Patents by Inventor Merrill Smith

Merrill Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070187492
    Abstract: A computer-implemented method for processing a stored-value card transaction request in a card data management system is presented. The management system has a central processor in communication with one or more point-of-sale terminals over a communications network. Each terminal has a unique terminal identifier and is associated with a location and a prepaid card merchant. The central processor is in communication with a database having stored therein a plurality of card records. Each of these card records contains data associated with a stored-value card distributed to a prepaid card merchant for further distribution to purchasers at a location controlled by the prepaid card merchant. The transaction request comprises a requesting terminal identifier, a card identifier assigned to a stored value card, and information indicative of a requested transaction type.
    Type: Application
    Filed: March 27, 2007
    Publication date: August 16, 2007
    Inventors: Phillip Graves, Merrill Smith, Phil Chakiris
  • Publication number: 20070118478
    Abstract: A system and method for adding value into a customer's stored-value account is provided. A stored-value card is distributed to a merchant for distribution to a customer who has an account with a specific provider of goods and/or services. The stored-value card has an associated identifier that can be used to associate a stored value with the card. The associated stored value is redeemable with one or more providers, including the specific provider. The account has an associated account number. During a card purchase transaction, a central processor receives a request to activate the card from a merchant terminal. The central processor receives a redemption request from the customer, wherein the redemption request includes the identifier. The central processor identifies the provider and the account number. The central processor inserts the associated value into the account, for instance by passing a value insertion request to the provider.
    Type: Application
    Filed: February 8, 2007
    Publication date: May 24, 2007
    Inventors: Phillip Graves, Merrill Smith
  • Publication number: 20070118477
    Abstract: The present invention is directed at systems and methods of inserting value into a customer account with a provider of goods or services. Methods may comprise distributing to a customer a bill pay card wherein the bill pay cards comprise information sufficient to identify the provider of goods or services, the customer, and the customer's account with the provider of goods or services; presenting the bill pay card at a point of sale (POS) location; reading or otherwise obtaining from the bill pay card the information thereon; receiving value from the customer; and crediting the value received from the customer to the customer's account with the provider of goods or services. Systems may comprise a bill pay card; a provider of goods or services; and a POS.
    Type: Application
    Filed: February 7, 2007
    Publication date: May 24, 2007
    Inventors: Phillip Graves, Merrill Smith
  • Publication number: 20070094129
    Abstract: Systems and methods for processing stored value card requests are disclosed herein. The method may generally comprise: distributing a stored-value card to a first merchant for distribution to a customer having an account with a specific provider, the stored-value card having an associated identifier that can be used to associate a stored value with the card, the associated stored value being redeemable with one or more providers, including the specific provider, the account having an associated account number; receiving a first request to activate the card from a first merchant terminal, the first request resulting from a card purchase transaction; receiving a redemption request from the customer, wherein the redemption request comprises the identifier; identifying the provider; and passing to the customer a provider-specific identifier representative of the stored value. Systems are disclosed for accomplishing the same.
    Type: Application
    Filed: September 5, 2006
    Publication date: April 26, 2007
    Applicant: e2interactive, Inc. d/b/a e2Interactive, Inc.
    Inventors: Phillip Graves, Merrill Smith
  • Publication number: 20060255135
    Abstract: Systems and methods of using a keycard for automating transaction requests are disclosed. Methods may comprise receiving a request for a product identification number that is associated with a product by inputting keycard information at a merchant terminal, wherein the keycard was selected from among a plurality of keycards and is associated with a specific provider and value; processing the request; transmitting a transaction confirmation; and retaining the keycard by the merchant.
    Type: Application
    Filed: July 14, 2006
    Publication date: November 16, 2006
    Applicant: e2interactive, Inc. d/b/a e2Interactive, Inc.
    Inventor: Merrill Smith
  • Publication number: 20060231611
    Abstract: Methods and systems for using a Radio Frequency Identification (RFID) payment card are disclosed herein. The method generally comprises receiving an indicia identifying an RFID card, receiving a request to activate the RFID card, activating the RFID card by associating an initial value with a database record associated with the RFID card; receiving a PIN associated with the RFID card; receiving profile information; and associating the profile information with the database record. Systems for using RFID cards generally comprise an RFID card, an RFID account associated with the RFID card, a merchant communication module that receives indicia identifying the RFID card and sends a request to activate the RFID card, and a central processor or intermediary that receives a PIN associated with the RFID card and a request to activate the RFID card from the merchant communication module.
    Type: Application
    Filed: May 18, 2006
    Publication date: October 19, 2006
    Inventors: Phil Chakiris, Merrill Smith, Leslie Lowin
  • Publication number: 20060161490
    Abstract: A method of adding a value to a customer account is provided. A request to add a value to a customer account of a customer is received from a point of sale terminal. The request may comprise value identification data associated with the value and account identification data associated with the customer account. The customer account identification data may be entered at the point of sale. The request may be associated with a purchase of the value. The value may be caused to be added to the customer account. During subsequent value purchase transactions, additional value may be added to the account.
    Type: Application
    Filed: December 1, 2005
    Publication date: July 20, 2006
    Applicant: e2interactive, Inc. d/b/a e2Interactive, Inc.
    Inventors: Philip Chakiris, Merrill Smith, Phillip Graves
  • Publication number: 20060120526
    Abstract: The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.
    Type: Application
    Filed: January 11, 2006
    Publication date: June 8, 2006
    Inventors: Peter Boucher, Michael Wright, Tim Cranny, Gabe Nault, Merrill Smith
  • Publication number: 20050242193
    Abstract: An apparatus and method for activating and using a transaction card comprising two storage media is provided. A composite transaction card comprises a transaction portion detachably coupled to an activation portion. The transaction portion comprises a substantially planar transaction portion substrate having a machine readable transaction storage medium applied thereto. The transaction storage medium has transaction card data associated with an account stored therein. The activation portion comprises a substantially planar activation portion substrate having a machine readable activation storage medium applied thereto. The activation storage medium has activation data associated with the account stored therein.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Applicant: e2interactive, Inc. d/b/a e2Interactive, Inc.
    Inventors: Merrill Smith, Sean Chariker
  • Publication number: 20050107068
    Abstract: A system and method for authorizing the activation of a communication device is provided. A request to activate a communication device is received by a communication service provider. The communication service provider or a central processor determines whether the communication device was validly sold in a purchase transaction. Alternately, the communication service provider can outsource the determining step to a central processor. The communication service provider or central processor determines whether to activate the communication device based on the determining action.
    Type: Application
    Filed: February 17, 2004
    Publication date: May 19, 2005
    Inventors: Merrill Smith, Phillip Graves
  • Publication number: 20050051619
    Abstract: A computerized system and method for securely authorizing and distributing stored-value card data over a communications network is provided. The method allows for storing in the database a plurality of records comprising stored-value card data for each stored-value card as well as information identifying a plurality of trusted sources of stored-value card activation requests and/or a plurality of trusted communications networks for transmitting stored-value card activation requests. A transmitting step allows for a requesting terminal to transmit over a communications network a request to change the status of a stored-value card. The central processor then determines whether the requesting terminal and/or the communications network is a trusted source. Based on whether the requesting terminal or communications network is a trusted source or trusted communications network, the request can be processed and the card can be activated.
    Type: Application
    Filed: September 5, 2003
    Publication date: March 10, 2005
    Inventors: Phillip Graves, Merrill Smith
  • Publication number: 20050055578
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Application
    Filed: July 21, 2004
    Publication date: March 10, 2005
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20040152945
    Abstract: An aortic blood pump is described that can be inflated and deflated in response to selective communication with a source of pressurized fluid or air. The pump includes a structure adapted to maintain implant stability in the face of mechanical and fluid forces to which it is exposed in situ. The pump may include a wall adapted to maintain implant stability by connection of the wall to a stiffening element, such as a stent, a brace, a stiffener or any combination of these. Additionally, the pump optionally includes a wall adapted to maintain implant stability by configuring the interior volume to generally follow the contour of the native human aorta.
    Type: Application
    Filed: February 2, 2004
    Publication date: August 5, 2004
    Inventors: Adrian Kantrowitz, Robert Merrill Smith
  • Publication number: 20040123150
    Abstract: Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card.
    Type: Application
    Filed: February 28, 2003
    Publication date: June 24, 2004
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20040123153
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card.
    Type: Application
    Filed: April 11, 2003
    Publication date: June 24, 2004
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims