One card system

This invention relates to a novel system which includes a new device (the DEVICE) and a new business process (the PROCESS) that combines multiple cards (for both financial and non-financial transactions) into one card in a secured manner.

Skip to: Description  ·  Claims  ·  References Cited  · Patent History  ·  Patent History
Description
RELATIONSHIP TO PRIOR APPLICATIONS

This application is an one of two applications for reissue of U.S. Pat. No. 8,498,936, issued Jul. 30, 2013 and filed Sep. 27, 2010 as a national stage entry of international application PCT/US2009/002837, filed under the PCT May 7, 2009, and claims the benefit of, and priority to, U.S. provisional application No. 61/126,966, filed 7th May 7, 2008 and titled “a One card system—the device and the process”, which application is applications are hereby incorporated by reference for all allowable purposes. The additional application for reissue of U.S. Pat. No. 8,498,936 is reissue application Ser. No. 14/813,038 and was filed on Jul. 29, 2015.

BACKGROUND OF THE INVENTION

Cards (including but not limited to credit cards, such as VISA, MASTERCARD, AMERICAN EXPRESS, bank cards, department store cards, club membership cards, rebate cards, medical/insurance cards, drivers license, calling cards, etc.) are widely used for financial transactions such as payment and cash advance, or other non-financial transactions. An average person carries multiple credit cards and bank cards, along with many other cards in their wallet. Therefore, a system that can combine multiple cards into one card in a secured manner is preferable.

There are numerous patents describing a universal credit card and/or related device and process so that the end user can combine multiple cards into one card. Examples of such patents are U.S. Pat. No. 6,742,704 B2, U.S. Pat. No. 7,072,864 B2, and U.S. Pat. No. 7,334,732 B2. While each of the above patents claims to achieve its goal from technological point of view, they suffer one or more of the following shortcomings:

1) Does not have the true capability to put multiple cards into one card.

2) Does not provide a secure issuing and authentication process to give the counterparty in a transition the confidence a traditional card gives.

3) Card may be too bulky or fragile to work with existing business infrastructure systems, such as point of sale machines (POS) or automated teller machines (ATM).

For example, U.S. Pat. No. 6,742,704 B2 describes a system that allows a single card function as both a credit card, using magnetic stripe, and a club card, using printed information and/or a bar code. The system uses standard card issuing processes with minor modifications to add club card information. Another example is U.S. Pat. No. 7,072,864 B2, which discloses a system that can combine a merchant/service card, with a general use credit card. It functions as a merchant/service card when used with issuing merchant/service providers and as a credit card when used in other places. The system uses standard secure card issuing process. It enables the transition processing system to support both merchant/service card and credit card transition using magnetic stripe.

Yet, both inventions do not have the ability to combine multiple magnetic cards, such as, multiple credit cards, and/or bank cards, to a single card. In addition, when there is a request for a new card or a replacement card or a cancellation, a new physical card will need to be processed and sent to the user. The standard processing time will take many days and sometimes weeks to complete.

U.S. Pat. No. 7,334,732 B2 describes a hardware system to read and store multiple magnetic based cards to a single card. The card has a programmable magnetic stripe and embedded screen, power source, display and input device to allow user find and select one account, then program the account information to the magnetic stripe. Even though it may be possible to make such an integrated device technology-wise, it will be difficult to fit the system with batteries and LCD display in a standard credit card size that's robust enough for daily use in an existing POS or ATM machine. Furthermore, this invention lacks the secured process to add card information onto the system to give the issuing banks confidence to endorse such an invention. Without endorsement from issuing banks, it is also difficult for the merchants to accept such a card and accept such payment since the card created by this application may not be authorized by the original issuing institute. It not only doesn't look like a traditional credit card, it may also lack authority the original card carries.

In order to resolve these deficiencies, it has become apparent that a new system consisting of a new device and a new business process that can truly combine multiple cards into one card in a more secure manner and can be accepted by merchants with confidence and will be endorsed by issuing banks is highly desirable.

Moreover, it is important that the one card has the same size and look of any existing credit or bank ATM cards, so that the card can be used in current card readers at bank's ATMs, and/or at the merchants without requiring changes to the existing infrastructures for financial transactions such as accepting credit card payment at merchant site, depositing check or receiving cash at bank's ATM, or other financial or non financial transactions that are currently performed by various cards.

Furthermore, it is desirable to have a new one card system that has the built-in capability to receive, authenticate, and store all the related account information in a secured manner that can display related account information for users to choose the card for their next transaction. In addition, it is advantageous to have a new business process of processing, delivering, authenticating and activating the new account information that follows the current new and/or replacement card issuing and activation process with added layers of security, so that the counterparties (such as merchants and card issuers) can have the confidence to accept the card and will endorse the product.

It is further desired to have the “card” be issued by an authorized (such as DMV) or a centralized card processor (e.g. FDR, TSYS) with VISA, MASTERCARD, and/or AMERICAN EXPRESS logo on it, as well as user's name, address, etc., for authentication at banks and the merchant sites.

Furthermore, it is advantageous to have a process that allows a faster and easier way for the consumer to add a card or to cancel a card (or in the event of a lost and/or stolen card). Lastly, it is desirable that the new one card system can still be used without system change or upgrade when the merchants and banks upgrade their system to use smart card in the future and do not use magnetic card readers anymore.

SUMMARY OF THE INVENTION

This invention relates to a novel system which includes a new device (the DEVICE) and a new business process (the PROCESS) that combines multiple cards (e.g. credit cards, bank cards, department/retail store cards, and/or club membership cards, medical and insurance cards, rebate cards, identification cards, etc.) into one card in a secured manner. The DEVICE in this invention can be either a stand alone device or be incorporated into any widely used portable electronic equipment—such as cell phones, PDAs, etc. with added features and functionalities. Specifically, it has the built-in capability to receive, authenticate, and store all related account information in a secured manner via the PROCESS. It can also display related account information for users to choose the card for their next transaction. In the example of the DEVICE being combined with a cell phone, the phone becomes the wallet that acquires the capability to hold all necessary plastic cards.

With the current card reader infrastructure, the DEVICE may include a CARD that has the same size and look of any existing credit or bank ATM cards with a magnetic stripe on the back, and can be used in any current card reader at bank's ATMs, or merchants' POS. The DEVICE can write related account information stored in the DEVICE onto the CARD's magnetic stripe in a secured manner. The DEVICE or the CARD may also use smart card technology in place of magnetic stripe to perform the transactions.

This invention also includes a new business process (the PROCESS) to register the DEVICE, to request adding a new card, processing a replacement card, or canceling a card, to deliver, authenticate and activate a new or replacement card, and to store and display the account information on the DEVICE, etc. The PROCESS of processing, delivering, authenticating and activating the new or replacement account is consistent with the current new/replacement card processing with additional layers of security. The PROCESS also includes secured information transmissions between card issuers and the DEVICE, and between the DEVICE and the CARD.

Compared to the other patents with the similar objectives, our invention is unique and superior to all the prior arts. The main differences and benefits of this invention are one or more of the following: It has the ability to truly combine multiple cards (e.g. credit cards, bank cards, department/retail store cards, and/or club membership cards, medical/insurance cards, rebate cards, identification cards, etc.) into one card in a secured manner, so that the “one card” can be accepted by merchants with confidence and will be endorsed by issuing banks.

The CARD in this invention has the same size and look of any existing credit or bank ATM cards. The CARD can be used in current card readers at bank's ATMs, and/or at the merchants—with no batteries in the card, or LCD display on the card. It does not require changes to the existing infrastructures for accepting payment, depositing check/receiving cash, or other financial transactions that's currently performed by credit or debit cards;

For authentication at banks and the merchant sites, the CARD can be issued by an authorized (such as DMV) or a centralized card processor (e.g. FDR, TSYS) with VISA, MASTERCARD, and/or AMERICAN EXPRESS logo on it, as well as the user's name, address, etc.

The PROCESS of processing, delivering, authenticating and activating the new account information follows the current new and/or replacement card issuing and activation process with additional layers of security. Customers are not required to register with the “Host System” with their financial data such as credit card or bank account information, which can create potential fraud and huge financial liabilities. Throughout the information transmission processes, the “Host System” is not required to have access to, to store or to transmit unencrypted account information. The PROCESS described in this invention will allow a consumer to add or to cancel a card (or in the event of a lost and/or stolen card) in a matter of minutes or hours instead of days or weeks. Smart card technology can be used on the DEVICE without system change or upgrade.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a drawing of the DEVICE and the CARD

FIG. 1a is a drawing illustrating the front view of the DEVICE. .

FIG. 1b is a drawing illustrating the inside view of the DEVICE and the CARD.

FIG. 1c is a drawing illustrating of the CARD.

FIG. 1d is a drawing illustrating the top view of the DEVICE with CARD.

Entities (FIG. 1):

1. a display; 2. an input mechanism; 3. a DEVICE ID; 4. a communication sub system; 5. a non-volatile storage; 6. a CPU, or other integrated computer system; 7. a magnetic strip writer; 8. a card storage slot; 9. a card; 10. a magnetic strip

FIG. 2 is a drawing illustrating the interactions among the customer, the card issuer, the HOST SYSTEM/card processor, the DEVICE and the CARD through the PROCESS.

Entities (FIG. 2):

1. Consumer; 2. Card Issuer; 3. Host System/Card Processor; 4. Device; 5. Card.

Consumer Actions (FIG. 2):

103. Register; 102. Request a card (add a new account onto, or cancel a card from the DEVICE, etc.); 104a. Confirm and activate or change the functionality of a new account; 104b. Select a card; 105. Use a card.

Information Flow (FIG. 2):

201. Pass-code encrypted account information; 202. Pass-code encrypted and DEVICE encrypted account information; 203. Re-program the CARD

DETAILED DESCRIPTION OF THE INVENTION

This invention relates to a novel system which includes a new device (the DEVICE) and a new business process (the PROCESS) that combines multiple cards (e.g. credit cards, bank cards, department/retail store cards, and/or club membership cards, medical and insurance cards, rebate cards, identification cards, etc.) into one card in a secured manner.

The Device

The DEVICE in this invention can be either a stand alone device or be incorporated into any widely used portable electronic equipment—such as cell phones, PDAs, etc. with added features and functionalities. Specifically, it has a built-in capability to receive, authenticate, and store all the related account information in a secured manner via the PROCESS. It can display related account information for users to choose the card for their next transaction. In the example of the DEVICE being combined with a cell phone, the phone becomes the wallet and acquires the capability to hold all necessary plastic cards.

    • 1. The DEVICE is an electronic device that is capable of receiving, storing and processing multiple account information in a secured manner using a novel PROCESS (defined later). The device may include or be used in conjunction with a smart card. It may be capable of reprogramming a magnetic stripe card or a smart card.
    • 2. In one general embodiment the DEVICE includes the following components. Each of these components may be used in any combination within a DEVICE:
    • a) A display. The display can be a LCD screen, as show as 1 in FIG. 1a. It can also be an e-ink display or any other type of display. It will be used for user interaction. It will also display account information in text, symbol, bar code or graphic form.
    • b) An input mechanism. It could be a keyboard, a pointing device, as shown as 2 in FIG. 1a. It could also be in the form of one or more the following mechanisms: a touch screen, one or more selection/arrow keys/buttons.
    • c) A unique DEVICE ID to uniquely identify the device in the PROCESS. The ID could be an IMEI (International Mobile Equipment Identity) on a mobile phone SIM card, as shown as 3 in FIG. 1b. It could also be a MAC (Media Access Control) address on a network chip, a CPU id, or any other form of unique identifier available on a hardware component.
    • d) A communication sub-system to communicate directly or through a computer to the HOST SYSTEM as described in the PROCESS. It could be a mobile data network modem, as shown as 4 in FIG. 1b. It could also be one or more of the following components: a wifi chip, an Ethernet chip, a USB interface, a blue tooth network, or an infrared transmitter/receiver.
    • e) A non-volatile storage, such as a flash memory chip, as shown as 5 in FIG. 1b. Alternatively one could choose a hard drive, a flash card, or an EPROM. This component is used to store the account information received from the PROCESS.
    • f) A CPU, as shown as 6 in FIG. 1b, or other integrated or specialized computing system that can process/encode/decode/store/retrieve the account information, handle user/network interaction and control other sub-system.
    • g) A magnetic stripe writer, as shown as 7 in FIG. 1b and FIG. 1d, to program the CARD. It could be a side slot on one side of the DEVICE that a CARD can swipe through. Alternatively, there could be an opening slot on the DEVICE that the CARD can be pushed into and pulled out, as shown as 8 in FIG. 1b and FIG. 1d. In the latter case, the slot can also be used as a storage for the CARD and a lock/eject mechanism may also be applied.
    • h) A smart card chip embedded and has the circuitry to program the smart card chip. In this case, the DEVICE itself can function as a smart card.
    • i) A smart card programmer that can program the CARD with smart card capability (a smart card). Smart card is a technology that uses an integrated circuit chip, instead of a magnetic stripe, to store and communicate with a point of sale (POS) system. The more common form of smart card as wireless technology is to perform touch-less transmission. The smart card can be programmed wirelessly or through electric contact using a smart card program device.
    • j) The capability to read the unique id of the CARD. It could be a smart card reader if the card has a smart card embedded, an optical scanner if the id is a bar code, or a magnetic stripe reader if the card use a (separate) permanent magnetic stripe to store its id.
    • k) It may have a clock for process time based dynamic account information.
    • l) It may have a bio-matrix scanner, such as print scanner for security authentication to operate the DEVICE.
    • m) A CARD, as shown as 9 in FIG. 1b, FIG. 1c and FIG. 1d, and a “CARD” slot, as shown as 8 in FIG. 1b and FIG. 1d. The CARD will have either a magnetic stripe, as show as 10 in FIG. 1b and FIG. 1c, that works with existing point of sale systems (POS) or ATMs, or a smart chip that works with smart card system. The CARD may have an unique id that can be recognized by the DEVICE, for example, a smart card, bar code or a special magnetic stripe. However, if in the future, the merchant and bank upgrade their system, and do not use a card reader anymore, then the DEVICE in this invention does not need to include the “CARD”, since the smart chip can be embedded in the “DEVICE”, the user can use the DEVICE without the CARD.

The CARD has the following features:

1). For an additional layer of security, the DEVICE and the CARD may be pre-paired before delivery to the user, or the DEVICE and the CARD can be paired through the PROCESS if the CARD has a unique id. The DEVICE will only write to a paired CARD. This way a user can't use a CARD from one DEVICE with a different DEVICE. When the match is not there, the DEVICE will refuse to write account info onto the CARD—this again is to prevent fraud.

2). For authentication by issuing banks and at merchant sites, the CARD can be issued by an authorized (such as DMV) or centralized card processor (e.g. First Data Corp, Total Systems, etc.) with VISA, MASTERCARD, AMERICAN EXPRESS, and/or other, logos from other authorities onto it, as well as user's name, address, etc.

3). The CARD can be inserted into the DEVICE and with user's selection of the account for the next transaction, related account information can be written from the DEVICE onto the magnetic stripe on the back of the CARD. The CARD can then be used as a “normal” credit or debit card for the user to perform his/her next desired transaction.

4). The CARD can take the form of an ID card with information such as photo, name, and address on the front of the card and at least one magnetic stripe on the back. For example, if combined with a driver license card, the CARD can take the form of the current driver license with an added special magnetic stripe on the back (not to replace the current stripe on the driver license, but an added one on the bottom), onto which the DEVICE to write related account information for financial transactions per user's instruction. Ultimately, when the CARD takes the form of the driver license, the DEVICE becomes a wallet, with the only “CARD” one needs to carry with them!

    • 3. The DEVICE can perform secure transmissions directly with smart card technology or through a CARD by reprogramming its magnetic stripe or its smart card chip. It has the following features:
    • a) For security, only account information received in a secured manner via the PROCESS can be read, stored, and used by the DEVICE and written onto the CARD.
    • b) The DEVICE will not accept any user entered account number. This is again to prevent fraud.
    • c) The DEVICE can't read account information from the CARD's magnetic stripe to retrieve account information or from ANY other cards (credit or bank card) user may choose to insert into the DEVICE, for that matter. This is important as nobody can insert any credit or bank card into the DEVICE and expect the DEVICE to retrieve the account information and store them onto the DEVICE without going through the PROCESS. This is to reduce or eliminate fraudulent activities possible through the one card invention. This feature is also important so that issuing banks are comfortable with account information transmissions.
    • d) The DEVICE may have a bio-matrix scanner, such as finger print scanner for security authentication to operate the DEVICE.
    • e) The DEVICE may have the ability to access and display account information with issuing bank for balance, available credit line, APR, payment due dates, etc.
    • f) The DEVICE can be a hand held item, including but not limited to cell phones, palms, laptop computers, or other electronic devices.
    • g) The account information stored in the DEVICE can be encrypted to add an additional layer of security in case the DEVICE is lost or stolen. The information can only be retrieved and the functionality can only be activated (for selecting the card to use and to write to the CARD) with correct password, and/or a bio-matrix match.
    • h) For non-financial institution issued cards (such as Safeway card, Costco card, insurance card, etc.), the user can also add such accounts through the PROCESS onto the DEVICE.

The Process

This invention also includes a new business process to register the DEVICE, to request adding a new card, processing a replacement card, or canceling a card, to deliver, authenticate and activate or change the functionality of a new or replacement card, and to store and display the account information on the DEVICE, etc. The PROCESS of processing, delivering, authenticating and activating the new or replacement account is consistent with the current new/replacement card processing with additional layers of security. The PROCESS also includes secured information transmissions between card issuers and the DEVICE, and between the DEVICE and the CARD.

    • 1. Register (as shown as 103 in FIG. 2) the DEVICE (as shown as 4 in FIG. 2)
    • a) After obtaining a new DEVICE, a customer (as shown as 1 in FIG. 2) can register the DEVICE with a HOST SYSTEM (as shown as 3 in FIG. 2) and obtain a One Card ID. The HOST SYSTEM here can be any centralized card processor such as FDR, TSYS, a newly created card processor for One-Card System, or any other institution chosen to perform this function. The DEVICE can also be pre-registered.
    • b) This step is included for added layer of security. It also provides user support and convenience when the DEVICE is lost or stolen. However, the PROCESS in this invention can work without a separate HOST SYSTEM as well.
    • 2. Initiate a request for a new/replacement card (as shown as 102 in FIG. 2)
    • a) A customer applies for a new card, or a card issuer (as shown as 2 in FIG. 2) issues a replacement card for an existing card (e.g. near the expiration date, or lost/stolen card, etc.);
    • b) The customer indicates he/she wants to combine the new card with the one-card DEVICE, and provide the card issuer with the One Card ID (if registered with the HOST SYSTEM).
    • 3. Process the request and deliver the new account information
    • a) The card issuer will send the encrypted new account information through the HOST SYSTEM (as shown as 201 in FIG. 2), and/or to the customer directly. It can be sent via mail, by phone, or other communication channels such as the Internet, satellite communication or the cell phone networks, etc.
    • b) In the example of card issuers sending account information to the customers through the HOST SYSTEM, the card issuer can send the encrypted new account information (pass-code encryption) with the One Card ID to the HOST SYSTEM via a secured private network. The HOST SYSTEM can then add another layer of encryption (device specific encryption with DEVICE ID) and forward the message through the public communication networks such as the Internet, satellite communication or the cell phone networks to the DEVICE (as shown as 202 in FIG. 2). Only when the DEVICE ID on the DEVICE matches with the one sent from the HOST SYSTEM the DEVICE will be able to notify the customer that new account information has arrived from the card issuer. In this case, even if the message from the HOST SYSTEM were to be received by a wrong party, they would not be able to decrypt the account information. In addition, the message to the customer may ask the customer to call the card issuer (similar to the current card activation process for a new credit and/or bank card) to verify and activate or change the functionality of the new card; after verification, the card issuer can provide the customer the pass-code (over the phone, by mail, or other appropriate communication channels) to key into the DEVICE. When the pass-code entered by the customer matches with the key of the encrypted message sent from the card issuer, the new account information can then be decoded and stored into the DEVICE (as shown as 104a in FIG. 2).
    • c) A separate HOST SYSTEM adds another level of security by guaranteeing that no single institution can generate valid account information for the DEVICE.
    • 4. USE (as shown as 105 in FIG. 2)
    • a) For more security, all the account information can be stored in the DEVICE in an encrypted form. The account information can only be retrieved or the functionality (such as display the account information, select the card to use and write the related account information onto the CARD (as shown as 5 in FIG. 2) for the next transaction) can only be activated with a correct password, and/or a bio-matrix match.
    • b) The user can view the account information stored in the DEVICE—it can include but is not limited to the name of issuing bank, current balance on the account, available credit, payment due date, and APR, etc.
    • c) The user can select the account he/she wants to use for the next transaction (as shown as 104b in FIG. 2).
    • d) After the user confirms the selection, the related account information will be written onto the magnetic stripe of the CARD or shown as the BAR code on the DEVICE (as shown as 203 in FIG. 2). The user can then use the CARD as a “normal” credit or debit card—whether it's at bank's ATMs for check deposit or cash advance, or at merchants for credit card payment. After the transaction, the user can put the CARD back into the DEVICE, and all account information becomes encrypted again.
    • e) The account information stored on the magnetic stripe of the CARD may disappear after a pre-set amount of time or when the CARD is put back into the storage in the DEVICE—in the situation the CARD (or the DEVICE) is lost or stolen, this feature can protect the issuing bank and card user from fraud losses. This is not a required feature for this invention.
    • f) At the merchants and/or at bank's ATMs that accept the smart card technology, the user can select the account he/she want to use and use the DEVICE for the next transaction with or without the CARD.
    • 5. Lost or Stolen
    • a) Users may follow the current established lost/stolen process by calling each card issuers and request replacement card issuance, or
    • b) For their convenience, when the DEVICE is lost or stolen, user may contact the HOST SYSTEM. With the correct One Card ID and verifications such as name and address match, the HOST SYSTEM can notify the card issuers (for all the cards processed through the HOST SYSTEM via the PROCESS) with the customer One Card ID and customer name and address for card cancellation. The customer will obtain a new DEVICE, register with the HOST SYSTEM again and establish a link between their new DEVICE and their existing One CARD ID, along with their name and address. The HOST SYSTEM can send the card issuers the customer's One Card ID linked with the new DEVICE and request new cards to be processed. Going through the PROCESS again, the user will be able to activate or change the functionality of and use the new cards with their new DEVICE.
    • 6. Cancellation and Account Closure
    • a) If a customer wants to cancel or close an existing account, they can notify the card issuer through the current account closure or cancellation process via phone, email, etc. Or,
    • b) The customer can choose to send an account cancellation request from the DEVICE to the HOST SYSTEM. When the HOST SYSTEM receives the message and if the DEVICE ID matches the customer's One Card ID, the HOST SYSTEM can notify the corresponding card issuer (for the cards processed through the HOST SYSTEM via the PROCESS) with the customer One Card ID and customer name and address for card cancellation.
    • c) The card issuer will process the cancellation request, and then send an account cancellation notification through the HOST SYSTEM to the DEVICE. After receiving such notice, the DEVICE will notify the customer that the card has been canceled or closed. The customer will have the option of either erasing the account information from the DEVICE or choosing to continue to be able to view the account, but the DEVICE will block the user from selecting the canceled account for any future transactions.

It should be pointed out that the Process of requesting, authenticating, receiving, storing, and activating the account information from the card issuer to the DEVICE is an important element of this invention and is believed to differentiate the invention from the prior art. As explicitly stated, the account information is not transmitted from any actual credit card onto the DEVICE, but rather it has to go through the PROCESS for security reasons. The HOST SYSTEM is there to further facilitate the process. The PROCESS has the following features: 1. It is secure—so that the card issuer and merchant will endorse and accept this invention. It follows the existing card issuing process with additional layer of security. 2. It is fast and convenient—if implemented correctly, the PROCESS of requesting, authenticating, receiving, storing, and activating additional account information should take only a few minutes. In the situation of a lost or stolen card or DEVICE, the customer only need to make one contact with the HOST SYSTEM (if registered), and the establish the link between the new DEVICE ID and the one card ID, all the old accounts will be cancelled and the new card information can be sent to the new DEVICE in a matter of minutes or hours. Today, to request a new card, it takes at least many days, most likely weeks.

Further embodiments of the invention include the following.

1. A system for providing multiple personal authorization information associated with multiple accounts in a single card, the system comprising: (a) a card having the dimensions and functionality of a credit card; the card additionally comprising a first programmable memory (e.g., magnetic stripe, chip & pin, non-volatile memory, etc.) physically associated with the card, the first programmable memory readable by a card reader; (b) an account database, the account database having a multiplicity of card holder account numbers stored therein; (c) an account programming device, the account programming device capable of reading one new user account number from the account database and writing a new account number on the first programmable memory; whereby when the card is placed is communication with the account programming device a card holder account number is read from the account database and is written onto the first programmable memory such that the card is useable by a card holder as a personal authorization card.

Other embodiments include the following (presented in the form of claims, but not intended to act as or be read as a claims limiting the invention):

1. A personal authorization card for storing access to account information comprising:

a planar card, the planar card having the dimensions and functionality of a credit card; a first programmable magnetic stripe affixed on the planar card, the first programmable magnetic stripe readable by a current card reader; an account database, the account database having a multiplicity of new card holder account numbers; an account programming device, the account programming device capable of reading one new user account number from the account database and writing a new account number on the first programmable magnetic stripe; wherein when the planar card is inserted in the account programming device a new card holder account number is read from the account database and is written on the first programmable magnetic stripe; such that the planar card is operable by a card holder as a personal authorization card.

2. The personal authorization card for storing access to account information as in claim 1 wherein the account programming device selected from a group consisting of:

standalone electronic devices, cellular phones, personal data assistants (PDA's), personal computers.

3. The personal authorization card for storing access to account information as in claim 1 wherein the planar card further comprising: an account database, the account database integrated onto the planar card; a new card holder account number selector, the new card holder account number selector capable of interfacing with the account database and operable by the card holder to select the new card holder account number; such that when the new card holder account number selector is operated, the user selects an account number that is then written on the first programmable magnetic stripe.

4. The personal authorization card for storing access to account information as in claim 3 wherein the account database is passively powered.

5. The personal authorization card for storing access to account information as in claim 3 wherein the account number selector is a touch screen.

6. The personal authorization card for storing access to account information as in claim 1 wherein the personal authorization card is selected from a group consisting of credit cards, bank ATM cards, department store cards, club membership cards, rebate cards, medical/insurance cards, drivers licenses, and calling cards.

7. The personal authorization card for storing access to account information as in claim 1 wherein the new card holder account numbers are encrypted.

8. The personal authorization card for storing access to account information as in claim 1 wherein the account programming device is selected from a group consisting of host computer systems, local computer systems, network based computer systems, portable data systems, and mobile data systems.

9. The personal authorization card for storing access to account information as in claim 1 wherein the account database is stored on a non-volatile memory.

10. The personal authorization card for storing access to account information as in claim 1 wherein the device further comprises: a unique identification number, such that the unique identification number corresponds to a card holder.

11. The personal authorization card for storing access to account information as in claim 1 where the account database is alterable by a third party.

12. The personal authorization card for storing access to account information as in claim 1 further comprising: a user id and password pair, such that the user id and password pair allows limited access by the account programming device.

13. The personal authorization card for storing access to account information as in claim 1 further comprising: a bio-matrix scanner, the bio-matrix scanner being coupled to the account database; such that when a biometric signature from the card holder is matched to an accepted card holder the card holder account number is retrieved from the account database.

14. A method for generating electronic transactions by a card holder comprising:

obtaining a card, the card being generally planar and possessing a first programmable magnetic stripe such that the first programmable magnetic stripe is readable by a current card reader; and coupling the card an account programming device, the account programming device capable of reading one new user account number from an account database and writing a new account number on the first programmable magnetic stripe; and selecting a new card holder account number from the account database; so that when the card is inserted into a card reader, the card reader reads the new user account number.

15. The method for generating electronic transactions by a card holder as in claim 14, further comprising the step of establishing a secured information transmission between the account programming device and the account database.

16. The method for generating electronic transactions by a card holder as in claim 14, further comprising the step of encrypting the account database.

17. A system for generating electronic transactions by a card holder comprising:

a magnetic stripe, the magnetic stripe integrated onto a generally planar card; and a means for selecting from a database of multiple account numbers generally related to a card holder, a single account number; a means for encoding account information on the magnetic stripe; a means for transmitting the single account onto the magnetic stripe using the encoding means.

18. A personal authorization card with a unique account number embedded on a magnetic stripe on the card, created by the process comprising the steps of:

accessing a database of multiple account numbers from a multiplicity of card issuers, wherein the account numbers are related to a single cardholder; selecting a single account number from the database of multiple account numbers; encoding the single account number on the magnetic stripe; such that personal authorization card is compatible with existing point of sale machines.

19. The personal authorization card as in claim 18 further comprising the steps of:

embedding the database of multiple account numbers on the card; attaching an external device to the card; reading an account number from the database of multiple account numbers on the card; writing the account number onto the magnetic stripe; so that the personal authorization card is readable by existing point of sale machines.

DEFINITIONS

In this disclosure, the following definitions are used.

A “One card ID” means a unique string of characters that is uniquely associated with a unique DEVICE ID, such as an ip address.

A “Device ID” is a unique string of characters that is associated with a unique device.

“Characters” may be any letters, numbers, pictograms, kanji, or symbols.

A “device memory” includes any storage accessible by the device including non-volatile memory on or off the device, non-volatile memory on the card, or a remote storage or database.

A “transaction memory” includes any storage device including magnetic stripes, RFID tags, smart card, non-volatile memory, etc.

To “change the functionality of a card” means to change the way the card works or change what it does in any way, or to change, edit, add or delete data from the card; this may include but is not limited to, for example, activating the card, deactivating the card, extend or change the expiration date of the card, changing address, credit limit, or changing authorized users of the card.

A “Customer” may be any person or legal entity such as a corporation.

The term “account” refers to any body if information specific to a person or entity, such as a corporation, and may be a credit or debit account, or may be an account having information for a customer loyalty card, insurance card, club membership card or drivers license. Any type of information may be stored in an account.

A “Card” may be any physical entity capable of including a memory, such as a credit or debit card, a customer loyalty card, insurance card, club membership card or drivers license, and may be of any shape but generally refers to a flat card with dimensions similar to a credit card, although the term is used to equally include any device of any shape.

A “programming device” means any machine that can program a memory, such as a read/write device for reading and writing to and from a magnetic memory or a non-volatile memory.

A “Host system” can be any centralized card processor such as First Data Corp., Total System, a new created card processor for One-Card System, or any other institution chosen to perform the function of facilitating communication in the one card system. It adds another layer of security and convenience.

The phrase “encoding” or “writing” information onto the memory of the card simply means transferring or writing information onto a memory.

A “new card” simply means a card that is new to the user/customer.

The “One-Card System” refers to the invention as shown and described herein.

“New account information” means any account information such as account number, expiration date, account holder name, address, etc. that is new to the user/customer.

“Contacting the card to the Device” means putting the card and Device in functional communication, and not necessarily physical communication. No physical communication is required and the card and Device may be remote from each other.

The phrase “account database” means any set of stored information stored in a memory, for example stored in a RAM in the Device.

The term “device memory” means a memory on the device.

The term “transaction memory” refers to a memory on the card.

General Representations Concerning the Disclosure

In this specification, reference is made to particular features of the invention (including for example components, elements, devices, apparatus, systems, groups, ranges, method steps, test results, etc.). It is to be understood that the disclosure of the invention in this specification includes all appropriate combinations of such particular features. For example, where Where a particular feature is disclosed in the context of a particular embodiment or a particular claim, that feature can also be used, to the extent appropriate, in the context of other particular embodiments and claims, and in the invention generally. The embodiments disclosed in this specification are exemplary and do not limit the invention. Other embodiments can be utilized and changes can be made. As used in this specification, the singular forms “a”, “an”, and “the” include plural reference unless the context clearly dictates otherwise. Thus, for example, a reference to “a part” includes a plurality of such parts, and so forth. The term “comprises” and grammatical equivalents thereof are used in this specification to mean that, in addition to the features specifically identified, other features are optionally present. For example, a device “comprising” (or “which comprises”) elements A, B and C can contain only elements A, B and C, or can contain not only elements A, B and C but also one or more other elements. The term “consisting essentially of” and grammatical equivalents thereof is used herein to mean that, in addition to the features specifically identified, other features may be present which do not materially alter the claimed invention. The term “at least” followed by a number is used herein to denote the start of a range beginning with that number. Where reference is made in this specification to a method comprising two or more defined steps, the defined steps can be carried out in any order or simultaneously (except where the context excludes that possibility), and the method can optionally include one or more other steps which are carried out before any of the defined steps, between two of the defined steps, or after all the defined steps (except where the context excludes that possibility). Where reference is made herein to “first” and “second” features, this is generally done for identification purposes; unless the context requires otherwise, the first and second features can be the same or different, and reference to a first feature does not mean that a second feature is necessarily present (though it may be present). Numbers given herein should be construed with the latitude appropriate to their context and expression; for example, each number is subject to variation which depends on the accuracy with which it can be measured by methods conventionally used by those skilled in the art. This specification incorporates by reference all documents referred to herein and all documents filed concurrently with this specification or filed previously in connection with this application, including but not limited to such documents which are open to public inspection with this specification.

Claims

1. A method for establishing account information into a device comprising:

(a) storing one or more user account information on a device, wherein the device includes a unique identification number stored thereon and known to a card issuer;
(b) encoding user account information onto a memory of a card using said device;
(c) receiving by the card issuer, a request from a user for a new card or to make changes to an existing card;
(d) sending by the card issuer, an encrypted new account information to the device using the unique identification number of the device, wherein only the device with the unique identification number is configured to decrypt the new account information;
(e) decrypting the encrypted new account information using the unique device identification number, and storing the account information to an account database on a memory of the device;
(f) selecting an account from the account database on the memory of the device and writing the selected account information onto the memory of the card; and
(g) using the card with the selected account information to complete a next transaction.

2. The method of claim 1 further comprising the steps of (h) upon receipt of the new account information, prompting the customer to contact the card issuer for verification of customer's identity; and (i) inputting by the customer, verification information to allow authorization by the card issuer activate or change of functionality of the card.

3. The method of claim 1 comprising, in step (d), further encrypting the new account information with a pass-code that is required to decrypt the new account information, and further comprising the step of; receiving the new account information, whereupon the device prompts the customer to contact the card issuer, and the customer contacts the card issuer to verify the customer's identity and to obtain the pass-code required to decrypt the account information.

4. A method for establishing account information into a device comprising:

(a) storing one or more user account information on a device, wherein the device includes a unique identification number stored thereon;
(b) encoding user account information onto a memory of a card using said device;
(c) establishing a unique one-card identification number known to the customer and a card issuer, wherein the unique one-card identification number is associated with and allowing access to the device;
(d) registering the one-card identification number and the device identification number with a host system;
(e) communicating, from the customer to the card issuer, an instruction to issue a new card or change the functionality of a card via the host system;
(f) in response to the communicating step, simultaneously sending by the card issuer, encrypted new account information and the one-card identification number associated to the account information, to the host system;
(g) identifying by the host system the device identification number using the one-card identification number;
(h) identifying the device using the device identification number;
(i) upon identifying the device, further encrypting by the host system, the encrypted new account information using device-specific encryption which can be decrypted only by a device having the corresponding device identification number;
(j) forwarding by the host system, the device-specific encrypted new account information to the device;
(k) receiving by the device, the device-specific encrypted new account information;
(l) decrypting by the device, the device-specific encrypted new account information using the corresponding device identification number;
(m) storing the decrypted new account information to the account database on a memory of the device;
(n) selecting an account from the account database on the device memory; and
(o) writing the selected account information onto the memory of the card.

5. The method of claim 1 or 4 further comprising the steps of using the un-encrypted account information to activate or change the functionality of the card.

6. The method of claim 4 further comprising the steps of upon receipt of the device-specific encrypted new account information, prompting the customer to contact the card issuer for verification of customer's identity; and inputting by the customer, verification information to allow authorization by the card issuer activate or change of functionality of the card; and the account information sending from the card issuer in step (f) is further encrypted with a pass-code, and upon receipt of the device-specific new account information, the device prompts the customer to contact the card issuer, the customer contacts the card issuer to verify the customer's identity to get the pass-code to decrypt the account information.

7. The method of claim 4 wherein the host system does not retain or store unencrypted account information.

8. The method of claims 1 or 4 further comprising storing the account information on the device in an encrypted form.

9. The method of claim 8 wherein the encrypted account information is only decrypted or viewed or used by entering either a correct password or a bio-metric information or both.

10. The method of claim 4 wherein, following decryption of the device-specific new account information, the user can view the account information stored in the device including information selected from the group consisting of: the name of issuing bank, the current balance of the account, and available credit.

11. The method of claims 1 or 4 further comprising the steps of the card issuer communicating an instruction to the customer for changing the functionality of a card in step (d) of claim 1, or in step (f) of claim 4, without the request of the customer.

12. The method of claims 1 or 4 wherein, following decryption of the account information, a bar code is displayed on the device.

13. The method of claims 1 or 4 further comprising physically contacting the card with the device and erasing account information from the card.

14. The method of claims 1 or 4 wherein account information stored on the transaction memory of the card is erased after a pre-set time.

15. The method of claim 4 further comprising the steps of the customer obtaining a new device, contacting the host system for card cancellation, registering the new device with the host system to establish a link between their new device and their one card identification number.

16. The method of claims 1 or 4 wherein the card comprises a programmable magnetic stripe.

17. The method of claims 1 or 4 wherein the card comprises a programmable smart card.

18. The method of claims 1 or 4 wherein the device comprises a smart card chip such that the device can function as a smart card by itself.

19. The method of claim 1 wherein, following decryption of the new account information, the user can view the account information stored in the device including information selected from the group consisting of: the name of issuing bank, the current balance of the account, and available credit.

20. A method for establishing account information into a device comprising:

a) providing an interface allowing a user to request, from a card issuer, a new card or changes to an existing card;
b) receiving a request to store user account information on the device, wherein the device includes a unique identification number stored thereon;
c) encoding user account information into a memory of the device;
d) receiving encrypted new account information sent by the card issuer to the device using the unique identification number on the device, wherein only the device with the unique identification number is configured to decrypt the new account information;
e) decrypting the encrypted new account information using the unique identification number and storing the account information to an account database on the memory of the device;
f) providing an interface allowing the user to select account information; and
g) identifying a selected account from the account database on the memory of the device and transmitting the selected account information via a wireless communications element of the device.

21. The method of claim 20, further comprising the steps of: (h) upon receipt of the new account information, prompting a customer to contact the card issuer for verification of customer's identity; and (i) receiving, from the customer, verification information to allow authorization by the card issuer to activate or change of functionality of the card.

22. The method of claim 20, comprising, in step (d), prompting the customer to contact the card issuer upon receiving the new account information to obtain a pass-code required to decrypt the account information.

23. A method for establishing account information into a device comprising:

a) providing an interface allowing a user to communicate to a card issuer an instruction to issue a new card or change the functionality of a card via a host system;
b) receiving a request to store one or more user account information on the device, wherein the device includes a unique identification number stored thereon;
c) encoding user account information into a memory of the device;
d) establishing a unique one-card identification number, wherein the unique one-card identification number is associated with and allows access to the device;
e) receiving, from the card issuer, encrypted new account information and the unique one-card identification number associated with the account information;
f) identifying the unique identification number using the unique one-card identification number;
g) identifying the device using the unique identification number;
h) upon identifying the device, further encrypting the encrypted new account information using device-specific encryption which can be decrypted only by a device having the corresponding unique identification number;
i) forwarding the device-specific encrypted new account information to the device;
j) receiving, at the device, the device-specific encrypted new account information;
k) decrypting, at the device, the device-specific encrypted new account information using the corresponding unique identification number;
l) storing the decrypted new account information to the account database on the memory of the device;
m) providing an interface allowing the user to select account information; and
n) identifying a selected account from the account database on the memory of the device and transmitting the selected account information via a wireless communications element of the device.

24. The method of claims 20 or 23, further comprising the step of using the un-encrypted account information to activate or change the functionality of the card.

25. The method of claim 23, further comprising the steps of: prompting the customer to contact the card issuer for verification of customer's identity upon receipt of the device-specific encrypted new account information; providing an interface to allow the user to input verification information to enable authorization by the card issuer activate or change of functionality of the card; and prompting the customer to contact the card issuer upon receipt of the device-specific new account information.

26. The method of claim 23, wherein unencrypted account information is not stored.

27. The method of claims 20 or 23, further comprising storing the account information on the device in an encrypted form.

28. The method of claim 27, wherein the encrypted account information is decrypted or viewed or used by entering a correct password.

29. The method of claim 27, wherein the encrypted account information is decrypted or viewed or used by entering biometric information.

30. The method of claims 20 or 23, further comprising the step of, following decryption of the device-specific new account information, providing an interface to allow the user to view the account information stored in the device including information selected from the group consisting of: the name of issuing bank, the current balance of the account, and available credit.

31. The method of claims 20 or 23, wherein, following decryption of the account information, a bar code is displayed on the device.

32. The method of claims 20 or 23, wherein account information stored on the memory of the device is erased after a pre-set time.

33. The method of claim 23, further comprising the step of providing an interface allowing the user to register a new device to establish a link between their new device and their unique one-card identification number.

34. A mobile computing device comprising a processor, an operating system, a memory, a wireless communications element, and instructions executed by the processor to provide an application, the application comprising:

a) a software module configured to provide an interface allowing a user to request, from a card issuer, a new card or changes to an existing card;
b) a software module configured to receive a request to store user account information on the device, wherein the device includes a unique identification number stored thereon;
c) a software module configured to encode user account information into a memory of the device;
d) a software module configured to receive encrypted new account information sent by the card issuer to the device using the unique identification number on the device, wherein only the device with the unique identification number is configured to decrypt the new account information;
e) a software module configured to decrypt the encrypted new account information using the unique identification number and store the account information to an account database on the memory of the device;
f) a software module configured to provide an interface allowing the user to select account information; and
g) a software module configured to identify a selected account from the account database on the memory of the device and transmit the selected account information via the wireless communications element of the device.

35. The device of claim 34, wherein the software module configured to receive encrypted new account information, upon receipt of the new account information, is further configured to prompt the customer to contact the card issuer for verification of customer's identity and receive, from the customer, verification information to allow authorization by the card issuer to activate or change the functionality of the card.

36. The device of claim 34, wherein the software module configured to receive encrypted new account information is further configured to encrypt the new account information with a pass-code that is required to decrypt the new account information, and prompt the customer to contact the card issuer to obtain the pass-code required to decrypt the account information.

37. The device of claim 34, wherein the application further comprises a software module configured to use the unencrypted account information to activate or change the functionality of the card.

38. The device of claim 34, wherein the software module configured to receive encrypted new account information is further configured to prompt the customer to contact the card issuer for verification of customer's identity upon receipt of the encrypted new account information; provide an interface to allow the user to input verification information to enable authorization by the card issuer to activate or change the functionality of the card; and prompt the customer to contact the card issuer upon receipt of the new account information.

39. The device of claim 34, wherein the unencrypted account information is not stored.

40. The device of claim 34, wherein the software module configured to store the account information on the device stores the account information in an encrypted form.

41. The device of claim 40, wherein the encrypted account information is decrypted or viewed or used by entering a correct password.

42. The device of claim 40, wherein the encrypted account information is decrypted or viewed or used by entering biometric information.

43. The device of claim 34, wherein the software module configured to decrypt the encrypted new account information is further configured to, following decryption of the new account information, provide an interface allowing the user to view the account information stored in the device including information selected from the group consisting of: the name of issuing bank, the current balance of the account, and available credit.

44. The device of claim 34, wherein the software module configured to decrypt the encrypted new account information is further configured to, following decryption of the account information, display a bar code on the device.

45. The device of claim 34, wherein the application further comprises a software module configured to receive a request from the user for card cancellation and register a new device with the host system to establish a link between the new device and the user's unique identification number.

46. A server comprising a processor, an operating system, a memory, a communications element, and instructions executed by the processor to provide a host system application, the application comprising:

a) a software module configured to receive a request to store one or more user account information on a device, wherein the device includes a unique identification number stored thereon;
b) a software module configured to establish a unique one-card identification number, wherein the unique one-card identification number is associated with and allows access to the device;
c) a software module configured to receive, from the card issuer, encrypted new account information and the unique one-card identification number associated with the account information;
d) a software module configured to identify the unique identification number using the unique one-card identification number;
e) a software module configured to identify the device using the unique identification number;
f) a software module configured to, upon identifying the device, further encrypt the encrypted new account information using device-specific encryption which can be decrypted only by a device having the corresponding unique identification number; and
g) a software module configured to forward the device-specific encrypted new account information to the device such that it can be decrypted, stored, and used to conduct wireless transactions at the device.

47. The server of claim 46, wherein the software module configured to receive encrypted new account information, upon receipt of the new account information, is further configured to prompt the customer to contact the card issuer for verification of customer's identity and receive, from the customer, verification information to allow authorization by the card issuer to activate or change the functionality of the card.

48. The server of claim 46, wherein the software module configured to receive encrypted new account information is further configured to encrypt the new account information with a pass-code that is required to decrypt the new account information, and prompt the customer to contact the card issuer to obtain the pass-code required to decrypt the account information.

49. The server of claim 46, wherein the software module configured to receive encrypted new account information is further configured to prompt the customer to contact the card issuer for verification of customer's identity upon receipt of the encrypted new account information; provide an interface to allow the user to input verification information to enable authorization by the card issuer to activate or change of the functionality of the card; and prompt the customer to contact the card issuer upon receipt of the device-specific new account information.

50. The server of claim 46, wherein unencrypted account information is not stored.

Referenced Cited
U.S. Patent Documents
6742704 June 1, 2004 Fitzmaurice et al.
7072864 July 4, 2006 Brake et al.
7334732 February 26, 2008 Cooper et al.
7353988 April 8, 2008 Ramachandran
8255323 August 28, 2012 Casey et al.
8364590 January 29, 2013 Casey et al.
8459544 June 11, 2013 Casey et al.
8498936 July 30, 2013 Cai
8628012 January 14, 2014 Wallner
8690059 April 8, 2014 Wallner
8814046 August 26, 2014 Wallner
8832465 September 9, 2014 Gulati et al.
8870081 October 28, 2014 Olson et al.
8876011 November 4, 2014 Olson et al.
8998096 April 7, 2015 Brown
9010646 April 21, 2015 Brown
9010651 April 21, 2015 Parashar et al.
20050247797 November 10, 2005 Ramachandran
20070214093 September 13, 2007 Colella
20070226140 September 27, 2007 Erikson
20080005559 January 3, 2008 Johnson
20080059379 March 6, 2008 Ramaci
20100078471 April 1, 2010 Lin et al.
20100078472 April 1, 2010 Lin et al.
20100082445 April 1, 2010 Hodge et al.
20100082447 April 1, 2010 Lin et al.
20100082481 April 1, 2010 Lin et al.
20120298757 November 29, 2012 Kim
20120307451 December 6, 2012 Shukla et al.
20130085941 April 4, 2013 Rosenblatt et al.
20130110709 May 2, 2013 Hodge et al.
20130124319 May 16, 2013 Hodge et al.
20130179351 July 11, 2013 Wallner
20130317835 November 28, 2013 Mathew
20130320081 December 5, 2013 Olson et al.
20140019367 January 16, 2014 Khan et al.
20140092571 April 3, 2014 Trzaskos et al.
20140214640 July 31, 2014 Mallikarjunan et al.
20150016694 January 15, 2015 Kerr
20150016697 January 15, 2015 Kerr
20150016698 January 15, 2015 Kerr
20150065107 March 5, 2015 Dave et al.
20150073983 March 12, 2015 Bartenstein et al.
20150127549 May 7, 2015 Khan
20150127550 May 7, 2015 Khan
20150134513 May 14, 2015 Olson et al.
20150161497 June 11, 2015 Olson et al.
20150161498 June 11, 2015 Olson et al.
20150161587 June 11, 2015 Khan et al.
20150170014 June 18, 2015 Olson et al.
Foreign Patent Documents
2003162682 June 2003 JP
1020010112824 December 2001 KR
1020030030235 April 2003 KR
1020050105432 November 2005 KR
Other references
  • Co-pending U.S. Appl. No. 14/813,038, filed Jul. 29, 2015.
  • U.S. Appl. No. 12/736,289 Office Action dated Apr. 12, 2012.
  • U.S. Appl. No. 14/813,038 Office Action dated Oct. 4, 2017.
  • U.S. Appl. No. 14/813,038 Office Action dated Jan. 19, 2018.
  • PCT, International Search Report dated Dec. 18, 2009, International Patent Application No. PCT/US2009/002837, filed May 7, 2009, Cai, Yinzi, 3 pages.
  • PCT, Written Opinion of the International Searching Authority dated Dec. 18, 2009, International Patent Application No. PCT/US2009/002837, filed May 7, 2009, Cai, Yinzi, 4 pages.
  • PCT, International Preliminary Report on Patentability dated Nov. 9, 2010, International Patent Application No. PCT/US2009/002837, filed May 7, 2009, Cai, Yinzi, 5 pages.
Patent History
Patent number: RE47248
Type: Grant
Filed: Jul 29, 2015
Date of Patent: Feb 19, 2019
Inventor: Yinzi Cai (Palo Alto, CA)
Primary Examiner: Joseph A Kaufman
Application Number: 14/813,043
Classifications
Current U.S. Class: Banking Systems (235/379)
International Classification: G06Q 40/00 (20120101); G06Q 20/10 (20120101); G06Q 20/34 (20120101); G07F 7/10 (20060101); G07F 7/08 (20060101);