throbber
(12) United States Patent
`Cohen
`
`111111111111111111111111111111111111111111111111111111111111111111111111111
`US006422462Bl
`US 6,422,462 BI
`Jui. 23, 2002
`
`(10) Patent No.:
`(45) Date of Patent:
`
`(54) APPARATUS AND METHODS FOR
`IMPROVED CREDIT CARDS AND CREDIT
`CARD TRANSACTIONS
`
`(76)
`
`Inventor: Morris E. Cohen, c/o 757 Third Ave.,
`Suite 2400, New York, NY (US) 10017
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.c. 154(b) by 0 days.
`
`(21) Appl. No.: 09/280,483
`
`(22) Filed:
`
`Mar. 30, 1999
`
`(60)
`
`Related U.S. Application Data
`Provisional application No. 60/079,884, filed on Mar. 30,
`1998.
`
`G06F 7/08
`Int. CI?
`(51)
`235/381; 235/380; 705/41
`(52) U.S. Cl.
`(58) Field of Search
`235/487, 382,
`235/380, 395, 492, 379; 705/35, 38, 39,
`1,20,26,41
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,293,424 A *
`
`3/1994 Holtey et al.
`
`5,696,965 A * 12/1997 Dedrick
`5,705,798 A *
`1/1998 Tarbox
`5,706,442 A *
`1/1998 Anderson et al.
`5,745,654 A *
`4/1998 Titan
`5,749,075 A *
`5/1998 Toader et al.
`5,963,643 A * 10/1999 Goreta et al.
`5,970,478 A * 10/1999 Walker et al.
`6,003,134 A * 12/1999 Kuo et al.
`6,014,645 A *
`1/2000 Cunningham
`6,145,741 A * 11/2000 Wisdom et al.
`
`395/610
`235/379
`395/227
`395/22
`705/14
`380/9
`705/35
`713/200
`705/38
`235/380
`
`* cited by examiner
`
`Primary Examiner-Thien M. Le
`
`(57)
`
`ABSTRACT
`
`Customized credit and debit cards for issuance by a person
`or main cardholder, the cards being limited to use in trans(cid:173)
`actions at selected vendors only. Thus, for example, a parent
`or corporation can issue a customized card to a person or
`group, wherein the card is only valid for use at restaurants,
`airlines, hotels, certain stores, or so forth.
`
`380/23
`
`25 Claims, 1 Drawing Sheet
`
`Credit card: normally in an "off' state
`
`1
`
`Card turned on by the cardholder for a limited
`time period, use, etc., preferably by a call to the
`company or using a computer to send information
`to the credit card company
`
`1
`
`time
`Card is on, and transactions during that
`period, or
`for
`that use, etc. are authorized/
`approved by the credit card company when the
`vendor requests an authorizationl approval
`
`1
`
`Time period elapses, use occurs, etc.
`
`1
`
`Card reverts to an "off' state, and no transactions
`will be authorized/approved
`
`1
`
`Process is repeated by the cardholder with the
`card as often as the cardholder desires
`
`1
`
`r
`
`1
`
`MasterCard, Exh. 1004, p. 1
`
`

`
`u.s. Patent
`
`Jut 23, 2002
`
`US 6,422,462 BI
`
`Figure 1
`
`Credit card: normally in an "off" state
`
`Card turned on by the cardholder for a limited
`time period, use, etc., preferably by a call to the
`company or using a computer to send information
`to the credit card company
`
`time
`Card is on, and transactions during that
`period, or
`for
`that use, etc. are authorized/
`approved by the credit card company when the
`vendor requests an authorization/ approval
`
`Time period elapses, use occurs, etc.
`
`Card reverts to an "off" state, and no transactions
`will be authorized/approved
`
`Process is repeated by the cardholder with the
`card as often as the cardholder desires
`
`MasterCard, Exh. 1004, p. 2
`
`

`
`US 6,422,462 Bl
`
`1
`APPARATUS AND METHODS FOR
`IMPROVED CREDIT CARDS AND CREDIT
`CARD TRANSACTIONS
`
`RELATED APPLICATIONS
`The present application claims all rights of priority to U.S.
`Provisional Application Ser. No. 60/079,884 filed Mar. 30,
`1998.
`
`5
`
`2
`It is also an object of the invention to provide methods and
`apparatus for transmission of credit card information over
`the Internet with a minimal risk of possible fraud or loss.
`In addition to the prevention and reduction of fraud, it is
`a further object of the invention to provide improved types
`of credit cards, and improved methods for credit card
`transactions.
`In accordance with the invention, a variety of new forms
`10 of credit cards and credit card methods are disclosed herein.
`In some of the disclosed embodiments, the cards and meth(cid:173)
`ods provide improved credit cards and methods providing
`for customization, limited use, single use (disposability), or
`15 so forth. Additionally or alternatively, in some of the dis(cid:173)
`closed embodiments, the cards and methods include new
`forms of credit cards designed to reduce or prevent fraud. In
`addition to, or as an alternative to the prevention of fraud, in
`some of the embodiments disclosed herein, new credit cards
`20 and associated methods are provided for the improvement of
`credit card transactions and/or
`for availability of an
`expanded array of financial products to consumers.
`
`BACKGROUND OF THE INVENTION
`Credit cards are currently a common financial tool. Yet,
`credit card fraud is a considerable concern for credit card
`companies. The problem occurs when an unscrupulous
`individual obtains a copy of a person's credit card
`information, and then uses that information to fraudulently
`charge purchases to the person's card until
`the theft
`is
`noticed and further use of the card is blocked. In addition to
`being a considerable problem for
`the card companies
`themselves, this illegal practice causes inconvenience and
`annoyance for the innocent user whose card has somehow
`been compromised.
`Such fraud is a potential problem in various contexts, but
`recently has become of significant concern in Internet trans- 25
`actions in particular. Transmission of credit card information
`over the Internet has long been suspect due to the risk of
`individuals monitoring traffic over the network and then
`using that information for their personal gain. While secure
`networks and connections have been increasingly available 30
`over the past several years, many are nonetheless unwilling
`to transmit any credit card information over the Internet, due
`to the possibility that valuable credit card information could
`be intercepted.
`In addition, monitoring, control and regulation of expen(cid:173)
`ditures and finances is a frequent concern of companies and
`individuals. It is always desirable to provide apparatus and
`methods which improve the apparatus and methods for such
`monitoring, control and regulation. Accordingly, there are 40
`numerous improvements which have been heretofore
`unknown in the art, which improve the effectiveness, value,
`and/or the efficiency of credit cards, either in general or
`certain types of financial transactions.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a schematic illustration of the customization of
`a credit card in accordance with one embodiment of the
`present invention.
`
`DESCRIPTION OF THE INVENTION
`
`In accordance with the present invention, in one embodi(cid:173)
`ment of the present invention, to address the problem of
`credit card fraud, a new system of disposable credit card
`35 numbers is disclosed herein. These credit cards or credit card
`numbers are generated for a one time, single transaction
`basis, after which they are disposed of, or thrown away. The
`numbers can be used by a user over the Internet or any other
`communications system, whether open or secure, to effect a
`single transaction. After a one time use of the credit card
`number, the number is deactivated by the issuing credit card
`company such that it is no longer available for use. In this
`manner, a credit card company need not wait
`to learn
`45 whether a given credit card number has been intercepted,
`and one or more fraudulent purchases made (with the
`attendant possible loss of time, money and manpower inves(cid:173)
`tigating and resolving such matters) before dealing with the
`results of the potential theft. Rather, all numbers used over
`50 the network, or in a certain context, are assumed insecure,
`and once used for the first time, are no longer available for
`use. By doing so, the company, so to speak, "beats the thief
`to the punch," having already deactivated the number after
`55 a single use of the card, even before learning of the fraud.
`In other embodiments of the invention, customized or
`limited use credit cards are provided. These cards are
`customized, preferably by the user, to suit the user's desires
`or needs. As a result, they provide methods and apparatus
`60 which have been heretofore unknown in the art, but which
`provide benefits that improve the efficiency, ease and uses of
`payment for goods and services.
