Use limitations for secondary users of financial accounts

Information

  • Patent Grant
  • 12086809
  • Patent Number
    12,086,809
  • Date Filed
    Monday, September 27, 2021
    3 years ago
  • Date Issued
    Tuesday, September 10, 2024
    4 months ago
Abstract
As disclosed, a processor is configured to receive information relating to an account user and a restriction relating to the account user's ability to spend funds from an account. Based on the information relating to the account user, the processor generates an electronic message comprising a link structured to allow the account user to download, at a user computing device, an instance of a mobile wallet application, wherein the instance of the mobile wallet application is structured to gather location data from at least one of a Bluetooth device interfacing with the user computing device, a WiFi device interfacing with the user computing device, and an application provided to the user computing device, and wherein the location data is used to allow a transaction based on a determination that the user computing device is within a threshold distance from a second computing device.
Description
FIELD

The present disclosure relates generally systems that use mobile devices to initiate fund transfer requests.


BACKGROUND

Many financial institutions offer mobile banking applications. The banking applications typically provide the customers of the financial institution access to information about the customers' accounts from customer computing devices, such as smartphones, portable media players, tablet computers, and other portable computing devices. The information includes account balances, transaction history, and the like. Some mobile banking applications allow customers to perform simple financial transactions, such as transferring money between accounts, sending a check to payees, and paying bills. Enhanced mobile banking applications to facilitate greater account control would be desirable.


SUMMARY OF THE INVENTION

One embodiment of the invention relates to a computer-implemented method. The method includes receiving, by a processor of a financial institution device from a customer computing device associated with a primary account holder, a request to add a secondary user to an account of the primary account holder. The method further includes receiving, by the processor and from the customer computing device, information relating to the secondary user. The method includes receiving, by the processor and from the customer computing device, rule and limitation information relating to at least one rule or limitation that restricts the secondary user's ability to spend funds from the account. The method further includes updating, by the processor, at least one database based on the information relating to the secondary user and the rule and limitation information.


One embodiment of the invention relates to a financial institution computing system. The system includes an account database, a mobile wallet profile database, a network interface, and a processor. The processor is configured to receive a request to add a secondary user to an account of the primary account holder from a customer computing device associated with a primary account holder. The processor is further configured to receive information relating to the secondary user. The processor is configured to receive rule and limitation information relating to at least one rule or limitation that restricts the secondary user's ability to spend funds from the account. The processor is further configured to update at least one database based on the information relating to the secondary user and the rule and limitation information.


One embodiment of the invention relates to a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by a processor of a financial institution computing system, cause the financial institution computing system to perform operations to restrict a primary user's access to an account owned by a primary account holder. The operations include receive a request to add the secondary user to the account of the primary account holder from a customer computing device associated with a primary account holder. The operations further include receive information relating to the secondary user. The operations include receive rule and limitation information relating to at least one rule or limitation that restricts the secondary user's ability to spend funds from the account. The operations further include update at least one database based on the information relating to the secondary user and the rule and limitation information.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic diagram of a computer-implemented mobile wallet payment system according to an exemplary embodiment.



FIGS. 2A through 2C are exemplary user interfaces of the mobile wallet client application for the computer-implemented mobile wallet payment system of FIG. 1.



FIG. 3 is a flow diagram of a method of adding a secondary user to an account according to an exemplary embodiment.



FIG. 4 is a flow diagram of a method of processing a purchase request by a secondary user of an account via a mobile wallet system according to an exemplary embodiment.





DETAILED DESCRIPTION

Referring to the figures generally, systems and methods for sharing financial accounts via a mobile wallet system are described. The mobile wallet system allows for a master wallet associated with a primary account holder to provide limited access to an account of the primary account holder to secondary users. The primary account holder can limit a secondary user's level of access to the funds in the account by establishing spending rules and limits for each secondary user. The rules and limits restrict the secondary users' abilities to spend funds in the account. The rule and limit types include spending limits, types of goods and services restrictions, store specific restrictions, purpose of purchase rules, purchase timing rules, geographic restrictions, group purchase rules.


Referring to FIG. 1, a schematic diagram of a computer-implemented mobile wallet payment system 100 is shown according to an exemplary embodiment. System 100 allows for users to facilitate transactions into and out of accounts associated with a financial institution 102 via mobile wallet accounts accessed on mobile devices 104. The users may be business entities and/or individual customers having one or more accounts with the financial institution 102. The accounts may include business or consumer demand deposit accounts (e.g., checking accounts, savings accounts, etc.) and credit accounts (credit cards, lines of credit, etc.). The mobile wallet account can be created for the user to transmit funds from an account with the financial institution 102 in return for the purchases of goods or services from various merchants 106. Additionally, funds can be transferred between accounts of different users (e.g., from a first mobile wallet to a second mobile wallet). In some arrangements, the system 100 integrates mobile wallet programs of multiple financial institutions. The relationships between the various devices and users of system 100 are described in further detail below.


The financial institution 102 includes a financial institution backend system 108. Although shown as a single computing device, the backend system 108 may be separated into a plurality of devices (e.g., a plurality of servers). The backend system 108 maintains various information relating to the accounts maintained with the financial institution 102 and the customers of the financial institution. The backend system 108 includes account databases 110. The account databases 110 are where the financial institution stores information relating to accounts, including account balance information and account owner information.


The backend system 108 includes components to provide the mobile wallet service to its customers. Accordingly, the backend system 108 includes mobile wallet transaction logic 112 and a mobile wallet profiles database 114. The mobile wallet profiles database 114 maintains a database of mobile wallet users and associations of the mobile wallet users with various accounts in the account databases 110. As described in further detail below, the mobile wallet profiles database 114 also maintains a listing of rules and limits (if any) for each mobile wallet user with respect to each account that mobile wallet user is associated with. The rules and limits can restrict secondary users' spending privileges with respect to any associated accounts. The mobile wallet transaction logic 112 interfaces with the mobile devices 104 and merchant computing systems 116 to perform mobile wallet transactions (as described in further detail below). The mobile wallet transaction logic 112 may include computer-readable instructions executed by a processor of the backend system 108 that cause the backend system 108 to operate in the manner described. The backend system 108 includes network interface logic 118 to help facilitate the mobile wallet transactions. The network interface logic 118 allows the backend system 108 to communicate with mobile devices 104 and merchant computing systems 116 via a network 120. In some arrangements, the network 120 is the internet.


Still referring to FIG. 1, the mobile device 104 may be used by an individual user (e.g., a business owner or employee, a consumer, and so on) to create and interact with a mobile wallet account with the financial institution 102. The mobile device 104 may, for example be, handheld computer, a cellular phone, smartphone, mobile handheld wireless e-mail device, a tablet computer, personal digital assistant, portable gaming devices, or another suitable device. The mobile device 104 comprises network interface logic 122, a display 124, an input 126, and a mobile wallet client application 128. In some arrangements, the display 124 and input 126 are integrated in a touchscreen display. Network interface logic 122 may include, for example, program logic that connects the mobile device 104 to the network 120. The mobile device 104 may receive and display user interfaces including account information, transaction instructions, and so on. In some arrangements, the user interfaces may be used to initiate payments from the user's mobile wallet to merchants 106. In other arrangements, the user interfaces may be used to provide secondary mobile wallet users access to the user's account, including setting up account rules and limitations. Such user interfaces are presented to the user via the display device 124. The input 126 may be used to permit the user to initiate account access and to facilitate receiving requested information from the user. As will be appreciated, in addition to or instead of the mobile device 104, users may also be provided with the ability to access the mobile wallet payment system 100 using another type of computer (e.g., a desktop or laptop computer executing browser software) to perform the operations described herein as being performed by the mobile device 104.


The mobile wallet client application 128 may comprise program logic executable by the mobile device to implement at least some or all of the functions described herein. As will be appreciated, the level of functionality that resides on the mobile device 104 as opposed to the financial institution backend system 108 may vary depending on the implementation. The client application 128 may be a web browser that is configured to receive and display mobile web pages (e.g., web pages prompting the user to provide information to create an account, web pages displaying account balance information and past transactions, and so on) or an application executed by the mobile device 104. The mobile wallet client application 128 may also include a code/token generator capable of generating a unique code/token for each transaction. The unique code/token may then be transmitted by the mobile device 104 as part of a transaction to facilitate authentication of the transaction and the user of the mobile device 104. As will be appreciated, the user may also use other devices (e.g., laptop or desktop computer system, not shown) to create and access the mobile wallet accounts.


In FIG. 1, the mobile wallet application 128 is used in connection with merchant computing systems 116 located at various physical store locations. As previously indicated, however, the mobile wallet application 128 may also be used in connection with online merchant transactions (e.g., an internet retailer). For example, in another embodiment, merchants 106 may be provided with the ability to have a mobile storefront and profile within the mobile wallet application 128. For example, merchants 106 may be provided with the ability to display marketing material, provide information, and promote products or discounts. Merchants 106 may also be provided with the ability to sell items directly through their mobile storefront for the account holder to purchase from within the mobile application 128.


The mobile wallet client application 128 may include, among other features, transaction logic 130, account information 132, and sharing rules and limitations 134. The transaction logic allows users of the mobile device 104 to provide funds to the merchants 106 in exchange for goods or services from an account with the financial institution 102 via the mobile wallet client application 128. This process is described in further detail in U.S. patent application Ser. No. 13/456,169, entitled “SYSTEM AND METHOD FOR A MOBILE WALLET,” filed on Apr. 25, 2012, and U.S. patent application Ser. No. 13/456,157, entitled “SYSTEM AND METHOD FOR A MOBILE WALLET,” filed on Apr. 25, 2012, which are hereby incorporated by reference in their entireties and for all purposes. The account information 132 stores associations between the user of the mobile device 104 and any accounts the user may own at the financial institution 102 or any accounts with the financial institution 102 that the user is a secondary user (e.g., an authorized user). The account information 132 is periodically updated based on information received from the backend system 108 (e.g., every minute, every ten minutes, every time the user logs into the mobile wallet client application 128, etc.). The sharing rules and limitations 134 include various rules and configurations available to the user when providing a secondary user access to the user's account via the mobile wallet client application 128.


Still referring to FIG. 1, the merchant computing systems 116 each include transaction logic 136 and network interface logic 138. Similar to mobile device 104, the transaction logic 136 allows merchants to accept mobile wallet payments from users of the mobile devices 104. The payments are account transfers from the financial institution into accounts associated with the merchants 116. The network interface logic 138 may include, for example, program logic that connects the merchant computing systems 116 to the network 120 to enable data communications between the merchant computing systems 116 and the mobile devices 104 and financial institution backend system 108.


