The present disclosure relates to the secondary gift card marketplace and more specifically to reselling gift cards on the secondary market via auctions.
Gift cards and gift codes are widely used as gifts for birthdays, Christmas, and other holidays. Gift cards and gift codes are closed loop, meaning that the value represented by a gift card or gift code is a valid form of payment at a closed set of retailers. For example, an Outback Steakhouse® gift card/code is only redeemable at Outback Steakhouse® and not at Planet Hollywood® or Target®. Some closed loop cards and codes are valid at a family of closely related or commonly owned merchants. For example, a Darden Restaurants gift card/code is valid at Red Lobster® and Olive Garden®, or a local mall gift card/code is valid at tenant merchants in the local mall. Open loop gift cards (and gift codes), in contrast, are a valid form of payment at virtually every retailer nationwide, such as Visa® or Mastercard® debit cards.
Gift cards/codes are a popular alternative to giving cash or a merchandise item that the recipient may or may not like. However, the recipient may not be able to redeem the gift card/code due to geographic limitations, personal disinterest in the merchant who issued the gift card/code, or other reasons. Additionally, some merchants issue gift cards/codes with significant restrictions, complex fees, and/or an expiration date. According to one estimate, consumers purchase about $80 billion worth of gift cards annually in the U.S. and roughly 10%, or $8 billion, of that amount goes unredeemed. Consumers waste these unredeemed funds and do not benefit from the full value of the gift card/code. Further, if these funds are not spent, they can escheat to the state. Merchants cannot track post-issuance gift card transactions that do not involve the issuing merchant.
Users often sell gift cards on the secondary market, whether directly or through a secondary market broker. Gift cards sold on the secondary market typically sell for a price lower than their face value. For example, a gift card with a value of $100 may sell on the secondary market for $90. On the secondary market, users or brokers often do not know how to price gift cards. Consequently, some gift cards remain on the secondary market for far too long, while others sell quickly, potentially losing profit opportunities.
In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure.
Some consumers resell or exchange their unwanted or unusable gift cards/codes in what is termed a secondary marketplace. The secondary marketplace is a collection of transactions involving gift cards and/or gift codes which do not involve an original gift card or code issuer. For example, Sears issues a $100 gift card to a Mary. Mary gives the gift card to Larry. Larry uses $50 of the gift card to purchase merchandise from Sears. That use of the gift card is not part of the secondary marketplace because it involves the gift card issuer, Sears. Other transactions that Larry conducts with the remaining balance are part of the secondary market. For example, if Larry sells the $50 balance remaining on the gift card for $35 in cash, that transaction is part of the secondary market. If Larry divides the $50 balance remaining on the gift card into two $25 gift cards, that transaction is part of the secondary market because it does not directly involve the gift card/code issuer.
The merchants who originally issued the gift cards or codes are unable to track this secondary gift card/code market in any meaningful way, potentially leading to lost revenues and marketing opportunities.
The disclosure first discusses an exemplary system and various components thereof that address these issues. The disclosure then turns to a more specific example configuration of how a secondary market for gift codes and gift cards can operate. The disclosure demonstrates an example merchant interface for tracking the secondary market. Finally, the disclosure turns to the exemplary method embodiment.
With reference to
The system bus 110 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 140 or the like, may provide the basic routine that helps to transfer information between elements within the computing device 100, such as during start-up. The computing device 100 further includes storage devices 160 such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive or the like. The storage device 160 can include software modules 162, 164, 166 for controlling the processor 120. Other hardware or software modules are contemplated. The storage device 160 is connected to the system bus 110 by a drive interface. The drives and the associated computer readable storage media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computing device 100. In one aspect, a hardware module that performs a particular function includes the software component stored in a tangible and/or intangible computer-readable medium in connection with the necessary hardware components, such as the processor 120, bus 110, display 170, and so forth, to carry out the function. The basic components are known to those of skill in the art and appropriate variations are contemplated depending on the type of device, such as whether the device 100 is a small, handheld computing device, a desktop computer, or a computer server.
