Financial transactions are a crucial part of our everyday lives. On one end, there are financial transactions between merchants and customers. On the other end, there are financial transactions between customers. When two or more customers want to share the cost of a purchase, apportioning the cost between them can be difficult, especially when one or more of them want to pay by credit card. Consider, for example, the situation in which a social group gathers for a meal at a restaurant, where everyone is to pay for his or her own food and drink. When it comes the time to pay the check, the need of conducting payment from one party to another can create an inconvenient and sometimes awkward interruption in the social interaction of the group. When there is not enough cash in the social group to settle the bill, many customers also find annoying the need to remember and track down how much each party owes to another.
One or more embodiments of the present invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements.
References in this description to “an embodiment,” “one embodiment,” or the like, mean that the particular feature, function, structure or characteristic being described is included in at least one embodiment of the present invention. Occurrences of such phrases in this specification do not necessarily all refer to the same embodiment. On the other hand, the embodiments referred to also are not necessarily mutually exclusive.
It is observed that the aforementioned need of conducting payment from one party to another often arises in social gatherings and can create annoyance. There are traditional ways of handling this kind of situation. For example, in one common approach, one member of the group uses a credit card, and the other members of the group reimburse that person with cash for their portions. With this approach, it is inconvenient and often time-consuming to have to calculate how much each person (or each couple or family) owes and then collect cash from the other members of the group. Additionally, it is common that some members of the group end up paying more or less than their fair share. In another common approach, the group asks the waiter to split the check in a certain manner, and everyone then either pays cash or uses his or her own credit card. This approach can also be troublesome if the check is not being split equally, and regardless, it is inconvenient and time-consuming for the waiter. In any of these situations, the need to deal with these issues detracts from the social atmosphere of the event.
To service non-sophisticated consumers, payment from one party to another should remain simple and easy to execute. Introduced here are techniques that facilitate customers' mobile devices to conduct proximity-based payments, which can further reduce the friction of conducting payments from one party to another. In the social dinning example discussed above, the techniques introduced here enable a customer (or a consumer, as used interchangeably herein) to pay another customer easily by using the customer's mobile device (e.g., a smartphone or tablet computer).
In short, the techniques involve communication among a mobile payment application installed on the customer's mobile device and a remote payment service system (PSS) (more of which is discussed below). The mobile payment application running on the customer's mobile device detects physical proximity of other customers' mobile devices, and enables the user to specify to whom and how much payment should be made. The mobile payment application communicates this information to the PSS, which then executes or triggers execution of the transfer of funds to carry out the specified payment. In some embodiments, the communication to the PSS enables the PSS to look up additional contact information; then, in certain examples, the PSS can transmit the additional contact information to the mobile payment application so that the payment transfers can be more easily facilitated (e.g., by automatically entering, for the user, those additional information of those customers who are physically nearby the user).
As described further below, mobile devices implementing the techniques disclosed herein can detect another device (or devices) that is close by and conduct payments. In certain embodiments, the techniques introduced here can utilize wireless personal area network (WPAN) circuitry (e.g., Bluetooth, Bluetooth Low Energy (BLE), Infrared Data Association (IrDA), etc.) that is equipped on a mobile device to determine whether there is another mobile device that is within the network and, in some examples, how close the another mobile device is. Preferably using his or her mobile devices, a customer user who wishes to enjoy the proximity-based payment functionality sets up the functionality by entering information about the customer's financial account (e.g., debit card information). For example, the customer enters the financial information in the customer's mobile device, and the customer's mobile device uploads to the PSS the financial account information together with an identifier that uniquely identifies the mobile device (such as an International Mobile Station Equipment Identity (IMEI) code or a BLE identifier (BLE ID)) so that the customer's mobile device is associated with the financial account.
When there is another mobile device detected in the network, the mobile device verifies whether the detected mobile device wishes to participate in proximity-based payments (i.e., allowing other mobile devices to conduct proximity-based payments with it). If the mobile device finds that the detected device also has proximity-based payment functionality enabled, then the mobile device prompts the customer to select the detected device for conducting a payment. For example, the mobile device can display icons or names that are representative of all the detected devices nearby that have their proximity-based payment functionalities enabled. As is described in fuller detail below, the devices nearby can have ways to control whether to be detected by the mobile device, and if so, in what manner they are to be displayed. The payment either can be sending from the customer's mobile device to the detected device, or can be receiving from the detected device to the customer's mobile device.
Upon the customer's selection of the detected device, the customer's mobile device can ask the customer to enter or to confirm an amount for the payment. Then, if the payment is from the customer's device to the detected device, the customer's device can cause the amount of payment to be transferred from the financial account associated with the customer's device to the financial account associated with the detected device. In variations, this process can also be initiated when the customer's device receives a request (or invitation) for payment from the detected device. On the other hand, if the payment is from the detected device to the customer's device, the customer's device can send out a request or invitation for payment to the detected device.
The techniques introduced here enable one customer to pay another quickly and easily compared to traditional methods. Furthermore, without the prerequisites of a customer having any information (e.g., an email address or a phone number) about another, the introduced techniques enable users to conduct payments with each other as long as they are in physical proximity, thereby greatly reducing the potential for awkward interruptions to the social flow of group events due to bill splitting issues, even in group events that include multiple distinct social circles. The introduced techniques are also advantageous over several traditional means of providing direct payment between two parties, such as an Automated Clearing House (ACH) network. In particular, the ACH is an electronic network for financial transactions in the United States and enables credit transfers including direct deposit, but the ACH would require a trial deposit of a trivial amount (e.g., $1) to verify the financial account, the process of which may take days. Indeed, traditional ways of direct monetary transfer from one bank account to another often involve time-consuming verification processes, which may reduce or even defeat the convenience that the techniques introduced here aim to bring.
In the following description, the example of a social dinning event is used, for illustrative purposes only, to explain various aspects of the techniques. Note, however, that the techniques introduced here are not limited in applicability to dinning in restaurants or to any other particular kind of scenario. Additionally, although the following description adopts debit cards as an example for the financial account information, the techniques introduced here are not limited to use with debit cards or other types of payment cards; rather, the techniques can be employed with essentially any suitable financial account that traditionally would be involved in monetary transfers. Additionally, the term “sale,” as in point-of-sale (POS), refers to any type of payment-oriented transaction, including providing of a service, a lease or rental for example, and is not limited to an actual purchase. Note also that in this description, the term “user” generally refers to a consumer or a customer (as opposed to a merchant), except where otherwise indicated, and except that the term “user interface” does not necessarily refer to an interface used by a customer, as will be apparent from the context.
Additionally, while the customer generally uses a mobile device to conduct proximity-based payments in the embodiments emphasized herein, in other embodiments the consumer may use a processing device other than a mobile device to specify that information, such as a conventional personal computer (PC). In such embodiments, the mobile payment application can be replaced by a more conventional software application in such processing device, where such software application has functionality similar to that of the mobile payment application as described herein.
In a traditional credit card transaction, the merchant swipes the user's credit card through a card reader at the merchant's POS system 104. The POS system 104 sends data read from the card (e.g., the cardholders name, credit card number, expiration date and card verification value (CVV)) to the computer system 114 of the merchant's acquirer (hereinafter “acquirer 114”). The acquirer 114 sends this data to the computer system 116 of the card payment network (e.g., Visa or MasterCard) (hereinafter “card payment network 116”), which forwards the data to the computer system 118 of the issuing bank (hereinafter “issuer 118”). If the transaction is approved by the issuer 118, a payment authorization message is sent from the issuer 118 to the merchant POS system 104 via a path opposite of that described above.
The memory 203 may include any suitable type of storage device including, for example, an SRAM, a DRAM, an EEPROM, a flash memory, latches, and/or registers. In addition to storing instructions which can be executed by the processor 201, the memory 203 can also store data generated from the processor module 201. Note that the memory 203 is merely an abstract representation of a generic storage environment. According to some embodiments, the memory 206 may be comprised of one or more actual memory chips or modules. The display 202 can be, for example, a touchscreen display, or a traditional non-touch display (in which case the mobile device 102 likely also includes a separate keyboard or other input devices). Optionally, the mobile device 102 can include or be coupled to a card reader 205, which can be any suitable physical card reader that can read a physical card, such as a magnetic stripe card reader, an optical scanner, a smartcard reader, a radio frequency identification (RFID) reader, or the like.
