Systems and methods for peer-to-peer funds requests

Information

  • Patent Grant
  • 11853919
  • Patent Number
    11,853,919
  • Date Filed
    Wednesday, March 4, 2015
    9 years ago
  • Date Issued
    Tuesday, December 26, 2023
    5 months ago
Abstract
A mobile wallet system to users is described. The mobile wallet system allows users to provide payments to merchants via the mobile wallet system. Users' mobile wallets are linked to payment forms associated with the users (e.g., bank accounts, credit cards, gift cards, etc.). Additionally, the mobile wallet system allows a first user to request funding from or provide funding to a second user for certain transactions. To pay for a good or service provided by a merchant, a user selects a form of payment, which may be another user, and provides a code to the merchant, which is used by a merchant computing system to initiate payment from the user to the merchant via the financial institution computing system.
Description
BACKGROUND

Consumers complete purchases of goods and services from merchants through various currency transfers. The consumers may provide payment to the merchants via cash, checks, credit cards, debit cards, automated clearing house (“ACH”) transfers, internet payments, mobile wallets, and the like. A financial institution processing a payment from a customer to a merchant may reject the payment if the consumer does not have enough funds to complete the transaction. For example, if a consumer has exhausted his credit limit on his credit card, the credit card processor may deny the transaction request on account of lack of funds or credit. In such situations, the consumer may try another form of payment or leave without acquiring the goods or services from the merchant. However, often if a first a form of payment is unavailable due to lack of funds, other forms of payment are also unavailable due to lack of funds.


SUMMARY

One embodiment relates to a method a method of facilitating a payment to a merchant via a mobile wallet system provided by a financial institution computing system of a financial institution. The method includes receiving, by a processor of the financial institution computing system from a first user device, a request to fund a purchase of a first user from the merchant with funds from a second user via the mobile wallet system. The method further includes transmitting, by the processor, a message including the request to fund the purchase of the first user to a second user device associated with the second user. The method further includes transmitting, by the processor, updated payment information to the first user device, the updated payment information including a payment code. The method includes receiving, by the processor, a transaction request from a point of sale system associated with the merchant, the transaction request including the payment code. The method further includes transmitting, by the processor, an approval message to the point of sale system.


Another embodiment relates to a financial institution computing system associated with a financial institution. The system includes a network interface configured to communicate with a plurality of user devices and a merchant point of sale system associated with a merchant via a network. The system further includes an account database storing information relating to a plurality of financial accounts maintained by the financial institution. The system includes a memory and at least one processor. The at least one processor is configured to receive, from a first user device, a request to fund a purchase of a first user from the merchant with funds from a second user via a mobile wallet system maintained by the financial institution computing system. The at least one processor is further configured to transmit a message including the request to fund the purchase of the first user to a second user device associated with the second user. The at least one processor is configured to transmit updated payment information to the first user device, the updated payment information including a payment code. The at least one processor is further configured to receive a transaction request from the point of sale system, the transaction request including the payment code. The at least one processor is configured to transmit an approval message to the point of sale system.


A further embodiment relates to a method of preauthorizing purchase funding via a mobile wallet system provided by a financial institution computing system of a financial institution. The method includes receiving, by a processor of the financial institution computing system from a first user device, auto-fund permissions relating to a preauthorization for the financial institution to fund purchases of a second user of the mobile wallet system, wherein the auto-fund permissions include an identity of a second user and transaction restrictions. The method further includes receiving, by the processor, a request to fund a transaction at a merchant from an account associated with the first user, wherein the request is received from a point of sale system of the merchant. The method includes determining, by the processor, that the transaction at the merchant is within the permissions set forth in the transaction restrictions received from the first user. The method further includes transmitting, by the processor, an approval message to the point of sale system.


Another embodiment relates to a financial institution computing system associated with a financial institution. The system includes a network interface configured to communicate with a plurality of user devices and a merchant point of sale system associated with a merchant via a network. The system further includes an account database storing information relating to a plurality of financial accounts maintained by the financial institution. The system includes a memory and at least one processor. The at least one processor is configured to receive, from a first user device, auto-fund permissions relating to a preauthorization for the financial institution to fund purchases of a second user of the mobile wallet system, wherein the auto-fund permissions include an identity of a second user and transaction restrictions. The at least one processor is further configured to receive a request to fund a transaction at a merchant from an account associated with the first user, wherein the request is received from a point of sale system of the merchant. The at least one processor is configured to determine that the transaction at the merchant is within the permissions set forth in the transaction restrictions received from the first user. The at least one processor is further configured to transmit an approval message to the point of sale system.


These and other features, together with the organization and manner of operation thereof, will become apparent from the following detailed description when taken in conjunction with the accompanying drawings, wherein like elements have like numerals throughout the several drawings described below.





BRIEF DESCRIPTION OF THE FIGURES


FIG. 1 is a diagram of a computing system according to an exemplary embodiment.



FIG. 2 is a flow diagram of a method 200 of facilitating third-party payment for a transaction that was previously denied for lack of funds via a mobile wallet system according to an exemplary embodiment.



FIG. 3 is an exemplary user interface of a mobile wallet client as presented on the display of a mobile device of FIG. 1 according to an exemplary embodiment.



FIG. 4 is another exemplary user interface of a mobile wallet client as presented on the display of a mobile device of FIG. 1 according to an exemplary embodiment.



FIG. 5 is another exemplary user interface of a mobile wallet client as presented on the display of a mobile device of FIG. 1 according to an exemplary embodiment.



FIG. 6 is a flow diagram of a method of automatically funding transactions of a user from a third-party's account according to an exemplary embodiment.





DETAILED DESCRIPTION

Referring generally to the figures, a financial institution computing system of a financial institution that provides a mobile wallet system to users is described. The mobile wallet system enables the users to provide payments to merchants via the mobile wallet system. Users' mobile wallets are linked to payment forms associated with the users (e.g., bank accounts, credit cards, gift cards, etc.). To pay for a good or service provided by a merchant, a user selects a form of payment and provides a code to the merchant, which is used by a merchant computing system to initiate payment from the user to the merchant via the financial institution computing system. The code may be a barcode, a two-dimensional barcode, a quick response (“QR”) code, or another code displayed on a mobile device (e.g., a smartphone) of the user such that the code is scannable by a merchant's point of sale (“POS”) system or identifiable by an employee of the merchant. In an alternative arrangement, the code may be wireless transmitted to the merchant POS system from the user's mobile device (e.g., via Bluetooth®, near field communication, radio frequency identification, 802.11 wireless networking, ZigBee®, etc.). Additionally, the mobile wallet system allows a first user to contact a second user of the mobile wallet system to request funding for certain transactions.


Referring to FIG. 1, a diagram of a computing system 100 is shown according to an exemplary embodiment. The computing system 100 includes a financial institution computing system 102. The financial institution computing system 102 is associated with a financial institution, such as a bank. The financial institution provides users 104 (e.g., account holders, mobile wallet users, etc.) a mobile wallet system. As described in further detail below, the mobile wallet system allows the users 104 to use their mobile devices 106 to provide payment for goods and services offered by a merchant 108.


When a user 104 wishes to purchase a good or service from the merchant, the user 104 can request a payment code from the mobile wallet system to provide to a merchant POS system 112. Accordingly, the user 104 interacts with a mobile wallet client 110 on the user's mobile device 106, which requests a payment code from the financial institution computing system 102 via a network 114 based on a user-selected payment source. The network 114 may be the Internet. The financial institution computing system 102 returns a payment code. The payment code may be a barcode, a two-dimensional barcode, a quick response (“QR”) code, or another code that is displayed on a display of the mobile device 106. The code is input into the POS system 112 (e.g., by scanning of the barcode or QR code, by manual entry of the code by an employee into the POS system 112, wireless transmission of the code from the mobile device to the POS system 112, etc.), where the code is sent, along with transaction information (e.g., amount of the transaction, retailer identification information, etc.), to the financial institution computing system 102 via the network 114. Based on the transaction information and the received code, the financial institution 102 determines whether to permit the transaction, and thus the funds transfer from the user 104 to the merchant 108, or to reject the transaction (e.g., due to lack of funds in the user's account or due to the transaction being non-permitted). The financial institution computing system 102 then returns either a transaction confirmation or denial to the POS system 112 to provide an indication to the merchant 108 as to the approval status of the funds transfer.