`Various embodiments of the inventions are possible con(cid:173)
`65 sistent with the inventions herein. Although reference is
`occasionally made to either
`the disposable credit card
`embodiment or the customized credit card embodiment
`
`SUMMARY OF THE INVENTION
`It
`is an object of the present
`invention to provide
`improved credit cards and methods for credit card transac(cid:173)
`tions.
`It is a further object of the present invention to provide for
`customized use credit cards.
`It is a further object of the present invention to provide for
`user-defined credit cards for use in financial transactions.
`It is a further object of the present invention to provide for
`disposable credit cards.
`It is a further object of the present invention to provide for
`limited use credit cards.
`It is a further object of the present invention to provide
`methods and apparatus for secure transmission of credit card
`information.
`It is a further object of the present invention to provide
`methods and apparatus for minimizing credit card fraud, and
`the amounts of loss that could occur should card information
`be intercepted.
`
`MasterCard, Exh. 1004, p. 3
`
`

`
`US 6,422,462 Bl
`
`5
`
`3
`herein, the features disclosed in association with one can
`likewise be applied to the other, as well.
`With respect to the credit card's number itself, in one
`preferred embodiment, for example, the credit card number
`is indistinguishable from permanent, ordinary credit card
`numbers. By making the customized credit card number
`indistinguishable from regular numbers both users and ven(cid:173)
`dors are encouraged to use the credit card in the same
`manner as regular credit cards.
`Similarly, by making the temporary disposable numbers
`(or likewise the customized credit card number) indistin(cid:173)
`guishable in appearance from regular credit card numbers, a
`potential thief is unable to tell in advance that a particular
`number is a disposable number, and already not valid. This
`may in turn enhance the potential of catching the thief by
`alerting the credit card company the first
`time someone
`attempts to illegally use the pilfered number.
`With respect to either the disposable or the customized
`credit card, relevant information (such as the expiration date
`etc.) can either be printed on the card or verbally transmitted
`to the user. Likewise, the limited use nature of the card
`(either in a general sense or the specific limitations), the
`disposability of the card, the range of dates or validity of the
`card, etc. may either be printed on the card or transmitted to 25
`the user, whether verbally or in writing.
`In another embodiment, the customized or the disposable
`number is the user's regular credit card number with a series
`of digits or alphanumeric characters either inserted therein,
`or tacked on at
`the end. This embodiment allows each
`customized or disposable card to be easily noted by the user
`to be a mere extension of his or her regular number.
`Many of the embodiments herein could be used in con(cid:173)
`junction with a policy by the credit card company (or by the
`main cardholder or the user) in which purchases from
`Internet transactions, for example (or purchases over unse(cid:173)
`cure networks), are only accepted if made in conjunction
`with a disposable or customized credit card number.
`The invention can be practiced according to a wide
`variety of embodiments. In one embodiment, for example, a
`user dials into her credit card company before making a
`transaction, and after providing the ordinary credit card
`number and verification data, is provided with a disposable 45
`or customized number and/or mailed, provided with, or
`allowed to activate a disposable or customized card for a
`single or a limited range use.
`In one embodiment of the invention, a user can indicate
`in advance of purchase, on the telephone call with the credit
`card company, what the single use or the customized credit
`card number is to be used for. This can be used to provide
`additional security and/or control
`the uses of the funds
`placed on that card.
`In another embodiment, a user could be provided, each
`month or each year, with a set of disposable, one time only,
`or customized, limited use, numbers and/or cards, which are
`printed on the credit card statement for use during the next
`month or year, or which are mailed to the user. With respect
`to the disposable card, the user is instructed that, after use of
`the number once, the number may not be used again. With
`respect to the customized card, the cards can either be preset
`for certain uses, or the cards can be ready and waiting in the
`user's office or home for setting to the desired use when the
`user is ready.
`
`4
`The user could also be provided with a set of paper (or
`thin plastic) credit cards (preferably with magnetic strips),
`whether along with the customer's monthly statement, with
`a credit card encoder, with an encoding device which
`attaches to the computer and/or the Internet, or otherwise.
`Each of these credit cards could be used once, or on a limited
`or customized basis, after which the credit card could be
`ripped up and discarded. The cards could further have
`printing or indicia on them to remind the user that they are
`10 for one time only or customized use.
`In a further variation on this approach, the paper cards
`and/or the provided numbers must be used in a specific
`required order, for additional security. These paper credit
`15 cards or provided numbers could be unusable until activated
`by the user, as is the practice with new credit cards that are
`sent out by mail.
`In another embodiment, instead of ripping the credit cards
`up, the cards could have a portion which the user writes on
`20 to record the type of transaction, and the amount of the
`transaction. Alternatively,
`the card could have a portion
`which the user signs upon receipt and a portion which is later
`countersigned at the vendor, to provide additional security.
`These credit cards could even have a portion which the
`user signs and provides to a vendor in a store. No vendor
`would ever, under one embodiment of the system, receive or
`have access to the user's permanent credit card number.
`Rather, the vendor (for example, a restaurant in which the
`30 user has just eaten) would receive a disposable credit card
`from the user's supply. The vendor could read the number
`off the disposable or customized card, could scan the number
`with a bar code scanner, could read a magnetic strip on the
`35 disposable card, or so forth. Upon being used once,
`the
`credit card can be marked, if desired, to show both that it has
`been processed to charge money to the person's account, and
`to show that it is no longer usable. This disposable card
`could be returned to the cardholder, saved as a receipt by
`40 either of the cardholder or the vendor, be returned to the
`credit card company, destroyed, or so forth. As noted above,
`signature could be provided once, or two signature lines
`could be provided, for the user to sign and countersign.
`As yet another example, a user could be provided with a
`"calculator" of sorts, of credit card like thickness, which
`stores a predetermined number of disposable numbers
`therein. After using a number once, the user has to go back
`to the calculator to get
`the next number
`for
`the next
`50 transaction. This calculator could also be provided with a
`PIN number to prevent a party from accessing the numbers
`should the user's wallet be stolen or lost.
`Alternatively, a card with multiple numbers stored
`55 thereon (which become activated in a predetermined
`sequence) can be provided, so that the actual credit card
`needs to be available (not just the credit card number) to
`determine the next available number in the sequence. In this
`way no single number alone is capable of compromising the
`60 user's account for more than one transaction, or of compro(cid:173)
`mising the main number in the user's account. This card
`could have an LED or some other visually readable means
`to display the next available card number (either automati-
`65 cally or upon activation of a PIN, if desired). As mentioned
`above, part of the number could be the fixed, base portion
`(which is a number or portion common to all of the numbers)
`
`MasterCard, Exh. 1004, p. 4
`
`

`
`US 6,422,462 Bl
`
`10
`
`5
`and part of the number could be the variable portion (a
`number or portion which varies). Alphanumeric sequences
`or any other symbol or series of symbols can be employed
`for either or both of these portions.
`In addition, since they are for use either on a one shot only 5
`or on a customized basis, the credit card or number could
`also be associated with a certain sublimit of the individual's
`or a corporation's credit limit. Thus, for example, a user with
`a $500 limit, for example, could call into the credit card
`company and obtain a disposable or a customized card
`which itself only has a $50 charge limit (for example, when
`the individual only intends to charge up to $50 in the next
`transaction, or to allow someone else to charge up to $50).
`This further limits the potential losses from a credit card 15
`fraud.
`The present invention could also be used to provide a
`disposable card for a single transaction to users in general
`(or a customized card for a limited use), including users who
`It could also be 20
`do not have a permanent credit card.
`provided to users on a debit basis, based in whole or in part
`upon some reserve or funds provided to the issuing company
`in advance. Alternatively, the user could even identify the
`general or specific type and amount of transaction in
`advance, if desired.
`The present invention, and the disposable embodiments in
`particular, is of additional value for use over the Internet. For
`example, the following system could be employed. Before a
`user makes a potential purchase over the Internet, he or she 30
`accesses one of his or her disposable credit cards or credit
`card numbers. As noted above, this could be accomplished
`by dialing into the credit card company, by removing one of
`a series of disposable cards from the user's monthly
`statement, or so forth. To effect the transaction over the 35
`Internet, the user transmits his or her credit card information
`to the vendor. That vendor then verifies the transaction and
`obtains an authorization code from the credit card company
`authorizing the purchase, as is currently standard practice
`with credit card transactions. To insure the integrity of the 40
`system, the vendor is required to verify the code immedi(cid:173)
`ately upon receipt. This prevents undue time from elapsing,
`which is undesirable from a security standpoint. Upon
`receiving the request for verification, the credit card com- 45
`pany notes the identity of the vendor, authorizes the trans(cid:173)
`action (if the credit card number is valid and the purchaser
`has sufficient funds available), and forwards the authoriza(cid:173)
`tion code to the vendor. At the same time, the credit card
`company also deactivates the credit card number from any 50
`further future use. Thus, if a thief intercepts the credit card
`information en route, when the thief later attempts to take
`that information and to use it in an illegal transaction, the
`transaction will be declined since the number has already 55
`been deactivated. After the number has legitimately been
`used once by the lawful owner,
`it no longer has any
`continuing validity.
`If desired, to remind the user the vendor can transmit a
`message indicating both that the credit card number has been 60
`accepted, and that
`it
`is no longer of validity, and can
`therefore be ripped up. However, if used, this method runs
`the risk of also alerting a thief who is monitoring the Internet
`traffic.
`The credit card company can also monitor all second
`requests for use of that credit card number which are
`
`6
`transmitted to the system. This monitoring can be used to
`attempt
`to catch the thief during his future attempt
`to
`illegally use the card
`As additional security, each of the disposable credit cards
`can be given an expiration date, e.g. the end of the month or
`the end of the billing cycle. Thus, if the credit card is not
`used within the time limit, it expires. (This expiration date
`could be printed on disposable paper credit cards). This
`approach has been used in a different application by credit
`card companies with respect to checks that are sent with the
`statement to the user with a given expiration date. As far as
`the present inventor is aware, that system has been used by
`credit card companies with satisfactory results in the past.
`The card company can also monitor the time of second
`requests. If the time of second request is extremely close to
`that of the first request, then the company can block both
`transactions on the grounds that a thief may be in the process
`of attempting to quickly intercept and use a credit card
`number en route before the user.
`To further add to the security of the system, a function can
`be built into Internet software, such as the popular Internet
`browsers, in which a server assigns a universal time and date
`stamp (based for example on Greenwich Mean Time) to
`25 each credit card transmission transmitted by a user over the
`Internet. Thus the authorized user's transaction will be
`assigned a time and date, such that the credit card company
`can determine, when the same disposable number is sent
`twice within a short time frame, which transaction corre(cid:173)
`sponds to the one in which the number was sent first. A
`function could also be provided in which the Internet
`address of the sender or some other password is encrypted
`and transmitted as well.
`For example, a password which modifies over time and
`which is coded to the time/date stamp can also be integrated
`into the browser. The password is individual to each user,
`with the data summarizing the algorithm used to encode the
`password being provided to the user and to the individual's
`credit card company ahead of time (as part of the security
`information associated with the account). When the trans-
`action is effected,
`the browser sends information to the
`internet provider's server, which sends back the universal
`time/date stamp. The browser then encodes the password
`and sends it back to the server with the credit card infor-
`mation to be transmitted to the vendor.
`The present invention is not limited to use over open
`systems. Rather, it is intended that it can also be used over
`secure systems to provide an additional added level of
`security. Similarly,
`the invention can be used for those
`individuals who own credit cards and wish to purchase items
`over the telephone, but who are reluctant to give out or
`release their credit card information over the phone.
`Likewise, although a variety of security procedures and
`methods are disclosed herein, any of the security procedures,
`protocols, encryption techniques, and so forth, used in the
`art, can be used in connection with the present disposable
`and/or customized credit cards.
`If the disposable credit cards are stolen or lost, the credit
`card company can, of course, minimize loss by simply
`deactivating them upon learning of the theft or loss from the
`65 user. In addition, the placement of sublimits on each of the
`cards, or on the group of cards as a whole, further minimizes
`potential loss.
`
`MasterCard, Exh. 1004, p. 5
`
`

`
`US 6,422,462 Bl
`
`7
`Although a disposable credit card number system is
`preferred, as described above, alternatively, a special, sepa(cid:173)
`rate (disposable or customized) credit card number could
`even be assigned specifically for use over the Internet,
`whose use is subject to higher security measures, whether
`usable one or more than once. For example, after use, the
`user would have to call into the credit card company to
`verify the transaction, or the credit card company would call
`the user at a predetermined number (e.g. the user's home
`number) to verify that the user made the transaction. This
`alternative system could be used for example, exclusively
`with Internet transactions on secure connections, to provide
`an additional
`level of comfort
`to those users who are
`uncomfortable with transmission of card information even 15
`over secure connections. In the event of problems,
`this
`separate Internet credit card number could be deactivated
`separately from the main credit card number associated with
`the account.
`In accordance with further embodiments of the invention,
`customized credit cards are also provided herein. These
`credit cards can be customized by the user such that they are
`only suitable or usable for particular subuses, for particular
`subframes of time, or so forth. This differs from the present
`practice in the art, which is to have credit card numbers
`which are valid for all uses, and for all periods of time until
`the card expires.
`In the current practice in the art, for example, employees
`frequently make payments which are later reimbursed by
`their corporation. In accordance with the present invention,
`their corporation can issue customized credit cards, or obtain
`customized credit cards from a credit card company, which
`can serve certain limited uses, functions or so forth. This
`card can be customized in any of numerous ways. For
`example, the customized card could be set to be valid for a
`certain limited number of dates or until a certain date. For
`example, if an employee is going on a business trip for two
`days (or some other amount of time), the card could be set
`to be valid on only those two days. Thus, the employee is
`authorized to use the card for charges on only that time that
`the employee is away on the business trip, but not for any
`other time. Thus, in accordance with these embodiments, the
`card can have a user customized range of dates or series of
`dates. In one embodiment this is a range of dates with a
`commencement date and expiration date. (This is useful, for
`example, if an employee is going on a business trip, one or
`more cards could be issued which are valid for the dates of
`the trip, with the card not being valid before the trip starts
`or after the trip ends). In another embodiment the card
`becomes valid at any specific time (even a time of day) and
`ceases to be valid at any other specific time. Likewise, the
`card could become valid for a series of ranges of dates, even
`dates which are non consecutive or non contiguous. For
`example, it could be valid for a specific day or series of date
`in March (for a first business trip), become deactivated once
`that trip is over, can be reactivated for a specific day or dates
`in June (for a second business trip), be deactivated once that
`trip is over, and so forth. It could also be valid for a specific
`predetermined amount of time. For example, it could be
`valid for anyone week period, beginning from when the user
`or subuser uses first uses it.
`The card can also be customized for only particular uses
`or groups of uses. In this manner, the main cardholder (e.g.
`
`8
`a corporation, a parent, etc.) can determine in advance what
`the card can or should be used for. For example, the card
`could be customized so that
`it
`is only good for airline
`reservations, such that if the employee tries to use it for any
`5 other type of charge, the charge will be declined, regardless
`of the amount of the transaction involved. Or the card could
`be customized so that it can only be used for airline and hotel
`charges. The types of uses which can be provided include
`any type of use that is currently charged or could in the
`10 future be charged on a credit card, or any combination of the
`same. Currently, charges which are placed on cards, include
`airline, hotel and car rental charges, restaurant bills, retail
`store purchases, and so forth.