The WPAN circuitry 204 is wireless communication circuitry that can form and/or communicate with a computer network for data transmission among electronic devices such as computers, telephones, and personal digital assistants. WPANs can be used for communication among the personal devices themselves or for connecting to a higher level network (e.g., a WLAN) and the Internet. Some examples of the WPAN circuitry 204 include IrDA, Bluetooth (including aforementioned BLE), Z-Wave, ZigBee, Body Area Network, and so forth. In some embodiments, the WPAN circuitry 204's connection can be bootstrapped by a near field communication (NFC) connection.
A mobile payment application 220 may be or include a software application, as henceforth assumed herein to facilitate description. As such, the mobile payment application 220 is shown as being located within the memory 203. Alternatively, the mobile payment application 220 could be a hardware or a firmware component (which may include a mobile payment software application).
In accordance with some embodiments of the techniques introduced here, the mobile payment application 220 includes a proximity-based payment module 222 that implements the techniques introduced here and provides proximity-based payment functionalities to the mobile device 102. The proximity-based payment (PBP) module 222 communicates with the mobile payment application 220. The PBP module 222 may also communicate with the display 202, either directly or through the mobile payment application 220. Similar to the mobile payment application 220, the PBP module 222 can be software, hardware, or a combination thereof. As illustrated in
In some embodiments, the mobile application 220 can employ a number of techniques for simplifying customer-to-customer transactions by use of an email mechanism. Some examples of these techniques are discussed in U.S. patent application Ser. No. 14/246,017, entitled “PAYMENT TRANSFER BY SENDING EMAIL,” filed Apr. 4, 2014, which is assigned to the same assignee as the present application. In general, these techniques enable a simplified payment transaction system for ordinary consumers without the hassle of having to sign up, to remember a user account associated with a password, and to login for sending or receiving every payment transaction, while not sacrificing the essential security feature of authenticating the user for every payment transaction. To send a payment, the user needs to only specify a receiver email address in an email. When the payment email is created, the email can be auto-populated with a security token. The email can also carbon copy (Cc), blind carbon copy (Bcc), or add as a recipient (To) a payment processing email address. When the email is sent, the payment processing system 108 can receive the payment email (e.g., by receiving the payment email through the payment processing email address) and generate a payment receipt interface for the receiver of the email.
Although these embodiments of the mobile application 220 can provide easy execution of customer-to-customer financial transactions (e.g., payment transfers), it is observed here that the above-described process can be even further simplified if the requirement for identifying the email addresses of the receivers (or payers, whichever the situation may be) can be removed. Accordingly, by one or more techniques discussed here, the proximity-based payment module 222 provides the mobile payment application 220 the ability to identify another customer that is nearby, and the ability to automatically enter contact information (e.g., email) of the identified, nearby customer for payment transaction, such that interruption caused by payment transfers to the flow of a social event (e.g., asking another customer for his or her email address) can be further reduced. More implementation details of the proximity-based payment module 222 is discussed blow.
As illustrated in
In preferred embodiments, before the user 101 can pay the user 111, the user 101 enables the proximity-based payment functionality in the mobile payment application 120 by entering information about a financial account of the user 101. For example, the user 101 enters information about his or her debit card 103 (e.g., through the card reader 205 or other input devices present on the mobile device 102) into the mobile payment application 120. After the mobile payment application 120 receives (510) the information about the financial account, the application 120 transmits (520) the information entered by the user 101 together with an identifier that uniquely identifies the mobile device 102 to a remote server (e.g., the PSS 108) so that the mobile device 102 is associated with the user 101's financial account (as indicated by the card 103). For example, the identifier can be the IMEI code of the mobile device 102. In one embodiment, the identifier is a BLE ID, a unique ID identifying each and every BLE chip. The transmission from the application 120 to the PSS 108 can be encrypted.
Note that, although a debit card is used for purposes of explaining the present techniques, the card 103 is not limited to an actual card of such kind; in alternative examples, the card 103 can represent an online bank account or any suitable payment account that can be used by the user 101 to transfer and/or receive currency. Further, in some embodiments, one mobile device can be associated with more than one financial accounts; in these embodiments, the mobile payment application 120 can adapt well-known multi-account managing techniques that allow the user 101 to identify which financial account should be used for conducting proximity-based payments. As an alternative, the user 101 can enter his or her financial account information along with the identifier that uniquely identifies the device 102 directly onto the PSS 108 (e.g., via a webpage that the PSS 108 hosts). In this alternative case, the PSS 108 can separately verify the correctness of the received information (e.g., by sending a text message to the mobile device 102). In other embodiments, the user 101 can associate the mobile device 102 and/or his particular instance of the mobile application 120 by registering (e.g., his email address) with the PSS 108.
Additionally or alternatively, the user 101 can enter other contact or identification information into the mobile payment application 120. Similar to the aforementioned financial account information, these contact or suitable identification information of the user 101 can be communicated to the PSS 108 so that these information can be associated to the mobile device 102. For example, in certain implementations where the mobile payment application 120 can initiate or cause proximity-based payment transaction by use of emails, the user 101 should enter his or her email address so that the PSS 108 can have the email address as one of the mechanisms available for identifying the mobile device 102. Note that, in some these examples that can cause payment transfers using email, the financial account information (e.g., the debit card information) need not be entered into the PSS 108—the email address can be used for payment transfers instead.
Similar to how the user 101 enables the proximity-based payment functionality by associating the mobile device 102 with the debit card 103, the users 111 and 121 each enable the proximity-based payment functionality on their mobile payment applications 120 by respectively associating the mobile device 112 with the debit card 113, and the mobile device 122 with the debit card 123. For certain implementations where the mobile payment application 120 can initiate proximity-based payment transaction by utilizing emails, the users 111 and 121 each should enter their email addresses into their respective mobile payment applications 120.
During normal operation, the mobile device 102 can conduct proximity-based payments with the mobile device 112 by first detecting (410) that the mobile device 112 is within the wireless network, such as within range of a BLE network. The detection can be initiated, in one example, when the user 101 selects to activate the mobile application 120 on the device 102, or in another example, when the user 101 selects to switch the mobile application 120 to run in foreground. More specifically, the mobile device 112 can sense the BLE devices (e.g., the device 112) that are nearby using BLE proximity sensing, e.g., estimating physical proximity using the radio receiver's received signal strength indication (RSSI) value. In other examples, the mobile application 120 may invoke other types of short-range wireless communication feature of the mobile device 102, such as infrared communication, WiFi, or the like.
To balance security, privacy, and convenience, a mobile device can choose (e.g., by turning off a particular WPAN circuit, by closing the mobile software application 120, or by refusing to be connected for proximity-based payment) whether it can be detected by other mobile devices within the network.
Depending on the implementation, some embodiments of the mobile payment application 120 only allows a mobile device to be discoverable when an instance of the mobile payment application 120 is running; for example, some embodiments of the application 120 allow proximity-based payment only when they are operating in the foreground, and some other embodiments of the application 120 allow proximity-based payment regardless of whether they are operating in the foreground or the background. Additionally or alternatively, the mobile payment application 120 can require a password before another mobile device attempts to detect or connect for proximity-based payment purposes. The password that authenticates a first mobile device (e.g., device 102) to conduct proximity-based payments with a second mobile device (e.g., device 112) is designated by a user of the second mobile device. The password protection is preferred in some implementations of the mobile payment application 120 which can remain in the background and broadcast about its capability to conduct proximity-based payment.
In some embodiments, a user can select to accept or refuse to conduct proximity-based payment with some particular mobile devices but not others. In these embodiments, the mobile payment application 120 of the mobile device 102, for example, can send out a query to the mobile payment application 120 of the mobile device 112, and the mobile device 112 can send out a signal (e.g., in response to the query) indicating whether the mobile device 112 allows conducting payments with the mobile device 102. In one example, the mobile device 102 also measures a received signal strength of a beacon signal sent from the mobile device 112, and the mobile device 112 is only considered detected when the received signal strength of the beacon signal sent from the mobile device 112 exceeds a predetermined threshold, i.e., when the mobile device 112 is close enough. In variations, the user can approve a nearby mobile device for a one-time-only proximity-based payment.
In addition or as an alternative to aforementioned ways of directly detecting proximity of other devices, the mobile payment application 120 of the mobile device 102 can indirectly detect the physical proximity of the mobile devices (e.g., device 112). In one example, even though the two devices (e.g., device 102 and 112) may not be within the same wireless network (e.g., a BLE network), the two devices can individually and separately determine their locations and transmit their locations back to the PSS 108, which can in turn determine that the two devices are in physical proximity for conducting proximity-based payments. How each device can determine its own physical location can be achieved through various means, for example, location calculation based on a global positioning satellite receiver, or triangulation from a number of nearby wireless base stations.