Still referring to FIG. 1, the financial institution computing system 102 includes a processor 116 and memory 118. In some arrangements, the financial institution computing system 102 includes a plurality of processors. The memory 118 stores programming modules that, when executed by the processor 116, control the operation of the financial institution computing system 102. The programming modules include mobile wallet transaction logic that allows the financial institution computing system 102 to provide the mobile wallet system to users 104 and to the merchant 108. The financial institution computing system 102 includes a network interface 120 that allows the financial institution computing system 102 to communicate data to and from other devices (e.g., mobile device 106, the merchant POS system 112, etc.) via the network 114. The financial institution computing system 102 maintains various information related to customer accounts in an account database 122. In some arrangements, the account database 122 is split into multiple account databases. The account database 122 is where the financial institution computing system 102 stores information relating to financial accounts held with the financial institution, including account balance information and account ownership information. The financial institution computing system 102 further includes a mobile wallet profiles database 124. The mobile wallets profiles database 124 maintains a database of mobile wallet users 104 and associations of the mobile wallet users 104 with various accounts in the account databases 122 (e g, linking a user's mobile wallet to the user's checking account with the financial institution). Further, the mobile wallet profiles database 124 stores other information concerning the users' mobile wallets, such as contacts lists, user repayment plans, purchase restrictions, and the like.


The mobile device 106 may be used by an individual user (e.g., a business owner or employee, a consumer, and so on) to create and interact with a mobile wallet account maintained by the financial institution computing system 102. The mobile device 106 may, for example be, handheld computer, a cellular phone, smartphone, mobile handheld wireless e-mail device, a tablet computer, personal digital assistant, portable gaming devices, or another suitable device. The mobile device 106 includes a processor 126 and memory 128. The memory 128 includes programming modules and logic that, when executed by the processor 126, control the operation of the mobile device 106. In some arrangements, the memory 128 includes the mobile wallet client 110. The mobile device 106 includes a network interface 130. The network interface 130 may be a wireless network interface that communicates with a wireless communication protocol (e.g., 802.11a/b/g/n, Bluetooth®, ZigBee®, CDMA, GSM, LTE, WiMax, etc.). The mobile device 106 includes a display 132 and an input 134. In some arrangements, the display 132 and input 134 are integrated in a touchscreen display. The mobile device 106 may receive and display user interfaces including account information, transaction instructions, and so on. In some arrangements, the user interfaces may be used to initiate payments from the user's mobile wallet to merchants 108. In other arrangements, the user interfaces may be used to facilitate a third-party mobile wallet user funding a purchase by the user. As will be appreciated, in addition to or instead of the mobile device 106, users may also be provided with the ability to access the mobile wallet system using another type of computer (e.g., a desktop or laptop computer executing browser software) to perform the operations described herein as being performed by the mobile device 106.


The mobile wallet client 110 includes program logic executable by the processor 126 to implement at least some or all of the functions described herein. As will be appreciated, the level of functionality that resides on the mobile device 106 as opposed to the financial institution computing system 102 may vary depending on the implementation. The mobile wallet client 110 may be a web browser that is configured to receive and display mobile web pages (e.g., web pages prompting the user to provide information to create an account, web pages displaying account balance information and past transactions, and so on) or an application executed by the mobile device 106. The mobile wallet client 110 may also include a code/token generator capable of generating a unique code/token for each transaction. The unique code/token may then be transmitted by the mobile device 106 as part of a transaction to facilitate authentication of the transaction and the user of the mobile device 106. As will be appreciated, the user may also use other devices (e.g., laptop or desktop computer system, not shown) to create and access the mobile wallet accounts.


In FIG. 1, the mobile wallet client 110 is used in connection with the merchant POS system 108 located at various physical store locations. In some arrangements, the merchant POS system 108 is a web server that hosts an internet retailer website. Accordingly, the mobile wallet client 110 may also be used in connection with online transactions via the internet retailer. For example, in another embodiment, merchants 106 may be provided with the ability to have a mobile storefront and profile within the mobile wallet client 110. For example, the merchants 108 may be provided with the ability to display marketing material, provide information, and promote products or discounts. Merchants 108 may also be provided with the ability to sell items directly through their mobile storefront for the account holder to purchase from within the mobile client 110.


The mobile wallet client 110 may include, among other features, transaction logic 136 and account information 138. The transaction logic 136 allows users 104 of the mobile devices 106 to provide funds to the merchants 108 in exchange for goods or services from an account with maintained by the financial institution computing system 102 via the mobile wallet client 110. This process is described in further detail in U.S. patent application Ser. No. 14/501,856, entitled “MOBILE WALLET ACCOUNT ACTIVATION SYSTEMS AND METHODS,” filed on Sep. 30, 2014, and in U.S. patent application Ser. No. 14/501,880, entitled “MOBILE WALLET ACCOUNT PROVISIONING SYSTEMS AND METHODS,” filed on Sep. 30, 2014, both of which are hereby incorporated by reference in their entireties and for all purposes. The account information 136 stores associations between the user 104 and any accounts the users 104 that may be associated with at the financial institution. The account information 136 is periodically updated based on information received from the financial institution computing system 102 (e.g., every minute, every ten minutes, every time the user logs into the mobile wallet client 110, etc.). The account information 138 may also include the user's mobile wallet contact book or listing. The contact book or listing includes information relating to other mobile wallet users associated with the user. For example, John's mobile wallet contact book may include relatives and friends that are also mobile wallet users, such as his mom, his dad, his sister, and the like, as well as friends. The contact book or listing may pull contact information from the financial institution computing system 102 or another contact database stored in the memory 128.


Still referring to FIG. 1, the merchant POS system 112 includes a processor 140 and memory 142. The memory 142 stores programming modules and logic that, when executed by the processor 140, control the operation of the merchant POS system 112. The merchant POS system also includes a network interface 144. The network interface 144 allows the POS system 112 to communicate data to and from the mobile device 106 directly or via the network 114 and to and from the financial institution computing system 102 via the network 114. The memory 142 includes transaction logic that allows the POS system 112 to accept mobile wallet payments from the mobile devices 106. The payments are account transfers from the financial institution into accounts associated with the merchant 108.


Referring to FIG. 2, a flow diagram of a method 200 of facilitating third-party payment for a transaction that was previously denied for lack of funds via a mobile wallet system is shown according to an exemplary embodiment. Generally, method 200 is initiated when a first user attempts to make a purchase from merchant 108 via the mobile wallet client 110 running on the first user's mobile device. The merchant POS system 112 relays payment information from the mobile wallet client 110 (e.g., by scanning a barcode presented on the display 132) to the financial institution computing system 102, however, the financial institution computing system 102 indicates to the POS system 112 returns a transaction rejection because the first user does not have sufficient funds in his account. The POS system 112 then denies the transaction. The first user, via the mobile wallet client 110, is presented the opportunity to contact a third-party (i.e., a second mobile wallet user), such as a relative or friend of the first user, to request funding for the transaction. The second user can then fund the previously denied transaction via the mobile wallet system. Method 200 is performed by the financial institution computing system 102 (e.g., by processor 116 controlling the various components of the financial institution computing system 102). Method 200 is described in further detail below.


Method 200 begins when a transaction request is received at 202. The transaction request is received by the financial institution computing system 102 from the merchant POS system 112 via the network 114. The transaction request indicates that the first user is attempting to pay for a purchase from the merchant 108 via the first user's mobile wallet. Accordingly, the transaction includes information identifying the first user and an identification of a payment source, such as the first user's checking account information or credit card information. Additionally, the transaction request includes information about the purchase. The purchase information includes an identity of the merchant 108 and a cost of the purchase. In some arrangements, the purchase information also includes an identification of the specific items or goods attempted to be purchased by the first user.


The transaction request is denied at 204. When the financial institution computing system 102 receives the transaction request, the financial institution computing system 102 checks the first user's account (e.g., a credit card, a checking account, etc.) for sufficient funds to complete the transaction. The financial institution computing system 102 cross-references the account database 122 to determine whether there are sufficient funds in the first user's account to complete the transaction. If there are sufficient funds, the financial institution computing system 102 transmits an approval message to the POS system 112 and transfers funds from the first user's account to an account associated with the merchant 108. However, in method 200, the first user's account does not have sufficient funds to complete the transaction. Accordingly, the financial institution computing system 102 transmits a transaction denial message to the POS system 112.