As discussed above and as described in further detail below, the system 100 allows for a primary account holder to share an account with at least one secondary user. The secondary user is associated with the account. The secondary user's access rights (e.g., abilities to spend funds from the account at will) may be limited by certain rules and limitations levied by the primary account holder during initial configuration of the secondary user's access to the account. In an alternative arrangement, the primary account holder can fund a secondary wallet in the mobile wallet payment system 100 with the funds of the account. The secondary wallet is essentially a second account in the name of the secondary user. Although the first arrangement is described (the secondary user arrangement) for simplicity's sake, the described systems and methods can be applied to the second arrangement (the second account/wallet arrangement). Accordingly, in arrangements where a new second account is created instead of adding a second authorized user to an existing account, the second account can be subject to the same rules and limitations as the secondary user's access rights are subject to in the described arrangement.


Referring to FIGS. 2A through 2C, exemplary user interfaces of the mobile wallet client application 128 as presented on the display 124 of the mobile device 104 are shown according to exemplary embodiments.


Referring to FIG. 2A, an account overview user interface 200 of the mobile wallet client application 128 is shown according to an exemplary embodiment. The user interface 200 relates to an overview of a user's account (shown as a checking account, but may be any type of account with the financial institution 102) as viewed from the user's mobile wallet client application 128. The user is the primary account holder of the checking account. The overview provides the user with general account information, such as account number or a portion there of, account balance, and any authorized secondary users of the checking account.


As described above and in further detail below, secondary users can use their personal mobile wallets to make purchases from the primary account holder's account. Accordingly, when a primary account holder adds a secondary user to the account, the primary account holder provides authorization for the secondary user to purchase goods and services with funds in the account via the secondary user's mobile wallet client application. To prevent or limit unauthorized spending by the secondary user, the primary account holder has the ability to place limits and rules on the secondary users. In the present example, Bob is the primary account holder and John Doe and Jim Smith are both authorized secondary users of the checking account. Accordingly, John Doe and Jim Smith can both access the funds of the checking account via their respective mobile wallets (as accessed via their respective mobile devices 104 and mobile wallet client applications 128). In the case of John Doe, John Doe has full access to the funds in the checking account (i.e., there are no rules or limits placed on John Doe's access to the checking account). In the case of Jim Smith, Jim Smith has limited access to the funds in the checking account (i.e., there are rules and/or limits placed on Jim Smith's access to the checking account). The arrangement of primary account holder and secondary users easily allows the primary account holder to provide funds to the secondary users. This may be beneficial in certain types of fiduciary relationships between people and entities. For example, the primary account holder may be a parent (or a set of parents) that authorizes their children as secondary users as a way of providing money to their children with restricted spending capabilities. As another example, the primary account holder may be an employer (e.g., a company) that authorizes their employees as the secondary users as a way of providing expense accounts with limited spending privileges. Other primary-secondary relationships are also contemplated, such as trustee-beneficiary relationships and child-elderly parent relationships. Still further, it is possible that two primary joint account holders (e.g., a married couple) can impose limits on each other with the described systems and methods. Additionally, it is possible for a primary account holder to self-impose limits on his spending out of an account as a way of budgeting.


Since the user is the primary account holder, the user has various account management options. In some arrangements, the account management options may also be available to secondary users having full access to the account. The user can add another secondary user by interacting with button 202 (“Add New Secondary User”). The user can remove an already existing secondary user, such as John Doe or Jim Smith, by interacting with button 204 (“Remove Secondary User”). The user can modify access type or level of an added secondary user by interacting with button 206 (“Modify Access Type”).


Referring to FIG. 2B, a user interface 208 for adding a new secondary user to the account via the mobile wallet client application 128 is shown according to an exemplary embodiment. The primary account holder is directed to the user interface 208 after interacting with button 202 of user interface 200. The user interface 208 allows the primary account holder to add secondary users to the account. The secondary users can be added in multiple ways. A first way to add a secondary user is to add an existing secondary user. An existing secondary user is a user that was previously added by the primary account holder (e.g., on another account owned by the primary account holder, previously added and removed on the account, etc.). Accordingly, the backend system 108 stores information relating to the previously added secondary users by the primary account holder. To add a previously added secondary user as a new or current secondary user for the account, the primary account holder interacts with the check boxes 210 to select the secondary user to be added and then presses the button 212 (“Add Selected”). The selected user is then added as a secondary user. Another way to add a secondary user is to manually add a secondary user through manual input of the secondary user's information, such as the secondary user's name, address, phone number, date of birth, social security number, the mobile wallet username, or a combination thereof. To do so, the primary account holder presses button 214, and the mobile wallet client application 128 directs the primary account holder to the appropriate interface to manually add the secondary user. A further way to add a secondary user is to import a contact (i.e., a secondary user's information). For example, the secondary user's information may be imported from a social media account by pressing button 216. As another example, the secondary user's information may be imported from an address book (e.g., an address book specific to the mobile wallet client application 128, a contacts application of the mobile device 104, etc.) by pressing button 218. If the secondary user is not already registered with the financial institution 102 (i.e., the secondary user does not currently have a mobile wallet account), the backend system 108 can initiate a message, such as a text message or an e-mail message, instructing the added secondary user to download the mobile wallet client application 128 and to register with the financial institution 102. In some arrangements, the message includes a unique access code or invite code that allows the backend system 108 to recognize the secondary user during the secondary user's registration with the financial institution 102.


Referring to FIG. 2C, a user interface 220 for modifying an access type (e.g., setting up new rules and limits or removing existing rules and limits) for a secondary user via the mobile wallet client application 128 is shown according to an exemplary embodiment. The primary account holder is directed to the user interface 220 by interacting with button 206 of user interface 200. Through the user interface 220, the primary account holder can limit a secondary user's access to the funds in the account by providing spending rules and limits for each secondary user. As shown in FIG. 2C, Jim Smith has limited access to the primary account holder's account. Specifically, Jim Smith is limited to spending $500 a month out of the account and is limited to only purchases at gas stations within California. Any one of the three rules can be edited (e.g., changed from California to California and Nevada, spending limit increased or decreased, etc.) or deleted via the user interface 220. Additionally, new rules can be added. The primary account holder can select a rule type through a dropdown menu 222 and configure the selected rule type on another user interface by interacting with button 224 (“Configure Rule”). A plurality of rule and limit types are available to the primary account holder. The rule and limit types include spending limits, types of goods and services restrictions, store specific restrictions, purpose of purchase rules, purchase timing rules, geographic restrictions, group purchase rules. Each rule and limitation restricts how a secondary user can spend the funds in the primary account holder's account. Each rule or limit type is described in further detail below.


Spending Limits


One type of rule or limit the primary account holder can impose on secondary users is a spending limit. The spending limit provides for a maximum amount of money the secondary user is allowed to spend from the primary account holder's account. In some arrangements, the spending limit may be on a per purchase basis. For example, the primary account holder can limit a given secondary user to purchases of $50, in which case the secondary user can make as many purchases as he wants, as long as each purchase less than or equal to $50. If the secondary user attempts to make a purchase for $75, the mobile wallet client application will not allow the purchase to go through because the $75 purchase exceeds the $50 limit set by the primary account holder. In other arrangements, the spending limit is a cumulative spending limit. For example, the primary account holder can limit the total spending of a second user to $500, in which case the secondary user can make a plurality of purchases as long as the total of the purchases remains under $500. If the secondary user has already made ten purchases totaling $450 and the secondary user tries to make an eleventh purchase for $75, the mobile wallet client application will not allow the purchase to go through because the $75 purchase will cause the total to exceed the $500 limit. The cumulative spending limit may reset after a given period of time. The given period of time can be a number of minutes, a number of hours, a number of days, a number of weeks, a number of months, etc. For example, the above mentioned $500 cumulative spending limit may reset every month such that the secondary user can spend up to $500 a month from the primary account holder's account (e.g., as shown FIG. 2C). This type of cumulative spending limit that resets after a given period of time may be good for parents (primary account holders) providing allowances to their children (secondary users), employers (primary account holders) providing spending accounts to their employees (secondary users), and the like. As another example, the cumulative spending limit may reset responsive to inputs received from the primary account holder. For example, the secondary user may be permitted to spend $500 at a time. After that, the secondary user may no longer spend funds, until the primary user authorizes another $500 in spending.


Types of Goods and Services Restrictions


Another type of rule or limit the primary account holder can impose on secondary users are restrictions on the types of goods and services the secondary user can purchase. The restrictions on the types of goods and services may be implemented in different ways. A first way is for the primary account holder to indicate acceptable types of goods and services for the secondary users to purchase. The acceptable types of goods and services may be a specific good or service or a category of goods and services. For example, an employer (primary account holder) may be in the delivery business and provide his employee delivery drivers (secondary users) access to a spending account via the mobile wallet client application. The employer may limit the employees' spending to specific goods, such as gasoline, to specific types of goods, such as automotive related goods and services, or to a combination thereof. Such a rule prevents (or at least limits) an employee's or secondary user's potential abuse of the spending privileges. A second way is for the primary account holder to indicate non-acceptable types of goods and services for the secondary users to purchase. The non-acceptable types of goods and services may be a specific good or service or a category of goods and services. For example, a parent (primary account holder) may provide access to the account to his child (secondary user). However, the parent may impose a rule that the child cannot spend money from the account for specific goods, such as Budweiser, for types of goods, such as alcohol, or for a combination thereof. Such a rule prevents the secondary user from purchasing specific goods or services or specific types of goods and services via the mobile wallet client application.


In some arrangements, the merchants 106 may not provide specific product information with purchase requests. Often, merchants 106 view this information as a trade secret and a valuable customer metric tool. In these situations, the financial institution 102 can partner with certain merchants 106 to share this information to allow types of goods and services restrictions to be implemented. The merchants 106 opting in to the program may be advertised as preferred merchants by the financial institution 102 in exchange for their participation. Further, the merchants 106 can be listed as exclusive store options for the store specific restrictions (as discussed in further detail below).


Store Specific Restrictions


Another type of rule or limit the primary account holder can impose on secondary users is restrictions on the stores that the secondary users can purchase goods and services with funds from the account. When used in reference to store specific restrictions (and not with respect to data storage), “stores” refers to retailers, service providers, restaurants, bars, clubs, marketplaces, or any other company or individual where a user can purchase goods or services. Similar to the restrictions on the types of goods and services, the restrictions on the stores can work two different ways. A first way is for the primary account holder to indicate acceptable stores or store types for the secondary users. The acceptable stores may include specific branded stores (e.g., Shell, BP, etc.) or may include specific types of stores (e.g., gas stations). For example, an employer (primary account holder) may be in the delivery business and provide his employee delivery drivers (secondary users) access to a spending account via the mobile wallet client application. The employer may limit the employees' spending to specific stores, such as Shell and BP gas stations, to specific types of stores, such as gas stations, or to a combination thereof. A second way is for the primary account holder to indicate non-acceptable stores and store types for the secondary users. For example, a parent (primary account holder) may provide access to the account to his child (secondary user). However, the parent may impose a rule that the child cannot spend money at a specific store, such as John's Bar and Tap, for types of store, such as liquor stores and bars, or a combination thereof.


Purpose of Purchase Rules


Yet another type of rule or limit the primary account holder can impose on secondary users are restrictions of purchases by the secondary users from the account based on the purpose of the purchase. In some arrangements, the primary account holder can request that the secondary user provide a purpose for each purpose prior to the purchase being authorized by the mobile wallet client application. Similar to the restrictions on the types of goods and services and the types of stores, the restrictions based on the purposes of the purchase can work two different ways. A first way is for the primary account holder to indicate acceptable purchase purposes. For example, an employer (primary account holder) may be in the delivery business and provide his employee delivery drivers (secondary users) access to a spending account via the mobile wallet client application. The employer may limit the employees' spending to purchases for refueling purposes. A second way is for the primary account holder to indicate non-acceptable purchase purposes. For example, a parent (primary account holder) may provide access to the account to his child (secondary user). However, the parent may impose a rule that the child cannot spend money for social events.


Purchase Timing Rules


A further rule or type of limit the primary account holder can impose on secondary users is restrictions on the timing of purchases made by the secondary users. The timing restriction may relate to allowing or prohibiting purchases during designated time periods. The designated time period may be a time range (e.g., from 12 am through 7 am), a day of the week, a month of the year, holidays, or a combination thereof. For example, an employer (primary account holder) may prohibit employees (secondary users) from making purchases during non-business hours (e.g., no purchases allowed all day Saturday and Sunday and between the hours of 5:01 pm through 8:59 am Mondays through Fridays).


Geographic Restrictions


Another type of limit the primary account holder can impose on secondary users are restrictions of purchases based on the location of the secondary user. The geographic restriction may relate to either allowing or prohibiting purchases based on the secondary user's detected location. The primary account holder defines a specific geographic zone where purchases are either allowed or prohibited defines. The geographic zone may relate to a radius from a specific geographic point (e.g., a radius of five miles from a particular address), within a designated city or township limit, within a county, within a state, within a country, and so on. For example, an employer (primary account holder) may be in the delivery business and provide his employee delivery drivers (secondary users) access to a spending account via the mobile wallet client application. The employer may limit the employees' spending to purchases made within the company's delivery zone (e.g., a thirty mile radius from the company's dispatch warehouse, a city, a state, etc.). Such a limit prevents employee spending for tasks not related to their jobs.


Group Purchase Rules


Yet another type of rule or limit the primary account holder can impose on secondary users is restrictions based on the secondary user being with (e.g., near or in proximity to) a prohibited person at the time of a purchase attempt. The primary account holder can program rules that prevent purchases when secondary users are in proximity (e.g., within a set distance, such as 100 feet) to certain identified individuals. A group purchase rule may help parents (primary account users) prevent their children (secondary users) from associating with certain individuals. Accordingly, prior to allowing a purchase by a secondary user, the system 100 first determines whether the secondary user is near any identified prohibited individuals. The system 100 may locate the identified prohibited individuals based on known locations of mobile devices associated with the prohibited individuals that are running the mobile wallet client application, based on scanning social media activity of the secondary user (e.g., for recent posts indicating that the secondary user is with a prohibited individual), based on locating the secondary user and prohibited users (e.g., via Bluetooth Low Energy location beacons, via a peer-to-peer chat client, via comparisons of WiFi SSIDs, etc.) or by another suitable method. For example, if the prohibited individual is a registered user of the financial institution 102 and the prohibited individual's mobile device 104 is running the mobile wallet client application 128, the backend system 108 can track the location of the prohibited individual and compare it with the location of the secondary user's purchase. As another example, some social media applications allow users to locate friends or contacts that are nearby. The mobile wallet application client 128 can interface with the social media application and compare the listing of nearby friends with the listing of prohibited individuals. If the secondary user is near a prohibited individual, the transaction is not allowed. Further, the group purchase rule can also add a timing aspect. For example, if the secondary user was near a prohibited individual within a certain time period (e.g., two hours), the transaction can still be rejected. Such an arrangement prevents the prohibited individual and secondary user from tricking the system 100 by either walking away from the secondary user or shutting off his mobile device at the time of the purchase to allow the purchase to continue.


The above described rule types can be combined to form complex spending limitations for secondary users. For example, with respect to the employer (primary account holder) and employee (secondary user) examples provided above, the employer may implement a spending limit, a timing restriction, and a restriction on the types of goods that employees can purchase via the mobile wallet client application. An exemplary combined rule might indicate that the employee is only allowed to spend up to $500 a week on gasoline on Mondays through Fridays between the hours of 8 am and 6 pm.


The above described rules are applied on a secondary user by secondary users basis. Accordingly, all secondary users associated with a single account do not necessarily have the same set of rules and limitations. As shown in FIG. 2A, both John Doe and Jim Smith are secondary users of the same primary account holder's account, and each of John Doe and Jim Smith have a different level of access.


Referring to FIG. 3, a flow diagram of a method 300 of adding a secondary user to an account is shown according to an exemplary embodiment. The method 300 is performed by a backend system (e.g., backend system 108) of a financial institution (e.g., financial institution 102). The backend system provides and maintains a mobile wallet system (e.g., system 100) in which customers of the financial institution can initiate transactions between other customers or merchants via a mobile wallet application (e.g., mobile wallet client application 128) running on the customers' computing devices (e.g., mobile device 104). As discussed above and as described in further detail below, primary account holders can provide access to an account to secondary users through the mobile wallet application. The access can be full access (e.g., having the same set of spending privileges as those of the primary account holder) or limited access (e.g., the secondary user's purchases are subject to certain restrictions, rules, and limits).


Method 300 begins when primary account holder login information is received (302). The primary account holder login information is received by the backend system from a user's computing device (such as a mobile device). The receipt of the primary account holder login information signals to the backend system that the primary account holder is attempting to access his accounts through a financial institution application (e.g., mobile wallet client application 128). The primary account holder login information is verified by the backend system prior to providing the primary account holder access to his accounts via the computing device. After the primary account holder login information is verified, the user of the computing device is authenticated as the primary account holder, and the user is provided access to the primary account holder's accounts. Access to the accounts allows the user to view account information for each of the accounts (e.g., balance information, transaction information, etc.), perform transactions via the primary account holder's mobile wallet, add secondary users to specific accounts, assign limits and rules to secondary users on accounts, and the like.


After the primary account holder has logged into his accounts, an account selection is received (304). The account selection is received by the backend system from the computing device. The account selection relates to a selection by the primary account holder of an account from a listing of accounts. For example, after logging into the financial institution application, the primary account holder is presented with a listing of accounts, such as a checking account, a savings account, a credit card account, and any other accounts the primary account holder is a holder of or a secondary user of. The primary account holder can select one of the accounts to view more information (e.g., to view recent transactions, account balances, statements, etc.). Upon selection of the account, the primary account holder is directed to an account detail user interface showing a detailed account summary for the selected account (e.g., as shown in FIG. 2A). Through the account detail user interface, the primary account holder can add secondary users to the account, remove already added secondary users to the account, and modify an access level of secondary users to the account (e.g., restrict access to the account's funds or lift restrictions already in place).


A request to add a secondary user to the selected account is received (306). The request is received by the backend system from the computing device. The request indicates that the primary account holder wants to add a secondary user to the selected account. In some arrangements, the request is initiated from the computing device by the primary account holder interacting with the user interface (e.g., by selecting button 202 of user interface 200).


A list of available secondary users is populated (308). The available secondary users are sent from the backend system to the computing device for population on the user interface of the computing device (e.g., as shown in user interface 208 of FIG. 2B). The available secondary users includes any secondary users previously authorized by the primary account holder. For example, if the primary account holder is a parent, the parent may have previously configured his children as secondary users for other accounts. Accordingly, each child may be listed in the list. Additional possible secondary users may be pulled from a contact or address book of the primary account holder stored on the computing device. For example, the financial institution application may include a contacts list or a buddy list that may be used to populate the list of available secondary users. In some arrangements, the list includes the option to add a new secondary user not already listed. If this option is selected by the primary account holder, the primary account holder may be prompted to provide information relating to the secondary user, such as the secondary user's name, address, phone number date of birth, social security number, the mobile wallet username, or a combination thereof. In further arrangements, the primary account holder can provide the mobile phone number of the secondary user. If the secondary user is already a known user (i.e., the secondary user already has an account at the financial institution and their mobile phone number is registered), then they are just added. If the mobile phone number is unrecognized, then the backend system can initiate a text message to the secondary user with a link to download the mobile wallet app.


A secondary user selection and/or information about the secondary user is received (310). The secondary user selection and/or information is received at the backend system from the computing device. As discussed above, the primary account holder can select a secondary user for adding to the account by interaction with the populated list of the user interface. Additionally or alternatively, the primary account holder can provide secondary user information if the desired secondary user is not populated in the list. The secondary user information may relate to the secondary user's name, address, phone number date of birth, social security number, mobile wallet username, or a combination thereof.


The primary account holder can arrange for the secondary user to have full access to the account or limited access to the account (312). If the primary account holder provides limited access to the account, rule and limitation information is received (314). The rule and limitation information is received at the backend system from the computing device. The primary account holder configures rules and limitations for the secondary user that limit the spending of the secondary user from the account (e.g., by interacting with user interface 220 of FIG. 2C). As described above, the rules and limitations set by the primary account holder may relate to spending limits, types of goods and services restrictions, store specific restrictions, purpose of purchase rules, purchase timing rules, geographic restrictions, group purchase rules, or a combination thereof. The received rule and limitation information relates to at least one rule or limitation that restricts the secondary user's ability to spend funds from the account.


After the rule and limitation information is received or if the primary account holder provides full access to the account, the account databases and mobile wallet profiles are updated (316). The backend system stores the association in account databases (e.g., account databases 110) and a database of mobile wallet profiles (e.g., mobile wallet profiles database 114). These databases may be hosted locally by the backend system. After the databases are updated, the secondary user is considered added to the selected account of the primary account holder. Accordingly, the secondary user is allowed to pay for authorized purchases (i.e., purchases falling within the secondary user's purchasing power as defined by the rules and limitations set by the primary account holder) via the secondary user's mobile wallet (e.g., the mobile wallet client application running on the secondary user's mobile device).


An alert is sent to the secondary user (318). The alert is sent by the backend system to a computing device of the secondary user. The alert may be an e-mail message, a text message, an in app notification (e.g., a push notification), or a combination thereof. The alert includes an indication that the secondary user has been added to the account. In some arrangements, the alert also includes an indication of the rules and limitations imposed by the primary account holder on the secondary user's spending.


