`Apple Inc. v. Smartflash LLC
`CBM2015-00032
`Page 00001
`
`
`
`US 8,083,137 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`5,790,668 A
`5,845,260 A
`5,857,079 A
`5,870,723 A
`5,914,472 A
`5,953,710 A
`5,991,750 A
`5,999,596 A
`6,006,205 A
`6,026,370 A
`6,045,039 A
`6,070,141 A
`6,173,269 B1
`6,213,395 B1
`6,224,109 B1
`6,243,689 B1
`6,308,887 B1
`6,325,285 B1
`6,349,290 B1
`6,353,811 B1
`6,726,094 B1
`6,728,397 B2
`6,796,497 B2
`7,024,563 B2
`7,039,221 B1
`7,152,042 B1
`7,231,068 B2
`7,246,243 B2
`7,254,548 B1*
`7,444,305 B2
`7,540,411 B1*
`7,571,139 B1
`7,631,193 B1
`7,676,435 B1
`2001/0000535 A1
`2001/0011680 A1
`2001/0034720 A1
`2001/0053239 A1
`2002/0016740 A1
`2002/0062279 A1
`2002/0073416 A1
`2002/0191816 A1
`2002/0194124 A1
`2002/0194137 A1
`2003/0061111 A1
`2003/0078849 A1
`2003/0154163 A1
`2003/0163708 A1
`2003/0195859 A1
`2003/0220841 A1
`2004/0030654 A1
`2004/0039694 A1
`2004/0088221 A1
`2004/0138958 A1
`2009/0083156 A1
`2009/0234766 A1
`
`8/1998 Ton1ko
`12/1998 Nakano et al.
`1/1999 Claus et al.
`2/1999 Pare, Jr. et al.
`6/1999 Foladare et al.
`9/1999 Fleming
`11/1999 Watson
`12/1999 Walker et al.
`12/1999 Loeb et al.
`2/2000 Jermyn
`4/2000 Stinson et al.
`5/2000 Houvener et al.
`1/2001 Soloklet al.
`4/2001 Dejaegeretal.
`5/2001 Yang
`6/2001 Norton
`10/2001 Korman et al.
`12/2001 Baratelli
`2/2002 Horowitz et al.
`3/2002 Weissman
`4/2004 Rantze et al.
`4/2004 McNeal
`9/2004 Benkert et al.
`4/2006 Shimosato et al.
`5/2006 Tumeyet al.
`12/2006 Arkes
`6/2007 Tibor
`7/2007 Uchida
`8/2007 Tarmenbaum ................ .. 705/18
`10/2008 Cotten et al.
`6/2009 Tarmenbaum .............. .. 235/380
`8/2009 Giordano et al.
`12/2009 Hoffman
`3/2010 Berstis
`4/2001 Lapsley et al.
`8/2001 Soltesz et al.
`10/200 1 Arrnes
`12/200 1 Takhar
`2/2002 Ogasawara
`5/2002 Behrenbrinker et al.
`6/2002 Ramsey
`12/2002 Maritzen et al.
`12/2002 Hobbs et al.
`12/2002 Park et al.
`3/2003 Dutta et al.
`4/2003 Snyder
`8/2003 Phillips
`8/2003 Tang
`10/2003 Lawrence
`11/2003 Maritzen
`2/2004 Walker et al.
`2/2004 Dunn
`5/2004 Katz
`7/2004 Watarai
`3/2009 Cotten et al.
`9/2009 Tarmenbaum
`
`WO
`
`FOREIGN PATENT DOCUMENTS
`WO01/73575
`10/2001
`
`OTHER PUBLICATIONS
`
`“Manager”, Retrieved from <http://www.credoreference.com/entry/
`chambdict/manage>, Chambers 21st Century Dictionary. London
`Chambers Harrap,(2001),2 pages.
`
`“Advisory Action”, U.S. Appl. No. 11/567,032, (Jul. 7, 2009),3
`pages.
`“U.S. Appl. No. 10/155,332”, filed May 23, 2002,31 pages.
`“U.S. Appl. No. 60/294,107”, filed May 29, 2001, 11 pages.
`“U.S. Appl. No. 60/458,096”, filed Mar. 27, 2003, 13 pages.
`“Restriction Requirement”, U.S. Appl. No. 11/567,069, (Jun. 24,
`2010), 6 pages.
`“Non Final Office Action”, U.S. Appl. No. 11/767,246, (Jun. 28,
`2010), 24 pages.
`“Notice ofAllowance”, U.S. Appl. No. 11/567,032, (Aug. 24, 2010),
`8 pages.