Additionally, the financial institution computing system 102 transmits a transaction denial message to the first user's mobile device. For example, FIG. 3 shows an exemplary user interface 300 of the mobile wallet client 110 as presented on the display 132 of the mobile device 106 associated with the first user. The user interface 300 is populated based on information received from the financial institution computing system 102. In some arrangements, the financial institution computing system 102 pushes the user interface 300 to the user device 106. The user interface 300 includes an indication 302 that the transaction was denied for insufficient funds. The indication may include an amount of the transaction and an amount of funds available in the first user's account. The user interface 300 further includes the option for the first user to request funds for the transaction from a second mobile wallet user, such as a contact. Accordingly, the user interface 300 allows the first user to select a second user from a contact list (e.g., via a drop down list 304). The second user is also a registered user of the mobile wallet system. The second user is a person that the first user would like to request funds from in order to proceed with the transaction with the merchant 108. For example, the second user may be the first user's mom. After the first user selects a second user, the first user has the option to send a note to the second user along with the request to fund by interacting with the note field 306 of the user interface 300. For example, the first user may indicate to the second user that the originally denied transaction is to purchase books for school. After the first user has entered a note, or if the first user does not want to enter the note, the first user can either send the request (e.g., by interacting with the “send request” button 308) or cancel the transaction altogether (e.g., by interacting with the “cancel transaction” button 310).


A request to fund via a third-party is received at 206. The financial institution computing system 102 receives the request to fund via the third-party from the first user's mobile device. For example, the request may be sent from the first user's mobile device after the first user interacts with the “send request” button 308. The request includes an identification of the second user targeted in the request, an indication of the amount of funds needed, an identity of the requestor (i.e., the first user), a time of the request, a merchant identifier, a merchant location, and any note included in the request by the first user. A funding request message is transmitted at 208. The financial institution computing system 102 transmits the funding request message to the second user's mobile device. The request may be transmitted as an e-mail message or an in-application message (e.g., a push notification processed by the mobile wallet client 110). The request includes information about the previously denied transaction. The information includes the requestor's identity (i.e., the first user's identity), an amount of money requested, a date and time of the request, an identification of the merchant 108 associated with the previously denied transaction, a location of the merchant 108, a note from the requestor (if provided by the first user), and a location of the first user.


An indication that the funding request message was opened is received at 210. The financial institution computing system 102 receives an indication from the second user's mobile device. The indication informs the financial institution computing system 102 that the second user is viewing the funding request message. In response to receiving the indication at 210, updated first user location information is transmitted to the second user's mobile device at 212. The financial institution computing system 102 requests location information relating to the first user's mobile device and transmits the received location information to the second user's mobile device. The updated first user location information lets the second user know where the first user is at the time of the contact reading the funding request message. The first user's location may be used by the second user to determine that the first user is in the vicinity of the merchant 108. This information may be used by the second user to determine that the first user is still seeking funding for the purchase and that the request is still valid. For example, if the current location of the first user is fifty miles away from the merchant 108, the second user may choose to deny the request for funding because it is evident that the first user no longer needs the goods or services offered by the merchant 108. The updated first user location is displayed to the second user along with the funding request message.


Referring to FIG. 4 shows an exemplary user interface 400 of the mobile wallet client 110 as presented on the display 132 of the mobile device 106. The user interface 400 shows the mobile device 106 of the second user that received the funding request message from the first user. As shown in FIG. 4, the fund request message provides basic information 402 relating to the fund request. The basic information 402 includes an identification of the first user (e.g., “John”), a date and time of the request, an amount of money requested, and an identification of the merchant where the funds will be spent. In some arrangements, the identification of the merchant also includes a location of the merchant (e.g., a street address). The fund request message includes a note 404 from the first user if the first user included the optional note in the fund request. Additionally, the fund request message includes current first user location information 408. The current first user location information 408 is received from the first user's mobile device at 210 of method 200. In some arrangements, the current first user location information 408 is updated periodically (e.g., every minute, every five minutes, etc.) or in real time.


The user interface 400 includes a plurality of response options. The response options allow the second user to accept the funding request as sent by interacting with the accept button 408 or to reject the funding request by interacting with the reject button 410. The second user can also alter the initial request. For example, the second user may reply to the initial request with a conditional acceptance of the funding request contingent on the first user agreeing to a repayment plan by interacting with button 412. The repayment plan terms may be set by the second user. The repayment plan may include repayment of the amount requested and interest accrued at an interest rate set by the second user. The repayment plan may include automatic payments (e.g., monthly payments until the requested amount is returned, a single payment repaying the total amount owed to the contact at a scheduled date, etc.) from an account of the first user into an account of the second user that are facilitated by the financial institution computing system 102. The second user can also respond with a modified amount by interacting with button 414. For example, as shown in FIG. 4, the request is for thirty five dollars; however, the second user may only want to provide twenty dollars of funding to the first user. Button 414 allows the second user to provide a different amount of funding than requested. Other reply options may be provided by interacting with button 416. For example, the other reply options may allow the second user to limit the provided funds to only purchases of specified items, to limit the provided funds to only certain merchants, to provide an expiration for the provided funds, and the like. In some arrangements, the other reply options allow the second user to suggest splitting the cost of the attempted transaction with the first user or other mobile wallet users (e.g., a third user, a fourth user, etc.). For example, the second user can reply with the offer to pay for a certain percentage of the transaction (e.g., the first user pays 50% while the second user pays the remaining 50%). In such arrangements, if the first user accepts the split transaction, the payment code generated (at 220 as discussed below) may draw funds from multiple payment sources at the agreed upon split percentages: an account associated with the first user and an account associated with the second user.


Referring again to FIG. 2, the second user decides whether to accept the request to fund from the first user or to deny the request to fund at 214. Based on the second user's decision, the second user's mobile device transmits the decision to the financial institution computing system 102. If the second user denied request for funds (e.g., by interacting with the reject button 410 of user interface 400), a funding request denial is transmitted to the first user's user mobile device at 216. In some arrangements, the financial institution computing system 102 transmits a denial at 216 if the second user has not responded to the request within a set period of time (e.g., within thirty minutes). In such arrangements, the request to fund expired and is no longer acceptable by the second user. The financial institution computing system 102 then determines whether the first user wants to send another funding request to another contact at 218. The first user can restart the process and transmit a request to another contact (e.g., another mobile wallet user). In these situations, method 200 returns to step 206. In some arrangements, any additional requests sent by the first user to other contacts may include an indication that the first user previously requested funds from at least one other contact (i.e., the second user), and the at least one other contact already denied the first user's request. For example, if a child first requests funds from his mother, and the mother hasn't responded or denied the initial request, the child may send a second fund request to his dad. The second fund request includes an indication that the child previously requested funds from his mother, but that the mother did not approve of the fund request. Based on this information, the dad may decide not to approve the fund request as well. If no additional request is sent by the first user, method 200 ends.


If the second user approved the funding request at 214, updated payment information is transmitted at 220. The updated payment information is transmitted from the financial institution computing system 102 to the first user's mobile device. The updated payment information includes a payment code. In some arrangements, the payment code can be displayed on the display of the first user's mobile device such that the payment code can be input into the merchant POS system 112 (e.g., by manually typing the payment code into the POS system 112, by scanning the payment code, etc.). In such arrangements, the payment code may be a barcode, a QR code, a string of numbers, or the like, that can then be relayed to the merchant POS system 112 to complete the transaction. In other arrangements, the payment code is a digital token or file that can be transmitted to the merchant POS system 112 from the first user's mobile device (e.g., via Bluetooth®, near field communication, radio frequency identification, WiFI, ZigBee®, etc.). The payment code may be a limited use payment code (e.g., a one-time use payment code). In some arrangements, the payment code includes a geographic restriction (e.g., the payment code is only valid in certain geography defined by the second user). For example, FIG. 5 shows an exemplary user interface 500 of the mobile wallet client 110 as presented on the display 132 of the mobile device 106 associated with the first user. The user interface 500 includes a QR code 502, which can be scanned by the merchant POS system 112 to effectuate payment from the second user (i.e., the individual funding the first user's purchase) to the merchant 108. The user interface 500 may also indicate that the payment is coming from a contact of the first user (e.g. as shown here, the payment is coming from “Mom”) at 504 and an indication of the amount of money that is approved for the specific transaction at 506.


