WO2013130705A1 - Système et procédé orientés objet carte de crédit à multiples sources - Google Patents

Système et procédé orientés objet carte de crédit à multiples sources Download PDF

Info

Publication number
WO2013130705A1
WO2013130705A1 PCT/US2013/028153 US2013028153W WO2013130705A1 WO 2013130705 A1 WO2013130705 A1 WO 2013130705A1 US 2013028153 W US2013028153 W US 2013028153W WO 2013130705 A1 WO2013130705 A1 WO 2013130705A1
Authority
WO
WIPO (PCT)
Prior art keywords
debit card
network
processor
foregoing
party
Prior art date
Application number
PCT/US2013/028153
Other languages
English (en)
Inventor
Jessica WEISS
Original Assignee
Weiss Enterprises, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/681,783 external-priority patent/US20130132278A1/en
Application filed by Weiss Enterprises, Inc. filed Critical Weiss Enterprises, Inc.
Priority to GB1416946.0A priority Critical patent/GB2514729A/en
Priority to AU2013226015A priority patent/AU2013226015A1/en
Priority to SG11201405090YA priority patent/SG11201405090YA/en
Publication of WO2013130705A1 publication Critical patent/WO2013130705A1/fr
Priority to IN8098DEN2014 priority patent/IN2014DN08098A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/26Debit schemes, e.g. "pay now"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/384Payment protocols; Details thereof using social networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/204Loading of a stored value token using an ATM

Definitions

  • the invention relates to financial transaction software. More specifically, the field of the invention is that of financial transaction software for the debit card industry.
  • Debit cards are a financial transaction card that allows a user to directly transfer money for a purchase to a vendor. Used much like a credit card, the debit card differs in that there is an immediate transfer of funds, wherein the credit card payment does not transfer funds until the charge card bill is paid.
  • the debit card is typically funded through a bank account.
  • the owner of the bank account may reload a debit card by depositing more funds into the connected bank account.
  • Gift cards have been developed that function similar to a debit card, but which are funded by the transfer of funds from the gift card purchaser to the financial institution sponsoring the gift card. In this way, a person may provide a cash-like gift card to another person. Some gift cards are reloadable, that is they allow further funds to be associated with the card.
  • the present invention is a multiple- source debit card system and method which allows multiple individuals to provide funds to a single debit card without the multiple individuals needing to know any bank account information.
  • multiple sources may reload the account associated with the debit card.
  • a closed loop debit card may be funded from multiple sources.
  • the system and method identifies the participants for purposes of the financial transaction, although the disclosure of the identification may be managed by the donor.
  • identity modules are used to identify the sources of funds.
  • identity modules may come from several sources, including an independent web site, a social network and its credentialing of its members, a financial institution, and/or an independent identity service.
  • the identity module provides verification of the source of the funds, and may provide the funds as well.
  • the financial institutions involved may satisfy accounting and regulatory compliance as a matter of routine and provide the underlying framework for the open or closed loop multiple- sourced debit card.
  • the entire transaction may appear to occur on a social network or other internet location without the need to explicitly contact a financing organization.
  • the identity module has financial transaction information for each individual so that a button may be added to a social media member's individual page so that any member of the social network can contribute to the funding.
  • a group may be created on a social network, and one of the group members has a financial need. Any group member may start the reloadable debit card, and then explain in a post with the button the nature of the fund raising. Then, any member of the group wanting to contribute may hit the button and indicate the amount to contribute.
  • the social network identity module does not have all the identity information it may have enough information to send an e-mail, text, or other message to the user to instruct the user on completing the financial aspect of the transaction.
  • subsystems of the system and process of the multi-source reloadable debit card may be performed in separate and distinct modules.
  • Such modules may be located in one or several physical locations and machines, coupled by communications links.
  • Figure 1 is a schematic diagrammatic view of a network system in which embodiments of the present invention may be utilized.
  • Figure 2 is a block diagram of a computing system (either a server or client, or both, as appropriate), with optional input devices (e.g., keyboard, mouse, touch screen, etc.) and output devices, hardware, network connections, one or more processors, and memory/storage for data and modules, etc. which may be utilized in conjunction with embodiments of the present invention.
  • input devices e.g., keyboard, mouse, touch screen, etc.
  • output devices e.g., keyboard, mouse, touch screen, etc.
  • Figure 3 is a schematic diagram of the operation of the present invention relating to multiple sources funding a debit card through a web site.
  • Figure 4 comprising Figures 4A and 4B, is a schematic work flow diagram of the funding of a debit card according to embodiments of the present invention.
  • Figure 5 is a graphic representation of a situation where embodiments of a multi- source reloadable debit card of the present invention could be used.
  • Figure 6 is a schematic diagram representation of the use of an embodiment of the present invention through a social network.
  • Figure 7 is a illustration of one embodiment of the invention in the form of a kit.
  • Figure 8 is a schematic diagram of the operation of one embodiment of the present invention relating to multiple sources funding a debit card through a call center.
  • Figure 9 is a schematic diagram of the operation of one embodiment of the present invention relating to multiple sources funding a debit card through a kiosk.
  • a computer generally includes a processor for executing instructions and memory for storing instructions and data.
  • the computer operating on such encoded instructions may become a specific type of machine, namely a computer particularly configured to perform the operations embodied by the series of instructions.
  • Some of the instructions may be adapted to produce signals that control operation of other machines and thus may operate through those control signals to transform materials far removed from the computer itself.
  • Data structures greatly facilitate data management by data processing systems, and are not accessible except through sophisticated software systems.
  • Data structures are not the information content of a memory, rather they represent specific electronic structural elements which impart or manifest a physical organization on the information stored in memory. More than mere abstraction, the data structures are specific electrical or magnetic structural elements in memory which simultaneously represent complex data accurately, often data modeling physical characteristics of related items, and provide increased efficiency in computer operation.
  • the manipulations performed are often referred to in terms, such as comparing or adding, commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention; the operations are machine operations.
  • Useful machines for performing the operations of the present invention include general purpose digital computers or other similar devices. In all cases the distinction between the method operations in operating a computer and the method of computation itself should be recognized.
  • the present invention relates to a method and apparatus for operating a computer in processing electrical or other (e.g., mechanical, chemical) physical signals to generate other desired physical manifestations or signals.
  • the computer operates on software modules, which are collections of signals stored on a media that represents a series of machine
  • Such machine instructions may be the actual computer code the processor interprets to implement the instructions, or alternatively may be a higher level coding of the instructions that is interpreted to obtain the actual computer code.
  • the software module may also include a hardware component, wherein some aspects of the algorithm are performed by the circuitry itself rather as a result of an instruction.
  • the present invention also relates to an apparatus for performing these operations.
  • This apparatus may be specifically constructed for the required purposes or it may comprise a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer.
  • the algorithms presented herein are not inherently related to any particular computer or other apparatus unless explicitly indicated as requiring particular hardware. In some cases, the computer programs may
  • the present invention may deal with "object-oriented” software, and particularly with an "object-oriented” operating system.
  • the "object-oriented” software is organized into “objects”, each comprising a block of computer instructions describing various procedures ("methods") to be performed in response to "messages" sent to the object or "events" which occur with the object.
  • Such operations include, for example, the manipulation of variables, the activation of an object by an external event, and the transmission of one or more messages to other objects.
  • messages may be generated by an object in response to the receipt of a message.
  • the object When one of the objects receives a message, the object carries out an operation (a message procedure) corresponding to the message and, if necessary, returns a result of the operation.
  • Each object has a region where internal states (instance variables) of the object itself are stored and where the other objects are not allowed to access.
  • inheritance For example, an object for drawing a "circle" on a display may inherit functions and knowledge from another object for drawing a "shape" on a display.
  • a programmer "programs" in an object-oriented programming language by writing individual blocks of code each of which creates an object by defining its methods.
  • a collection of such objects adapted to communicate with one another by means of messages comprises an object-oriented program.
  • Object-oriented computer programming facilitates the modeling of interactive systems in that each component of the system can be modeled with an object, the behavior of each component being simulated by the methods of its corresponding object, and the interactions between components being simulated by messages transmitted between objects.
  • An operator may stimulate a collection of interrelated objects comprising an object-oriented program by sending a message to one of the objects.
  • the receipt of the message may cause the object to respond by carrying out predetermined functions which may include sending additional messages to one or more other objects.
  • the other objects may in turn carry out additional functions in response to the messages they receive, including sending still more messages.
  • sequences of message and response may continue indefinitely or may come to an end when all messages have been responded to and no new messages are being sent.
  • a programmer need only think in terms of how each component of a modeled system responds to a stimulus and not in terms of the sequence of operations to be performed in response to some stimulus. Such sequence of operations naturally flows out of the interactions between the objects in response to the stimulus and need not be preordained by the programmer.
  • object-oriented programming makes simulation of systems of interrelated components more intuitive, the operation of an object-oriented program is often difficult to understand because the sequence of operations carried out by an object-oriented program is usually not immediately apparent from a software listing as in the case for sequentially organized programs. Nor is it easy to determine how an object-oriented program works through observation of the readily apparent manifestations of its operation. Most of the operations carried out by a computer in response to a program are "invisible" to an observer since only a relatively few steps in a program typically produce an observable computer output.
  • the term “object” relates to a set of computer instructions and associated data which can be activated directly or indirectly by the user.
  • the terms "windowing environment”, “running in windows”, and “object oriented operating system” are used to denote a computer user interface in which information is manipulated and displayed on a video display such as within bounded regions on a raster scanned video display.
  • the terms "network”, “local area network”, “LAN”, “wide area network”, or “WAN” mean two or more computers which are connected in such a manner that messages may be transmitted between the computers.
  • typically one or more computers operate as a "server", a computer with large storage devices such as hard disk drives and communication hardware to operate peripheral devices such as printers or modems.
  • Other computers termed “workstations”, provide a user interface so that users of computer networks can access the network resources, such as shared data files, common peripheral devices, and inter- workstation communication.
  • Users activate computer programs or network resources to create “processes” which include both the general operation of the computer program along with specific operating characteristics determined by input variables and its environment.
  • an agent sometimes called an intelligent agent
  • an agent using parameters typically provided by the user, searches locations either on the host machine or at some other point on a network, gathers the information relevant to the purpose of the agent, and presents it to the user on a periodic basis.
  • the term "desktop” means a specific user interface which presents a menu or display of objects with associated settings for the user associated with the desktop.
  • the desktop accesses a network resource, which typically requires an application program to execute on the remote server, the desktop calls an Application Program Interface, or "API", to allow the user to provide commands to the network resource and observe any output.
  • API Application Program Interface
  • the term “Browser” refers to a program which is not necessarily apparent to the user, but which is responsible for transmitting messages between the desktop and the network server and for displaying and interacting with the network user. Browsers are designed to utilize a communications protocol for transmission of text and graphic information over a world wide network of computers, namely the "World Wide Web" or simply the "Web”.
  • Browsers compatible with the present invention include the Chrome browser program developed by Google Inc. of Mountain View, California (Chrome is a trademark of Google Inc.), the Safari browser program developed by Apple Inc. of Cupertino, California (Safari is a registered trademark of Apple Inc.), Internet Explorer program developed by Microsoft Corporation (Internet Explorer is a trademark of Microsoft Corporation), the Opera browser program created by Opera Software ASA, or the Firefox browser program distributed by the Mozilla Foundation (Firefox is a registered trademark of the Mozilla Foundation).
  • Browsers display information which is formatted in a Standard Generalized Markup Language (“SGML”) or a HyperText Markup Language (“HTML”), both being scripting languages which embed non-visual codes in a text document through the use of special ASCII text codes.
  • Files in these formats may be easily transmitted across computer networks, including global information networks like the Internet, and allow the Browsers to display text, images, and play audio and video recordings.
  • the Web utilizes these data file formats to conjunction with its communication protocol to transmit such information between servers and workstations.
  • Browsers may also be programmed to display information provided in an extensible Markup Language (“XML”) file, with XML files being capable of use with several Document Type Definitions (“DTD”) and thus more general in nature than SGML or HTML.
  • XML file may be analogized to an object, as the data and the stylesheet formatting are separately contained (formatting may be thought of as methods of displaying information, thus an XML file has data and an associated method).
  • PDA personal digital assistant
  • WW AN wireless wide area network
  • synchronization means the exchanging of information between a first device, e.g. a handheld device, and a second device, e.g. a desktop computer, either via wires or wirelessly. Synchronization ensures that the data on both devices are identical (at least at the time of synchronization).
  • communication primarily occurs through the transmission of radio signals over analog, digital cellular or personal communications service (“PCS”) networks. Signals may also be transmitted through microwaves and other electromagnetic waves.
  • PCS personal communications service
  • CDMA code- division multiple access
  • TDMA time division multiple access
  • GSM Global System for Mobile Communications
  • 3G Third Generation
  • 4G fourth Generation
  • PDC personal digital cellular
  • CDPD packet-data technology over analog systems
  • AMPS Advance Mobile Phone Service
  • wireless application protocol or "WAP” mean a universal
  • Mobile Software refers to the software operating system which allows for application programs to be implemented on a mobile device such as a mobile telephone or PDA.
  • Examples of Mobile Software are Java and Java ME (Java and JavaME are trademarks of Sun Microsystems, Inc. of Santa Clara, California), BREW (BREW is a registered trademark of Qualcomm Incorporated of San Diego, California), Windows Mobile (Windows is a registered trademark of Microsoft Corporation of Redmond, Washington), Palm OS (Palm is a registered trademark of Palm, Inc.
  • Symbian OS is a registered trademark of Symbian Software Limited Corporation of London, United Kingdom
  • ANDROID OS is a registered trademark of Google, Inc. of Mountain View, California
  • iPhone OS is a registered trademark of Apple, Inc. of Cupertino, California
  • Windows Phone 7 “Mobile Apps” refers to software programs written for execution with Mobile Software.
  • social network may be used to refer to a multiple user computer software system that allows for relationships among and between users (individuals or members) and content assessable by the system.
  • a social network is defined by the relationships among groups of individuals, and may include relationships ranging from casual acquaintances to close familial bonds.
  • members may be other entities that may be linked with individuals.
  • the logical structure of a social network may be represented using a graph structure. Each node of the graph may correspond to a member of the social network, or content assessable by the social network. Edges connecting two nodes represent a relationship between two individuals.
  • the degree of separation between any two nodes is defined as the minimum number of hops required to traverse the graph from one node to the other.
  • a degree of separation between two members is a measure of relatedness between the two members.
  • Social networks may comprise any of a variety of suitable arrangements.
  • An entity or member of a social network may have a profile and that profile may represent the member in the social network.
  • the social network may facilitate interaction between member profiles and allow associations or relationships between member profiles.
  • Associations between member profiles may be one or more of a variety of types, such as friend, co-worker, family member, business associate, common-interest association, and common-geography association. Associations may also include intermediary
  • Associations between member profiles may be reciprocal associations. For example, a first member may invite another member to become associated with the first member and the other member may accept or reject the invitation. A member may also categorize or weigh the association with other member profiles, such as, for example, by assigning a level to the association. For example, for a friendship-type association, the member may assign a level, such as acquaintance, friend, good friend, and best friend, to the associations between the member's profile and other member profiles.
  • Each profile within a social network may contain entries, and each entry may comprise information associated with a profile.
  • entries for a person profile may comprise contact information such as an email addresses, mailing address, instant messaging (or IM) name, or phone number; personal information such as relationship status, birth date, age, children, ethnicity, religion, political view, sense of humor, sexual orientation, fashion preferences, smoking habits, drinking habits, pets, hometown location, passions, sports, activities, favorite books, music, TV, or movie preferences, favorite cuisines; professional information such as skills, career, or job description;
  • photographs of a person or other graphics associated with an entity may comprise industry information such as market sector, customer base, location, or supplier information; financial information such as net profits, net worth, number of employees, stock performance; or other types of information and documents associated with the business profile.
  • a member profile may also contain rating information associated with the member.
  • the member may be rated or scored by other members of the social network in specific categories, such as humor, intelligence, fashion, trustworthiness, sexiness, and coolness.
  • a member's category ratings may be contained in the member's profile.
  • a member may have fans. Fans may be other members who have indicated that they are "fans" of the member. Rating
  • Rating information may also include the number of fans of a member and identifiers of the fans. Rating information may also include the rate at which a member accumulated ratings or fans and how recently the member has been rated or acquired fans.
  • a member profile may also contain social network activity data associated with the member.
  • Membership information may include information about a member's login patterns to the social network, such as the frequency that the member logs in to the social network and the member's most recent login to the social network.
  • Membership information may also include information about the rate and frequency that a member profile gains associations to other member profiles.
  • a member profile may contain consumer information.
  • a member profile may comprise data stored in memory.
  • the profile in addition to comprising data about the member, may also comprise data relating to others.
  • a member profile may contain an identification of associations or virtual links with other member profiles.
  • a member's social network profile may comprise a hyperlink associated with another member's profile. In one such association, the other member's profile may contain a reciprocal hyperlink associated with the first member's profile.
  • a member's profile may also contain information excerpted from another associated member's profile, such as a thumbnail image of the associated member, his or her age, marital status, and location, as well as an indication of the number of members with which the associated member is associated.
  • a member's profile may comprise a list of other social network members' profiles with which the member wishes to be associated.
  • An association may be designated manually or automatically.
  • a member may designate associated members manually by selecting other profiles and indicating an association that may be recorded in the member's profile.
  • associations may be established by an invitation and an acceptance of the invitation.
  • a first user may send an invitation to a second user inviting the second user to form an association with the first user.
  • the second user may accept or reject the invitation.
  • a one-way association may be formed between the first user and the second user.
  • no association may be formed between the two users.
  • an association between two profiles may comprise an association automatically generated in response to a
  • a member profile may be associated with all of the other member profiles comprising a predetermined number or percentage of common entries, such as interests, hobbies, likes, dislikes, employers and/or habits. Associations designated manually by members of the social network, or associations designated automatically based on data input by one or more members of the social network, may be referred to as user established associations.
  • Examples of social networks include, but are not limited to, facebook, twitter, myspace, linkedin, and other systems. The exact terminology of certain features, such as associations, fans, profiles, etc. may vary from social network to social network, although there are several functional features that are common to the various terms. Thus, a particular social network may have more of less of the common features described above. In terms of the following disclosure, generally the use of the term "social network” encompasses a system that includes one or more of the foregoing features or their equivalents.
  • Figure 1 is a high-level block diagram of a computing environment 100 according to one embodiment.
  • Figure 1 illustrates server 110 and three clients 112 connected by network 114. Only three clients 112 are shown in Figure 1 in order to simplify and clarify the description.
  • Embodiments of the computing environment 100 may have thousands or millions of clients 112 connected to network 114, for example the Internet. Users (not shown) may operate software 116 on one of clients 112 to both send and receive messages network 114 via server 110 and its associated communications equipment and software (not shown).
  • Figure 2 depicts a block diagram of computer system 210 suitable for
  • Computer system 210 includes bus 212 which interconnects major subsystems of computer system 210, such as central processor 214, system memory 217 (typically RAM, but which may also include ROM, flash RAM, or the like), input/output controller 218, external audio device, such as speaker system 220 via audio output interface 222, external device, such as display screen 224 via display adapter 226, serial ports 228 and 230, keyboard 232 (interfaced with keyboard controller 233), storage interface 234, disk drive 237 operative to receive floppy disk 238, host bus adapter (HBA) interface card 235A operative to connect with Fibre Channel network 290, host bus adapter (HBA) interface card 235B operative to connect to SCSI bus 239, and optical disk drive 240 operative to receive optical disk 242.
  • HBA host bus adapter
  • HBA host bus adapter
  • HBA host bus adapter
  • Bus 212 allows data communication between central processor 214 and system memory 217, which may include read-only memory (ROM) or flash memory (neither shown), and random access memory (RAM) (not shown), as previously noted.
  • ROM read-only memory
  • RAM random access memory
  • ROM or flash memory may contain, among other software code, Basic Input- Output system (BIOS) which controls basic hardware operation such as interaction with peripheral components.
  • BIOS Basic Input- Output system
  • Applications resident with computer system 210 are generally stored on and accessed via computer readable media, such as hard disk drives (e.g., fixed disk 244), optical drives (e.g., optical drive 240), floppy disk unit 237, or other storage medium. Additionally, applications may be in the form of electronic signals modulated in accordance with the application and data communication technology when accessed via network modem 247 or interface 248 or other telecommunications equipment (not shown).
  • Storage interface 23 may connect to standard computer readable media for storage and/or retrieval of information, such as fixed disk drive 244.
  • Fixed disk drive 244 may be part of computer system 210 or may be separate and accessed through other interface systems.
  • Modem 247 may provide direct connection to remote servers via telephone link or the Internet via an internet service provider (ISP) (not shown).
  • ISP internet service provider
  • Network interface 248 may provide direct connection to remote servers via direct network link to the Internet via a POP (point of presence).
  • Network interface 248 may provide such connection using wireless techniques, including digital cellular telephone connection, Cellular Digital Packet Data (CDPD) connection, digital satellite data connection or the like.
  • CDPD Cellular Digital Packet Data
  • OS/2® is a registered trademark of International Business Machines Corporation of Armonk, New York
  • UNIX® is a registered trademark of X/Open Company Limited of Reading, United Kingdom
  • Linux® is a registered trademark of Linus Torvalds of Portland, Oregon
  • a signal may be directly transmitted from a first block to a second block, or a signal may be modified (e.g., amplified, attenuated, delayed, latched, buffered, inverted, filtered, or otherwise modified) between blocks.
  • a signal may be directly transmitted from a first block to a second block, or a signal may be modified (e.g., amplified, attenuated, delayed, latched, buffered, inverted, filtered, or otherwise modified) between blocks.
  • modified signals in place of such directly transmitted signals as long as the informational and/or functional aspect of the signal is transmitted between blocks.
  • a signal input at a second block may be conceptualized as a second signal derived from a first signal output from a first block due to physical limitations of the circuitry involved (e.g., there will inevitably be some attenuation and delay). Therefore, as used herein, a second signal derived from a first signal includes the first signal or any modifications to the first signal, whether due to circuit limitations or due to passage through other circuit elements which do not change the informational and/or final functional aspect of the first signal.
  • server 300 facilitates both the creation of debit card 350 by initiating user 302, and the reloading of debit card 350 by independent parties 304.
  • server 300 creates a debit card account associated with debit card 350, and transfers or credits funds from independent parties 304 to the account associated with debit card 350.
  • One method of enabling this procedure is for initiating user 302 to specify the recipient of debit card 350.
  • the initiating user 302 submits a request to server 300 for the creation of debit card 350, the request including a recipient identifier that identifies the recipient.
  • server 300 generates an account identifier that identifies the account associated with debit card 350, and for example transmits the account identifier to initiating user 302.
  • the account identifier could include any element for uniquely identifying the debit account, such as an account number, the name and/or address of the recipient, a physical item having encoded information, etc.
  • Initiating user 302 then for example provides information identifying the account to one of independent parties 304.
  • a link sent via e-mail, text message, SMS, or a button on a social network post may initiate a message from independent party 304 to server 300 to start a transfer of funds from independent party 304 to debit card 350.
  • each of independent parties 304 may make a separate request to server 300 for funds to be applied or transferred to the account of debit card 350.
  • These requests may include, for example, at least the account identifier associated with debit card 350.
  • Such a link may included encoded identification of the target individual and/or account, as well as encoded identification of the individual transferring the funds.
  • Such encoding may encompass encrypted information, hash values of numbers or text associated with a person or account, or other encoding scheme.
  • the link itself may include a string or portion that when activated by browser software or similar mechanisms, identify the underlying text or number.
  • Server 300 plays an important role in the transactions contemplated by the embodiments of the present invention. In accounting for financial transactions, it is usually necessary to identify the parties involved in a particular transaction. In the electronic commerce world, typically financial organizations rely on multiple items of identification to verify identity, called multi-factor authentication. The three factors primarily used involve information that an individual knows, information on a thing that an individual possesses, and information derived from a characteristic of the individual. It may also be possible to have a variant on multi-factor authentication based on separate and distinct classes of information from those three factors, for example information an individual knows about her family as opposed to information an individual knows about her employment.
  • Server 300 may have direct access to multi-factor information (e.g., a user database with security profile information) or indirect access to such information (e.g., an application program interface to a trusted third party).
  • a trusted third party may be a financial institution, a medical institution, another member based group having relevant factor information, and/or a combination of two or more third parties that combined provide a sufficiently high authentication level.
  • things an individual has may include security code generating devices, computers and/or smartphones, encryption keys, etc. that may be used to authenticate a communication by an individual.
  • biometric information about an individual may identify an individual, such as a scan from a finger print reader, a scan from a retinal scanner, or even a photograph of an individual.
  • a piece or collection of information that aids in the identification of an individual, typically stored in electronic form, is termed a token.
  • server 300 may be able to reliably identify an individual accessing server 300, creating an identity module that processes and optionally stores authentication information, and transmits such identifying information as a token to provide authentication for a transaction.
  • Such an authentication process may be used for both a donating user as well as a recipient.
  • a debit card in one embodiment of the invention, may be created by user 302 visiting WeCare Card website 310 and initiating the creation of the debit card (not shown).
  • user 302 may sponsor a debit card to provide funds for a friend in a difficult situation (e.g., stranded in a remote location because a family member became ill while on a trip).
  • User 302 may fund the card by a conventional transaction, in one embodiment by an e-commerce exchange through a transaction processing module which is part of website 310, in an alternative embodiment by submitting cash into a kiosk (shown in Figure 9) that confirms the receipt of cash to web site 310.
  • WeCare Card website 310 then initiates the creation of the physical debit card and arranges for the physical debit card to be delivered (e.g., by overnight delivery) to the friend/recipient.
  • WeCare Card website 310 sends a message (e.g. by mobile phone text message or electronic mail) to the recipient with identifying information so that the recipient may obtain the debit card from another kiosk, automatic teller machine (ATM) terminal, internet terminal, bank teller, or banking facility.
  • ATM automatic teller machine
  • the recipient obtains the debit card and is able to use the funds associated with the card without having to attend to setting up an account or otherwise dealing with the financial institution that provides the debit card account.
  • WeCare Card website 310 In addition to providing basic gift card functionality, WeCare Card website 310 also facilitates independent parties 304 providing funds to the debit card for the recipient, either initially for a closed loop debit card, or after the delivery of the card for a reloadable debit card.
  • WeCare Card website 310 provides a listing of available debit cards for initial funding or additional reloading. Such a listing may be alphabetically arranged, geographically arranged, or searchable so that individuals may visit WeCare Card website 310, view the available debit cards and their associated recipients, and initiate an e-commerce transaction to provide additional funding to the debit card.
  • user 302 or independent parties 304 may specify particular areas of concern or interest to them, e.g., homelessness, single parenting, cancer, children, and WeCare Card website 310 pushes notifications to user 302 when such identified concerns become a subject of a campaign involving a WeCare Card.
  • Such campaigns may be self identified, or may be determined by search and evaluation of campaign pages.
  • WeCare Card website 310 provides a description of the debit card recipient and an associated link to a funding section of website 310 so that user 302, or any of the independent parties 304, may post the description and link to a social network to assist raising funds for the recipient.
  • WeCare Card website 310 provides user 302 or independent parties 304 to send electronic mail messages, text messages, SMS messages, instant messages, and/or social network messages containing the description and/or the link.
  • the functions described in this paragraph are conducted through a mobile device app, e.g. using cell phone 306 or tablet 308, rather than through conventional computer 312.
  • the functions described in this paragraph are conducted through a kiosk which may have a cash deposit or ATM terminal for receiving funding.
  • Figure 4 illustrates a workflow of the operation of an embodiment of the present invention.
  • the starting point may be a blogger writing about a situation (e.g., see discussion of Figure 5 below), in this example about the Smith family, wherein someone has initiated a "WeCare Card" for the Smith Family.
  • the blog site for example a social network, may include a deep link to the corresponding page or pages for the Smith family at the WeCare Card web site.
  • the individual may check to donate to the Smith family card by clicking on a donate button of that particular page of the WeCare Card website, and invoke an e-commerce process.
  • a payment process such as PayPal, Bill Pay, eCheck, P2P, or other similar e- commerce payment system to transfer funds from a personal bank account to the WeCare Card website shopping cart, from which funds are transferred to a merchant account and to a bank or other trust/escrow fund holder.
  • the WeCare Card shopping cart sends the funds with an identification of the target recipient debit card, which may be reloaded by the prepaid platform, or if not yet issued then the funds from the shopping cart may fund the issuance of the debit card.
  • Figure 5 illustrates a situation suitable for such a workflow, wherein a family may need assistance because of a house fire.
  • a family member or another individual may start the WeCare Card funding process by interacting with social media to notify multiple individuals of the house fire and the family in need of emergency funds, for example by writing a blog entry about the house fire and the individuals in distress.
  • someone starts a WeCare Card for the family at the WeCare Card website so that the social media blog can reference the deep link to the family's WeCare Card page.
  • the blog writer may independently write about the family' s plight, and a reader may start a WeCare Card for the family and post a donation link as a comment to the blog entry.
  • the identity of the WeCare Card recipient would need to be identified before a loaded debit card is provided to the recipient, such as through one of the above described identity modules. In either event, multiple readers of the blog entry may follow the link and contribute funds to the family's debit card.
  • Figure 6 illustrates how the social situation of Figure 5 and the network schematic of Figure 4 may interact in one embodiment of the invention.
  • An individual with an injury e.g. a broken leg
  • the helper who offers help.
  • the helper can publicize the plight of the person with the broken leg. That helper, or others, may then start publishing blogs of the plight of the person with the broken leg and then associating those discussions with links to the WeCare Card website (WCCW).
  • Such links may be either a general link to WCCW (requiring a follower of the link to look for the injured individual) or an embedded link that takes the follower directly to the injured person's specific WCCW page or pages.
  • WCCW page(s) may invoke the WCCW shopping cart, a P2P process, or other e-commerce procedure to get funds to a merchant account.
  • the funds may optionally stay in an escrow or trust account (in anticipation of the issuance of a debit card) or directly reload an existing debit card that is associated with the injured person.
  • multiple persons may be notified of the distress of the injured person and take steps to provide needed funds to that person through e-commerce processes without having to set up any special fund transfers.
  • WeCare Card call center 802 is connected to conventional telephony networks, and may be contacted by users 810, 812, and 814 through telephony exchanges, e.g., land line telephones or mobile phones.
  • Call center 802 is also in communication with financial institutions, such as bank 804 and card 806, so that when one of users 810, 812, or 814 opts to become an initiator, call center 802 may obtain the information about the initiator, the recipient, and fund the debit card. Subsequently, other ones of users 810, 812, or 814 may contact call center 802 and opt to become a contributor.
  • the recipient is identified by name and the contributors specify the individual to be the recipient over the telephone.
  • the initiator starts the process for obtaining a kit having a WeCare Card debit card, information about activating the debit card for a donor, and several additional information cards containing identifying information about the debit card and the funding mechanism.
  • Such information cards include, for example, the telephone number of call center 802, and a unique code for the debit card. Contributors would receive this information, telephone call center 802 and express the desire to fund the debit card identified by the unique code.
  • Call center 802 may obtain funding information from each contributor, e.g. a credit card number and credentials acceptable by card 806, or a bank account number and routing number for bank 804. Additionally, call center 802 may confirm the desire to contribute to the recipient by identifying the recipient to the contributor.
  • the contributor may thus further fund the debit card for the recipient.
  • the recipient may also be provided with activation materials. Delivery may be by hand, for example when the initiator obtains a kit and then gives the WeCare Card debit card to the recipient on a visit and includes activation materials. Alternatively, if the initiator started the process by telephoning call center 802 and identified the recipient, call center 802 would then send the WeCare Card debit card to the recipient, for example by post, express delivery, or special delivery.
  • call center 802 may provide the recipient with information by which the recipient could go to a bank or kiosk and have the WeCare Card debit card produced.
  • Such activation materials may include a magnetically or visually encoded strip, bar, or section that could be scanned, read, or otherwise detected by a machine.
  • Activation materials may alternatively include a code or series of codes that would be used with a particular interface to identify recipient and confirm the receipt of the WeCare Card debit card.
  • FIG. 9 shows an embodiment of the system of the present invention being deployed using kiosks.
  • Kiosk 902 is in communication with bank 904 and card 906 to allow users 910, 912, and 914 to participate in the funding of a WeCare Card debit card 906.
  • the recipient is identified by name and the contributors specify the individual to be the recipient by typing into kiosk 902.
  • the initiator starts the process for obtaining a kit having the debit card, information about activating the debit card for a donor, and several additional information cards containing identifying information about the debit card and the funding mechanism.
  • Such information cards include, for example, the location(s) of kiosk 902, and a unique code for the debit card.
  • Kiosk 902 may obtain funding information from each contributor, e.g. a credit card number and credentials acceptable by card 906, the insertion of a physical card into kiosk 902, or a bank account number and routing number for bank 904. Additionally, kiosk 902 may confirm the desire to contribute to the recipient by identifying the recipient to the contributor. Assuming that the recipient is acceptable to the contributor, and the contributor's funding information is valid, the contributor may thus further fund the debit card for the recipient.
  • server 300 facilitates both the creation of debit card 350 by one or more initiating user 302, and the reloading of debit card 350 by one or more independent parties 304.
  • One method of enabling this procedure is for initiating user 302 to specify the recipient of debit card 350, then for initiating user 302 to provide further information to WeCare Card website 310 about the recipient of debit card 350, for example, by specifying location, category, or other information.
  • each recipient may also have an associated blog, for example on WeCare Card website 310, which allows individuals to post updates and comments.
  • one of independent parties 304 may use a search facility of server 300 to enter search criteria and locate a recipient of interest, either by matching location/category/etc. information of WeCare Card website 310 or from searching an associated blog.
  • independent party 304 may also specify interests by indicating specific criteria associated with a recipient, via interest specification or blog searches, for which notification should be sent. For example, a link sent via e-mail, text message, SMS message, social network message, or a button on a social network post may appear to independent party 304, allowing independent party 304 to activate the link and access server 300 to start a transfer of funds from independent party 304 to an instance of debit card 350 associated with a recipient having matching interests.
  • a debit card in one embodiment of the invention, may be created by user 302 visiting WeCare Card website 310 and initiating the creation of a WeCare Card debit card (not shown).
  • user 302 may sponsor a debit card to provide funds for a friend in a difficult situation (e.g., stranded in a remote location because a family member became ill while on a trip).
  • User 302 may fund the card by a conventional transaction, in one embodiment by an e-commerce exchange through website 310, in an alternative embodiment by submitting cash into a kiosk (not shown in Figure 3) that confirms the receipt of cash to web site 310.
  • WeCare Card website 310 then initiates the creation of the physical debit card and arranges for the physical debit card to be delivered (e.g., by overnight delivery) to the friend/recipient.
  • WeCare Card website 310 sends a message (e.g. by mobile phone text message or electronic mail) to the recipient with identifying information so that the recipient may obtain the debit card from another kiosk, automatic teller machine (ATM) terminal, internet terminal, bank teller, or banking facility.