In this way, the mobile device 102 can identify, among the nearby devices within the wireless network, which devices are suitable candidates for conducting proximity-based payments by detecting, for example, which devices have their mobile payment application 120 up and running and with strong BLE signals. These features and options can also be adjusted depending on the user's preference in one or more embodiments.
Referring back to
Depending on the embodiment, either after the mobile device 112 is detected or after the mobile device 112 is verified, the mobile device 102 can receive user information about the mobile device 112 (e.g., the user 111's name, nickname, portrait, email or contact information, etc.) from the PSS 108. The mobile device 102 can display the received user information on the display of the mobile device 102 for the user 101 to identify the user 111. In some examples, the mobile device 112 is displayed as an icon once detected, and the icon is replaced by the user information once the mobile device 112 is verified by and the user information received from the PSS 108. In various embodiments, the user of the detected device has control over what user information is to be displayed. After the user information is received, a screen such as
In some embodiments, either the mobile application 120 or the PSS 108 can identify, from those physically-proximate devices, a list of devices with users that are socially connected to the user 101. Then, the user 101 can configure the mobile application 120 so that it only provides information regarding identities of the users socially connected to the user 101. More specifically, in some embodiments, the mobile application 120 can detect people in the vicinity (e.g., for those people that have their “detectability” turned on) The proximately-located devices can either be discovered directly by the mobile device 102 using, for example, BLE, or can be discovered by the PSS 108 based on the PSS 108's understanding of devices located in proximate geographic regions. Either way, the PSS 108 or the mobile application 120 can recognize a list of people nearby, but only provides information relating to people known or otherwise socially connected with the user to be displayed as people in the proximate list. In some examples, a person can be regarded as “socially connected” because the user 101 has previously had a payment transfer or financial transaction with this person. In other examples, either the mobile application 120 or the PSS 108 can have access to the user 101's social network account (e.g., a Facebook™, a LinkedIn™, or other suitable social networking sites) and determines that this person is socially connected to (e.g., within a social circle of) the user 101.
Moreover, after aforesaid measurements of received signal strengths sent from all the detected mobile devices (e.g., devices 112 and 122) in proximity (e.g., within the BLE network), the mobile device 102 can sort all detected mobile devices based on their received signal strengths. As a variation, the mobile device 102 can also sort all detected mobile devices based on a frequency of past payments conducted between the mobile device 102 and each of the detected mobile devices. For example, the user 101 can set up, in the mobile device 102, a black list for those devices that are disallowed for proximity-based payment, a white list for those that are allowed, and/or a favorite list for those that are to be displayed on the top of the list (or as highlighted in a map) of all detected devices.
By displaying information indicative of the mobile device 112 to the user 101, the mobile device 102 prompts (430), via the display of the mobile device 102, the user 101 to select or confirm the mobile device 112 for a proximity-based payment. As discussed above, the payment can be from or to the mobile device 102, which can be chosen by the user 101. As illustrated in the example scenario of
Note that, as is further discussed below, in the examples where the mobile device 102's proximity-based payment is initiated in response to a request from the mobile device 112, it may not be necessary for the user 101 to enter the amount for the payment; because the amount can be received from the mobile device 112, the user 101 may only need to approve (rather than enter) the amount for the payment. By the same token, it may not be necessary for the user 101 to select the mobile device 112; if the payment is initiated in response to the mobile device 112's request, then the user 101 may only need to confirm (rather than select) the mobile device 112 for the payment. For example, in the display illustrated in
After the payment information is confirmed by the user 101, the mobile device 102 causes (440) the amount to be transferred from the financial account associated with the mobile device 102 to the financial account associated with the mobile device 112. More specifically, after the user 101 has input or confirmed the payment information to the mobile device 102, the mobile payment application 120 causes the mobile device 102 to transmit a message to convey that payment information to the PSS 108. The PSS 108 then executes or triggers a money transfer process to carry out the payment, according to the payment information received from the mobile device 102. In some examples, to cause the PSS 108 (for example) to carry out the payment, the mobile device 102 communicates with the PSS 108 the unique identifier of the payer (which in this case, mobile device 102), the unique identifier of the payee (which in this case, mobile device 112), and the amount to be transferred. The mobile application 120 can display a transmitting screen and a confirmation screen, such as respectively illustrated in
In some implementations, the mobile application 120 can transmit cause to the PSS 108 to conduct payment transfers between the user 101's financial account and another person's financial account that is identified by the user 101. For example, the mobile application 120 can communicate with the PSS 108 by sending an email, a text message, a multimedia message, or a message that uses a proprietary communication protocol between the mobile application 120 and the PSS 108.
In some examples, the email is generated by an email application separate from the money-transfer application (e.g., a native email application or a third-party email application, such as an Gmail™ application). The email can include an email address associated with the PSS 108. The email can further include, for example, in its body or header portion, an indication of the monetary amount to be transferred to or from the user 101's financial account. In some implementations, the email is generated with pre-populated information including (1) an email address associated with the PSS in an addressee filed and (2) the monetary amount, so that the user 101 only needs to select the send button (such as the “SEND” button shown in
Note that, in some embodiments, the email is generated but not displayed to the user 101, and after the email is generated, the email is sent in the background using the email application without user intervention. In some of these embodiments, once the mobile application 120 has received the monetary amount and the identities of the selected users, the mobile application 120 can automatically cause (e.g., by generating an email or a message and sending the email to the PSS 108) the PSS 108 to perform the payment transfer in the background, without the user actually seeing the email or the message and without the need for the user to instruct an email application to send. In this way, since all the required information is already pre-populated, the mobile application 120 improves the user experience by simplifying the payment transfer process, which only requires the user to initiate the process by hitting the “send” button. The user need not see the background process of an email being generated by, for example, an email application of the mobile device 102.
Note that the proximity-based payment from the mobile device 102 to the mobile device 112 can be initiated in response to the mobile device 102 receiving (610), from the mobile device 112, a request for the payment to the user 111. As mentioned above, the request can include the amount for the payment to the user 111 so that the user 101 does not need to specify the amount.
As mentioned above, in some implementations, the mobile payment application 120 can initiate customer-to-customer payment transfers by means of email. In these implementations, the mobile payment application 120 utilizes a third-party email application (e.g., a Gmail™ application) located on the mobile device 102 to transmit an email message that includes, for example, a payment amount to be transferred to a recipient, the recipient's name, a request for the PSS 108 to transfer the payment amount to the recipient, and a message token.
In one example, the user can enter an amount of payment on either the mobile payment application 120 or in the “SUBJECT” field of the third-party email application. The user can also include a message in the body of the email being drafted on the native email application. A security token can be embedded in the email being drafted and can include information regarding sender email address, device characteristic(s) and/or identifier of the payment sender device, financial account information of the sender user (e.g., debit card account information or credit card account information), or any combination thereof. It is noted that even without the financial account information of the sender user, the email can still be sent from the email application. For example, if no financial account information is embedded in the email, the PSS 108 can send a financial account request email to the sender email address requesting that financial account information be entered. The financial account request email can include a secure link to enter the financial account information, such as a debit card number or a credit card number and associated authentication information (e.g., expire date, ZIP Code, PIN number, or security code). After the user 101 chooses to send the email message, a copy of the message is also sent to the PSS 108. The PSS 108 can analyze the email message, identify the mobile device 102, verify that the email message has been sent from an email address of the user 101, and verify that the mobile device 102 is the only one capable of having produced the email message. Having verified the email message (and the authenticity of the request to transfer money), the PSS 108 initiates the process to transfer the payment amount. However, as said above, the user 101 typically still needs to specify a recipient email address (e.g., such as that of the user 111) in the “TO:” field of the third-party email application.
By adapting the techniques introduced here in these implementations, the above process of initiating payment transfers via email can be further simplified. Before the email (i.e., the payment transaction email) is drafted, the mobile payment application 120 can detect the physical proximity of the mobile device 112, communicate this information regarding its nearby mobile devices to the PSS 108, and receive (425) relevant intelligence related to the nearby mobile devices (such as email address of the user 111) from the PSS 108. Then, the mobile payment application 120 can automatically enter the received information for the user 101 for facilitating the proximity-based payment transfers. For example, the mobile payment application 120 can prompt the user 101 to select from a list of potential receivers (of the payment) that have been detected nearby, and the user 101 is given the choice to select or not select each potential payee. In variations, the mobile application 120 can generate a list of suggested payers based on, for example, the consumer's address book stored in the mobile device 120 and/or the consumer's recently used contacts stored on the mobile device 120. Upon the user 101 indicating that he is satisfied with the selections (e.g., by clicking a “Pay” button provided on a user interface), the mobile payment application 120 can proceed with the next steps of the payment transfer procedures (e.g., launching the third-party email application of the mobile device 120 to draft a payment transaction email).
In accordance with some embodiments, the mobile device 102 can also actively send out request for payment using the proximity-based payment techniques. In the example of
After detecting and verifying the mobile device 122's eligibility for conducting proximity-based payments, the mobile device 102 can enable (710) the user 101 to request a payment from the user 121 by prompting the user 101 to (a) select the mobile device 121 for the payment, and (b) specify an amount for the payment. Adapting the techniques herein, various embodiments of the mobile payment application 120 can let the user 101 enter how many shares of payments in total, and can let the user 101 choose how to split the bill (e.g., by spreading out evenly, by specifying an amount for each share, etc.). Thereafter, the mobile device 102 transmits (720) (e.g., via the BLE network), to the mobile device 122, a request for the payment.
In the case that certain parties in the social dinning event are not eligible for proximity-based payment (e.g., because their mobile devices are not present, or their mobile payment application are shut off), the mobile payment application 120 can still enable the user 101 to request a payment by (a) prompting the user 101 to enter an electronic mail address of such party, and (b) transmitting, to the electronic mail (email) address, a request for the payment. Note that, after the mobile device 102 sends out the request to the mobile device 122, the mobile device 122 can perform proximity-based payment to the mobile device 102 in a similar manner as how the mobile device 102 conducts proximity-based payment to the mobile device 112. For those embodiments that utilize email as means for facilitating the payment transfer, the email addresses associated with those devices that are detected in proximity to the mobile device 102 can be transmitted from the PSS 108 to the mobile device 102. Also, using similar techniques introduced here, the mobile payment application 120 can facilitate payment transfers with (including from and to) multiple other devices that are nearby. For example, depending on the implementation, the mobile payment application 120 can send out a single email to multiple recipients, or separate emails to each individual recipients.
In the aforementioned manner, the techniques introduced here enable one customer to pay another quickly and easily compared to traditional methods. Furthermore, without the prerequisites of a customer having any information (e.g., an email address or a phone number) about another, the introduced techniques enable users to conduct payments with each other as long as they are in physical proximity, thereby greatly reducing the potential for awkward interruptions to the social flow of group events due to bill splitting issues, even in group events that include multiple distinct social circles.
In the illustrated embodiment, the processing system 900 includes one or more processors 910, memory 911, a communication device 912, and one or more input/output (I/O) devices 913, all coupled to each other through an interconnect 914. The interconnect 914 may be or include one or more conductive traces, buses, point-to-point connections, controllers, adapters and/or other conventional connection devices. The processor(s) 910 may be or include, for example, one or more general-purpose programmable microprocessors, microcontrollers, application specific integrated circuits (ASICs), programmable gate arrays, or the like, or a combination of such devices. The processor(s) 910 control the overall operation of the processing device 900. Memory 911 may be or include one or more physical storage devices, which may be in the form of random access memory (RAM), read-only memory (ROM) (which may be erasable and programmable), flash memory, miniature hard disk drive, or other suitable type of storage device, or a combination of such devices. Memory 911 may store data and instructions that configure the processor(s) 910 to execute operations in accordance with the techniques described above. The communication device 912 may be or include, for example, an Ethernet adapter, cable modem, Wi-Fi adapter, cellular transceiver, Bluetooth transceiver, or the like, or a combination thereof. Depending on the specific nature and purpose of the processing device 900, the I/O devices 913 can include devices such as a display (which may be a touch screen display), audio speaker, keyboard, mouse or other pointing device, microphone, camera, etc.
Unless contrary to physical possibility, it is envisioned that (i) the methods/steps described above may be performed in any sequence and/or in any combination, and that (ii) the components of respective embodiments may be combined in any manner.
The techniques introduced above can be implemented by programmable circuitry programmed/configured by software and/or firmware, or entirely by special-purpose circuitry, or by a combination of such forms. Such special-purpose circuitry (if any) can be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
Software or firmware to implement the techniques introduced here may be stored on a machine-readable storage medium and may be executed by one or more general-purpose or special-purpose programmable microprocessors. A “machine-readable medium”, as the term is used herein, includes any mechanism that can store information in a form accessible by a machine (a machine may be, for example, a computer, network device, cellular phone, personal digital assistant (PDA), manufacturing tool, any device with one or more processors, etc.). For example, a machine-accessible medium can include recordable/non-recordable media (e.g., read-only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, etc.).
Note that any and all of the embodiments described above can be combined with each other, except to the extent that it may be stated otherwise above or to the extent that any such embodiments might be mutually exclusive in function and/or structure.
Although the present disclosure has been described with reference to specific exemplary embodiments, it will be recognized that the techniques introduced here are not limited to the embodiments described. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.
This application is a continuation under 35 U.S.C. § 120 of U.S. application Ser. No. 16/828,817, filed Mar. 24, 2020, which is a continuation under 35 U.S.C. § 120 of U.S. application Ser. No. 14/296,385, filed Jun. 4, 2014, now U.S. Pat. No. 10,614,445 entitled “PROXIMITY-BASED PAYMENTS,” which is incorporated by reference in its entirety herein.
Number | Name | Date | Kind |
---|---|---|---|
4838384 | Thangavelu | Jun 1989 | A |
5506898 | Costantini et al. | Apr 1996 | A |
5991749 | Morrill | Nov 1999 | A |
6157927 | Schaefer et al. | Dec 2000 | A |