Although the exemplary embodiment described herein employs the hard disk 160, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks, cartridges, random access memories (RAMs) 150, read only memory (ROM) 140, a cable or wireless signal containing a bit stream and the like, may also be used in the exemplary operating environment. Tangible computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
To enable user interaction with the computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. The input device 190 may be used by the presenter to indicate the beginning of a speech search query. An output device 170 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with the computing device 100. The communications interface 180 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
For clarity of explanation, the illustrative system embodiment is presented as including individual functional blocks including functional blocks labeled as a “processor” or processor 120. The functions these blocks represent may be provided through the use of either shared or dedicated hardware, including, but not limited to, hardware capable of executing software and hardware, such as a processor 120, that is purpose-built to operate as an equivalent to software executing on a general purpose processor. For example the functions of one or more processors presented in
The logical operations of the various embodiments are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a general use computer, (2) a sequence of computer implemented steps, operations, or procedures running on a specific-use programmable circuit; and/or (3) interconnected machine modules or program engines within the programmable circuits. The system 100 shown in
Having discussed some basic system components, the disclosure returns to a discussion of gift cards and codes and tracking the secondary gift card market. Gift cards/codes are divided into open loop and closed loop cards/codes. Typically issuing banks or credit card companies issue open loop cards/codes (example: Visa, MasterCard, Amex or Discover) which can be redeemed by virtually any business entity. These differ from closed loop cards/codes which are typically issued by a specific store or restaurant and can be only redeemed by the issuing provider (example: Sears, Red Lobster, Target). Gift cards/codes are one common form of closed loop cards/codes. The physical card/code and the card/code number associated with the card/code are interchangeable concepts. Gift cards/codes can store a reference to the amount of money within a physical card/code or can store a reference to an external database of accounts which references an amount of money. One or more external database can maintain funds from which each of a set of accounts linked to a card/code can draw. Throughout this disclosure, closed loop cards and other gift cards are interchangeable with a closed loop code or other gift code which serves the same purpose as a physical closed loop card.
The disclosure now turns to
Each of these devices can interact with the secure gateway 202 through different protocols, such as a direct network connection, an HTTP-based portal, SMS messages, telephone, interactive voice response systems, point-of-sale (POS) terminals, etc. In the case of merchants, each point of sale of the merchant 210 can connect to a centralized merchant server, not shown, which relays requests to the secure gateway 202 on behalf of all the merchant 210 point of sale devices. Other configurations also exist. In one aspect, this process is called “Cash4Card” (name used for description purposes only). Merchants 210, kiosks 204, other devices and/or locations, including online storefronts, which provide an interface to the secure gateway 202 can provide an easily recognizable visual or other indication readily indicating to potential customers that they accept gift cards/codes under the Cash4Card program. The indication can be a window sticker, an online image, or other sign displayed in a manner similar to the well-known overlapping circles for MasterCard® or the blue and orange bars over and under the word VISA®.
The secure gateway 202 interacts with multiple closed loop processors 214, such as FirstData and Chase Paymentech, over a network 212A such as the Internet. These closed loop processors are entities that process closed loop cards, and are different from a computer processor such as an AMD Phenom II or Intel Core 2 Duo. The secure gateway 202 can perform any action on the closed loop card/code through the various closed loop card/code processors 214 as if the secure gateway 202 was a closed loop merchant. The secure gateway 202 analyzes the submitted information to determine which closed loop processor handles that type of closed loop card/code. For example, a particular series of numbers or letters can indicate that one closed loop card/code is honored by Paymentech, and another distinct set of numbers or letters indicates that another closed loop card/code is honored by FirstData.
The logic and analysis in the secure gateway 202 can change from time to time as new types of cards/codes are issued by existing closed loop processors 214 or as the secure gateway 202 adds interfaces for new closed loop processors. The secure gateway 202 can include a common application programmer interface (API) which defines actions which may be performed through the closed loop processors 214. The API translates API calls to the corresponding specific sets of proprietary interactions with the various closed loop processors 214, which may be very different between closed loop processors 214.
The secure gateway 202 determines the balance of the closed loop card/code from the closed loop processor 214 and offers to purchase the closed loop card/code from the requestor, typically at a price lower than the face value of the card/code (though not always and can be at or above the face value). If the requestor provides an indication of agreement to sell the closed loop card/code, then the secure gateway deactivates the closed loop card/code associated with the submitted information, issues a new closed loop card/code in that amount (which may be a physical closed loop card/code or a virtual closed loop card/code), and pays the purchase price to the requestor through a payment entity 216.
The payment entity 216 can be a merchant that pays the requestor while another entity settles with the merchant. The gateway 202 can also provide instructions to other entities to perform the deactivation, issuance, payment, and other steps. The payment entity 216 can be part of the secure gateway 202, part of a merchant point of sale equipment 210, or a separate entity altogether. The secure gateway 202 can provide additional instructions regarding how to transfer payment 218 to the requestor. Some examples of how to transfer payment include mailing a physical open loop card/code to the requestor, emailing to the requestor the necessary information to use a non-physical open loop card/code (such as an account number and PIN), notifying a local financial service to prepare an amount of money for pickup (such as MoneyGram or Western Union), transferring funds to an electronic account (such as PayPal), transferring money to a requestor's existing open loop card/code (such as an OmniCard or other debit card/code), adding funds to an existing credit card or debit card, any other form of electronic funds transfer (EFT), or granting store credit or any other form of currency usable at a store to the requestor. The payment entity 216 can also provide payment to the requestor using other suitable approaches. Transactions processed through the secure gateway 202 constitute part of the secondary market if they do not directly involve the gift card issuer.
The transaction tracker/processor 220 can receive and/or retrieve information regarding completed, in-process, and/or attempted transactions from the secure gateway 202. The transactions with the secure gateway 202 represent the secondary marketplace for gift cards and gift codes. In the secondary marketplace, non-original issuers of gift cards and codes sell and/or trade the gift cards for cash or for other goods or services. The transaction tracker/processor 220 can be incorporated as part of the secure gateway 202 or can be a separate entity communicating through a network 222 as shown in
The transaction tracker 220 processes the secondary marketplace transaction information and stores all or part of the processed information in a transaction data repository 224. The transaction tracker 220 can aggregate all or part of the received data, and can categorize data by date, geographical region, type of gift card or code, gift card face value, gift card redemption value, customer habits, whether or not a portion of the gift card had been used, whether a customer is participating in the secondary gift card market for the first time, what the gift card was sold for (i.e. was the gift card exchanged at a merchant, for another gift card, split into smaller denominations, etc.), and so forth. The transaction tracker 220 can provide closed loop processors 214, merchants 210, and/or other interested or involved entities an interface to view, sort, analyze, and otherwise manipulate the stored transaction data 224. In one aspect, a merchant 210 can view detailed information regarding individual transactions associated with gift cards/codes issued by that merchant 210, but only broad statistical data regarding gift cards/codes issued by other merchants.
In one aspect, the transaction tracker 220 provides a web-based user interface. The interface can allow closed loop merchants to compare aggregated statistics to their own statistics. For example, a nationwide office supply retailer can compare the secondary market statistics for their own gift cards to the secondary market of other nationwide office supply retailers to determine trends. The retailer can then exploit these trends with marketing campaigns, in-store promotions, online ads, or other methods.
The transaction tracker 220 can also collect personally identifiable information, such as a phone number, email address, or credit card number associated with each transaction. However, for the sake of privacy, the transaction tracker 220 can strip this information out when providing reports through the interface to the various requesting entities. In one aspect, the transaction tracker 220 offers a user a more favorable price for the gift card on the secondary market in exchange for more detailed personal and/or demographic information. For example, the secure gateway 202 offers a user $34 in cash for a $50 gift card. However, if the user agrees to spend a few minutes to fill out a survey and divulge some more detailed personal information, the transaction tracker 220 can authorize the secure gateway 202 to offer the user $38 in cash instead of $34.
The transaction tracker 220 can also track redemption specific data such as at which specific stores or websites the cards or codes are redeemed. In the case of online redemption, the transaction tracker 220 can track referral websites (i.e. which site referred the customer to the online redemption page). The transaction tracker 220 can disclose all, part, or none of this information to merchants. In one brick and mortar merchant example, if a large number of customers redeem their closed-loop cards and codes at Wal-Mart and Target, the transaction tracker 220 can provide this information to either Wal-Mart or Target so that they can approach issuers of the redeemed cards regarding potential cooperative marketing opportunities.
The transaction tracker 220 can track data indicating which individual store sold each redeemed card or code. Such data allows merchants to identify the origin of redeemed cards. For instance, Best Buy can log into the merchant interface and see data indicating from which specific stores and/or states the secondary market gift card originated. If the data show a large influx of cards redeemed in the secondary marketplace which were issued at Store #1395 in Quakertown, Pa., maybe that is an indication that customers don't like shopping at that store. Best Buy can drill down in to the other data related to these transactions which may shed additional light on the matter.
Additionally, as with virtually any marketplace, one concern is how to detect and prevent fraud in the secondary gift card and gift code marketplace. In one aspect, the transaction tracker 220 tracks and provides information to merchants about fraud related or potentially fraud related trends or individual transactions. For example, if the secure gateway 202 of
Next, the secure gateway transfers the new closed loop card to a reseller 314. The reseller 314 can offer to sell the new closed loop card for less than its face value. For example, if the user 302 submits a $200 Sears gift card, the secure gateway 202 can examine sales or customer demand data for Sears gift cards in that denomination and offer to purchase the $200 Sears gift card for $135. If the user accepts the offer, the secure gateway 202 pays the user $135. The secure gateway 202 deactivates the $200 Sears gift card and reissues a new $200 Sears gift card, to be stored in the inventory database 322, which can be represented as numbers stored by the reseller 314. The reseller 314 then offers the $200 Sears gift card for sale to the general public 324 at a discount rate of $170, a 15% discount off the face value. When a customer from the general public 324 purchases the $200 Sears gift card, the reseller 314 can convert the virtual gift card to a printed gift card on demand and mail it to the customer. In this case, the reseller profits the difference between the purchase price $135 and the discount rate $170, or $35. The reseller 314 can operate as a brick and mortar retail store, an online storefront, an online auction, or any other suitable sales outlet. In another aspect, the reseller 314 purchases a gift card from a user at or above its face value, i.e. purchases a $100 Sears gift card for $100 or for $110. In this case, the reseller 314 can make a profit by providing the payment for the gift card on a general-purpose reloadable card run by the reseller. Then the reseller 314 can make profit by interest, float, interchange, and/or monthly minimum fees.
In one embodiment, the reseller 314 uses an auction interface 320 to sell gift cards. The reseller 314 can offer gift cards through the auction interface 320 on a consignment model, so that the reseller 314 offers for auction cards that are not yet owned by the reseller 314, but which users have offered for sale. The auction interface 320 can offer the Sears gift card from the example above at an initial price of $200, or at a price slightly below the face value such as $195. Then, if no one has purchased the gift card at that price after a specified duration, the auction interface 320 reduces the price of the gift card by some increment. If the gift card started at $200, and the increment is $10, then the auction interface 320 changes the price to $190. If a user purchases the gift card via the auction interface, the reseller 314 can complete the transaction, receive payment, and transfer the gift card or its equivalent to the purchaser. If no one buys the gift card, the auction interface 320 can continue, at regular intervals, to reduce the price by the increment, until the price goes below a minimum threshold, or a floor price. Then, instead of reducing the price further, the reseller 314 purchases the gift card for the floor price, and stores the gift card in the inventory database 322. Then, the reseller 314 can offer the gift card for sale at some other price, most likely at a price somewhere between the floor price for which the gift card was purchased and the face value.
Then, the Dutch auction portal offers the gift card for sale. Initially, the Dutch auction portal can list the gift card in the packet at face value (or some other value below face value), and the bid price drops by some percentage or some fixed amount at time intervals 428. For example, the gift card can be listed in the Dutch auction at the full face value, and reduced by 1% each hour, or can be listed at $1 less than the face value and decremented by $0.50 each day. Then, if the system receives a bid 430 from a buyer for the gift card at the auction price, the system can again verify the balance 438 of the gift card. If the verification fails, the system can stop the auction 440 and send notifications to both the buyer and the seller. However, if the balance is verified 438, then the system determines whether this auction is selling a card or a code 446. If the discounted gift is a gift card, the system can initiate a peer to peer 448 contact so the user can make arrangements for delivering the gift card to the buyer. In one embodiment, the reseller can receive the gift card from the seller, and hold it or have an escrow or consignment agent hold the gift card until the buyer purchases the gift card.
If the discount gift is a gift code, rather than a physical gift card for example, the system can contact both the buyer and the seller 456 to notify them of the sale. Then, pending a successful payment from the buyer 458, the system can send a delivery notification email 460 to the buyer that either contains the gift code or provides instructions for obtaining the gift code. When the system confirms delivery to the buyer 462 and provides trackable delivery data to the buyer, the system considers the transaction complete, and registers a successful settlement 464 of the gift card auction to stop 466 the auction.
If the Dutch auction proceeds without bids, the system repeatedly decrements or reduces the gift card price until the price meets or is below a floor or acquisition price 432. When the price meets or is below the acquisition price, then the system can take the gift card out of the Dutch auction, and verify the balance 434. If the system fails to verify the balance, such as the balance has changed or decreased, then the system can send a message 436 to the seller of the gift card. If the system successfully verifies the balance, the system can confirm whether the gift card is a physical card or a gift code 442. If it is a gift card, the system can initiate a card delivery and receipt process 444 for the seller to send the gift card to the reseller. If it is a gift code, then the system can process a successful settlement 450 by transferring the code into available inventory 452 and offering the gift code for purchase at a “Buy It Now” price 454. In one embodiment, the seller sends the gift card or gift code to the reseller in advance of the Dutch auction, and the reseller simply retains the card or code in escrow until a successful sale via the Dutch auction or purchase at the acquisition price, at which time the reseller or the buyer pays the seller the corresponding purchase price.
At any time throughout the auction, a buyer can accept the bid price and purchase the lot. Then the system can deliver the DGC in the lot to the buyer, or winning bidder. The system can deliver electronic gift codes by providing access to a code, image, or printable code via a secure computer, mobile device, kiosk, or other interface. The system can arrange for physical delivery, either from the seller of the DGC or from the reseller, depending on where the DGC is located and which party has possession of the DGC. In one embodiment, the system deactivates the seller's DGC, and issues a new DGC in the same denomination for shipping to the buyer.
The system can vary the duration of the Dutch auction based on various factors, such as the number of bid price drops determined by the difference between the verified face value and the predetermined bid price, or based on a fixed time interval for each drop in bid price. In one embodiment, the system can suggest parameters to maximize the sale price. For example, the system can suggest a starting and closing time so that a particular price point coincides with a high point in demand 512 to maximize the chances of a sale at a higher price point. The system can adjust the maximum auction duration by modifying the interval time or the decrement amount. The preview period for an auction lot can be optional. The system can dynamically determine the acquisition price 502 for an individual DGC based on internal and external market conditions, such as competitor pricing, current inventory levels, the face value of the gift card, specific merchant characteristics, and so forth. If the price reaches the acquisition price 502 without a bid, the system can purchase the lot and take the DGCs in the lot into inventory for resale at the disposition price 504.
Having disclosed system components and concepts, the disclosure now turns to the exemplary method embodiment for auctioning gift cards on the secondary market, as shown in
The system can receive a prepaid debit account for resale from an owner of the prepaid debit account (602). The prepaid debit account can be associated with a physical or virtual gift card, a gift certificate, an electronic gift card, or a gift code, for example. The prepaid debit account can be closed loop or open loop, or can be open loop with one or more restrictions placed thereon. The system can determine a face value for the prepaid debit account (604). For example, the system can query an entity holding or administering the prepaid debit account to electronically verify the face value or the current balance of the prepaid debit account. Based on the face value, the system can establish a floor price (606). The system can further establish other auction parameters for the sale of the prepaid debit account. Once at least a minimum set of auction parameters are established, the system can present a preview of the action to the owner for approval prior to activating the auction.
The system can offer the prepaid debit account for sale via an auction, wherein the prepaid debit account is offered for sale at an initial price above the floor price and up to and including the face value, and wherein the initial price is decremented at time intervals to yield a decremented price (608). The system can set an end time for the auction, based on a desired price target, input from the owner, the face value of the prepaid debit account, a decrement value, a size of the time intervals, an urgency score, a target sale price, or historical bidding data. The system can establish the size of the time intervals based on a difference between the face value and the floor price. The auction can include multiple prepaid debit accounts as a single auction lot. The system can “lock” the prepaid debit account during the auction so the prepaid debit account cannot be used for transactions while locked. This can reduce the chance of a user listing a prepaid debit account for auction, but using the prepaid debit account to make purchases in the interim either inadvertently, or in hopes that the reseller or the eventual purchaser will not find out, or will not be able to track down the seller.
The system can end the auction when a purchaser purchases the prepaid debit account at the decremented price above the floor price. However, if no purchaser purchases the prepaid debit account before the decremented price is below a threshold based on the floor price, the system can purchase the prepaid debit account from the owner for the floor price (610). The system can store the prepaid debit account in an inventory after purchasing the prepaid debit account, and can offer the prepaid debit account for sale at a resale price above the floor price and below the face value.
Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as discussed above. By way of example, and not limitation, such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or combination thereof) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable media.
Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
Those of skill in the art will appreciate that other embodiments of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Those skilled in the art will readily recognize various modifications and changes that may be made to the principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure.
The present application is a continuation of U.S. patent application Ser. No. 14/275,948, filed May 13, 2014, is a continuation-in-part of U.S. patent application Ser. No. 13/934,631, filed 3 Jul. 2013, which is a continuation-in-part of U.S. patent application Ser. No. 12/701,711, filed 8 Feb. 2010 (now U.S. Pat. No. 8,500,007, issued Aug. 6, 2013), which is a continuation-in-part of U.S. patent application Ser. No. 12/573,060, filed 2 Oct. 2009 (now U.S. Pat. No. 8,887,998, issued Nov. 18, 2014), the contents of each of which are herein incorporated by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4809837 | Hayashi | Mar 1989 | A |
5960411 | Hartman | Sep 1999 | A |
7424452 | Feilbogen et al. | Sep 2008 | B2 |
7494048 | Gusler et al. | Feb 2009 | B2 |
7527192 | Chaskin et al. | May 2009 | B1 |
7624921 | Beck et al. | Dec 2009 | B1 |
7941344 | Bickerstaff | May 2011 | B1 |
8152060 | Wolfe et al. | Apr 2012 | B2 |
8152061 | Wolfe et al. | Apr 2012 | B2 |
8229851 | Doran et al. | Jul 2012 | B2 |
8285643 | Isaacson et al. | Oct 2012 | B2 |
8401957 | Forlai | Mar 2013 | B2 |
8463661 | Blair et al. | Jun 2013 | B2 |
8528814 | Wolfe | Sep 2013 | B2 |
8733637 | Cedeno | May 2014 | B1 |
9016567 | Wolfe | Apr 2015 | B2 |
9547856 | Wolfe | Jan 2017 | B2 |
9679277 | Wolfe | Jun 2017 | B2 |
20010007098 | Hinrichs et al. | Jul 2001 | A1 |
20020046255 | Moore et al. | Apr 2002 | A1 |
20020065713 | Awada et al. | May 2002 | A1 |
20030004828 | Epstein | Jan 2003 | A1 |
20040078325 | O'Connor | Apr 2004 | A1 |
20040219971 | Ciancio et al. | Nov 2004 | A1 |
20050038714 | Bonet et al. | Feb 2005 | A1 |
20050171902 | Nguyen | Aug 2005 | A1 |
20050177493 | Sung | Aug 2005 | A1 |
20050228717 | Gusler et al. | Oct 2005 | A1 |
20060037835 | Doran et al. | Feb 2006 | A1 |
20060190337 | Ayers et al. | Aug 2006 | A1 |
20060190347 | Cuervo | Aug 2006 | A1 |
20070055568 | Osborne | Mar 2007 | A1 |
20070075134 | Perlow et al. | Apr 2007 | A1 |
20070156513 | Mastrianni et al. | Jul 2007 | A1 |
20070205269 | Lindon | Sep 2007 | A1 |
20070272736 | Brooks et al. | Nov 2007 | A1 |
20070284433 | Domenica et al. | Dec 2007 | A1 |
20080027810 | Lerner et al. | Jan 2008 | A1 |
20080162271 | Benjamin | Jul 2008 | A1 |
20080162299 | Gusler et al. | Jul 2008 | A1 |
20080208688 | Byerley et al. | Aug 2008 | A1 |
20080294518 | Weiss et al. | Nov 2008 | A1 |
20080296368 | Newsom | Dec 2008 | A1 |
20090030789 | Mashinsky | Jan 2009 | A1 |
20090074167 | Evans et al. | Mar 2009 | A1 |
20090171773 | Shastry | Jul 2009 | A1 |
20090265269 | Stoecker | Oct 2009 | A1 |
20090283594 | Walton | Nov 2009 | A1 |
20100010888 | Maertz | Jan 2010 | A1 |
20100057580 | Raghunathan | Mar 2010 | A1 |
20100063872 | Patel | Mar 2010 | A1 |
20100070290 | Marturana et al. | Mar 2010 | A1 |
20100076833 | Nelsen | Mar 2010 | A1 |
20100198726 | Doran et al. | Aug 2010 | A1 |
20100280921 | Stone et al. | Nov 2010 | A1 |
20100299194 | Snyder et al. | Nov 2010 | A1 |
20100318415 | Gottlieb | Dec 2010 | A1 |
20110029370 | Roeding et al. | Feb 2011 | A1 |
20110079644 | Wolfe et al. | Apr 2011 | A1 |
20110099104 | Nybom | Apr 2011 | A1 |
20110106698 | Isaacson et al. | May 2011 | A1 |
20110178862 | Daigle | Jul 2011 | A1 |
20110178924 | Briscoe et al. | Jul 2011 | A1 |
20110213674 | Shpun et al. | Sep 2011 | A2 |
20110246284 | Chaikin et al. | Oct 2011 | A1 |
20110288978 | Abifaker | Nov 2011 | A1 |
20110295705 | Kasmei | Dec 2011 | A1 |
20120016725 | Kraft et al. | Jan 2012 | A1 |
20120066043 | Carmichael et al. | Mar 2012 | A1 |
20120072298 | Ramanujam et al. | Mar 2012 | A1 |
20120109787 | Larrick | May 2012 | A1 |
20120123832 | Nicolaidis et al. | May 2012 | A1 |
20120123833 | Nicolaidis et al. | May 2012 | A1 |
20120123834 | Nicolaidis et al. | May 2012 | A1 |
20120123922 | Nicolaidis et al. | May 2012 | A1 |
20120123923 | Nicolaidis et al. | May 2012 | A1 |
20120150643 | Wolfe et al. | Jun 2012 | A1 |
20120173402 | Nicolaidis | Jul 2012 | A1 |
20120185394 | Gelfand | Jul 2012 | A1 |
20120246019 | Wolfe | Sep 2012 | A1 |
20120303425 | Katzin et al. | Nov 2012 | A1 |
20130073388 | Heath | Mar 2013 | A1 |
20130073459 | Zacarias et al. | Mar 2013 | A1 |
20130197986 | Roberts et al. | Aug 2013 | A1 |
20130204681 | Kraft et al. | Aug 2013 | A1 |
20130254074 | Joa et al. | Sep 2013 | A1 |
20130254086 | Joa et al. | Sep 2013 | A1 |
20130268413 | Burr et al. | Oct 2013 | A1 |
20130284805 | Kraft et al. | Oct 2013 | A1 |
20140006129 | Heath | Jan 2014 | A1 |
20140012640 | Roberts et al. | Jan 2014 | A1 |
20140058934 | Smith et al. | Feb 2014 | A1 |
20140081852 | Blackhurst et al. | Mar 2014 | A1 |
20140101044 | Blackhurst et al. | Apr 2014 | A1 |
20140114842 | Blackhurst et al. | Apr 2014 | A1 |
20140229319 | Roberts et al. | Aug 2014 | A1 |
Number | Date | Country |
---|---|---|
WO 2008013945 | Jan 2008 | WO |
Entry |
---|
Swapagift.com Expands its “Cash for Your Card” program. Retrieved from http://www.prweb.com/releases/2003/12/prweb96305.htm on Nov. 9, 2011. |
Swapathing, Inc. Announces the Internet's First Online Gift Card Exchange. Retrieved from http://www.prweb.com/releases/2003/10/prweb83758.htm on Nov. 9, 2011. |
Cash for your card now! Retrieved from www.swapagift.com on Nov. 9, 2011. |
“What is SwapAGift.com?” retrieved from http://www.swapagift.com/ on Oct. 25, 2011. |
Offenberg. “Markets: Gift Cards”; Journal of Economic Perspectives. vol. 21, No. 2, Spring 2007 [Retrieved from the Internet] <URL: http://myweb.lmu.edu/jpate/JEP_2007.pdf>, pp. 227-238. |
Ernstberger, Kathryn W., D. McDowell, and J. Parris. “Impact of Closed-Loop Gift Card Promotions by Businesses.” International Journal of Business and Social Research 2.6 (2012): 190-197. |
“2010 U.S. Gift Card Consumer Insights Study,” dated Mar. 2011, published by First Data Corporation. |
Number | Date | Country | |
---|---|---|---|
20160239909 A1 | Aug 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14275948 | May 2014 | US |
Child | 15138342 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13934631 | Jul 2013 | US |
Child | 14275948 | US | |
Parent | 12701711 | Feb 2010 | US |
Child | 13934631 | US | |
Parent | 12573060 | Oct 2009 | US |
Child | 12701711 | US |