  • ATM automatic teller machine
  • WeCare Card website 310 may obtain identifying information regarding the recipient of debit card 350 prior to, concurrently with, or after delivering debit card 350.
  • a charge card, driver's license, library card, or other identifying card may be scanned or otherwise observed to determine if the card or license uniquely identifies the individual.
  • initiating user 302 may be provided a token (either physical or electronic) that the recipient is required to present to obtain debit card 350. Thus, initiating user 302 would need to deliver the token to the recipient, thus providing a further level of authentication.
  • the recipient obtains the debit card and is able to use the funds associated with the card without having to attend to setting up an account or otherwise dealing with the financial institution that provides the debit card account.
  • WeCare Card website 310 In addition to providing basic gift card functionality, WeCare Card website 310 also facilitates independent parties 304 providing funds to the debit card for the recipient, either initially for a closed loop debit card, or after the delivery of the card for a reloadable debit card.
  • WeCare Card website 310 provides a listing of available debit cards for initial funding or additional reloading. Such a listing may be alphabetically arranged, geographically arranged, or searchable so that individuals may visit WeCare Card website 310, view the available debit cards and their associated recipients, and initiate an e-commerce transaction to provide additional funding to the debit card.
  • WeCare Card website 310 provides a description of the debit card recipient and an associated link to a funding section of website 310 so that user 302, or any of the independent parties 304, may post the description and link to a social network to assist raising funds for the recipient. Further embodiments allow for user 302 or 304 to logon to WeCare Card website 310 via a social media account, with the additional ability to obtain photos or comments/posts from the social network to populate a campaign page in WeCare Card website 310, and to direct social media posts from one social netork to be sent as a message..
  • WeCare Card website 310 provides user 302 or independent parties 304 with the ability to send electronic messages containing the description and/or the link; and to obtain campaign statuses and edit/update campaigns.
  • the functions described in this paragraph are conducted through a mobile device app, e.g. using cell phone 306 or tablet 308, rather than through conventional computer 312.
  • the functions described in this paragraph are conducted through a kiosk which may have a cash deposit or ATM terminal for receiving funding.
  • some aspects of the process described above occur in a system having a call center such as described in relation to Figure 8, others over a kiosk such as described in relation to Figure 9, and still others over a web site such as described in relation to Figure 3.
  • debit card 350 may be sold through conventional retail, mail order, telephone, or web purchasing systems without a specific individual recipient.
  • user 302 obtains debit card 350 from a conventional delivery system for example a retail store.
  • the packaging of debit card 350 may include instructions, or reference to a telephone number, kiosk location, or web site providing such instructions, so that user 302 may set up the recipient information and optionally provide some initial funding of the card.
  • user 302 may engage in activities to encourage independent parties 304 to provide funds for card 350.
  • User 302 may then give debit card 350 to the recipient, and the recipient may activate the card by contacting an authentication authority, such as server 300, WeCare Card website 310, Call Center 802, and/or Kiosk 902.
  • an authentication authority such as server 300, WeCare Card website 310, Call Center 802, and/or Kiosk 902.
  • the authentication authority may invoke an identity module to identify and categorize the recipient.
  • the authentication authority may include Application Program Interfaces (or "APF's) to other trusted systems, for example ones that may use multi-factor authentication to substantiate identification information from the recipient.
  • WeCare Card website 310 may have an API to a financial institution, such that the recipient may logon to the financial institution web site, using conventional multi-factor authentication. By virtue of the success of the logon, the API may create a token verifying the logon which may be considered as a verification of the individual, assuming that the financial institution is a trusted source.
  • Such a token may be sent as part of an electronic message to identify the sender, alternatively such a token may be stored on an individual's electronic device as an identifying file in a manner similar to a cookie, so that a future interaction with software running on a particular electronic device may access the file and provide suitable identifying information.
  • WeCare Card website 310 may have software configured to utilize a social network's integration capabilities or APIs to automatically allow information to flow from the social network' s systems to or from financial institutions' or WeCare Card's systems to enhance the ability to share campaigns across the websites and servers, authenticate the identity of donors & recipients through the data known by those parties about donors and recipients, etc.
  • WeCard Card website 310 may be incorporated into another software platform, for example into a social network (not shown).
  • server 300 may have access to sufficient identity information that a user having social network credentials may be sufficient to providing funding to debit card 350.
  • a user having social network credentials may only have a partial amount of credentials necessary to activate an account.
  • an API may use the partial credentials to start an authentication process with another party (e.g., a financial institution) to complete identification and either authorize funding to debit card 350, or to activate debit card 350 for the recipient.
  • user 302 may create a page for the particular debit card 350 and its recipient with the purpose of encouraging the friends and/or followers of user 302 to provide funds for debit card 350.
  • WeCare Card website 310 may be incorporated into an e-commerce software platform (not shown).
  • user 302 may purchase debit card 350 through the mechanisms of the e-commerce network or website.
  • User 302 may specify delivery of debit card 350 to user 302, the recipient, or independent party 304 so that independent party 304 may deliver debit card 350 to recipient. If the recipient is a member of the e- commerce network or website, the recipient may be able to activate debit card 350 by providing credentials to the e-commerce network or website.
  • user 302 may be able to promote providing funds to debit card 350 via messaging or other communication mechanisms, for example recommendations and/or product reviews, such that potentially interested contributors receive the message regarding contributing to the recipient— either automatically through pushing such a recommendation or review to the potential contributor, or passively by providing search terms that potential contributors would likely use.
  • messaging or other communication mechanisms for example recommendations and/or product reviews, such that potentially interested contributors receive the message regarding contributing to the recipient— either automatically through pushing such a recommendation or review to the potential contributor, or passively by providing search terms that potential contributors would likely use.
  • WeCare Card website 310 may be incorporated into a financial services software platform. As part of a financial services platform, if user 302 has credentials with the financial services platform then
  • WeCare Card website 310 includes an API that obtains an identity token for the user so that a contributor and/or a recipient may be associated with a transaction involving a particular debit card 350.
  • WeCare Card website 310 may have additional modules for obtaining identity information and authentication.
  • WeCare Card website 310 includes an API that interfaces with drivers on client machines to obtain authentication
  • user 302 may have a personal computer or smartphone with a connection for a connected token (e.g., a USB token, a smartcard, magnetic strip reader, audio port token, etc.), a user interface for entry of a displayed passcode (e.g., sequence- based, time -based, or a challenge-reply generated display token), or a soft token (e.g., a cookie, an secure socket layer (SSL) client certificate, or an application).
  • a connected token e.g., a USB token, a smartcard, magnetic strip reader, audio port token, etc.
  • a user interface for entry of a displayed passcode e.g., sequence- based, time -based, or a challenge-reply generated display token
  • a soft token e.g., a cookie, an secure socket layer (SSL) client certificate, or an application.
  • WeCare Card website 310 further includes an API to call center 800 and/or kiosk 900 so that authentication provided over call center 800 and/

Abstract

La présente invention concerne un système et un procédé basés sur un serveur (110) qui permettent de recharger une seule carte de crédit (350) à partir de plusieurs sources. Le système et le procédé de carte de crédit à multiples sources permettent à de multiples personnes de fournir des fonds à une seule carte de crédit sans que les multiples personnes aient pris connaissance des informations de compte bancaire. Les multiples sources, éventuellement identifiées par une identification à plusieurs facteurs, peuvent recharger le compte associé à la carte de crédit. En variante, une carte de crédit à boucle fermée peut être financée par de multiples sources. Le système et le procédé identifient les participants pour les objectifs de la transaction financière bien que l'identification du destinataire puisse être gérée par le donneur.
PCT/US2013/028153 2012-02-28 2013-02-28 Système et procédé orientés objet carte de crédit à multiples sources WO2013130705A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
GB1416946.0A GB2514729A (en) 2012-02-28 2013-02-28 Multi-source debit card object oriented system and method
AU2013226015A AU2013226015A1 (en) 2012-02-28 2013-02-28 Multi-source debit card object oriented system and method
SG11201405090YA SG11201405090YA (en) 2012-02-28 2013-02-28 Multi-source debit card object oriented system and method
IN8098DEN2014 IN2014DN08098A (fr) 2012-02-28 2014-09-29

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261604357P 2012-02-28 2012-02-28
US61/604,357 2012-02-28
US13/681,783 US20130132278A1 (en) 2011-11-21 2012-11-20 Multi-source debit card system and method
US13/681,783 2012-11-20

Publications (1)

Publication Number Publication Date
WO2013130705A1 true WO2013130705A1 (fr) 2013-09-06

Family

ID=49083259

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/028153 WO2013130705A1 (fr) 2012-02-28 2013-02-28 Système et procédé orientés objet carte de crédit à multiples sources

Country Status (5)

Country Link
AU (1) AU2013226015A1 (fr)
GB (1) GB2514729A (fr)
IN (1) IN2014DN08098A (fr)
SG (2) SG11201405090YA (fr)
WO (1) WO2013130705A1 (fr)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
EPO: "Mitteilung des Europäischen Patentamts vom 1. Oktober 2007 über Geschäftsmethoden = Notice from the European Patent Office dated 1 October 2007 concerning business methods = Communiqué de l'Office européen des brevets,en date du 1er octobre 2007, concernant les méthodes dans le domaine des activités", JOURNAL OFFICIEL DE L'OFFICE EUROPEEN DES BREVETS.OFFICIAL JOURNAL OF THE EUROPEAN PATENT OFFICE.AMTSBLATTT DES EUROPAEISCHEN PATENTAMTS, OEB, MUNCHEN, DE, vol. 30, no. 11, 1 November 2007 (2007-11-01), pages 592 - 593, XP007905525, ISSN: 0170-9291 *

Also Published As

Publication number Publication date
SG10201606912UA (en) 2016-10-28
GB2514729A (en) 2014-12-03
IN2014DN08098A (fr) 2015-05-01
GB201416946D0 (en) 2014-11-12
AU2013226015A1 (en) 2014-09-11
SG11201405090YA (en) 2014-09-26

Similar Documents

Publication Publication Date Title
US11887074B2 (en) Money transfer by use of a payment proxy
US8494913B2 (en) Multi-party payment object oriented system and method
US20180246623A1 (en) Secure transaction interfaces
US20130332357A1 (en) Setting peer-to-peer authorization levels with social network content
US10389544B2 (en) Virtual contact cards
US20140089195A1 (en) Person to person photo payments
US11663575B2 (en) Time sensitive geo-location data for push notifications after shared transaction processing
KR20170127854A (ko) 전자 결제 기능을 제공하는 전자 장치 및 그의 동작 방법
US20130226804A1 (en) Multi-source debit card object oriented system and method
US8751389B2 (en) Method and system to process payment using SMS messaging and a mobile-optimized web form
US20140046837A1 (en) Systems and methods for facilitating electronic payment service provider transactions using physical objects
WO2016179528A1 (fr) Appareils, procédés et systèmes de plate-forme de paiement de média social destinés au traitement de paiements via un média social
US20140365358A1 (en) Methods and systems for context-based check-out flows using a pass-through payment gateway
US20200184478A1 (en) Secure transaction interfaces
CN113196322A (zh) 通过联网的传感器进行的自动化数据令牌化
US20220180364A1 (en) Secure transaction interfaces
JP2023537719A (ja) Urlを介した安全なデータ転送を制御するためのシステムおよび方法
WO2013130705A1 (fr) Système et procédé orientés objet carte de crédit à multiples sources
WO2020204743A1 (fr) Procédé et système de rétribution sur internet
CN111971706A (zh) 使用无线个人助理执行金融交易的系统和方法
JP2021163383A (ja) ペイメントカード発行方法、ペイメントカード発行装置、及びペイメントカード発行プログラム
KR20140094683A (ko) 공간 웹 기반의 화폐 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13711488

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2013226015

Country of ref document: AU

Date of ref document: 20130228

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 1416946

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20130228

WWE Wipo information: entry into national phase

Ref document number: 1416946.0

Country of ref document: GB

122 Ep: pct application non-entry in european phase

Ref document number: 13711488

Country of ref document: EP

Kind code of ref document: A1