`The card can also be customized for use only by a specific
`individual, by certain groups of individuals, or so forth. A
`parent could provide a customized use card which is for use
`by his or her son or daughter, a corporation could provide a
`customized use card which is for use by employees, an
`20 organization could provide a customized use card for use by
`employees and/or members and so forth. Different cards or
`customization parameters could be provided for officers,
`board members, executives, or so forth.
`As one example, an employee could be given authoriza-
`25 tion to purchase a new computer system. A customized
`credit card could be issued to the user which is only valid for
`use for that particular type of charge (computer hardware
`and software stores) and to the credit limit decided by the
`30 issuer or authorizing party at the corporation, such that if the
`employee tries to use it for anything else or for a charge in
`excess of that authorized, the charge will be declined. The
`card could even customized for use in a particular store itself
`or a particular chain of stores (such as a particular restaurant,
`35 or a particular chain of restaurants). Any of the features in
`the present application can also be combined -thus, the
`employee could be given a card for use in any computer
`store which is good for a total purchase of up to, for
`example, $2000 in value.
`As another example, a parent could give a teenage child
`a card to go out and make a specific purchase for the child
`or for the parent. The card could be valid only for purchase
`on that particular day, to a certain designated purchase limit,
`45 and even, if desired only in a certain store, or group of stores
`or types of stores (e.g. clothing stores), or types of purchases
`or items. The main account could have, for example, a $1500
`credit card limit, but the parent could set a $100 limit for use
`of the customized card on that particular day. Thus, if the
`50 card is lost or stolen, the card can not be used at stores other
`than the types chosen by the parent. Use in any other type
`of store or on any day other than that one day will cause the
`card to be declined. This minimizes the amount of credit
`55 card loss which can occur, and increases the chances of
`catching the thief. Likewise,
`the sublimit of $100 also
`minimizes the amount of loss which is possible.
`The card could also be customized to be valid only in a
`particular region. For example, if the employee is going on
`60 a business trip from New York to Florida and back, the card
`could be set to be valid only in the States of New York and
`Florida, and not
`to be valid for charges in any other
`locations. If the card were lost or stolen en route, e.g. in a
`65 stopover in Georgia, and the thief attempted to use the card
`in Georgia, the charge would be declined, irrespective of the
`amount involved.
`
`40
`
`MasterCard, Exh. 1004, p. 6
`
`

`
`US 6,422,462 Bl
`
`5
`
`20
`
`9
`The amount of credit on the card could be as high as the
`credit on the main account, or alternatively, could also be
`customized. The main cardholder (e.g. the corporation, the
`parent, etc.) can set how much credit is on the particular card
`for the subuser (e.g. the employee). This can be done in
`some fixed manner, on the basis of some formula, or so
`forth.
`Self transfer of funds and customization by the corpora(cid:173)
`tion or the user of the card is preferred. In other words, the
`corporation determines what uses and/or amounts are set on
`the credit card up to the corporation's total credit card limit.
`In one embodiment, with respect to customization, the
`user receives one or more credit cards, each of which is
`inactive. Each card has a blank amount of credit, and no 15
`predefined use, i.e. the card initially has no credit available
`on it at all and no use available to it. When the user receives
`the credit card, or when the user is ready to activate the card,
`the user determines how much of his or her available credit
`he or she wants to transfer onto that particular card and what
`particular uses or types of uses are desired (or even all uses,
`if desired). For example, the user may decide that he or she
`wants to go to a particular place or store that day and have
`a certain amount of money with himself or herself (or wants 25
`to send his or her employee with a certain amount). In
`addition to or in place of carrying cash, the user could carry
`a card having a predetermined amount on it, and could even,
`if desired, set the places or types of places where the card
`will be active.
`In another embodiment, a user can designate a single sum
`for use over a plurality of cards. This method overcomes a
`variety of problems present with the current methods of the
`art. For example, if a individual or couple wishes to go on 35
`vacation abroad, they often purchase traveller's cheques in
`any of a predetermined limited number of denominations
`twenty, fifty, one hundred dollars, etc.) When using
`(e.g.
`those cheques to convert money the couple often may not
`wish to convert

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket