This application is related to commonly owned patent application SYSTEMS AND METHODS FOR E-COUPON TIES AMONG PLURAL PARTIES, U.S. patent application Ser. No. 12/960,055, filed on Dec. 3, 2010; Systems and Methods For Self-Generation Of E-coupons, U.S. patent application Ser. No. 12/960,072, filed on Dec. 3, 2010; SYSTEMS AND METHODS FOR MANAGING E-COUPONS USING A LIFE PORTAL, U.S. patent application Ser. No. 13/464,680, filed on May 4, 2012; and SYSTEMS AND METHODS FOR COORDINATING LOYALTY AWARDS WITH SOCIAL NETWORKING, U.S. patent application Ser. No. 13/464,655, filed on May 4, 2012; all of the above-referenced applications are hereby incorporated by reference herein.
This disclosure relates to mechanisms for user identification and more specifically to systems and methods for controlling disparate commercial transactions using a single identification mechanism.
It is certainly commonplace for a purchaser of goods or services to use a plastic credit/debit card (hereinafter called financial card) as a mechanism for payment for the transaction. The financial card acts as an identification mechanism to a clearing house (or other back-office processing system) to facilitate payment from an account identified by the financial card to an account identified by the merchant who is processing information from the purchaser's credit card. Typically, the financial card information is communicated to the clearing house by swiping the card through a reader that senses information contained on a magnetic stripe on the card. This sensed magnetic stripe information is then transmitted to the back-office for processing. In some situations, RFID and mobile devices/apps can be used.
It is also commonplace to identify users for purposes other than financial transactions, such as for loyalty rewards, by also using a plastic card. Typically, but not always, these loyalty cards contain information in bar code format and thus the bar code information is sent to a back-office processing center to identify the participant.
In some situations, the financial card is used to identify a user for purposes other than payment of a commercial transaction. One example of such use occurs when a person swipes a financial card at an airline kiosk in order to obtain a boarding pass. In such a situation, the information encoded on the financial card's magnetic stripe is used by the airline's back-office to identify the user.
However, while the financial card has the capability of performing financial as well and non-financial transactions, these disparate operations are handled separately. Thus a person wishing to receive loyalty card benefits must produce a loyalty card (or otherwise inform the merchant of the consumer's ID) and have the information transmitted from the loyalty card to a loyalty processing center and then that same person must subsequently swipe his/her financial card to pay for the transaction. Note that in these transactions, any discount or price reduction is performed at the merchant's location before processing the payment information, thereby requiring at least two separate transaction steps.
A single swipe system is constructed that allows a person to use a single financial card to receive loyalty benefits (or conduct other non-payment operations) concurrently with a payment transaction. In one embodiment, the user simply swipes his/her financial card and the processing system then concurrently processes a non-payment transaction along with a payment transaction. In some situations, the non-payment transaction can be blended into the payment transaction to allow for discounts and other awards from one or more databases other than the payment processing database. In one embodiment, a single swipe of a financial card connects the consumer with one or more loyalty systems and the consumer can select from the ones desired during the course of payment processing. Discounts and other advantages can be applied to the payment transaction, all based upon a single entry of the consumer's ID.
The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:
Before beginning a discussion of the use of the invention in a particular set of embodiments, it is important to note that while a plastic financial card, such as card 20,
Turning now to
In operation, in one embodiment, a consumer, such as consumer 11-1, would approach clerk 12 with merchandise 15. Consumer 11-1 would present financial card 20 which would be entered into the system, perhaps using swipe reader 14, and the consumer identification information from the financial card would be transmitted, by land line or wirelessly, via connection 102 and through network 101 to payment processing (main) system 17 via connection 104. This operation is well-known and as will be discussed, if the inventive concept were not being employed, then main system 17 would process the ID data and complete (or reject) the transaction. If the transaction is satisfactorily completed, then at some point in time the merchant would be credited with the amount of the purchase minus (in some cases) a processing fee. The consumer, on the other hand, would have debited from his/her account (or in the case of a credit transaction, sent a credit statement for subsequent payment) the amount of the transaction. This operation may entail several back-office steps and data transfer points, but it is all well-known.
One point of departure from prior system operation is that, as will be discussed, the ID used by the main processing system is sued to access one or more separate data bases to obtain information, including loyalty rewards, available to the consumer. As will be discussed, the consumer may be given a choice of which rewards program, or programs, he/she desires to use. Based on the consumer's selection when given a choice, or based on other factors, any loyalty rewards, discounts, etc can be automatically deducted from the pending transaction. If desired, the results of any such discounts can be shown on the consumer's receipt.
In one embodiment, such secondary processing utilizes conversion processing 18-3 to convert consumer financial ID information into one or more loyalty IDs for processing by each separate non-financial system. If desired, conversion processing could be stand-alone or co-located with either the main the processing system or any one of the secondary processing systems. Information from the secondary systems can be fed back to the consumer via connection 103 or via any other connection, for example by a text message directly to the consumer. Any discounts can then be applied to the actual price charged to the consumer for the fuel.
In some situations, at least one of the secondary processing systems could be something other than a loyalty system. For example, using the concepts discussed herein, a secondary system could be a driver license system, or a driver insurance data base, or a ‘wanted driver” database. In such a situation, perhaps a match with the secondary system, based on the usage of a financial card, could result in the refusal to pump fuel and/or a notification to a public safely official. In some situations the secondary processing could be for food stamps or other low income subsidy databases. Based on the above, the secondary transaction may include loyalty programs, government operated data bases, biometric databases, card databases, social network databases, and webservice connections.
Magnetic stripe 21 is located 0.223 inches (5.56 mm) from top edge 23 of the card, and is 0.375 inches (9.52 mm) wide. The magnetic stripe typically contains three tracks, each 0.110 inches (2.79 mm) wide. Tracks 21-1 and 21-3 are typically recorded at 210 bits per inch (8.27 bits per mm), while track 21-2 typically has a recording density of 75 bits per inch (2.95 bits per mm). Each track can either contain 7-bit alphanumeric characters, or 5-bit numeric characters. Track 21-1 standards were created by the airlines industry (IATA). Track 21-2 standards were created by the banking industry (ABA) and track 21-3 standards were created by the Thrift-Savings industry.
Track 21-3 is typically unused by the major worldwide networks, such as VISA, and could be used for secondary processing control if desired. The minimum cardholder account information needed to complete a transaction is present on both tracks 21-1 and 21-2. Track 21-1 has a higher bit density (210 bits per inch vs. 75), and is the only track that contains alphabetic text, and hence is the track that contains the cardholder's name. Accordingly, at least track 1 information should be passed to conversion processing 18-3 to convert the user's financial ID information useful for secondary processing.
Track 21-1 is written with code known as DEC SIXBIT plus odd parity. The information on track 21-1 on financial cards is contained in several formats: A, which is reserved for proprietary use of the card issuer, B, which is described below, C-M, which are reserved for use by ANSI Subcommittee X3B10 and N-Z, which are available for use by individual card issuers:
Track 21-1, Format B:
Start sentinel—one character (generally ‘%’)
Format code=“B”—one character (alpha only)
Primary Account Number (PAN)—up to 19 characters. Usually, but not always, matches the credit card number printed on the front of the card.
Field Separator—one character (generally ‘^’)
Name—two to 26 characters
Field Separator—one character (generally ‘^’)
Expiration date—four characters in the form YYMM
Service code—three characters
Discretionary data—may include Pin Verification Key Indicator (PVKI, 1 character), PIN Verification Value (PVV, 4 characters), Card Verification Value or Card Verification Code (CVV or CVK, 3 characters)
End sentinel—one character (generally ‘?’)
Longitudinal redundancy check (LRC)—it is one character and a validity character calculated from other data on the track. Most reader devices do not return this value when the card is swiped to the presentation layer, and use it only to verify the input internally to the reader.
Track 21-2: This format was developed by the banking industry (ABA) and is written with a 5-bit scheme (4 data bits+1 parity), which allows for sixteen possible characters, which are the numbers 0-9, plus the six characters : ; < = > ?. The sixteen codes map to the ASCII range 0x30 through 0x3f, which defines ten digit characters, plus those six symbols. The data format is as follows:
Start sentinel—one character (generally ‘;’)
Primary account number (PAN)—up to 19 characters. Usually, but not always, matches the credit card number printed on the front of the card.
Separator—one char (generally ‘=’)
Expiration date—four characters in the form YYMM
Service code—three digits. The first digit specifies the interchange rules, the second specifies authorization processing and the third specifies the range of services
Discretionary data—as in track one
End sentinel—one character (generally ‘?’)
Longitudinal redundancy check (LRC)—it is one character and a validity character calculated from other data on the track. Most reader devices do not return this value when the card is swiped to the presentation layer, and use it only to verify the input internally to the reader.
Since at least one of the tracks of the card contains the user's name and in most situation his/her address, that information can be translated to a loyalty card data base. Also, the consumer can be asked to link his/her loyalty card to his/her financial cards and then conversion processing becomes straightforward. In other situations, track 21-3 can be used to add on loyalty or other secondary processing ID information by the card issuer. For example, states could require financial cards to carry driver license information and/or social security information thus facilitating cross-checks all during a financial transaction.
Continuing in
Process 303 checks the data to determine if secondary processing is available for the received data. This checking can be, for example, by conversion processing 18-3,
If process 303 determines that secondary processing is available, then process 305 delays main process until a determination can be made by process 306 as to whether the secondary processing should occur prior to the main processing or whether main processing should proceed independent from any secondary processing.
If secondary processing is to occur first, then process 307 checks the appropriate secondary sources with the assistance of conversion processing 18-3 and rules engine 19 (
For example, the consumer might have loyalty programs A, B and C. The rules engine could be set up in advance by, perhaps, using a web interface with the consumer, so that the consumer can be given a choice of using program A, B and/or C. Perhaps program C is one that collects points for some purpose and program A gives discounts. The consumer can then select both A and C under control of process 308. In the case of program A the rules engine, under control of process 309, would calculate any deduction from the price and send a message to main processor 17 via processes 310 and 311 to make the deduction from the financial transaction. If desired, this deduction would show on the ultimate receipt received from the vendor. Also, when the customer receives his/her monthly statement the deduction, as well as any other secondary processing results, could also be displayed.
In the case of program C, at the completion of the transaction points would be calculated and placed in the consumer's account. This differs from current situations in which credit card usage generates points (or other prizes) because in current systems the point accumulation is part of the same main system whereas in the system being described herein the points are being accumulated in a system not associated directly with the main financial processing system.
In some situations it might be appropriate to permanently prevent the transaction. In such a situation, process 313 controls. Such a situation could work, for example, if a government database determined that a problem exits with a particular consumer. In fuel purchase situations refusing to proceed with the financial transaction prevents fuel from being pumped.
Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
Number | Name | Date | Kind |
---|---|---|---|
4723212 | Mindrum et al. | Feb 1988 | A |
4949256 | Humble | Aug 1990 | A |
5185695 | Pruchnicki | Feb 1993 | A |
5420606 | Begum et al. | May 1995 | A |
5483049 | Schulze, Jr. | Jan 1996 | A |
5502636 | Clarke | Mar 1996 | A |
5710886 | Christensen et al. | Jan 1998 | A |
5822735 | De Lapa et al. | Oct 1998 | A |
5905246 | Fajkowski | May 1999 | A |
6076068 | DeLapa et al. | Jun 2000 | A |
6298329 | Walker et al. | Oct 2001 | B1 |
6332128 | Nicholson | Dec 2001 | B1 |
6450407 | Freeman et al. | Sep 2002 | B1 |
7054830 | Eggleston et al. | May 2006 | B1 |
7268668 | Beenau et al. | Sep 2007 | B2 |
7392224 | Bauer et al. | Jun 2008 | B1 |
7742942 | Nicholson | Jun 2010 | B2 |
8489513 | Bishop et al. | Jul 2013 | B2 |
8676642 | Sheley | Mar 2014 | B1 |
20040249710 | Smith et al. | Dec 2004 | A1 |
20050021401 | Postrel | Jan 2005 | A1 |
20070174126 | McCall et al. | Jul 2007 | A1 |
20080071614 | Mebruer | Mar 2008 | A1 |
20080126208 | Nicholson et al. | May 2008 | A1 |
20100017284 | Ross et al. | Jan 2010 | A1 |
20100094690 | Beal | Apr 2010 | A1 |
20100114683 | Wessels et al. | May 2010 | A1 |
20100153205 | Retter et al. | Jun 2010 | A1 |
20110071890 | Hart et al. | Mar 2011 | A1 |
20120029992 | De Facendis | Feb 2012 | A1 |
20120197705 | Mesaros | Aug 2012 | A1 |
20130046605 | Baron et al. | Feb 2013 | A1 |
20130091001 | Jia et al. | Apr 2013 | A1 |
20130246138 | Johnson et al. | Sep 2013 | A1 |
20130317894 | Zhu et al. | Nov 2013 | A1 |
Entry |
---|
U.S. Appl. No. 10/764,930, filed Aug. 12, 2004, Nicholson. |
U.S. Appl. No. 12/832,788, Perry. |