The payment to the merchant 108 is processed at 222. The financial institution computing system 102 receives an updated transaction request with the updated payment information from the merchant POS system 112. The updated transaction request includes the payment code. The financial institution computing system 102 verifies that the funds are available in the contact's account in a similar manner as discussed above with respect to 204. When the payment is processed, the financial institution computing system 102 transmits an approval message to the merchant POS system 102. In some arrangements, the financial institution computing system 102 also transmits approval messages to the user devices 106 associated with both the first user and the second user. The second user's account balance is updated at 224. The financial institution computing system 102 updates the appropriate account balance in the account database 122 to account for the payment to the merchant 108. If the first user agreed to a repayment plan, the financial institution computing system 102 implements the repayment rules associated with the repayment plan at 226. For example, the financial institution computing system 102 may schedule an automatic payment from an account associated with the first user to an account associated with the second user.


Referring to FIG. 6, a flow diagram of a method 600 of automatically funding transactions of a user from a third-party's account is shown according to an exemplary embodiment. In some arrangements, the mobile wallet system allows a first user (i.e., a first mobile wallet user) to preauthorize funding for transactions initiated by a second user (i.e., a second mobile wallet user) without an initial denied transaction (e.g., as described above with respect to method 200). For example, a mother may preauthorize her son to purchase certain items or initiate a transaction that is funded from the mother's account. As described in further detail, the first user can setup auto-fund permissions that allow the second user to make purchases funded from the first user's account without asking for approval each time. If the attempted transaction of the second user is within the permissions setup by the first user, the transaction will go through. Then, the first user will have the opportunity to fine-tune the permissions based on the transaction. Method 600 is performed by the financial institution computing system 102 (e.g., by processor 116 controlling the various components of the financial institution computing system 102). Method 600 is described in further detail below.


Method 600 begins when auto-fund permissions are received at 602. Auto-fund permissions are received at the financial institution computing system 102 from a first user's mobile device. The auto-fund permissions indicate a preauthorization for the financial institution to fund purchases of a second user of the mobile wallet system. The preauthorization relates to a one-off funding preauthorization (e.g., for a single purchase made by the second user) or to an open-ended preauthorization for purchases made by the second user (e.g., at a specific merchant). The auto-fund permissions include the identity of the second user (e.g., at least one of a username, a phone number, an e-mail address, etc.) and transaction restrictions. The transaction restrictions define which transactions are to be authorized by the financial institution computing system 102 and which transactions are to be denied by the financial institution computing system 102. The transaction restrictions may include an approved amount limit. The amount limit may limit the amount of an individual transaction (e.g., preauthorization for transactions under thirty dollars) and/or the amount of a series of transactions occurring within a given time period (e.g., preauthorization for transactions not to exceed one hundred dollars within a calendar month, within a week, etc.). The transaction limits may include limitations on the merchant, such as limiting preauthorized transactions to specific merchants, limiting transactions to specific classes or types of merchants (e.g., grocery stores, gas stations, etc.), and excluding transactions from specific merchants or from specific classes or types of merchants (e.g., liquor stores). The transaction limits may also include geographic limitations, such as limiting purchases to certain occurring at merchants within specific geographic regions or excluding purchases attempted at merchants within specific geographic regions. The geographic regions may be defined the first user as a country, a state, a county, a city, a geofence (e.g., a geographic area defined by a plurality of geographic points, such as GPS coordinates or landmarks; within a specific building, such as a shopping mall; etc.), or a combination thereof. In some arrangements, the first user may opt to have the financial institution set default transaction restrictions. As set forth in further detail below, the initial transaction restrictions may be fine-tuned based on approved or denied transactions.


The payment auto-fund permissions database is updated at 604. The financial institution computing system 102 updates an internal database that stores the auto-fund permissions of its mobile wallet users. In some arrangements, the auto-fund permissions are stored in the mobile wallet profiles database 124. After the auto-fund permissions database is updated, the second user's mobile wallet may display the first user as a payment source along with other payment sources (e.g., the second user's bank accounts, credit cards, etc.) during transactions. For example, when the second user is attempting to make a purchase from the merchant 108 via the mobile wallet client 110 running on the second user's mobile device 106, the second user can select the first user as a payment source for the contemplated transaction.


A request to fund a transaction via a third-party is received at 606. The request is received by the financial institution computing system 102 from the second user. In some arrangements, the request is received via the merchant POS system 112. In such arrangements, the second user provided a payment code to the merchant POS system 112 in a similar manner as described above with steps 220 and 222 of method 200. Accordingly, the request may include a payment code generated by the mobile wallet client 110 (via the financial institution computing system 102) that identifies the first user as the payment source. The second user is attempting to pay for goods or services from the merchant 108 via the mobile wallet client 110. In attempting the transaction, the second user selected to fund the transaction via the first user. The request includes transaction information. The transaction information includes an identification of the second user, a payment source (i.e., the first user), a transaction amount, and an identification of the merchant 108. The financial institution computing system 102 determines whether the request is within the auto-fund permissions set up by the first user at 608. The financial institution computing system 102 cross-references the received transaction information against the auto-fund permissions stored in the auto-fund permissions database.


If the request is not within the auto-fund permissions, the transaction is denied at 610. The financial institution computing system 102 transmits a denial to the merchant POS system 112 to inform the merchant 108 that funds will not be provided. Additionally, denied transaction messages are sent at 612. The financial institution computing system 102 sends denied transaction messages to the mobile devices 106 of both the first user and the second user. In some arrangements, the denied transaction messages include information about the attempted transaction (e.g., amount, merchant identification, location information of the second user at the time of the attempted transaction, specific items being purchased in the attempted transaction, and the like) and a rationale for why the transaction was denied (e.g., attempted transaction exceeds the preauthorized limit, the merchant is an excluded merchant, etc.).


If the request is within the auto-fund permissions, the transaction is approved and payment is processed at 614. The financial institution computing system 102 transmits an approval to the merchant POS system 112 such that the merchant 108 can proceed with the transaction. Approval messages are sent at 618. The financial institution computing system 102 transmits a first approval message to the second user's mobile device to indicate that funding for the transaction was approved. The financial institution computing system 102 transmits a second approval message to the first user's mobile device to indicate that a transaction for the second user was funded based on the auto-fund permissions. The second approval message includes information about the attempted transaction (e.g., amount, merchant identification, location information of the second user at the time of the attempted transaction, specific items being purchased in the attempted transaction, and the like).


If the transaction contemplated in the auto-fund permissions received at 602 is a one-off transaction, then method 600 ends after the denied transaction messages are transmitted at 612 or after the approval messages are transmitted at 618. If the auto-fund permissions received at 602 relate to a plurality of preauthorized transactions, the first user has the opportunity to fine-tune the auto-fund permissions based on received any denied transaction messages or any approval messages. For example, a received denied transaction message may indicate that the second user attempted to have the first user pay for a purchase at the merchant 108. However, the merchant 108 is included in a category of merchants not permitted in the initial auto-fund permissions. In such a situation, the denied transaction message may allow the first user to add the merchant 108 to permitted merchants such that future attempted transactions by the second user at the merchant 108 would be allowed (assuming the attempted transaction meets the other rules set forth in the auto-fund permissions). Additionally, if the transaction is denied based on the permissions, the second user may still send a request for (manual) approval of the contemplated purchase to the first user. For example, the second user can send a funding request message similar to those contemplated in method 200 after the initial contemplated transaction was automatically denied by the system. The message may include an explanation as to why the request should be approved by the first user (e.g., “Please Mom! I really need these shoes!”). Similarly, a transaction that was allowed (as indicated in an approval message) may be used by the first user to fine tune the initial auto-fund permissions such that later attempted transactions matching the one that was allowed are later denied the future.


Accordingly, a permissions update request is received at 620. The financial institution computing system 102 receives the permissions update request from the mobile device 106 associated with the first user. The permissions update request includes updated transaction restrictions. The updated transaction restrictions are provided in response to receipt of messages at 612 or 618. The messages received at 612 or 618 may include options for the first user to fine-tune the initially provided auto-fund permissions by modifying any previously provided transaction restrictions. The updated transaction restrictions may further limit the second user's access to the first user's funds or expand on the second user's ability to access the first user's funds. The auto-fund permissions database is updated at 622. The financial institution computing system 102 updates the stored auto-fund permissions based on the received updated transaction restrictions.