After the secondary user is added and the initial rules and limits are established, the primary account holder can later modify the rules and limitations for each secondary user. This may be achieved by the primary account holder selecting the existing secondary user via the user interface and selecting an option to add or modify rules and limitations associated with the selected secondary user (e.g., by interacting with user interface 220 of FIG. 2C). The user's computing device transmits the selection to the backend system, where it is received. The backend system then performs 314-318 as described above to update the rules and limitations for the selected secondary user.


Referring to FIG. 4, a flow diagram of a method 400 of processing a purchase request by a secondary user of an account via a mobile wallet system (e.g., system 100) is shown according to an exemplary embodiment. Method 400 occurs after method 300 is completed (e.g., after a secondary user is added to a primary account holder's account). Method 400 is may be repeated for each of a plurality of transactions occurring after the secondary user is added through method 300. Method 400 is performed in the same computing system as described above with respect to method 300. Accordingly, method 400 is performed by a backend system (e.g., backend system 108) of a financial institution (e.g., financial institution 102). The backend system provides and maintains a mobile wallet system (e.g., system 100) in which customers of the financial institution can initiate transactions between other customers or merchants via a mobile wallet application (e.g., mobile wallet client application 128) running on the customers' computing devices (e.g., mobile devices 104). As described above in method 300, users of the mobile wallet system can be secondary users of accounts owned by primary account holders. The secondary users may have a limited or restricted spending power with respect to the accounts owned by the primary account holders.


Method 400 begins when a purchase request is received (402). The purchase request is a mobile wallet purchase request. The purchase request is received at the backend system from a merchant computing system (e.g., merchant computing system 116). The merchant computing system 116 may be a point of sale system. In other arrangements, the merchant computing system 116 may be a merchant backend system for an internet retailer. The purchase request includes, among other purchase information, an identification of the merchant, an identification of the person attempting to make the purchase (e.g., in the present case, the person is the secondary user), an identification of the account (e.g., in the present case, the account is the account owned by the primary account holder), and a cost of the purchase. In some arrangements, the purchase request also includes an itemized list of what goods or services are attempted to be purchased.


The secondary user identity and the secondary user's associated account privileges are determined (403). Based on the information contained in the purchase request, the backend system identifies the secondary user and compares the secondary user's identity to ensure the secondary user is an authorized user of the account. If the secondary user is not an authorized user, the backend system may notify the primary account holder of the attempted fraudulent transaction and method 400 ends. If, as in the above described situation, the secondary user is an authorized user of the account, the secondary user's account privileges are determined. The account privileges relate to any rules and limitations that apply to the secondary user's use of the account.


The purchase information of the purchase request is compared to the identified rules and limitations associated with the secondary user (405). The rules and limitations set by the primary account holder may relate to spending limits, types of goods and services restrictions, store specific restrictions, purpose of purchase rules, purchase timing rules, geographic restrictions, group purchase rules, or a combination thereof. Each of these rules and limitations are explained above in further detail. If the purchase falls outside of the boundaries of one of the rules or limitations, the purchase will be rejected by the financial institution. For example, if one of the limitations relates to a spending limit of $100 and the purchase is for $150, the financial institution will reject the purchase request because the secondary user is not authorized to make the purchase based on the limit set by the primary account holder. As noted above, in some arrangements, there are no rules or limitations associated with the secondary user because the secondary user has full access to the account. In such arrangements, 405 is skipped.


The backend system determines if the purchase is allowed (404). The backend system transmits a purchase authorization decision to the merchant computing system based at least in part on the determination of 404. If the purchase is determined to be allowable at 404 (e.g., the purchase is in compliance with the rules and limitations), an approval is communicated to the merchant (406). The approval signals to the merchant that the purchase is allowed. The backend system updates account information (e.g., balance information) to account for cost of the purchase (408). The financial institution transfers funds to the merchant account (410) to pay for the purchase. The funds may be transferred to another account within the financial institution (if the merchant is an account holder), to another financial institution, or to a third party. Optionally, approval notifications are sent (412). An approval notification may be sent by the backend system to the secondary user (e.g., via an alert within the mobile wallet application). An approval notification may be sent to the primary account holder in a similar manner. The approval notifications may include information about the purchase.


If the purchase is determined to be not allowable at 404 (e.g., the purchase is not in compliance with the rules and limitations), a rejection is communicated to the merchant (414). The rejection signals to the merchant that the purchase is not allowed such that the purchase is not completed by the merchant. In response to the rejection, an alert is sent to the secondary user (416). The alert is sent by the backend system to the secondary user's computing device. The alert may include an indication as to why the purchase is not allowed (e.g., an indication as to what rule would be broken or what limit would be exceeded if the purchase was approved). For example, the alert may say “Transaction not approved—exceeds spending limit.” As another example, the alert may say “Transaction not approved—non-approved store.” An additional alert may be sent to the primary account holder's computing device indicating that the secondary user attempted to make a non-approved purchase.


In some arrangements, the alert to the secondary user may include an option to request an override for the particular transaction. For example, the alert may say “Transaction not approved—exceeds spending limit. Press here to request an override.” Accordingly, the backend system determines if it received an override request (418). If an override request was not received, method 400 ends. If an override request is received by the backend system from the secondary user's computing device, the backend system sends an override request to the primary account holder (420). The message may be sent to the primary account holder's computing device, such as a mobile phone. The message may be an e-mail message, a text message, an in app notification (e.g., a push notification), or a combination thereof. The message includes information about the previously rejected purchase. The information may include the identity of the secondary user, the amount of the purchase, the identity of the merchant, and other relevant purchase information. The message requests the user to either approve or reject the proposed transaction. The primary account holder can interact with the message to either provide an approval or to maintain the rejection.


The backend system determines if the override is approved (422). If the override request is not approved, method 400 ends. In some arrangements, the override request may automatically be assumed to not be approved if a certain period of time elapses from the time of the request without a response from the primary account holder. If the override request is not approved, the backend system may initiate an alert to the secondary user's computing device indicating that the override was denied. If the override request is approved, the backend system sends a message to the secondary user's computing device instructing the secondary user to restart the transaction (424). The backend system may annotate the mobile wallet profile of the secondary user or the account database with the one-time exception. Accordingly, if the secondary user reattempts the transaction, the transaction will be deemed allowable at 404. In some arrangements, the one-time exception expires after a designated period of time (e.g., an hour). In some situations, a secondary user can preemptively request an override if the secondary user anticipates needing to make a purchase that will not be authorized under the ordinary rules. In such situations, method 400 can begin at 418. Further the override process may take the appearance of a negotiation with at least one counter offer exchanged between the primary account holder and the secondary user after the initial override request.


As noted above, embodiments within the scope of this disclosure include program products comprising non-transitory machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable or non-transitory storage media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.


Embodiments have been described in the general context of method steps which may be implemented in one embodiment by a program product including machine-executable instructions, such as program code, for example in the form of program modules executed by machines in networked environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Machine-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.


As previously indicated, embodiments may be practiced in a networked environment using logical connections to one or more remote computers having processors. Those skilled in the art will appreciate that such network computing environments may encompass many types of computers, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and so on. Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.


An exemplary system for implementing the overall system or portions of the embodiments might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. The system memory may include read only memory (ROM) and random access memory (RAM). The computer may also include a magnetic hard disk drive for reading from and writing to a magnetic hard disk, a magnetic disk drive for reading from or writing to a removable magnetic disk, and an optical disk drive for reading from or writing to a removable optical disk such as a CD ROM or other optical media. The drives and their associated machine-readable media provide nonvolatile storage of machine-executable instructions, data structures, program modules and other data for the computer. It should also be noted that the word “terminal” as used herein is intended to encompass computer input and output devices. Input devices, as described herein, include a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function. The output devices, as described herein, include a computer monitor, printer, facsimile machine, or other output devices performing a similar function.


It should be noted that although the diagrams herein may show a specific order and composition of method steps, it is understood that the order of these steps may differ from what is depicted. For example, two or more steps may be performed concurrently or with partial concurrence. Also, some method steps that are performed as discrete steps may be combined, steps being performed as a combined step may be separated into discrete steps, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative embodiments. Accordingly, all such modifications are intended to be included within the scope of the present disclosure as defined in the appended claims. Such variations will depend on the software and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the disclosure. Likewise, software and web implementations of the present disclosure could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps.


The foregoing description of embodiments has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from this disclosure. The embodiments were chosen and described in order to explain the principals of the disclosure and its practical application to enable one skilled in the art to utilize the various embodiments and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the embodiments without departing from the scope of the present disclosure as expressed in the appended claims.

Claims
  • 1. A computer-implemented method, comprising: receiving, by a processor, from a first instance of a mobile wallet application associated with a primary account holder, a request to add a secondary user to an account;receiving, by the processor, information relating to the secondary user;receiving, by the processor, a restriction to define a geographic zone and to define the secondary user's ability to spend funds from the account based on a threshold distance from a second computing device within the geographic zone;based on the information relating to the secondary user, generating, by the processor, an electronic message comprising a link structured to allow the secondary user to download, at a user computing device, a second instance of the mobile wallet application, wherein the second instance of the mobile wallet application is structured to gather location data from at least one of a Bluetooth device interfacing with the user computing device, a WiFi device interfacing with the user computing device, and an application provided to the user computing device, and wherein the location data is used to allow a transaction based on a determination that the user computing device is within the threshold distance from the second computing device;based on the information relating to the secondary user, transmitting the electronic message to the user computing device;processing, by the processor, a purchase request by the secondary user with funds from the account, wherein processing the purchase request includes: receiving, by the processor and from a merchant computing system, the purchase request, the purchase request including purchase information;comparing, by the processor, the purchase information with the restriction; andtransmitting, by the processor, a purchase authorization decision based at least in part on the comparison of the purchase information with the restriction.
  • 2. The method of claim 1, wherein the information relating to the secondary user comprises address book information of the primary account holder.
  • 3. The method of claim 1, wherein the information relating to the secondary user comprises social media information relating to the secondary user.
  • 4. The method of claim 1, further comprising receiving, by the processor, a selection of the account from a listing of accounts associated with the primary account holder.
  • 5. The method of claim 1, wherein the restriction further comprises at least one of: a spending limit, a types of goods and services restriction, a store specific restriction, a purpose of purchase rule, a purchase timing rule, and group purchase rule.
  • 6. A system comprising: a processing circuit configured to: receive, from a first instance of a mobile wallet application associated with a primary account holder, a request to add a secondary user to an account;receive information relating to the secondary user;receive a restriction to define a geographic zone and to define the secondary user's ability to spend funds from the account based on a threshold distance from a second computing device within the geographic zone;based on the information relating to the secondary user, generate an electronic message comprising a link structured to allow the secondary user to download, at a user computing device, a second instance of the mobile wallet application, wherein the second instance of the mobile wallet application is structured to gather location data from at least one of a Bluetooth device interfacing with the user computing device, a WiFi device interfacing with the user computing device, and an application provided to the user computing device, and wherein the location data is used to allow a transaction based on a determination that the user computing device is within the threshold distance from the second computing device;based on the information relating to the secondary user, transmit the electronic message to the user computing device;process a purchase request by the secondary user with funds from the account, wherein processing the purchase request includes: receiving, from a merchant computing system, the purchase request, the purchase request including purchase information;comparing the purchase information with the restriction; andtransmitting a purchase authorization decision based at least in part on the comparison of the purchase information with the restriction.
  • 7. The system of claim 6, wherein the information relating to the secondary user comprises address book information of the primary account holder.
  • 8. The system of claim 6, wherein the information relating to the secondary user comprises social media information relating to the secondary user.
  • 9. The system of claim 6, wherein the processing circuit is further configured to receive a selection of the account from a listing of accounts associated with the primary account holder.
  • 10. The system of claim 6, wherein the restriction further comprises at least one of: a spending limit, a types of goods and services restriction, a store specific restriction, a purpose of purchase rule, a purchase timing rule, and group purchase rule.
  • 11. One or more non-transitory computer-readable media comprising computer-executable instructions stored thereon, the instructions, when executed by a processor, configured to cause the processor to perform operations comprising: receiving, from a first instance of a mobile wallet application associated with a primary account holder, a request to add a secondary user to an account;receiving information relating to the secondary user;receiving a restriction to define a geographic zone and to define the secondary user's ability to spend funds from the account based on a threshold distance from a second computing device within the geographic zone;based on the information relating to the secondary user, generating an electronic message comprising a link structured to allow the secondary user to download, at a user computing device, a second instance of the mobile wallet application, wherein the second instance of the mobile wallet application is structured to gather location data from at least one of a Bluetooth device interfacing with the user computing device, a WiFi device interfacing with the user computing device, and an application provided to the user computing device, and wherein the location data is used to allow a transaction based on a determination that the user computing device is within the threshold distance from the second computing device;based on the information relating to the secondary user, transmitting the electronic message to the user computing device;processing a purchase request by the secondary user with funds from the account, wherein processing the purchase request includes: receiving, from a merchant computing system, the purchase request, the purchase request including purchase information;comparing the purchase information with the restriction; andtransmitting a purchase authorization decision based at least in part on the comparison of the purchase information with the restriction.
  • 12. The media of claim 11, wherein the information relating to the secondary user comprises address book information of the primary account holder.
  • 13. The media of claim 11, wherein the information relating to the secondary user comprises social media information relating to the secondary user.
  • 14. The media of claim 11, the operations further comprising receiving a selection of the account from a listing of accounts associated with the primary account holder.
  • 15. The media of claim 11, wherein the restriction further comprises at least one of: a spending limit, a types of goods and services restriction, a store specific restriction, a purpose of purchase rule, a purchase timing rule, and group purchase rule.
CROSS-REFERENCE TO RELATED PATENT APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 16/601,238, entitled “USE LIMITATIONS FOR SECONDARY USERS OF FINANCIAL ACCOUNTS,” filed Oct. 14, 2019, now U.S. Pat. No. 11,132,693, which is a continuation of U.S. patent application Ser. No. 14/459,559, entitled “USE LIMITATIONS FOR SECONDARY USERS OF FINANCIAL ACCOUNTS,” filed Aug. 14, 2014, now U.S. Pat. No. 10,445,739, both of which are incorporated herein by reference in their entireties.

US Referenced Citations (611)
Number Name Date Kind
5412192 Hoss May 1995 A
5778067 Jones et al. Jul 1998 A
5953710 Fleming Sep 1999 A
6016484 Williams et al. Jan 2000 A
6018724 Arent Jan 2000 A
6353811 Weissman Mar 2002 B1
6615194 Deutsch et al. Sep 2003 B1
6865547 Brake et al. Mar 2005 B1
6873974 Schutzer Mar 2005 B1
6993510 Guy et al. Jan 2006 B2
7086586 Sullivan Aug 2006 B1
7287695 Wankmueller Oct 2007 B2
7395243 Zielke et al. Jul 2008 B1
7398919 Cooper Jul 2008 B2
7400883 Rivers et al. Jul 2008 B2
7631803 Peyret et al. Dec 2009 B2
7757944 Cline et al. Jul 2010 B2
7765481 Dixon et al. Jul 2010 B2
7774274 Jones et al. Aug 2010 B2
7822206 Birk et al. Oct 2010 B2
7827057 Walker et al. Nov 2010 B1
7860790 Monk Dec 2010 B2
7909243 Merkow et al. Mar 2011 B2
7925285 Indirabhai Apr 2011 B2
7930225 Wahlberg et al. Apr 2011 B2
7945776 Atzmony et al. May 2011 B1
7958049 Jamison et al. Jun 2011 B2
7970669 Santos Jun 2011 B1
8019365 Fisher Sep 2011 B2
8078140 Baker et al. Dec 2011 B2
8126806 DiMartino et al. Feb 2012 B1
8160959 Rackley et al. Apr 2012 B2
8215560 Granucci et al. Jul 2012 B2
8280788 Perlman Oct 2012 B2
8332290 Venturo et al. Dec 2012 B1
8401904 Simakov et al. Mar 2013 B1
8433657 Dinan Apr 2013 B2
8452257 Granucci et al. May 2013 B2
8467766 Rackley et al. Jun 2013 B2
8468587 Blinn et al. Jun 2013 B2
8489067 Rackley, III et al. Jul 2013 B2
8504699 Vaughan et al. Aug 2013 B2
8533123 Hart Sep 2013 B2
8538845 Liberty Sep 2013 B2
8548908 Friedman Oct 2013 B2
8548926 Balistierri et al. Oct 2013 B2
8555361 Nakhjiri et al. Oct 2013 B2
8566237 Forzley Oct 2013 B2
8566239 Arthur et al. Oct 2013 B2
8571953 Gopalakrishnan et al. Oct 2013 B2
8577803 Chatterjee et al. Nov 2013 B2
8589290 Baskerville Nov 2013 B2
8615468 Varadarajan Dec 2013 B2
8626632 Dolan et al. Jan 2014 B1
8627424 O'Malley et al. Jan 2014 B1
8635131 Saunders Jan 2014 B1
8639621 Ellis et al. Jan 2014 B1
8645971 Carlson et al. Feb 2014 B2
8676704 Ledbetter et al. Mar 2014 B2
8682802 Kannanari Mar 2014 B1
8700729 Dua Apr 2014 B2
8706628 Phillips Apr 2014 B2
8725576 Fisher May 2014 B2
8725577 Fisher May 2014 B2
8732080 Karim May 2014 B2
8744966 Amacker et al. Jun 2014 B1
8750901 Gupta et al. Jun 2014 B1
8762265 Kessler et al. Jun 2014 B2
8762270 Evans et al. Jun 2014 B1
8768830 Jorgensen et al. Jul 2014 B1
8768834 Zacarias et al. Jul 2014 B2
8774781 Speiser et al. Jul 2014 B1
8781955 Schamer et al. Jul 2014 B2
8831677 Villa-Real Sep 2014 B2
8838501 Priebatsch Sep 2014 B1
8843125 Kwon et al. Sep 2014 B2
8843417 Hammad Sep 2014 B2
8880432 Collins, Jr. Nov 2014 B2
8924246 Chen et al. Dec 2014 B1
8925805 Grigg et al. Jan 2015 B2
8930271 Ellis et al. Jan 2015 B1
8972297 Kay et al. Mar 2015 B2
8977251 Grigg et al. Mar 2015 B2
8989712 Wentker et al. Mar 2015 B2
9020836 Fisher et al. Apr 2015 B2
9026460 Grigg et al. May 2015 B2
9027109 Wolberg-Stok et al. May 2015 B2
9031880 Bishop et al. May 2015 B2
9037509 Ellis et al. May 2015 B1
9043240 Langus et al. May 2015 B2
9043605 Machani May 2015 B1
9098190 Zhou et al. Aug 2015 B2
9111266 Kessler et al. Aug 2015 B2
9117242 Ellis et al. Aug 2015 B1
9177307 Ross et al. Nov 2015 B2
9195984 Spector et al. Nov 2015 B1
9208488 Liberty Dec 2015 B2
9208528 Chelst et al. Dec 2015 B2
9218624 Moghadam Dec 2015 B2
9256876 Vasant Akole et al. Feb 2016 B2
9286606 Diamond Mar 2016 B2
9317849 Pitroda et al. Apr 2016 B2
9324068 Soundararajan Apr 2016 B2
9361616 Zhou et al. Jun 2016 B2
9424572 Bondesen et al. Aug 2016 B2
9473491 Johansson et al. Oct 2016 B1
9652770 Kurani et al. May 2017 B1
9659312 Ellis et al. May 2017 B1
9691058 Epler et al. Jun 2017 B2
9704157 Ellis et al. Jul 2017 B1
9741051 Carpenter et al. Aug 2017 B2
9785934 Davis et al. Oct 2017 B2
9805363 Rudnick et al. Oct 2017 B1
9818109 Loh Nov 2017 B2
9928518 Vippagunta et al. Mar 2018 B1
9972047 Elliott et al. May 2018 B1
10019740 Simantov et al. Jul 2018 B2
10037561 Hecht Jul 2018 B1
10115112 Fordyce, III Oct 2018 B2
10121129 Kalgi Nov 2018 B2
10140615 Carpenter et al. Nov 2018 B2
10169812 Bajgier et al. Jan 2019 B1
10223710 Purves et al. Mar 2019 B2
10235668 Ellis et al. Mar 2019 B1
10242368 Poole Mar 2019 B1
10380583 Ellis et al. Aug 2019 B1
10380596 Butler et al. Aug 2019 B1
10395247 Gilliam et al. Aug 2019 B2
10402897 Czyzewski et al. Sep 2019 B1
10445739 Sahni et al. Oct 2019 B1
10467615 Omojola et al. Nov 2019 B1
10515356 Cronic et al. Dec 2019 B2
10565558 Fredericks et al. Feb 2020 B2
10586236 Pourfallah et al. Mar 2020 B2
10600128 Graham et al. Mar 2020 B2
10817950 Iqbal et al. Oct 2020 B1
10853787 Mango Dec 2020 B1
10887301 Vera et al. Jan 2021 B1
10997592 Kurani May 2021 B1
11042882 Ledford et al. Jun 2021 B2
11068866 Hecht et al. Jul 2021 B1
11144902 Gaddam et al. Oct 2021 B2
11151546 Mossoba et al. Oct 2021 B2
11210715 Lindsey et al. Dec 2021 B2
11228660 Rapaka et al. Jan 2022 B2
11270293 Salama et al. Mar 2022 B2
11288660 Kurani Mar 2022 B1
11295294 Kurani et al. Apr 2022 B1
11334579 Quade et al. May 2022 B1
11416766 Chao et al. Aug 2022 B2
11422393 Stray et al. Aug 2022 B2
11436581 Walker et al. Sep 2022 B1
11551190 Clements et al. Jan 2023 B1
20020032602 Lanzillo et al. Mar 2002 A1
20020052852 Bozeman May 2002 A1
20020062249 Iannacci May 2002 A1
20020174016 Cuervo Nov 2002 A1
20020198829 Ludwig et al. Dec 2002 A1
20030028481 Flitcroft et al. Feb 2003 A1
20030040964 Lacek Feb 2003 A1
20030055785 Lahiri Mar 2003 A1
20030056096 Albert et al. Mar 2003 A1
20030172039 Guy et al. Sep 2003 A1
20040088349 Beck et al. May 2004 A1
20040230535 Binder et al. Nov 2004 A1
20040236632 Maritzen et al. Nov 2004 A1
20040254848 Golan et al. Dec 2004 A1
20040260646 Berardi et al. Dec 2004 A1
20050021401 Postrel Jan 2005 A1
20050021457 Johnson et al. Jan 2005 A1
20050043997 Sahota et al. Feb 2005 A1
20050077350 Courtion et al. Apr 2005 A1
20050086492 Nicodemus et al. Apr 2005 A1
20050125317 Winkelman et al. Jun 2005 A1
20050125668 Botz Jun 2005 A1
20050133590 Rettenmyer et al. Jun 2005 A1
20050138377 First et al. Jun 2005 A1
20050184145 Law et al. Aug 2005 A1
20050235363 Hibbard et al. Oct 2005 A1
20060129502 Pastusiak et al. Jun 2006 A1
20060229985 Lalwani et al. Oct 2006 A1
20060235795 Johnson et al. Oct 2006 A1
20060253335 Keena et al. Nov 2006 A1
20070125840 Law Jun 2007 A1
20070162369 Hardison Jul 2007 A1
20070168354 Ramer et al. Jul 2007 A1
20070170243 Desany et al. Jul 2007 A1
20070174166 Jones Jul 2007 A1
20070174873 Griggs Jul 2007 A1
20070198432 Pitroda Aug 2007 A1
20070199061 Byres et al. Aug 2007 A1
20070244811 Tumminaro Oct 2007 A1
20070250923 M'Raihi Oct 2007 A1
20070262140 Long Nov 2007 A1
20080005006 Tritt et al. Jan 2008 A1
20080006685 Rackley, III et al. Jan 2008 A1
20080033878 Krikorian et al. Feb 2008 A1
20080040265 Rackley, III et al. Feb 2008 A1
20080127317 Nakhjiri May 2008 A1
20080203152 Hammad et al. Aug 2008 A1
20080208742 Arthur et al. Aug 2008 A1
20080242274 Swanburg et al. Oct 2008 A1
20080243701 Von Mueller Oct 2008 A1
20080294556 Anderson Nov 2008 A1
20080319887 Pizzi et al. Dec 2008 A1
20090027191 Farah et al. Jan 2009 A1
20090043695 Hickey Feb 2009 A1
20090048971 Hathaway et al. Feb 2009 A1
20090076950 Chang et al. Mar 2009 A1
20090106558 Delgrosso et al. Apr 2009 A1
20090157531 Bui Jun 2009 A1
20090177563 Bernstein et al. Jul 2009 A1
20090192873 Marble Jul 2009 A1
20090228384 Melik-Aslanian et al. Sep 2009 A1
20090228966 Parfene et al. Sep 2009 A1
20090271287 Halpern Oct 2009 A1
20090281941 Worth Nov 2009 A1
20090281951 Shakkarwar Nov 2009 A1
20090319409 Omidyar Dec 2009 A1
20090319427 Gardner et al. Dec 2009 A1
20090327010 Vadhri Dec 2009 A1
20090327151 Carlson et al. Dec 2009 A1
20100057553 Ameiss et al. Mar 2010 A1
20100063906 Nelsen et al. Mar 2010 A1
20100076833 Nelsen Mar 2010 A1
20100082481 Lin et al. Apr 2010 A1
20100088188 Kumar et al. Apr 2010 A1
20100114724 Ghosh et al. May 2010 A1
20100114731 Kingston et al. May 2010 A1
20100114733 Collas et al. May 2010 A1
20100125495 Smith et al. May 2010 A1
20100125510 Smith et al. May 2010 A1
20100131415 Sartipi May 2010 A1
20100191602 Mikkelsen et al. Jul 2010 A1
20100205077 Hammad Aug 2010 A1
20100274655 Postrel Oct 2010 A1
20100280896 Postrel Nov 2010 A1
20100325048 Carlson et al. Dec 2010 A1
20100332386 Vancini et al. Dec 2010 A1
20110055080 Ahlers et al. Mar 2011 A1
20110071914 Beasley et al. Mar 2011 A1
20110106601 Perlman et al. May 2011 A1
20110106674 Perlman May 2011 A1
20110137797 Stals et al. Jun 2011 A1
20110145149 Valdes et al. Jun 2011 A1
20110153397 Wagenheim Jun 2011 A1
20110153498 Makhotin et al. Jun 2011 A1
20110154466 Harper et al. Jun 2011 A1
20110191160 Blackhurst et al. Aug 2011 A1
20110196782 Allen et al. Aug 2011 A1
20110251892 Laracey Oct 2011 A1
20110270665 Kim et al. Nov 2011 A1
20110270748 Graham et al. Nov 2011 A1
20110270749 Bennett et al. Nov 2011 A1
20110276489 Larkin Nov 2011 A1
20110289004 Prakash et al. Nov 2011 A1
20110295748 Woodriffe Dec 2011 A1
20110295749 Scalisi Dec 2011 A1
20110302084 Melik-Aslanian et al. Dec 2011 A1
20110313918 Lawson et al. Dec 2011 A1
20120011063 Killian et al. Jan 2012 A1
20120018511 Hammad Jan 2012 A1
20120022944 Volpi Jan 2012 A1
20120078735 Bauer et al. Mar 2012 A1
20120078751 Macphail et al. Mar 2012 A1
20120084210 Farahmand Apr 2012 A1
20120110634 Jakobsson May 2012 A1
20120130731 Canetto May 2012 A1
20120130887 Meckling May 2012 A1
20120143705 Bhattacharya et al. Jun 2012 A1
20120150669 Langley et al. Jun 2012 A1
20120150687 Hart Jun 2012 A1
20120158589 Katzin et al. Jun 2012 A1
20120185317 Wong Jul 2012 A1
20120185387 Doyle Jul 2012 A1
20120192254 Garcia Perez et al. Jul 2012 A1
20120196586 Grigg et al. Aug 2012 A1
20120197793 Grigg et al. Aug 2012 A1
20120197794 Grigg et al. Aug 2012 A1
20120209749 Hammad et al. Aug 2012 A1
20120233005 White Sep 2012 A1
20120239417 Pourfallah et al. Sep 2012 A1
20120253852 Pourfallah et al. Oct 2012 A1
20120253913 Richard Oct 2012 A1
20120254021 Wohied et al. Oct 2012 A1
20120271705 Postrel Oct 2012 A1
20120271712 Katzin et al. Oct 2012 A1
20120284130 Lewis et al. Nov 2012 A1
20120284195 McMillen et al. Nov 2012 A1
20120290376 Dryer et al. Nov 2012 A1
20120296720 Pirillo Nov 2012 A1
20120301774 Jiang et al. Nov 2012 A1
20120303425 Katzin et al. Nov 2012 A1
20120310774 Chassin Dec 2012 A1
20120323717 Kirsch Dec 2012 A1
20120323762 Kapur et al. Dec 2012 A1
20120330837 Persaud et al. Dec 2012 A1
20130006848 Kuttuva Jan 2013 A1
20130013499 Kalgi Jan 2013 A1
20130013509 Perlman et al. Jan 2013 A1
20130018777 Klein Jan 2013 A1
20130018786 Sher Jan 2013 A1
20130018791 Mendicino et al. Jan 2013 A1
20130018792 Casey et al. Jan 2013 A1
20130024364 Shrivastava et al. Jan 2013 A1
20130030941 Meredith et al. Jan 2013 A1
20130042261 Tavormina et al. Feb 2013 A1
20130046697 Schibuk Feb 2013 A1
20130054336 Graylin Feb 2013 A1
20130054454 Purves et al. Feb 2013 A1
20130054469 Agashe et al. Feb 2013 A1
20130060679 Oskolkov et al. Mar 2013 A1
20130060689 Oskolkov et al. Mar 2013 A1
20130060696 Martin et al. Mar 2013 A1
20130060708 Oskolkov et al. Mar 2013 A1
20130065555 Baker et al. Mar 2013 A1
20130073365 McCarthy Mar 2013 A1
20130073459 Zacarias et al. Mar 2013 A1
20130074168 Hao et al. Mar 2013 A1
20130080241 Fisher Mar 2013 A1
20130080323 Scipioni Mar 2013 A1
20130110628 Yeo et al. May 2013 A1
20130110658 Lyman et al. May 2013 A1
20130132275 Enzaldo et al. May 2013 A1
20130132854 Raleigh et al. May 2013 A1
20130143089 Teshima et al. Jun 2013 A1
20130144663 Qawami et al. Jun 2013 A1
20130144702 Tabor et al. Jun 2013 A1
20130151400 Makhotin et al. Jun 2013 A1
20130166332 Hammad Jun 2013 A1
20130168450 Von Mueller et al. Jul 2013 A1
20130173456 Grigg et al. Jul 2013 A1
20130173474 Ranganathan et al. Jul 2013 A1
20130179336 Lyons et al. Jul 2013 A1
20130179352 Dwyre et al. Jul 2013 A1
20130185167 Mestre et al. Jul 2013 A1
20130191227 Pasa et al. Jul 2013 A1
20130191277 O'Leary et al. Jul 2013 A1
20130191278 O'Leary et al. Jul 2013 A1
20130200999 Spodak et al. Aug 2013 A1
20130204785 Monk et al. Aug 2013 A1
20130226720 Ahluwalia et al. Aug 2013 A1
20130226751 Friedholm et al. Aug 2013 A1
20130226799 Raj Aug 2013 A1
20130232032 Chaturvedi et al. Sep 2013 A1
20130238455 Laracey Sep 2013 A1
20130246258 Dessert Sep 2013 A1
20130246260 Barten et al. Sep 2013 A1
20130246261 Purves et al. Sep 2013 A1
20130246265 Al-Sahli Sep 2013 A1
20130254028 Salci Sep 2013 A1
20130254102 Royyuru Sep 2013 A1
20130254114 Smith Sep 2013 A1
20130254115 Pasa et al. Sep 2013 A1
20130260734 Jain et al. Oct 2013 A1
20130262309 Gadotti Oct 2013 A1
20130262316 Hruska Oct 2013 A1
20130262317 Collinge et al. Oct 2013 A1
20130275250 Rodell et al. Oct 2013 A1
20130282588 Hruska Oct 2013 A1
20130290121 Simakov et al. Oct 2013 A1
20130290169 Bathula et al. Oct 2013 A1
20130290176 Tirumalashetty Oct 2013 A1
20130297425 Wallaja Nov 2013 A1
20130297486 Colborn Nov 2013 A1
20130297513 Kirillin et al. Nov 2013 A1
20130304559 Stone et al. Nov 2013 A1
20130304642 Campos Nov 2013 A1
20130317928 Laracey Nov 2013 A1
20130317984 O'Leary et al. Nov 2013 A1
20130332344 Weber Dec 2013 A1
20130332353 Aidasani et al. Dec 2013 A1
20130346302 Purves et al. Dec 2013 A1
20140006129 Heath Jan 2014 A1
20140006194 Xie et al. Jan 2014 A1
20140006276 Grigg et al. Jan 2014 A1
20140006277 Rao Jan 2014 A1
20140012750 Kuhn et al. Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140019360 Yang Jan 2014 A1
20140038546 Neal et al. Feb 2014 A1
20140040139 Brudnicki et al. Feb 2014 A1
20140052617 Chawla et al. Feb 2014 A1
20140058855 Hussein et al. Feb 2014 A1
20140058936 Ren et al. Feb 2014 A1
20140058938 McClung, III Feb 2014 A1
20140067677 Ali et al. Mar 2014 A1
20140074581 Johnson et al. Mar 2014 A1
20140074637 Hammad Mar 2014 A1
20140074655 Lim et al. Mar 2014 A1
20140074724 Gordon et al. Mar 2014 A1
20140081783 Paranjape et al. Mar 2014 A1
20140081854 Sanchez et al. Mar 2014 A1
20140089171 Gandhi Mar 2014 A1
20140089195 Ward et al. Mar 2014 A1
20140096215 Hessler Apr 2014 A1
20140100975 Van Apr 2014 A1
20140101034 Tanner et al. Apr 2014 A1
20140101048 Gardiner et al. Apr 2014 A1
20140108254 Lee Apr 2014 A1
20140108263 Ortiz et al. Apr 2014 A1
20140109200 Tootill et al. Apr 2014 A1
20140114856 Jung et al. Apr 2014 A1
20140118704 Duelli et al. May 2014 A1
20140122310 Torrens et al. May 2014 A1
20140122563 Singh et al. May 2014 A1
20140129357 Goodwin May 2014 A1
20140129433 Rosenberger May 2014 A1
20140129442 Hanson et al. May 2014 A1
20140136352 Ramakrishna et al. May 2014 A1
20140143089 Campos et al. May 2014 A1
20140180849 Kimberg et al. Jun 2014 A1
20140188586 Carpenter et al. Jul 2014 A1
20140188704 Grossman et al. Jul 2014 A1
20140188718 Grossman et al. Jul 2014 A1
20140188719 Poornachandran et al. Jul 2014 A1
20140201086 Gadotti et al. Jul 2014 A1
20140207680 Rephlo Jul 2014 A1
20140210321 Dixon Jul 2014 A1
20140214640 Mallikarjunan et al. Jul 2014 A1
20140222670 Concannon Aug 2014 A1
20140236792 Pant et al. Aug 2014 A1
20140244506 Gramling Aug 2014 A1
20140249948 Graylin et al. Sep 2014 A1
20140250003 Levchin et al. Sep 2014 A1
20140258135 Park et al. Sep 2014 A1
20140278892 Collart Sep 2014 A1
20140279097 Alshobaki et al. Sep 2014 A1
20140279459 Weiss et al. Sep 2014 A1
20140279469 Mendes Sep 2014 A1
20140279489 Russell et al. Sep 2014 A1
20140279559 Smith et al. Sep 2014 A1
20140279566 Verma et al. Sep 2014 A1
20140282068 Levkovitz et al. Sep 2014 A1
20140297435 Wong Oct 2014 A1
20140297520 Levchin et al. Oct 2014 A1
20140297524 Ravindranath et al. Oct 2014 A1
20140304095 Fisher Oct 2014 A1
20140304187 Menn Oct 2014 A1
20140310173 Caldwell Oct 2014 A1
20140310182 Cummins Oct 2014 A1
20140337175 Katzin et al. Nov 2014 A1
20140337621 Nakhimov Nov 2014 A1
20140344153 Raj et al. Nov 2014 A1
20140347265 Aimone et al. Nov 2014 A1
20140351072 Wieler et al. Nov 2014 A1
20140351126 Priebatsch Nov 2014 A1
20140351130 Cheek et al. Nov 2014 A1
20140365322 Phillips Dec 2014 A1
20140365363 Knudsen et al. Dec 2014 A1
20140376576 Jespersen et al. Dec 2014 A1
20140379576 Marx Dec 2014 A1
20150019944 Kalgi Jan 2015 A1
20150026049 Theurer et al. Jan 2015 A1
20150032626 Dill et al. Jan 2015 A1
20150032627 Dill et al. Jan 2015 A1
20150035643 Kursun Feb 2015 A1
20150039462 Shastry et al. Feb 2015 A1
20150046241 Salmon et al. Feb 2015 A1
20150046339 Wong et al. Feb 2015 A1
20150066790 Desanti Mar 2015 A1
20150074774 Nema et al. Mar 2015 A1
20150088633 Salmon et al. Mar 2015 A1
20150089568 Sprague et al. Mar 2015 A1
20150095075 Breuer et al. Apr 2015 A1
20150095219 Hurley Apr 2015 A1
20150100442 Van Heerden et al. Apr 2015 A1
20150100486 Green et al. Apr 2015 A1
20150100495 Salama et al. Apr 2015 A1
20150112781 Clark et al. Apr 2015 A1
20150120472 Aabye et al. Apr 2015 A1
20150121063 Maller et al. Apr 2015 A1
20150134514 Chan et al. May 2015 A1
20150134540 Law et al. May 2015 A1
20150137938 Slaby et al. May 2015 A1
20150140960 Powell et al. May 2015 A1
20150154588 Purves et al. Jun 2015 A1
20150178693 Solis Jun 2015 A1
20150178725 Poetsch Jun 2015 A1
20150186855 Bennett et al. Jul 2015 A1
20150186871 Laracey Jul 2015 A1
20150186872 Sobol et al. Jul 2015 A1
20150186875 Zhang et al. Jul 2015 A1
20150186886 Schwalb Jul 2015 A1
20150186952 Brown et al. Jul 2015 A1
20150187021 Moring et al. Jul 2015 A1
20150193131 Bayer et al. Jul 2015 A1
20150193745 Handwerger et al. Jul 2015 A1
20150193869 Del Vecchio et al. Jul 2015 A1
20150213435 Douglas et al. Jul 2015 A1
20150220914 Purves et al. Aug 2015 A1
20150229622 Grigg et al. Aug 2015 A1
20150237026 Kumar Aug 2015 A1
20150242987 Lee et al. Aug 2015 A1
20150254660 Allison et al. Sep 2015 A1
20150254698 Bondesen et al. Sep 2015 A1
20150254699 Bondesen et al. Sep 2015 A1
20150278799 Palanisamy Oct 2015 A1
20150278816 Fleishman et al. Oct 2015 A1
20150287015 Kaplinger et al. Oct 2015 A1
20150287037 Salmon et al. Oct 2015 A1
20150319158 Kumnick Nov 2015 A1
20150324768 Filter et al. Nov 2015 A1
20150332252 Shahrokhi et al. Nov 2015 A1
20150333964 Wang et al. Nov 2015 A1
20150339662 Huang et al. Nov 2015 A1
20150339663 Lopreiato et al. Nov 2015 A1
20150339671 Krietzman et al. Nov 2015 A1
20150348029 Van Os et al. Dec 2015 A1
20150363810 Kim et al. Dec 2015 A1
20150371212 Giordano et al. Dec 2015 A1
20150371234 Huang et al. Dec 2015 A1
20150371326 Montesano et al. Dec 2015 A1
20160004876 Bye et al. Jan 2016 A1
20160012465 Sharp Jan 2016 A1
20160026999 Kurian Jan 2016 A1
20160042341 Griffin et al. Feb 2016 A1
20160042344 Thimmana et al. Feb 2016 A1
20160048828 Lee Feb 2016 A1
20160048929 Parento et al. Feb 2016 A1
20160054336 Anderberg et al. Feb 2016 A1
20160063496 Royyuru et al. Mar 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160071071 Lazay Mar 2016 A1
20160071074 Baird Mar 2016 A1
20160071096 Rosca Mar 2016 A1
20160071097 Lazay Mar 2016 A1
20160071099 Lazay Mar 2016 A1
20160071109 Lazay Mar 2016 A1
20160071110 Lazay Mar 2016 A1
20160086170 Hurt et al. Mar 2016 A1
20160086179 Barbier Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160092866 Liberty et al. Mar 2016 A1
20160092868 Salama et al. Mar 2016 A1
20160092874 O'Regan et al. Mar 2016 A1
20160125396 Brickell et al. May 2016 A1
20160125409 Meredith et al. May 2016 A1
20160125417 Huang et al. May 2016 A1
20160132875 Blanco et al. May 2016 A1
20160132884 Fridman et al. May 2016 A1
20160140555 Scipioni May 2016 A1
20160140561 Cowan May 2016 A1
20160162882 McClung, III Jun 2016 A1
20160162889 Badenhorst Jun 2016 A1
20160180305 Dresser et al. Jun 2016 A1
20160269416 Camenisch et al. Sep 2016 A1
20160283925 Lavu et al. Sep 2016 A1
20160342962 Brown et al. Nov 2016 A1
20160342992 Lee Nov 2016 A1
20160343043 Hicks et al. Nov 2016 A1
20160379215 Clerkin Dec 2016 A1
20170017958 Scott et al. Jan 2017 A1
20170061402 Mobin et al. Mar 2017 A1
20170061406 Adams et al. Mar 2017 A1
20170061438 Patel Mar 2017 A1
20170164139 Deselaers et al. Jun 2017 A1
20170178110 Swanson et al. Jun 2017 A1
20170185989 Bozovich, Jr. Jun 2017 A1
20170193468 Chougule et al. Jul 2017 A1
20170228715 Gurunathan Aug 2017 A1
20170236118 Laracey Aug 2017 A1
20170337542 Kim et al. Nov 2017 A1
20170357969 Huang et al. Dec 2017 A1
20170357977 Pitz et al. Dec 2017 A1
20170364914 Howard Dec 2017 A1
20180007052 Quentin Jan 2018 A1
20180012203 Hall Jan 2018 A1
20180032981 Shanmugam et al. Feb 2018 A1
20180047016 Sarin Feb 2018 A1
20180068308 Gupta et al. Mar 2018 A1
20180082283 Sharma Mar 2018 A1
20180096428 Gorenstein Apr 2018 A1
20180157336 Harris et al. Jun 2018 A1
20180219863 Tran Aug 2018 A1
20180285836 Enobakhare Oct 2018 A1
20180322488 Arana et al. Nov 2018 A1
20180324204 McClory et al. Nov 2018 A1
20180365675 Sivaraman Dec 2018 A1
20180374076 Wheeler Dec 2018 A1
20190108505 Perlman Apr 2019 A1
20190122222 Uechi Apr 2019 A1
20190165942 Subramaniam May 2019 A1
20190220908 Wilkes Jul 2019 A1
20190236577 Schmid et al. Aug 2019 A1
20190280863 Meyer et al. Sep 2019 A1
20190303803 Buc et al. Oct 2019 A1
20190304029 Murray et al. Oct 2019 A1
20190385250 Bhattacharjee et al. Dec 2019 A1
20200005277 Prabhu et al. Jan 2020 A1
20200028753 Powar et al. Jan 2020 A1
20200034813 Calinog et al. Jan 2020 A1
20200051117 Mitchell Feb 2020 A1
20200097957 Driggs et al. Mar 2020 A1
20200151706 Mossoba et al. May 2020 A1
20200175496 Finke et al. Jun 2020 A1
20200219060 Fredericks et al. Jul 2020 A1
20200279305 Mossoba et al. Sep 2020 A1
20200372536 Scislowski et al. Nov 2020 A1
20210027291 Ranganathan Jan 2021 A1
20210056552 Murray Feb 2021 A1
20210110392 Lacoss-Arnold et al. Apr 2021 A1
20210158333 Cohen et al. May 2021 A1
20210166260 Ho et al. Jun 2021 A1
20210358754 Masuoka et al. Nov 2021 A1
20210398179 Kolaja et al. Dec 2021 A1
20220027873 Pathuri et al. Jan 2022 A1
20220101609 Hu et al. Mar 2022 A1
20220147967 Clark May 2022 A1
20220210209 Vanbuskirk et al. Jun 2022 A1
20220215356 Dakshinyam et al. Jul 2022 A1
Foreign Referenced Citations (24)
Number Date Country
2002-312554 Oct 2002 JP
20090014076 Feb 2009 KR
WO-2011100529 Aug 2011 WO
WO-2011113121 Sep 2011 WO
WO-2011159842 Dec 2011 WO
WO-2012139003 Oct 2012 WO
WO-2013044175 Mar 2013 WO
WO-2013079793 Jun 2013 WO
WO-2014012138 Jan 2014 WO
WO-2014111888 Jul 2014 WO
WO-2014134180 Sep 2014 WO
WO-2014207615 Dec 2014 WO
WO-2014210321 Dec 2014 WO
WO-2015016780 Feb 2015 WO
WO-2015023172 Feb 2015 WO
WO-2015054697 Apr 2015 WO
WO-2016009198 Jan 2016 WO
WO-2016053975 Apr 2016 WO
WO-2016097879 Jun 2016 WO
WO-2016153977 Sep 2016 WO
WO-2016172107 Oct 2016 WO
WO-2016196054 Dec 2016 WO
WO-2017106309 Jun 2017 WO
WO-2018005798 Jan 2018 WO
Non-Patent Literature Citations (43)
Entry
Authors: Saygin Baksi et al; Title: Optimal primary-secondary user pairing and power allocation in cognitive cooperative multiple access channels; Date Added to IEEE Xplore: Apr. 10, 2014 (Year: 2014).
Authors et al: Tianliang Lei ; Title: Investigation of Cross-Social Network User Identification; Date of Conference: Apr. 21-22, 2022. (Year: 2022).
Authors: Mia Olsen et al; Title: e-Wallet Properties; Publisher: IEEE; in 2011 (Year: 2011).
Authors et al: Tooba Qasim ; Title: Interactive shopping with mobile wallet; Publisher: IEEE; Date of Conference: Nov. 19-22, 2012. (Year: 2012).
N. C. Kiran and G. N. Kumar, “Reliable OSPM schema for secure transaction using mobile agent in micropayment system,” 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013, pp. 1-6, doi: 10.1109/ICCCNT.2013,6726503. (Year: 2013).
P. De, K. Dey, V. Mankar and S. Mukherjea, “Towards an interoperable mobile wallet service,” 2013 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT), 2013, pp. 1-6, doi: 1109/CEWIT.2013.6713767. (Year: 2013).
W. Adi, A. Al-Qayedi, A. A. Zarooni and A. Mabrouk, “Secured multi-identity mobile infrastructure and offline mobile-assisted micro-payment application,” 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No. 04TH8733), 2004, pp. 879-882 vol.2, doi: 10.1109/WCNC.2004.1311302. (Year: 2004).
Yang, Ming-Hour. “Security enhanced EMV-based mobile payment protocol.” TheScientificWorldJournal vol. 2014 (2014): 864571. Doi: 10.115/2014/864571 (Year: 2014).
“Cashcloud Mobile eWallet”, FinTech Forum Exchange, Jul. 1, 2016. 4 pages.
“Cashcloud mobile eWallet”, Popote Payments, www.popotepayments.com, 2016. 6 pages.
A Smart Card Alliance Payments Council White Paper; Publication date: Sep. 2011; Publication No. PC-11002; 191 Clarksville Rd. Princeton Junction, NJ 08550 www.smartcardalliance.org (Year: 2011).
EMV, “Payment Tokenisation Specification Technical Framework”, 2014 EMVCO, LLC. 84 pages.
How to Control Children's Spending on Debit Cards | Money | by Jill Paperworth, May 10, 2009, https:www.theguardian.com/money/2009/mar/.../children-debit-cards-online-spend . . . (Year: 2009).
Kyrillidis, Mayes, Markantonakis; Card-present Transactions On The Internet Using The Smart CardWeb Server; 2013, IEEE; 12th (Year: 2013).
Lehdonvirta et al., UbiPay: Minimizing Transaction Costs with Smart Mobile Payments, Proceedings of the 6th International Conference on Mobile Technology, Application & Systems, ACM, Jan. 2009, retrieved from the Internet at http://www.researchgate.net/profile/Tatsuo_Nakajima/publication/220982951_UbiPay_minimizing_transaction_costs_with_smart_mobile_payments/links/548e9dad0cf225bf66a607bb.pdf on Oct. 30, 2015, 8 pages.
Smart Card Alliance, “The Mobile Payments and NFC Landscape: A U.S. Perspective,” Sep. 2011. 53 pages.
The University of Alaska staff, Managing Finance Reports with Vista Plus, Aug. 2008, The University of Alaska, web, 2-20 (Year: 2008).
White, Ron, “How Computers Work”, Que Publishing, 7th Ed, Oct. 15, 2003, p. 4. 23 pages.
“Authors et al., Secure Authorization Token, Sep. 18, 2013, IP.com PAD, entire document” (Year: 2013).
“Wang et al. Mobile payment security, threats, and challenges, Mar. 24, 2016, IEEE Xplore, Entire document” (Year: 2016).
Advisory Action issued on U.S. Appl. No. 15/392,339 dated Dec. 16, 2021.
Kyrillidis; Mayes; Markantonakis, Card-present Transactions on the Internet Using the Smart CardWeb Server, 2013, IEEE, 12th, p. 616 (Year: 2013).
Other USPTO Comm. with Refs. on US dated Jan. 19, 2023.
Urien, P., et al., “A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards”, 2011 International Conference on Collaboration Technologies and Systems (CTS), 2011. (Year: 2011).
“Messages in the SCT interbank space—pacs.008 and pacs.002”, Nov. 1, 2017, Paiementor, pp. 1-3 (Year: 2017).
Alipay, Alipay Documentation Red Packet QR Code Introduction, printed on Sep. 30, 2019 at Internet address https://intl.alipay.com/doc/redpacket/scrzsv, 2 pages.
Alipay, Trust Makes It Simple, printed on Sep. 30, 2019 from Internet address https://intl.alipay.com/, 3 pages.
Authors et al.: Disclosed anonymously, Notifying a User When a Bill is Due Using a Notification on the User's Mobile Device, Oct. 18, 2013 IP.com PAD, entire document (Year: 2013).
Bravo, Bravo Pay, CrunchBase, printed on Sep. 30, 2019 from Internet address https://www.crunchbase.com/organization/bravo#section-overview, 9 pages.
Bravo, Tip or Pay Your Tour Guide Without Sharing Personal Info, printed on Sep. 30, 2019 from Internet address https://trybravo.com, 4 pages.
Bravo, Trybravo's Competitors, Revenue, Number of Employees, Funding and Acquisitions, printed from Internet address https://www.owler.com/company/trybravo on Sep. 30, 2019, 2 pages.
DipJar, printed on Sep. 30, 2019 from Internet address https://www.dipjar.com/, 10 pages.
Hany Herb, Hassan Farahat, and Mohamed Ezz, SecureSMSPay: Secure SMS Mobile Payment Model, 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification (pp. 11-17) (Year:2008).
J. Gao, V. Kulkarni, H. Ranavat, L. Chang and H. Mei, “A 2D Barcode-Based Mobile Payment System,” 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009, pp. 320-329, doi: 10.1109/MU E.2009.62. (Year: 2009).
Latterell, Kayla, “How Do Gift Cards Work?,” https://www.cardsource.com/news/how-do-gift-cards-work, pp. 1-6.
LevelUp, Restaurant Customers Expect Seamless Digital Experiences, printed on Sep. 30, 2019 from Internet address https://www.thelevelup.com/, 4 pages.
Message in the SCT interbank space—pacs.008 and pacs.002, Nov. 1, 2017, Paiementor, pp. 1-3 (Year: 2017).
Square, Inc., Grow Your Business Your Way With Square Tools, printed on Sep. 30, 2019 from Internet address https://squareup.com/us/en, 8 pages.
TSIP, Introducing Helping Heart—A Contactless Payment Jacket to Help the Homeless, dated Jul. 4, 2017, printed on Sep. 30, 2019 from Internet address https://www.tsip.co.uk/blog/2019/2/19/introducing-helping-heart-a-contactless-payment-jacket-to-help-the-homeless, 4 pages.
Uber, How Uber Works, printed on Sep. 30, 2019 from Internet address https://www.uber.com/us/en/about/how-does-uber-work/, 6 pages.
Wazeopedia, Main Page, printed on Sep. 30, 2019 from Internet address https://wazeopedia.waze.com/wiki/USA/Main_Page, 3 pages.
P2P-Paid: A Peer-to-Peer Wireless Payment System by Gao et al (Year: 2005).
Polito et al., Inter-provider AAA and Billing of VoIP Users with Token-based Method, Dec. 26, 2007, IEEE Xplore, entire document (Year: 2007).
Continuations (2)
Number Date Country
Parent 16601238 Oct 2019 US
Child 17486710 US
Parent 14459559 Aug 2014 US
Child 16601238 US