6173272 | Thomas et al. | Jan 2001 | B1 |
D458271 | Huang et al. | Jun 2002 | S |
6513018 | Culhane | Jan 2003 | B1 |
6707905 | Lenard | Mar 2004 | B2 |
6829583 | Knapp et al. | Dec 2004 | B1 |
6839566 | Casaccia et al. | Jan 2005 | B2 |
6847942 | Land et al. | Jan 2005 | B1 |
6876993 | LaButte et al. | Apr 2005 | B2 |
7089208 | Levchin et al. | Aug 2006 | B1 |
7254406 | Beros | Aug 2007 | B2 |
7343335 | Olliphant | Mar 2008 | B1 |
7349871 | Labrou et al. | Mar 2008 | B2 |
7376587 | Neofytides | May 2008 | B1 |
7383226 | Kight et al. | Jun 2008 | B2 |
7580719 | Karmarkar | Aug 2009 | B2 |
7606734 | Baig | Oct 2009 | B2 |
7620404 | Chesnais | Nov 2009 | B2 |
7668766 | Goodwin, III et al. | Feb 2010 | B1 |
7694287 | Singh et al. | Apr 2010 | B2 |
7783537 | Van Luchene et al. | Aug 2010 | B1 |
8010601 | Jennings | Aug 2011 | B2 |
8015070 | Sinha et al. | Sep 2011 | B2 |
8020763 | Kowalchyk et al. | Sep 2011 | B1 |
8055564 | Wehunt et al. | Nov 2011 | B2 |
8065190 | Collas et al. | Nov 2011 | B2 |
8090616 | Proctor, Jr. | Jan 2012 | B2 |
8090656 | Solomon et al. | Jan 2012 | B2 |
8208388 | Casaccia et al. | Jun 2012 | B2 |
8341074 | Reid | Dec 2012 | B1 |
8385964 | Haney | Feb 2013 | B2 |
8401968 | Schattauer et al. | Mar 2013 | B1 |
8408992 | de Cuba | Apr 2013 | B2 |
8428079 | Lambert | Apr 2013 | B1 |
8498900 | Spirin et al. | Jul 2013 | B1 |
8500010 | Marcus et al. | Aug 2013 | B1 |
8571975 | Lehman et al. | Oct 2013 | B1 |
8606703 | Dorsey et al. | Dec 2013 | B1 |
8615445 | Dorsey et al. | Dec 2013 | B2 |
8655837 | Beckstrom et al. | Feb 2014 | B2 |
8661046 | King et al. | Feb 2014 | B2 |
8694435 | Bishop | Apr 2014 | B1 |
8700526 | Cozens et al. | Apr 2014 | B1 |
8751379 | Bueche, Jr. | Jun 2014 | B1 |
8762272 | Cozens et al. | Jun 2014 | B1 |
D709914 | Berdan et al. | Jul 2014 | S |
9092776 | Dessert | Jul 2015 | B2 |
9092828 | Hosp | Jul 2015 | B2 |
9264850 | Lee | Feb 2016 | B1 |
9378491 | Grassadonia et al. | Jun 2016 | B1 |
D764543 | Delia | Aug 2016 | S |
D776687 | Wick et al. | Jan 2017 | S |
9576284 | Runyan | Feb 2017 | B2 |
D783658 | Hurst et al. | Apr 2017 | S |
D785031 | Bhat et al. | Apr 2017 | S |
D785043 | Montgomery et al. | Apr 2017 | S |
9652769 | Golin | May 2017 | B1 |
9665858 | Kumar | May 2017 | B1 |
D790577 | Hatzikostas et al. | Jun 2017 | S |
9710821 | Heath | Jul 2017 | B2 |
9715709 | Carlson | Jul 2017 | B2 |
9767443 | Wilson et al. | Sep 2017 | B1 |
D801387 | Lemay et al. | Oct 2017 | S |
9799071 | Wilson et al. | Oct 2017 | B1 |
9805358 | Green et al. | Oct 2017 | B2 |
D808978 | Hazam et al. | Jan 2018 | S |
9875469 | Chin et al. | Jan 2018 | B1 |
D809528 | Hazam et al. | Feb 2018 | S |
9990621 | Ng et al. | Jun 2018 | B1 |
D829765 | Crawford | Oct 2018 | S |
10242351 | Wilson et al. | Mar 2019 | B1 |
10339506 | Kassemi et al. | Jul 2019 | B2 |
10387874 | Birand et al. | Aug 2019 | B1 |
10410184 | Green et al. | Sep 2019 | B2 |
10552828 | Hammad | Feb 2020 | B2 |
10614445 | Dorsey et al. | Apr 2020 | B1 |
10621563 | Spindel et al. | Apr 2020 | B1 |
10769619 | Bennett | Sep 2020 | B2 |
10963868 | McCauley et al. | Mar 2021 | B1 |
11023869 | Kumar | Jun 2021 | B1 |
11023878 | Hernandez et al. | Jun 2021 | B1 |
11270278 | Kumar | Mar 2022 | B2 |
11354645 | Dorsey et al. | Jun 2022 | B1 |
11410139 | Spindel et al. | Aug 2022 | B1 |
11423394 | McCauley et al. | Aug 2022 | B1 |
11829964 | Spindel et al. | Nov 2023 | B2 |
20010014878 | Mitra et al. | Aug 2001 | A1 |
20020057285 | James | May 2002 | A1 |
20020114442 | Lieberman et al. | Aug 2002 | A1 |
20020116331 | Cataline et al. | Aug 2002 | A1 |
20020161630 | Kern et al. | Oct 2002 | A1 |
20020194141 | Langensteiner et al. | Dec 2002 | A1 |
20030028483 | Sanders et al. | Feb 2003 | A1 |
20030037074 | Dwork et al. | Feb 2003 | A1 |
20030045272 | Burr | Mar 2003 | A1 |
20030061170 | Uzo | Mar 2003 | A1 |
20030120936 | Farris et al. | Jun 2003 | A1 |
20030126076 | Kwok | Jul 2003 | A1 |
20040039630 | Begole et al. | Feb 2004 | A1 |
20040044616 | Salter | Mar 2004 | A1 |
20040113928 | Kobayashi et al. | Jun 2004 | A1 |
20040148252 | Fleishman | Jul 2004 | A1 |
20040177005 | Poltorak | Sep 2004 | A1 |
20040230489 | Goldthwaite et al. | Nov 2004 | A1 |
20040230526 | Praisner | Nov 2004 | A1 |
20040264466 | Huang | Dec 2004 | A1 |
20050165684 | Jensen et al. | Jul 2005 | A1 |
20050174975 | Mgrdechian et al. | Aug 2005 | A1 |
20050286686 | Krstulich | Dec 2005 | A1 |
20060064380 | Zukerman | Mar 2006 | A1 |
20060106716 | Hurwitz et al. | May 2006 | A1 |
20060111945 | Tinsley et al. | May 2006 | A1 |
20060112006 | Hurwitz et al. | May 2006 | A1 |
20060112007 | Hurwitz et al. | May 2006 | A1 |
20060129484 | Hurwitz et al. | Jun 2006 | A1 |
20060146839 | Hurwitz et al. | Jul 2006 | A1 |
20060148532 | Schnurr | Jul 2006 | A1 |
20060224542 | Yalamanchi | Oct 2006 | A1 |
20060229984 | Miyuki | Oct 2006 | A1 |
20060235796 | Johnson et al. | Oct 2006 | A1 |
20060259358 | Robinson et al. | Nov 2006 | A1 |
20060277550 | Williams et al. | Dec 2006 | A1 |
20060288367 | Swix et al. | Dec 2006 | A1 |
20070078771 | Allin et al. | Apr 2007 | A1 |
20070106558 | Mitchell et al. | May 2007 | A1 |
20070124721 | Cowing | May 2007 | A1 |
20070136118 | Gerlach et al. | Jun 2007 | A1 |
20070150411 | Addepalli et al. | Jun 2007 | A1 |
20070174080 | Outwater | Jul 2007 | A1 |
20070198382 | Ferrari | Aug 2007 | A1 |
20070203836 | Dodin | Aug 2007 | A1 |
20070208816 | Baldwin et al. | Sep 2007 | A1 |
20070233615 | Tumminaro | Oct 2007 | A1 |
20070255652 | Tumminaro et al. | Nov 2007 | A1 |
20070255653 | Tumminaro | Nov 2007 | A1 |
20070256035 | Matsuzawa et al. | Nov 2007 | A1 |
20070265984 | Santhana | Nov 2007 | A1 |
20080004989 | Yi | Jan 2008 | A1 |
20080010190 | Rackley, III | Jan 2008 | A1 |
20080052176 | Buchheit | Feb 2008 | A1 |
20080154798 | Valz | Jun 2008 | A1 |
20080162340 | Zimmer et al. | Jul 2008 | A1 |
20080167980 | Aaron et al. | Jul 2008 | A1 |
20080182591 | Krikorian | Jul 2008 | A1 |
20080183619 | Gould et al. | Jul 2008 | A1 |
20080201769 | Finn | Aug 2008 | A1 |
20080320036 | Winter | Dec 2008 | A1 |
20090006151 | Zarghami et al. | Jan 2009 | A1 |
20090006398 | Lam et al. | Jan 2009 | A1 |
20090024533 | Fernandes et al. | Jan 2009 | A1 |
20090063353 | Viidu | Mar 2009 | A1 |
20090070263 | Davis | Mar 2009 | A1 |
20090099961 | Ogilvy | Apr 2009 | A1 |
20090119190 | Realini | May 2009 | A1 |
20090157652 | Barbosa et al. | Jun 2009 | A1 |
20090164374 | Shastry | Jun 2009 | A1 |
20090194584 | Alexander et al. | Aug 2009 | A1 |
20090260060 | Smith et al. | Oct 2009 | A1 |
20090266884 | Killian et al. | Oct 2009 | A1 |
20090281817 | Ferrara et al. | Nov 2009 | A1 |
20090288012 | Hertel et al. | Nov 2009 | A1 |
20090299869 | Cibanof | Dec 2009 | A1 |
20100010906 | Grecia | Jan 2010 | A1 |
20100063893 | Townsend | Mar 2010 | A1 |
20100082481 | Lin | Apr 2010 | A1 |
20100121745 | Teckchandani et al. | May 2010 | A1 |
20100169264 | O'Sullivan et al. | Jul 2010 | A1 |
20100211592 | Brownlee | Aug 2010 | A1 |
20100211938 | Singh et al. | Aug 2010 | A1 |
20100250682 | Goldberg et al. | Sep 2010 | A1 |
20100268648 | Wiesman et al. | Oct 2010 | A1 |
20100280860 | Iskold et al. | Nov 2010 | A1 |
20100312626 | Cervenka | Dec 2010 | A1 |
20100312636 | Coulter et al. | Dec 2010 | A1 |
20110029416 | Greenspan | Feb 2011 | A1 |
20110071892 | Dickelman | Mar 2011 | A1 |
20110078073 | Annappindi | Mar 2011 | A1 |
20110078260 | Rashad et al. | Mar 2011 | A1 |
20110087742 | Deluca et al. | Apr 2011 | A1 |
20110106698 | Isaacson et al. | May 2011 | A1 |
20110119190 | Mina | May 2011 | A1 |
20110145049 | Hertel et al. | Jun 2011 | A1 |
20110145152 | McCown | Jun 2011 | A1 |
20110177802 | Gupta | Jul 2011 | A1 |
20110178883 | Granbery | Jul 2011 | A1 |
20110231292 | McCown | Sep 2011 | A1 |
20110238517 | Ramalingam et al. | Sep 2011 | A1 |
20110246284 | Chaikin et al. | Oct 2011 | A1 |
20110251892 | Laracey | Oct 2011 | A1 |
20110313871 | Greenwood | Dec 2011 | A1 |
20110313880 | Paul et al. | Dec 2011 | A1 |
20120024607 | Swope et al. | Feb 2012 | A1 |
20120030091 | Hu et al. | Feb 2012 | A1 |
20120054100 | Pfohl | Mar 2012 | A1 |
20120054102 | Schwartz et al. | Mar 2012 | A1 |
20120095905 | Hodges | Apr 2012 | A1 |
20120130790 | Lyons et al. | May 2012 | A1 |
20120130895 | Granbery | May 2012 | A1 |
20120130903 | Dorsey et al. | May 2012 | A1 |
20120143753 | Gonzalez et al. | Jun 2012 | A1 |
20120143772 | Abadir | Jun 2012 | A1 |
20120150643 | Wolfe et al. | Jun 2012 | A1 |
20120158553 | Sudhidhanakul et al. | Jun 2012 | A1 |
20120158589 | Katzin et al. | Jun 2012 | A1 |
20120166311 | Dwight | Jun 2012 | A1 |
20120166332 | Naaman | Jun 2012 | A1 |
20120173349 | Buckley | Jul 2012 | A1 |
20120173396 | Melby et al. | Jul 2012 | A1 |
20120185355 | Kilroy | Jul 2012 | A1 |
20120197794 | Grigg et al. | Aug 2012 | A1 |
20120209749 | Hammad et al. | Aug 2012 | A1 |
20120214416 | Kent et al. | Aug 2012 | A1 |
20120239417 | Pourfallah et al. | Sep 2012 | A1 |
20120246074 | Annamalai et al. | Sep 2012 | A1 |
20120246252 | Denise | Sep 2012 | A1 |
20120253852 | Pourfallah et al. | Oct 2012 | A1 |
20120259782 | Hammad | Oct 2012 | A1 |
20120271707 | Harrison et al. | Oct 2012 | A1 |
20120296726 | Dessert et al. | Nov 2012 | A1 |
20120303425 | Katzin et al. | Nov 2012 | A1 |
20130003089 | Morovic et al. | Jan 2013 | A1 |
20130005433 | Holch | Jan 2013 | A1 |
20130006853 | Amundsen | Jan 2013 | A1 |
20130019284 | Pacyga et al. | Jan 2013 | A1 |
20130024506 | Setton | Jan 2013 | A1 |
20130030890 | Richardson | Jan 2013 | A1 |
20130041824 | Gupta | Feb 2013 | A1 |
20130054330 | O'Donnell et al. | Feb 2013 | A1 |
20130060623 | Walker et al. | Mar 2013 | A1 |
20130060708 | Oskolkov et al. | Mar 2013 | A1 |
20130085931 | Runyan | Apr 2013 | A1 |
20130110656 | Chau et al. | May 2013 | A1 |
20130132502 | Stacey et al. | May 2013 | A1 |
20130144707 | Isaacson et al. | Jun 2013 | A1 |
20130159081 | Shastry et al. | Jun 2013 | A1 |
20130159173 | Sivaraman et al. | Jun 2013 | A1 |
20130166445 | Isaacson et al. | Jun 2013 | A1 |
20130173407 | Killian et al. | Jul 2013 | A1 |
20130173464 | Quillian | Jul 2013 | A1 |
20130179330 | Quillian | Jul 2013 | A1 |
20130181045 | Dessert et al. | Jul 2013 | A1 |
20130218721 | Borhan et al. | Aug 2013 | A1 |
20130229930 | Akay et al. | Sep 2013 | A1 |
20130232075 | Monaghan et al. | Sep 2013 | A1 |
20130246258 | Dessert | Sep 2013 | A1 |
20130275301 | Lehman et al. | Oct 2013 | A1 |
20130290234 | Harris et al. | Oct 2013 | A1 |
20130297385 | Mehta et al. | Nov 2013 | A1 |
20130316808 | Nelson et al. | Nov 2013 | A1 |
20130317835 | Mathew | Nov 2013 | A1 |
20130317893 | Nelson et al. | Nov 2013 | A1 |
20130325663 | Scipioni et al. | Dec 2013 | A1 |
20130332344 | Weber | Dec 2013 | A1 |
20130332354 | Rhee et al. | Dec 2013 | A1 |
20130339253 | Sincai | Dec 2013 | A1 |
20140006205 | Berry et al. | Jan 2014 | A1 |
20140019341 | Frohwein | Jan 2014 | A1 |
20140025958 | Calman | Jan 2014 | A1 |
20140032297 | Germann et al. | Jan 2014 | A1 |
20140040130 | Kunz et al. | Feb 2014 | A1 |
20140046851 | Lehman et al. | Feb 2014 | A1 |
20140052617 | Chawla et al. | Feb 2014 | A1 |
20140067557 | Willem et al. | Mar 2014 | A1 |
20140074569 | Francis et al. | Mar 2014 | A1 |
20140074658 | Sanchez | Mar 2014 | A1 |
20140074691 | Bank et al. | Mar 2014 | A1 |
20140081783 | Paranjape et al. | Mar 2014 | A1 |
20140089073 | Jacobs et al. | Mar 2014 | A1 |
20140089078 | Dessert et al. | Mar 2014 | A1 |
20140114775 | Cloin et al. | Mar 2014 | A1 |
20140100931 | Sanchez et al. | Apr 2014 | A1 |
20140100973 | Brown et al. | Apr 2014 | A1 |
20140101737 | Rhee | Apr 2014 | A1 |
20140108247 | Artman et al. | Apr 2014 | A1 |
20140129942 | Rathod | May 2014 | A1 |
20140136349 | Dave et al. | May 2014 | A1 |
20140136352 | Ramakrishna et al. | May 2014 | A1 |
20140156508 | Argue et al. | Jun 2014 | A1 |
20140156517 | Argue et al. | Jun 2014 | A1 |
20140164234 | Coffman et al. | Jun 2014 | A1 |
20140172531 | Liberty et al. | Jun 2014 | A1 |
20140172704 | Atagun et al. | Jun 2014 | A1 |
20140180929 | Ohnishi et al. | Jun 2014 | A1 |
20140181934 | Mayblum et al. | Jun 2014 | A1 |
20140201067 | Lai et al. | Jul 2014 | A1 |
20140207679 | Cho | Jul 2014 | A1 |
20140214652 | Zheng et al. | Jul 2014 | A1 |
20140222595 | Fernandes | Aug 2014 | A1 |
20140222663 | Park et al. | Aug 2014 | A1 |
20140250002 | Isaacson et al. | Sep 2014 | A1 |
20140254575 | Venkatraman et al. | Sep 2014 | A1 |
20140279098 | Ham | Sep 2014 | A1 |
20140279436 | Dorsey et al. | Sep 2014 | A1 |
20140279444 | Kassemi et al. | Sep 2014 | A1 |
20140279447 | Dorsey et al. | Sep 2014 | A1 |
20140279474 | Evans et al. | Sep 2014 | A1 |
20140279556 | Priebatsch et al. | Sep 2014 | A1 |
20140304510 | Sannegowda et al. | Oct 2014 | A1 |
20140348143 | Kato et al. | Nov 2014 | A1 |
20140351130 | Cheek et al. | Nov 2014 | A1 |
20140372308 | Sheets | Dec 2014 | A1 |
20150012388 | Kim et al. | Jan 2015 | A1 |
20150012426 | Purves et al. | Jan 2015 | A1 |
20150031393 | Post et al. | Jan 2015 | A1 |
20150032567 | Bhatia | Jan 2015 | A1 |
20150066765 | Banks et al. | Mar 2015 | A1 |
20150073907 | Purves et al. | Mar 2015 | A1 |
20150081462 | Ozvat et al. | Mar 2015 | A1 |
20150088754 | Kirsch | Mar 2015 | A1 |
20150095228 | Su et al. | Apr 2015 | A1 |
20150100481 | Ghosh et al. | Apr 2015 | A1 |
20150100482 | Zamer et al. | Apr 2015 | A1 |
20150120418 | Cervenka et al. | Apr 2015 | A1 |
20150134528 | Fineman et al. | May 2015 | A1 |
20150149350 | Ananda Kumar et al. | May 2015 | A1 |
20150170092 | Klein | Jun 2015 | A1 |
20150178755 | Barroso | Jun 2015 | A1 |
20150178835 | Quillian | Jun 2015 | A1 |
20150186887 | Khan et al. | Jul 2015 | A1 |
20150194023 | Brackenridge et al. | Jul 2015 | A1 |
20150287006 | Hunter et al. | Oct 2015 | A1 |
20150339696 | Zhou et al. | Nov 2015 | A1 |
20150358476 | Flores-Estrada | Dec 2015 | A1 |
20160019536 | Ortiz et al. | Jan 2016 | A1 |
20160042379 | Upoli et al. | Feb 2016 | A1 |
20160048830 | Laracey | Feb 2016 | A1 |
20160117670 | Davis | Apr 2016 | A1 |
20160125369 | Grassadonia et al. | May 2016 | A1 |
20160277560 | Gruberman et al. | Sep 2016 | A1 |
20160321663 | Batlle | Nov 2016 | A1 |
20170287022 | Capps et al. | Oct 2017 | A1 |
20180349871 | Moshal | Dec 2018 | A1 |
20200160296 | Park et al. | May 2020 | A1 |
20210117940 | Grassadonia et al. | Apr 2021 | A1 |
20210241384 | Dal et al. | Aug 2021 | A1 |
20220156707 | Kumar | May 2022 | A1 |
20220230148 | Grassadonia et al. | Jul 2022 | A1 |
20220292472 | Spindel et al. | Sep 2022 | A1 |
20220405737 | McCauley et al. | Dec 2022 | A1 |
20230196319 | Ng et al. | Jun 2023 | A1 |
Number | Date | Country |
---|---|---|
2004102570 | Apr 2004 | JP |
2005-182338 | Jul 2005 | JP |
10-2008-0053056 | Jun 2008 | KR |
2011153281 | Dec 2011 | WO |
2013147954 | Oct 2013 | WO |
2016069958 | May 2016 | WO |
2023121756 | Jun 2023 | WO |
Entry |
---|
Zhu, Y., “A new architecture for secure two-party mobile payment transactions”, (Order No. MR68790), Available from ProQuest Dissertations and Theses Professional (822410582), Retrieved from Internet URL: https://dialog.proquest.com/professional/docview/822410582?accountid=131444, (2010), 239 pages. |
Non-Final Office Action mailed May 13, 2021 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Non-Final Office Action mailed Jun. 25, 2021 for U.S. Appl. No. 17/216,385, of McCauley, N., et al., filed Mar. 29, 2021. |
Non-Final Office Action mailed Jul. 30, 2021 for U.S. Appl. No. 16/828,817, of Dorsey, J., et al., filed Mar. 24, 2020. |
Non-Final Office Action mailed Sep. 16, 2021 for U.S. Appl. No. 17/138,702, of Grassadonia, B., et al., filed Dec. 30, 2020. |
Final Office Action mailed Oct. 5, 2021 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Final Office Action mailed Nov. 8, 2021, for U.S. Appl. No. 17/216,385, of McCauley, N., et al., filed Mar. 29, 2021. |
Notice of Allowance mailed Feb. 4, 2022, for U.S. Appl. No. 17/216,385, of McCauley, N., et al., filed Mar. 29, 2021. |
Final Office Action mailed Feb. 7, 2022 for U.S. Appl. No. 17/138,702, of Grassadonia, B., et al., filed Dec. 30, 2020. |
Notice of Allowance mailed Feb. 10, 2022 for U.S. Appl. No. 16/828,817, of Dorsey, J., et al., filed Mar. 24, 2020. |
Notice of Allowance mailed Feb. 16, 2022 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., iled Jun. 29, 2015. |
Corrected Notice of Allowability mailed Mar. 2, 2022 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Notice of Allowance mailed Mar. 3, 2022 for U.S. Appl. No. 16/828,817, of Dorsey, J., et al., filed Mar. 24, 2020. |
Non-Final Office Action mailed Mar. 16, 2022 for U.S. Appl. No. 17/138,702, of Grassadonia, B., et al., filed Dec. 30, 2020. |
Notice of Allowance mailed Apr. 13, 2022, for U.S. Appl. No. 17/216,385, of McCauley, N., et al., filed Mar. 29, 2021. |
Notice of Allowance mailed Jun. 23, 2022 for U.S. Appl. No. 17/138,702, of Grassadonia, B., et al., filed Dec. 30, 2020. |
Ex Parte Quayle mailed Jun. 24, 2022 for U.S. Appl. No. 17/711,364, of Grassadonia, B., et al., filed Apr. 1, 2022. |
Corrected Notice of Allowability mailed Jun. 27, 2022, for U.S. Appl. No. 17/216,385, of McCauley, N., et al., filed Mar. 29, 2021. |
Notice of Allowability mailed Aug. 17, 2022 for U.S. Appl. No. 17/711,364, of Grassadonia, B., et al., filed Apr. 1, 2022. |
Non-Final Office Action mailed Aug. 18, 2022 for U.S. Appl. No. 17/359,237, of Seemann, D., et al., filed Jun. 25, 2021. |
Church, K.W., “A stochastic parts program and noun phrase parser for unrestricted text,” Proceedings of the second conference on Applied natural language processing, pp. 136-143 (Feb. 9, 1988). |
Cover, T. M., and Thomas, J. A., “Elements of Information Theory,” John Wiley and Sons, Inc. Publication, New York (1991), pp. 1-140, at http://www.cs-114.org/wp-content/uploads/2015/01/Elements_of_Information_Theory_Elements.pdf. [Part-1]. |
Cover, T. M., and Thomas, J. A., “Elements of Information Theory,” John Wiley and Sons, Inc. Publication, New York (1991), pp. 141-281, at http://www.cs-114.org/wp-content/uploads/2015/01/Elements_of_Information_Theory_Elements.pdf. [Part-2]. |
Cover, T. M., and Thomas, J. A., “Elements of Information Theory,” John Wiley and Sons, Inc. Publication, New York (1991), pp. 282-419, at http://www.cs-114.org/wp-content/uploads/2015/01/Elements_of_Information_Theory_Elements.pdf. [Part-3]. |
Cover, T. M., and Thomas, J. A., “Elements of Information Theory,” John Wiley and Sons, Inc. Publication, New York (1991), pp. 420-563, at http://www.cs-114.org/wp-content/uploads/2015/01/Elements_of_Information_Theory_Elements.pdf. [Part-4]. |
Derouault, A. M., and Merialdo, B., “Probabilistic grammar for phonetic to French transcription,” ICASSP '85, IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1577-1580 (1985), at https://ieeexplore.ieee.org/abstract/document/1168078/. |
European Patent Office; “EPO Summary of Arguments”, Minutes of the Oral Proceedings before the Examining Division; Sep. 22, 2015; Munich, DE. |
Magerman, D.M., “Natural Language Parsing as Statistical Pattern Recognition,” PHD Thesis, Stanford University, dated Feb. 1994, pp. 1-158. |
Magerman, D.M., “Parsing as Statistical Pattern Recognition,” IBM T. J. Watson Research Center, dated Jan. 16, 1995, pp. 1-15. |
Gao, J., et al. “A 2D Barcode-Based Mobile Payment System”, 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 11 pages (2009). |
Nseir, S., et al. “A Secure Mobile Payment System using QR Code”, 2013 5th International Conference on Computer Science and Information Technology (CSIT), 4 pages (2013). |
Isaac, J.T., et al. “Anonymous Payment in a Client Centric Model for Digital Ecosystems”, 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007), 6 pages. |
Yang, Ming-Hour “Security Enhanced EMV-Based Mobile Payment Protocol”, Hindawi Publishing Corporation, The Scientific World Journal, vol. 2014, Article ID 864571, 19 pages; http://dx.doi.org/10.1155/2014/864571 (2014). |
Non-Final Office Action mailed Jan. 5, 2015 for U.S. Appl. No. 14/284,227, of Wilson, J., et al., filed May 21, 2014. |
Final Office Action mailed Jun. 25, 2015 for U.S. Appl. No. 14/284,227, of Wilson, J., et al., filed May 21, 2014. |
Non-Final Office Action mailed Feb. 2, 2016, for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Non-Final Office Action mailed Mar. 24, 2016 for U.S. Appl. No. 14/284,227, of Wilson, J., et al., filed May 21, 2014. |
Non-Final Office Action mailed Mar. 25, 2016, for U.S. Appl. No. 14/276,659, of Wilson, J., et al., filed May 13, 2014. |
Non-Final Office Action mailed Aug. 11, 2016, for U.S. Appl. No. 14/296,385, of Dorsey, J., et al., filed Jun. 4, 2014. |
Final Office Action mailed Aug. 12, 2016, for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Non-Final Office Action mailed Aug. 30, 2016, for U.S. Appl. No. 14/444,741, of Seemann, D., et al., filed Jul. 28, 2014. |
Final Office Action mailed Sep. 29, 2016, for U.S. Appl. No. 14/276,659, of Wilson, J., et al., filed May 13, 2014. |
Final Office Action mailed Oct. 6, 2016 for U.S. Appl. No. 14/284,227, of Wilson, J., et al., filed May 21, 2014. |
Non-Final Office Action mailed Nov. 18, 2016, for U.S. Appl. No. 14/296,385, of Dorsey, J., et al., filed Jun. 4, 2014. |
Advisory Action mailed Dec. 15, 2016, for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Advisory Action mailed Jan. 12, 2017 for U.S. Appl. No. 14/284,227, of Wilson, J., et al., filed May 21, 2014. |
Non-Final Office Action mailed Jan. 20, 2017, for U.S. Appl. No. 14/276,659, of Wilson, J., et al., filed May 13, 2014. |
Notice of Allowance mailed May 30, 2017, for U.S. Appl. No. 14/276,659, of Wilson, J., et al., filed May 13, 2014. |
Notice of Allowance mailed Jun. 30, 2017 for U.S. Appl. No. 14/284,227, of Wilson, J., et al., filed May 21, 2014. |
Final Office Action mailed Jul. 10, 2017 for U.S. Appl. No. 14/296,385, of Dorsey, J., et al., filed Jun. 4, 2014. |
Non-Final Office Action mailed Aug. 24, 2017, for U.S. Appl. No. 14/481,760, of McCauley, N.P., et al., filed Sep. 9, 2014. |
Final Office Action mailed Oct. 6, 2017, for U.S. Appl. No. 14/444,741, of Seemann, D., et al., filed Jul. 28, 2014. |
Non-Final Office Action mailed Mar. 9, 2018, for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Non-Final Office Action mailed Apr. 26, 2018 for U.S. Appl. No. 14/296,385, of Dorsey, J., et al., filed Jun. 4, 2014. |
Final Office Action mailed May 15, 2018, for U.S. Appl. No. 14/481,760, of McCauley, N.P., et al., filed Sep. 9, 2014. |
Non-Final Office Action mailed Aug. 10, 2018, for U.S. Appl. No. 14/444,741, of Seemann, D., et al., filed Jul. 28, 2014. |
Advisory Action mailed Aug. 27, 2018 for U.S. Appl. No. 14/481,760, of McCauley, N.P., et al., filed Sep. 9, 2014. |
Final Office Action mailed Oct. 19, 2018, for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Final Office Action mailed Dec. 10, 2018, for U.S. Appl. No. 14/296,385, of Dorsey, J., et al., filed Jun. 4, 2014. |
Non-Final Office Action mailed May 2, 2019, for U.S. Appl. No. 14/481,760, of McCauley, N.P., et al., filed Sep. 9, 2014. |
Final Office Action mailed Jul. 8, 2019, for U.S. Appl. No. 14/444,741, of Seemann, D., et al., filed Jul. 28, 2014. |
Non-Final Office Action mailed Oct. 8, 2019, for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Notice of Allowance mailed Nov. 27, 2019, for U.S. Appl. No. 14/296,385, of Dorsey, J., et al., filed Jun. 4, 2014. |
Advisory Action mailed Dec. 4, 2019 for U.S. Appl. No. 14/444,741, of Seemann, D., et al., filed Jul. 28, 2014. |
Final Office Action mailed Feb. 4, 2020, for U.S. Appl. No. 14/481,760, of McCauley, N.P., et al., filed Sep. 9, 2014. |
Final Office Action mailed Apr. 6, 2020 , for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Advisory Action mailed Jun. 9, 2020 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Notice of Allowance mailed Nov. 25, 2020, for U.S. Appl. No. 14/481,760, of McCauley, N.P., et al., filed Sep. 9, 2014. |
International Search Report and Written Opinion for International Application No. PCT/US2015/058168, mailed Apr. 12, 2016. |
Non-Final Office Action mailed May 12, 2022 for U.S. Appl. No. 17/138,702, of Grassadonia, B., et al., filed Dec. 30, 2020. |
Notice of Allowance mailed May 12, 2022, for U.S. Appl. No. 17/216,385, of McCauley, N., et al., filed Mar. 29, 2021. |
Notice of Allowance mailed Jul. 7, 2022 for U.S. Appl. No. 17/138,702, of Grassadonia, B., et al., filed Dec. 30, 2020. |
Non-Final Office Action mailed Jul. 14, 2022 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Corrected Notice of Allowability mailed Jul. 11, 2022, for U.S. Appl. No. 17/216,385, of McCauley, N., et al., filed Mar. 29, 2021. |
Non-Final Office Action mailed Sep. 28, 2022 for U.S. Appl. No. 29/831,541, of Grassadonia, B., et al., filed Mar. 21, 2022. |
Money Transfer to East Africa—Omondi, https://innov8tiv.com/money-transfer-east-africa-just-got-lot-easier-thanks-wave/ (Year:2015). |
American Express Launches Serve, a Direct Mobile Payment App—Sage, https://www.intomobile.com/2011/03/28/american express-launches-serve-a-direct-mobile-to-mobile-payment-app/ (Year: 2011). |
Blank Check with Open Space—iqoncept, https://depositphotos.com/5777799/stock-photo-blank-check-with-open-space.html (Year: 2011). |
Dads dig this Venmo app—Venmo, https://coolmomtech.com/2014/05/venmo-app-ios-android/ (Year: 2014). |
Square Cash for iOS Lets You Pay Friends Over Bluetooth—TNW, https://thenextweb.com/news/sq uare-cash-ios-how-lets-select-pay-nearby-friends-usi ng-bluetooth-low-energy (Year: 2014). |
Notice of Allowability mailed Aug. 23, 2022 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
Corrected Notice of Allowability mailed Sep. 16, 2022 for U.S. Appl. No. 14/754,223, of Grassadonia, B., et al., filed Jun. 29, 2015. |
“Adyen Announces European Availability of Chip & PIN Mobile Point-of-Sale Solution,” Business Wire, dated Dec. 3, 2012, retrieved from: https://www.businesswire.com/news/home/20121203005476/en/Adyen-Announces-European-Availability-Chip-PIN-Mobile, pp. 1-4. |
“Divvy makes splitting the check as easy as snap, drag, and pay”, Divvy App Website, published on May 11, 2013, retrieved from: http://web.archive.org/web/20130511015727/http://divvythatup.com/, on Sep. 6, 2017, pp. 1-2. |
“MeDeploy Launches a New Approach to Digital Pay-Media Distribution at DEMOfall 08”, Science Letter, published on Sep. 23, 2008, pp. 1-2. |
“Tab: A Seriously Useful Bill-Splitting App”, The Huffington Post, published on Aug. 27, 2013, retrieved from: http://www.huffingtonpost.com/2013/08/27 /bill-splitting-app-tab_n_3818225.html>, on Sep. 6, 2017, pp. 1-2. |
“White Paper Near Field Communication”, NOKIA, 2007, pp. 1-4. |
Gneezy et al. “The inefficiency of splitting the bill”, The Economic Journal, vol. 114, Apr. 2004, pp. 265-280. |
Nagasubramanian et al., “Online Payment- Innovation in Split Tender Payment”, International Journal of Computer Applications, vol. 55, No. 10, Oct. 2012, pp. 35-41. |
“Manage housemate expenses with Conmigo for Android | How To—CNET”, May 21, 2012, pp. 1-12. |
Ho A., “No more deadbeat friends: PayDivvy launches social bill service | VentureBeat”, Year 2011, 5 pages. |
Number | Date | Country | |
---|---|---|---|
20220222651 A1 | Jul 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16828817 | Mar 2020 | US |
Child | 17710555 | US | |
Parent | 14296385 | Jun 2014 | US |
Child | 16828817 | US |