The above-described mobile wallet systems and methods allow mobile wallet users to pay for goods and services from merchants even when the users do not have sufficient funds in the account. The users reach out to contacts, such as friends and relatives, for funding of transactions. The mobile wallet systems and methods allow for quicker transactions in circumstances where users attempting purchases do not have sufficient funds because the users can ask for funding on the spot, without needing to go through traditional loan sources, such as banks and lenders. Additionally, the above-described mobile wallet systems and methods permit users to preauthorize funding requests of other users, which also leads to quicker transactions by eliminating the need for individual funding requests.


The embodiments of the present invention have been described with reference to drawings. The drawings illustrate certain details of specific embodiments that implement the systems and methods and programs of the present invention. However, describing the invention with drawings should not be construed as imposing on the invention any limitations that may be present in the drawings. The present invention contemplates methods, systems and program products on any machine-readable media for accomplishing its operations. The embodiments of the present invention may be implemented using an existing computer processor, or by a special purpose computer processor incorporated for this or another purpose or by a hardwired system.


As noted above, embodiments within the scope of the present invention include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.


Embodiments of the present invention have been described in the general context of method steps which may be implemented in one embodiment by a program product including machine-executable instructions, such as program code, for example in the form of program modules executed by machines in networked environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Machine-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such steps.


As previously indicated, embodiments of the present invention may be practiced in a networked environment using logical connections to one or more remote computers having processors. Those skilled in the art will appreciate that such network computing environments may encompass many types of computers, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and so on. Embodiments of the invention may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.


An example system for implementing the overall system or portions of the invention might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. The system memory may include read only memory (ROM) and random access memory (RAM). The computer may also include a magnetic hard disk drive for reading from and writing to a magnetic hard disk, a magnetic disk drive for reading from or writing to a removable magnetic disk, and an optical disk drive for reading from or writing to a removable optical disk such as a CD ROM or other optical media. The drives and their associated machine-readable media provide nonvolatile storage of machine-executable instructions, data structures, program modules and other data for the computer. It should also be noted that the word “terminal” as used herein is intended to encompass computer input and output devices. Input devices, as described herein, include a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function. The output devices, as described herein, include a computer monitor, printer, facsimile machine, or other output devices performing a similar function.


It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present invention as defined in the appended claims. Such variations will depend on the software and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the invention. Likewise, software and web implementations of the present invention could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps.


The foregoing description of embodiments of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiments were chosen and described in order to explain the principals of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the present invention as expressed in the appended claims.

Claims
  • 1. A financial institution computing system associated with a financial institution, the system comprising: a network interface configured to communicate with a plurality of user devices and a merchant point of sale system associated with a merchant via a network;an account database storing information relating to a plurality of financial accounts maintained by the financial institution;a memory; andat least one processor coupled to the memory that stores instructions that, when executed by the at least one processor, cause the at least one processor to: receive, from a first user device, a request to fund a purchase of a first user from the merchant with funds from a second user via a mobile wallet system maintained by the financial institution computing system, wherein the request to fund the purchase is received after the first user attempted an initial transaction which was denied by the financial institution;transmit a message including the request to fund the purchase of the first user to a second user device associated with the second user, the request comprising a location of the merchant;receive, from the second user device, an indication that the message is being viewed by the second user;in response to receiving the indication that the message is being viewed, (1) generate a request for updated location information, (2) transmit the request for updated location information to the first user device, (3) receive the updated location information from the first user device, and (4) transmit the updated location information of a current location of the first user device to the second user device; andupon receiving an approval from the second user device, the approval comprising funds expiration information; (1) generate a digital token corresponding to a financial account of the second user, the digital token comprising a scannable quick response (QR) code and further comprising a geographic restriction defined by the second user such that the digital token is valid only at the location of the merchant;(2) transmit updated payment information to the first user device, the updated payment information including the digital token;(3) receive an updated transaction request from the merchant point of sale system, the updated transaction request including the digital token transmitted in accordance with the funds expiration information from the first user device to the merchant point of sale system; and(4) transmit an approval message to a point of sale system.
  • 2. The system of claim 1, wherein the at least one processor coupled to the memory stores instructions that, when executed by the at least one processor, further cause the at least one processor to transmit updated location information relating to the location of the first user device to the second user device.
  • 3. The system of claim 1, wherein the at least one processor coupled to the memory stores instructions that, when executed by the at least one processor, further cause the at least one processor to: receive a funding request denial from the second user device;receive a second request to fund the purchase of the first user, wherein the second request identifies a third user as a source of funds to fund the purchase; andtransmit a second message including the second request to a third user device associated with the third user.
  • 4. The system of claim 3, wherein the second message indicates that the second user already denied the request.
  • 5. The system of claim 1, wherein the at least one processor coupled to the memory stores instructions that, when executed by the at least one processor, further cause the at least one processor to transfer the funds, upon verification of the digital token, from a first account associated with the second user into a second account associated with the merchant, in response to the updated transaction request from the merchant point of sale system.
  • 6. The system of claim 1, wherein the at least one processor coupled to the memory stores instructions that, when executed by the at least one processor, further cause the at least one processor to schedule an automated transfer from a first account associated with the first user to a second account associated with the second user based on a repayment agreement between the first user and the second user.
  • 7. The system of claim 1, wherein the request to fund the purchase is a request to at least partially fund the purchase.
  • 8. A method of preauthorizing funding for a purchase via a mobile wallet system provided by a financial institution computing system of a financial institution, the method comprising: receiving, by a processor of the financial institution computing system from a first user device of a first user, auto-fund permissions relating to a preauthorization for the financial institution to fund certain purchases of a second user of the mobile wallet system without requiring approval of these certain purchases from the first user in response to a transaction initiated by the second user being denied by the financial institution, wherein the auto-fund permissions include an identity of a second user and transaction restrictions;generating, by the processor, a payment code that includes a digital token corresponding to a mobile wallet account of the first user, the digital token comprising a scannable QR code and a geographic restriction defined by the first user such that the digital token is valid only in a particular merchant location;receiving, by the processor, a request to fund the transaction at a merchant from an account associated with the first user based on a request for the transaction by the second user at the merchant, wherein the request is received from a point of sale system of the merchant, wherein the request to fund the transaction at the merchant is initiated without intervention by the first user or the second user based on the payment code sent to a device of the second user and transmitted to the point of sale system of the merchant;transmitting, by the processor and to the first user device, a message including the request to fund the transaction;determining, by the processor and in response to receiving an indication that the first user is viewing the message, a current location of a second user device;determining, by the processor, that the transaction at the merchant is within the auto-fund permissions set forth in the transaction restrictions received from the first user by determining whether the current location of the second user device corresponds to the particular merchant location;transmitting, by the processor, an approval message to the point of sale system of the merchant; andupdating, by the processor, a database based on the received auto-fund permissions such that the first user appears as a payment source in a mobile wallet of the second user.
  • 9. The method of claim 8, wherein the transaction restrictions include at least one of a transaction amount limit, a merchant limitation, or a previously approved transaction.
  • 10. The method of claim 8, further comprising transmitting, by the processor, a user approval message to the first user device indicating approval of the transaction, wherein the user approval message includes an option to adjust the previously provided auto-fund permissions.
  • 11. The method of claim 10, further comprising receiving, by the processor and from the first user device, updated auto-fund permissions in response to the user approval message.
  • 12. A financial institution computing system associated with a financial institution, the system comprising: a network interface configured to communicate with a plurality of user devices and a merchant point of sale system associated with a merchant via a network;an account database storing information relating to a plurality of financial accounts maintained by the financial institution;a memory; andat least one processor coupled to the memory that stores computer-executable instructions that, when executed by the at least one processor, cause the at least one processor to: receive, from a first user device of a first user, auto-fund permissions relating to a preauthorization for the financial institution to fund certain purchases of a second user of a mobile wallet system without requiring approval of these certain purchases from the first user in response to a transaction initiated by the second user being denied by the financial institution, wherein the auto-fund permissions include an identity of the second user and transaction restrictions;receive a request to fund the transaction at the point of sale system of the merchant from an account associated with the first user based on a request for the transaction by the second user at the merchant, wherein the request to fund the transaction at the merchant is initiated without intervention by the first user or the second user;in response to receiving the request, generate a digital token that corresponds to a mobile wallet account of the first user, wherein the digital token comprises a scannable QR code and includes a geographic restriction defined by the first user such that the digital token is valid only at a particular merchant location;transmit, to the first user device associated with the first user, a message including the request to fund the transaction;determine a current location of a second user device in response to receiving an indication that that the first user is viewing the message;determine that the transaction at the merchant is within the auto-fund permissions set forth in the transaction restrictions received from the first user by determining whether the current location of the second user device corresponds to the particular merchant location;transmit an approval message to the point of sale system; andupdate a database based on the received auto-fund permissions such that the first user appears as a payment source in a mobile wallet of the second user.
