| PCT Search Report, PCT Appl. No. PCT/US2010/049985, dated Nov. 17, 2010. |
| Final Office Action, U.S. Appl. No. 12/118,643, dated Sep. 23, 2010. |
| EP Search Report for Application No. 09743702.4-1238 / 2300972 PCT/US2009043200 dated Apr. 20, 2012. |
| Office Action, U.S. Appl. No. 12/118,647, dated Oct. 6, 2011. |
| European Search Report dated May 6, 2014 in Application No. 10 81 9452. |
| Non-Final Rejection received for U.S. Appl. No. 15/960,223, dated Mar. 5, 2020, 40 pages. |
| Non-Final Rejection received for U.S. Appl. No. 13/011,536, dated Mar. 3, 2020, 18 pages. |
| Notice of Allowance received for U.S. Appl. No. 13/011,525, dated Mar. 12, 2020, 39 pages. |
| Notice of Allowance received for U.S. Appl. No. 15/681,298 dated Apr. 1, 2020, 16 pages. |
| Levitin, Adam J., “Payment Wars: The Merchant-Bank Struggle for Control of Payment Systems”, Stanford Journal of Law, Business & Finance, vol. 12, No. 2, ProQuest Central, Spring, 2007, pp. 425-485. |
| Non-Final Rejection received for U.S. Appl. No. 12/118,647, dated Jun. 18, 2010, 35 pages. |
| Final Rejection received for U.S. Appl. No. 12/118,647, dated Dec. 7, 2010, 29 pages. |
| Final Rejection received for U.S. Appl. No. 12/118,647, dated Mar. 9, 2012, 30 pages. |
| Non-Final Rejection received for U.S. Appl. No. 12/118,647, dated May 7, 2013, 38 pages. |
| Final Rejection received for U.S. Appl. No. 12/118,647, dated Dec. 27, 2013, 38 pages. |
| Non-Final Rejection received for U.S. Appl. No. 12/887,347, dated Apr. 1, 2011, 27 pages. |
| Final Rejection received for U.S. Appl. No. 12/887,347, dated Sep. 26, 2011, 23 pages. |
| Non-Final Rejection received for U.S. Appl. No. 12/887,347, dated Mar. 14, 2012, 28 pages. |
| Final Rejection received for U.S. Appl. No. 12/887,347, dated Aug. 31, 2012, 27 pages. |
| Non-Final Rejection received for U.S. Appl. No. 12/887,347, dated Aug. 29, 2016, 25 pages. |
| Final Rejection received for U.S. Appl. No. 12/887,347, dated Mar. 30, 2017, 24 pages. |
| Notice of Allowance received for U.S. Appl. No. 12/887,347, dated Feb. 9, 2018, 32 pages. |
| Notice of Allowance received for U.S. Appl. No. 15/960,223, dated Jun. 26, 2020, 67 pages. |
| “California government doles out more IOUs”, USA Today, http:/ /usatoday30 .usatoday .com/news/nation/2009-07-07-iou_N .htm, Jul. 7, 2009, 3 pages. |
| Notice of Allowance received for U.S. Appl. No. 15/960,223, dated Oct. 2, 2020, 109 pages. |
| Number | Date | Country | |
|---|---|---|---|
| 20090281945 A1 | Nov 2009 | US |