  • 13. The system of claim 12, wherein the transaction restrictions include at least one of a transaction amount limit or a merchant limitation.
  • 14. The system of claim 12, wherein the at least one processor coupled to the memory stores instructions that, when executed by the at least one processor, further cause the at least one processor to transmit a user approval message to the first user device indicating that the transaction was approved, wherein the user approval message includes an option to adjust the previously provided auto-fund permissions.
  • 15. The system of claim 14, wherein the at least one processor coupled to the memory stores instructions that, when executed by the at least one processor, further cause the at least one processor to receive, from the first user device, updated auto-fund permissions in response to the user approval message.
US Referenced Citations (396)
Number Name Date Kind
5412192 Hoss May 1995 A
5778067 Jones et al. Jul 1998 A
6016484 Williams et al. Jan 2000 A
6018724 Arent Jan 2000 A
6615194 Deutsch et al. Sep 2003 B1
6865547 Brake et al. Mar 2005 B1
6873974 Schutzer Mar 2005 B1
7765481 Dixon et al. Jul 2010 B2
7822206 Birk et al. Oct 2010 B2
7827057 Walker et al. Nov 2010 B1
7909243 Merkow Mar 2011 B2
7930225 Wahlberg et al. Apr 2011 B2
7945776 Atzmony et al. May 2011 B1
7970669 Santos Jun 2011 B1
8019365 Fisher Sep 2011 B2
8078140 Baker et al. Dec 2011 B2
8126806 Dimartino et al. Feb 2012 B1
8160959 Rackley et al. Apr 2012 B2
8215560 Granucci et al. Jul 2012 B2
8280788 Perlman Oct 2012 B2
8332290 Venturo et al. Dec 2012 B1
8401904 Simakov et al. Mar 2013 B1
8433657 Dinan Apr 2013 B2
8452257 Granucci et al. May 2013 B2
8467766 Rackley et al. Jun 2013 B2
8468587 Blinn et al. Jun 2013 B2
8489067 Rackley, III et al. Jul 2013 B2
8504699 Vaughan et al. Aug 2013 B2
8533123 Hart Sep 2013 B2
8538845 Liberty Sep 2013 B2
8548908 Friedman Oct 2013 B2
8548926 Balistierri et al. Oct 2013 B2
8555361 Nakhjiri et al. Oct 2013 B2
8566237 Forzley Oct 2013 B2
8566239 Arthur et al. Oct 2013 B2
8577803 Chatterjee et al. Nov 2013 B2
8615468 Varadarajan Dec 2013 B2
8627424 O'Malley et al. Jan 2014 B1
8639621 Ellis Jan 2014 B1
8645971 Carlson et al. Feb 2014 B2
8676704 Ledbetter et al. Mar 2014 B2
8700729 Dua Apr 2014 B2
8706628 Phillips Apr 2014 B2
8725576 Fisher May 2014 B2
8725577 Fisher May 2014 B2
8732080 Karim May 2014 B2
8744966 Amacker et al. Jun 2014 B1
8750901 Gupta Jun 2014 B1
8768830 Jorgensen et al. Jul 2014 B1
8768834 Zacarias et al. Jul 2014 B2
8774781 Speiser et al. Jul 2014 B1
8781955 Schamer et al. Jul 2014 B2
8831677 Villa-Real Sep 2014 B2
8838501 Priebatsch Sep 2014 B1
8843125 Kwon et al. Sep 2014 B2
8843417 Hammad Sep 2014 B2
8880432 Collins, Jr. Nov 2014 B2
8924246 Chen Dec 2014 B1
8925805 Grigg et al. Jan 2015 B2
8930271 Ellis et al. Jan 2015 B1
8972297 Kay et al. Mar 2015 B2
8977251 Grigg et al. Mar 2015 B2
8989712 Wentker et al. Mar 2015 B2
9020836 Fisher et al. Apr 2015 B2
9026460 Grigg et al. May 2015 B2
9027109 Wolberg-Stok et al. May 2015 B2
9037509 Ellis et al. May 2015 B1
9043240 Langus et al. May 2015 B2
9098190 Zhou et al. Aug 2015 B2
9117242 Ellis et al. Aug 2015 B1
9177307 Ross et al. Nov 2015 B2
9195984 Spector et al. Nov 2015 B1
9208488 Liberty Dec 2015 B2
9218624 Moghadam Dec 2015 B2
9256876 Vasant Akole et al. Feb 2016 B2
9286606 Diamond Mar 2016 B2
9317849 Pitroda et al. Apr 2016 B2
9324068 Soundararajan Apr 2016 B2
9361616 Zhou et al. Jun 2016 B2
9652770 Kurani et al. May 2017 B1
9659312 Ellis et al. May 2017 B1
9691058 Epler Jun 2017 B2
9704157 Ellis et al. Jul 2017 B1
9741051 Carpenter Aug 2017 B2
9805363 Rudnick et al. Oct 2017 B1
9928518 Vippagunta et al. Mar 2018 B1
9972047 Elliott May 2018 B1
10121129 Kalgi Nov 2018 B2
10140615 Carpenter et al. Nov 2018 B2
10169812 Bajgier et al. Jan 2019 B1
10235668 Ellis et al. Mar 2019 B1
10242368 Poole Mar 2019 B1
10380583 Ellis et al. Aug 2019 B1
10380596 Butler et al. Aug 2019 B1
10402897 Czyzewski et al. Sep 2019 B1
10445739 Sahni et al. Oct 2019 B1
10515356 Cronic et al. Dec 2019 B2
10997592 Kurani May 2021 B1
11288660 Kurani Mar 2022 B1
11436581 Walker et al. Sep 2022 B1
20020032602 Lanzillo, Jr. Mar 2002 A1
20020052852 Bozeman May 2002 A1
20020062249 Iannacci May 2002 A1
20030028481 Flitcroft et al. Feb 2003 A1
20030040964 Lacek Feb 2003 A1
20030055785 Lahiri Mar 2003 A1
20030056096 Albert et al. Mar 2003 A1
20040230535 Binder Nov 2004 A1
20040236632 Maritzen et al. Nov 2004 A1
20040254848 Golan et al. Dec 2004 A1
20040260646 Berardi et al. Dec 2004 A1
20050021401 Postrel Jan 2005 A1
20050043997 Sahota et al. Feb 2005 A1
20050077350 Courtion et al. Apr 2005 A1
20050086492 Nicodemus et al. Apr 2005 A1
20050125317 Winkelman et al. Jun 2005 A1
20050138377 First et al. Jun 2005 A1
20050184145 Law et al. Aug 2005 A1
20050235363 Hibbard et al. Oct 2005 A1
20060235795 Johnson et al. Oct 2006 A1
20060253335 Keena et al. Nov 2006 A1
20070168354 Ramer et al. Jul 2007 A1
20070170243 Desany et al. Jul 2007 A1
20070174873 Griggs Jul 2007 A1
20070198432 Pitroda Aug 2007 A1
20070244811 Tumminaro Oct 2007 A1
20080005006 Tritt et al. Jan 2008 A1
20080006685 Rackley, III et al. Jan 2008 A1
20080033878 Krikorian et al. Feb 2008 A1
20080040265 Rackley III et al. Feb 2008 A1
20080127317 Nakhjiri May 2008 A1
20080203152 Hammad et al. Aug 2008 A1
20080208742 Arthur Aug 2008 A1
20080242274 Swanburg et al. Oct 2008 A1
20080243701 Von Mueller Oct 2008 A1
20080294556 Anderson Nov 2008 A1
20080319887 Pizzi et al. Dec 2008 A1
20090027191 Farah et al. Jan 2009 A1
20090048971 Hathaway et al. Feb 2009 A1
20090106558 Delgrosso et al. Apr 2009 A1
20090157531 Bui Jun 2009 A1
20090177563 Bernstein Jul 2009 A1
20090228384 Melik-Aslanian et al. Sep 2009 A1
20090228966 Parfene et al. Sep 2009 A1
20090271287 Halpern Oct 2009 A1
20090319427 Gardner et al. Dec 2009 A1
20100082481 Lin et al. Apr 2010 A1
20100114724 Ghosh et al. May 2010 A1
20100114731 Kingston et al. May 2010 A1
20100114733 Collas et al. May 2010 A1
20100125495 Smith et al. May 2010 A1
20100131415 Sartipi May 2010 A1
20100191602 Mikkelsen et al. Jul 2010 A1
20100205077 Hammad Aug 2010 A1
20110055080 Ahlers Mar 2011 A1
20110106674 Perlman May 2011 A1
20110145149 Valdes et al. Jun 2011 A1
20110153397 Wagenheim Jun 2011 A1
20110153498 Makhotin et al. Jun 2011 A1
20110154466 Harper et al. Jun 2011 A1
20110191160 Blackhurst et al. Aug 2011 A1
20110196782 Allen et al. Aug 2011 A1
20110251892 Laracey Oct 2011 A1
20110270665 Kim et al. Nov 2011 A1
20110270748 Graham, III Nov 2011 A1
20110289004 Prakash et al. Nov 2011 A1
20110295748 Woodriffe Dec 2011 A1
20110302084 Melik-Aslanian et al. Dec 2011 A1
20110313918 Lawson et al. Dec 2011 A1
20120011063 Killian Jan 2012 A1
20120018511 Hammad Jan 2012 A1
20120022944 Volpi Jan 2012 A1
20120078735 Bauer et al. Mar 2012 A1
20120078751 MacPhail Mar 2012 A1
20120084210 Farahmand Apr 2012 A1
20120110634 Jakobsson et al. May 2012 A1
20120130731 Canetto May 2012 A1
20120143705 Bhattacharya et al. Jun 2012 A1
20120150669 Langley et al. Jun 2012 A1
20120150687 Hart Jun 2012 A1
20120158589 Katzin Jun 2012 A1
20120185317 Wong Jul 2012 A1
20120185387 Doyle Jul 2012 A1
20120192254 Garcia Perez et al. Jul 2012 A1
20120196586 Grigg et al. Aug 2012 A1
20120197793 Grigg et al. Aug 2012 A1
20120197794 Grigg et al. Aug 2012 A1
20120209749 Hammad Aug 2012 A1
20120239417 Pourfallah Sep 2012 A1
20120253852 Pourfallah Oct 2012 A1
20120254021 Wohied Oct 2012 A1
20120271705 Postrel Oct 2012 A1
20120271712 Katzin et al. Oct 2012 A1
20120284130 Lewis Nov 2012 A1
20120284195 McMillen et al. Nov 2012 A1
20120290376 Dryer et al. Nov 2012 A1
20120296720 Pirillo Nov 2012 A1
20120303425 Katzin Nov 2012 A1
20120310774 Chassin Dec 2012 A1
20120323762 Kapur et al. Dec 2012 A1
20120330837 Persaud et al. Dec 2012 A1
20130006848 Kuttuva Jan 2013 A1
20130013499 Kalgi Jan 2013 A1
20130018777 Klein Jan 2013 A1
20130018792 Casey et al. Jan 2013 A1
20130030941 Meredith et al. Jan 2013 A1
20130042261 Tavormina et al. Feb 2013 A1
20130046697 Schibuk Feb 2013 A1
20130054454 Purves et al. Feb 2013 A1
20130060679 Oskolkov Mar 2013 A1
20130060696 Martin et al. Mar 2013 A1
20130060708 Oskolkov et al. Mar 2013 A1
20130065555 Baker et al. Mar 2013 A1
20130073365 McCarthy Mar 2013 A1
20130073459 Zacarias Mar 2013 A1
20130080241 Fisher Mar 2013 A1
20130110628 Yeo et al. May 2013 A1
20130110658 Lyman et al. May 2013 A1
20130132854 Raleigh et al. May 2013 A1
20130144663 Qawami et al. Jun 2013 A1
20130144702 Tabor et al. Jun 2013 A1
20130151400 Makhotin et al. Jun 2013 A1
20130166332 Hammad Jun 2013 A1
20130173474 Ranganathan et al. Jul 2013 A1
20130179352 Dwyre et al. Jul 2013 A1
20130185167 Mestre Jul 2013 A1
20130191227 Pasa et al. Jul 2013 A1
20130191277 O'Leary et al. Jul 2013 A1
20130191278 O'Leary et al. Jul 2013 A1
20130200999 Spodak et al. Aug 2013 A1
20130204785 Monk et al. Aug 2013 A1
20130226720 Ahluwalia et al. Aug 2013 A1
20130226751 Friedholm et al. Aug 2013 A1
20130226799 Raj Aug 2013 A1
20130232032 Chaturvedi et al. Sep 2013 A1
20130238455 Laracey Sep 2013 A1
20130246260 Barten et al. Sep 2013 A1
20130246261 Purves et al. Sep 2013 A1
20130246265 Al-Sahli et al. Sep 2013 A1
20130254102 Royyuru Sep 2013 A1
20130254114 Smith Sep 2013 A1
20130254115 Pasa et al. Sep 2013 A1
20130260734 Jain et al. Oct 2013 A1
20130262309 Gadotti Oct 2013 A1
20130262316 Hruska Oct 2013 A1
20130282588 Hruska Oct 2013 A1
20130290121 Simakov et al. Oct 2013 A1
20130290169 Bathula et al. Oct 2013 A1
20130304559 Stone et al. Nov 2013 A1
20130304642 Campos Nov 2013 A1
20130317928 Laracey Nov 2013 A1
20130317984 O'Leary et al. Nov 2013 A1
20130332344 Weber Dec 2013 A1
20130332353 Aidasani et al. Dec 2013 A1
20130346302 Purves et al. Dec 2013 A1
20140006129 Heath Jan 2014 A1
20140006276 Grigg et al. Jan 2014 A1
20140012750 Kuhn et al. Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140019360 Yang Jan 2014 A1
20140038546 Neal et al. Feb 2014 A1
20140058855 Hussein Feb 2014 A1
20140058936 Ren et al. Feb 2014 A1
20140067677 Ali et al. Mar 2014 A1
20140074581 Johnson et al. Mar 2014 A1
20140074637 Hammad Mar 2014 A1
20140074655 Lim et al. Mar 2014 A1
20140074724 Gordon Mar 2014 A1
20140081783 Paranjape Mar 2014 A1
20140081854 Sanchez et al. Mar 2014 A1
20140089171 Gandhi Mar 2014 A1
20140096215 Hessler Apr 2014 A1
20140100975 Van Apr 2014 A1
20140101048 Gardiner et al. Apr 2014 A1
20140108254 Lee Apr 2014 A1
20140108263 Ortiz et al. Apr 2014 A1
20140109200 Tootill et al. Apr 2014 A1
20140114856 Jung et al. Apr 2014 A1
20140118704 Duelli et al. May 2014 A1
20140122310 Torrens et al. May 2014 A1
20140122563 Singh et al. May 2014 A1
20140129357 Goodwin May 2014 A1
20140129442 Hanson et al. May 2014 A1
20140136352 Ramakrishna May 2014 A1
20140143089 Campos et al. May 2014 A1
20140180849 Kimberg et al. Jun 2014 A1
20140188704 Grossman et al. Jul 2014 A1
20140188718 Grossman et al. Jul 2014 A1
20140188719 Poornachandran et al. Jul 2014 A1
20140207680 Rephlo Jul 2014 A1
20140214640 Mallikarjunan et al. Jul 2014 A1
20140222670 Concannon Aug 2014 A1
20140244506 Gramling Aug 2014 A1
20140249948 Graylin et al. Sep 2014 A1
20140250003 Levchin et al. Sep 2014 A1
20140258135 Park et al. Sep 2014 A1
20140279097 Alshobaki Sep 2014 A1
20140279469 Mendes Sep 2014 A1
20140279489 Russell et al. Sep 2014 A1
20140279504 Cook Sep 2014 A1
20140279566 Verma et al. Sep 2014 A1
20140282068 Levkovitz et al. Sep 2014 A1
20140297435 Wong Oct 2014 A1
20140297520 Levchin et al. Oct 2014 A1
20140297524 Ravindranath et al. Oct 2014 A1
20140304095 Fisher Oct 2014 A1
20140310173 Caldwell Oct 2014 A1
20140310182 Cummins Oct 2014 A1
20140337175 Katzin Nov 2014 A1
20140337621 Nakhimov Nov 2014 A1
20140344153 Raj et al. Nov 2014 A1
20140347265 Aimone et al. Nov 2014 A1
20140351072 Wieler Nov 2014 A1
20140351126 Priebatsch Nov 2014 A1
20140351130 Cheek Nov 2014 A1
20140365363 Knudsen et al. Dec 2014 A1
20140376576 Jespersen et al. Dec 2014 A1
20140379576 Marx Dec 2014 A1
20150019944 Kalgi Jan 2015 A1
20150026049 Theurer et al. Jan 2015 A1
20150032626 Dill et al. Jan 2015 A1
20150032627 Dill et al. Jan 2015 A1
20150035643 Kursun Feb 2015 A1
20150039462 Shastry et al. Feb 2015 A1
20150046241 Salmon et al. Feb 2015 A1
20150046339 Wong et al. Feb 2015 A1
20150074774 Nema et al. Mar 2015 A1
20150088633 Salmon et al. Mar 2015 A1
20150089568 Sprague et al. Mar 2015 A1
20150095075 Breuer et al. Apr 2015 A1
20150095219 Hurley Apr 2015 A1
20150100442 Van Heerden et al. Apr 2015 A1
20150112781 Clark Apr 2015 A1
20150140960 Powell et al. May 2015 A1
20150154588 Purves Jun 2015 A1
20150178693 Solis Jun 2015 A1
20150178725 Poetsch Jun 2015 A1
20150186872 Sobol et al. Jul 2015 A1
20150186875 Zhang et al. Jul 2015 A1
20150186886 Schwalb et al. Jul 2015 A1
20150186952 Brown et al. Jul 2015 A1
20150187021 Moring et al. Jul 2015 A1
20150193869 Del Vecchio et al. Jul 2015 A1
20150220914 Purves et al. Aug 2015 A1
20150229622 Grigg et al. Aug 2015 A1
20150254698 Bondesen et al. Sep 2015 A1
20150254699 Bondesen Sep 2015 A1
20150278799 Palanisamy Oct 2015 A1
20150287015 Kaplinger et al. Oct 2015 A1
20150287037 Salmon et al. Oct 2015 A1
20150319158 Kumnick Nov 2015 A1
20150324768 Filter Nov 2015 A1
20150332252 Shahrokhi et al. Nov 2015 A1
20150339662 Huang et al. Nov 2015 A1
20150371234 Huang et al. Dec 2015 A1
20150371326 Montesano et al. Dec 2015 A1
20160004876 Bye et al. Jan 2016 A1
20160012465 Sharp Jan 2016 A1
20160026999 Kurian Jan 2016 A1
20160042341 Griffin et al. Feb 2016 A1
20160042344 Thimmana et al. Feb 2016 A1
20160048828 Lee Feb 2016 A1
20160063496 Royyuru et al. Mar 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160086170 Hurt et al. Mar 2016 A1
20160086179 Barbier Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160092866 Liberty et al. Mar 2016 A1
20160092868 Salama et al. Mar 2016 A1
20160092874 O'Regan et al. Mar 2016 A1
20160125396 Brickell et al. May 2016 A1
20160125409 Meredith et al. May 2016 A1
20160125417 Huang et al. May 2016 A1
20160132875 Blanco May 2016 A1
20160140555 Scipioni May 2016 A1
20160162889 Badenhorst Jun 2016 A1
20160342962 Brown et al. Nov 2016 A1
20160342992 Lee Nov 2016 A1
20160379215 Clerkin Dec 2016 A1
20170017958 Scott Jan 2017 A1
20170061402 Mobin et al. Mar 2017 A1
20170061406 Adams et al. Mar 2017 A1
20170164139 Deselaers et al. Jun 2017 A1
20170193468 Chougule et al. Jul 2017 A1
20170228715 Gurunathan Aug 2017 A1
20170236118 Laracey Aug 2017 A1
20180007052 Quentin Jan 2018 A1
20180047016 Sarin Feb 2018 A1
20180068308 Gupta et al. Mar 2018 A1
20180082283 Sharma Mar 2018 A1
20180157336 Harris et al. Jun 2018 A1
20180322488 Arana et al. Nov 2018 A1
20180365675 Sivaraman Dec 2018 A1
20180374076 Wheeler Dec 2018 A1
20190304029 Murray et al. Oct 2019 A1
20210166260 Ho et al. Jun 2021 A1
Foreign Referenced Citations (13)
Number Date Country
WO-2011113121 Sep 2011 WO
WO-2012139003 Oct 2012 WO
WO-2013079793 Jun 2013 WO
WO-2014012138 Jan 2014 WO
WO-2014111888 Jul 2014 WO
WO-2014207615 Dec 2014 WO
WO-2015016780 Feb 2015 WO
WO-2015023172 Feb 2015 WO
WO-2016009198 Jan 2016 WO
WO-2016053975 Apr 2016 WO
WO-2016097879 Jun 2016 WO
WO-2016172107 Oct 2016 WO
WO-2016196054 Dec 2016 WO
Non-Patent Literature Citations (17)
Entry
Office Action on U.S. Appl. No. 14/266,580, dated Apr. 9, 2015, 16 pages.
Office Action on U.S. Appl. No. 14/266,580, dated Dec. 2, 2014, 10 pages.
White, Ron, “How Computers Work”, Que Publishing, 7th Ed, Oct. 15, 2003, p. 4. 23 pages.
“Cashcloud Mobile eWallet”, FinTech Forum Exchange, Jul. 1, 2016. 4 pages.
“Cashcloud mobile eWallet”, Popote Payments, www.popotepayments.com, 2016. 6 pages.
A Smart Card Alliance Payments Council White Paper; Publication date: Sep. 2011; Publication No. PC-11002; 191 Clarksville Rd. Princeton Junction, NJ 08550 www.smartcardalliance.org (Year: 2011).
How to Control Children's Spending on Debit Cards | Money | by Jill Paperworth, May 10, 2009, https:www.theguardian.com/money/2009/mar/.../children-debit-cards-online-spend . . . (Year: 2009).
Lehdonvirta et al., UbiPay: Minimizing Transaction Costs with Smart Mobile Payments, Proceedings of the 6th International Conference on Mobile Technology, Application & Systems, ACM, Jan. 2009, retrieved from the Internet at http://www.researchgate.net/profile/Tatsuo_Nakajima/publication/220982951_UbiPay_minimizing_transaction_costs_with_smart_mobile_payments/links/548e9dad0cf225bf66a607bb.pdf on Oct. 30, 2015, 8 pages.
Smart Card Alliance, “The Mobile Payments and NFC Landscape: A U.S. Perspective,” Sep. 2011. 53 pages.
EMV, “Payment Tokenisation Specification Technical Framework”, 2014 EMVCO, LLC. 84 pages.
Examiner's Answer issued in U.S. Appl. No. 15/401,664 dated Sep. 23, 2021.
Kyrillidis, Mayes, Markantonakis; Card-present Transactions On The Internet Using The Smart CardWeb Server; 2013, IEEE; 12th (Year: 2013).
Ron White, How Computers Work, Oct. 15, 2003, Que, 7th Edition, p. 4. (Year: 2003).
The University of Alaska staff, Managing Finance Reports with Vista Plus, Aug. 2008, The University of Alaska, web, 2-20 (Year: 2008).
Latterell, Kayla, “How Do Gift Cards Work?” https://www.cardsource.com/news/how-do-gift-cards-work, pp. 1-6.
J. Gao, V. Kulkarni, H. Ranavat, L. Chang and H. Mei, “A 2D Barcode-Based Mobile Payment System,” 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009, pp. 320-329, doi: 10.1109/MU E.2009.62. (Year: 2009).
Hany Herb, Hassan Farahat, and Mohamed Ezz, SecureSMSPay: Secure SMS Mobile Payment Model, 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification (pp. 11-17) (Year:2008).