`“Non Final Office Action”, U.S. Appl. No. 11/567,069, (Aug. 31,
`2010), 9 pages.
`Flaherty, Richard M., et al., “A New Twist on Credit for College
`Students”, Card News, vol. 15, No. 16, (Aug. 9, 2000),3 pages.
`“Final Office Action”, U.S. Appl. No. 11/767,246,
`(Feb. 17,
`2009),311 pages.
`‘“‘Fraud’”’, Chambers 21st Century Dictionary. London: Chambers
`Harrap, Credo Reference, <http://www.credoreference.com/entry/
`2691119>,,(Feb. 4, 2009), 1 page.
`‘“‘Secure’”’, Collins English Dictionary. London: Collins, 2000,
`Credo
`Reference
`<http://www.credoreference .com/entry/
`2691119>,(Feb. 4, 2009), 1 page.
`“The Bank Credit Card Business”, American Bankers Association,
`(1996),246 pages.
`“Final Office Action”, U.S. Appl. No. 11/567,032, (Apr. 2, 2009),20
`pages.
`“Non-Final Office Action”, U.S. Appl. No. 11/567,032, (Nov. 24,
`2009),16 pages.
`“Final Office Action”, U.S. Appl. No. 11/767,246, (Jan. 26, 2010), 16
`pages.
`“Account”, Chambers 21st Century Dictionary. London: Chambers
`Harrap, 2001, Retrieved from: <http://www.xreferplus.com/entry/
`chambdict/account> on Jan. 15, 2010,(2001), 2 pages.
`“Final OfficeAction”, U.S.Appl. No. 11/767,246, (Oct. 28, 2010), 23
`pages.
`L SPTO; Office Action Restriction dated Oct. 27, 2005 in U.S. Appl.
`No. 10/192,426.
`LSPTO; Office Action dated Jan. 30, 2006 in U.S. Appl.
`10/192,426.
`L SPTO; Office Action Restriction dated May 9, 2006 in U.S. Appl.
`No. 10/192,426.
`LSPTO; Final Office Action dated Oct. 23, 2006 in U.S. Appl. \Io.
`10/192,426.
`LSPTO; Office Action dated Mar. 2, 2007 in U.S. Appl.
`10/192,426.
`L SPTO; Notice ofAllowance dated Jun. 18, 2007 in U.S. Appl. \Io.
`10/192,426.
`LSPTO; Final Office Action dated May 2, 2011 in U.S. Appl. \Io.
`11/567,069.
`LSPTO; Office Action dated Sep. 8, 2008 in U.S. Appl.
`11/567,032.
`LSPTO; Office Action dated Apr. 8, 2008 in U.S. Appl.
`11/567,044.
`LSPTO; Final Office Action dated Oct. 16, 2008 in U.S. Appl. \Io.
`11/567,044.
`L SPTO; Notice ofAllowance dated Jan. 28, 2009 in U.S. Appl. \Io.
`11/567,044.
`LSPTO; Office Action dated Oct. 22, 2008 in U.S. Appl. \Io.
`11/767,246.
`
`\Io.
`
`\Io.
`
`\Io.
`
`\Io.
`
`* cited by examiner
`
`Page 00002
`
`
`Page 00002
`
`
`
`U.S. Patent
`
`Dec. 27, 2011
`
`Sheet 1 of 7
`
`US 8,083,137 B2
`
`mmqméa
`
`$59:
`
`V34
`
`zoE2_,_2,__28
`
`$8oh
`
`>E<n_9:59.
`
`:3
`
`V2:
`
`Page 00003
`
`
`Page 00003
`
`
`
`
`
`
`
`
`U.S. Patent
`
`US 8,083,137 B2
`
`_,sE2_,.5_2_,§Ea9:5EDx2E82
`
`:58BaxivéoamzHNISN/_._mmm,x.
`wx:..\J..}.,\/Mmozfilowanna:mmzoimo,0uuuuuuI.
`HTEN
`
`Tmom
`
`aaaa!..xu1r.....i:
`
`Page 00004
`
`
`Page 00004
`
`
`
`
`
`U.S. Patent
`
`Dec. 27, 2011
`
`Sheet 3 of7
`
`US 8,083,137 B2
`
`3“
`
`FIG. 3A
`
`-
`
`302
`303
`VIEW ACCOUNT 9
`
`Lmrrs AND
`CURRENT STATUS
`
`EDIT PROFILE
`
`308
`
`SELECT
`INFORMATION
`DESIRED
`
`330
`
`306
`
`EDIT MAIN
`USER-
`
`
`
`IDENTIFY USERS
`
`
`
`EJs;&IuPS.FI{+0Frfiv
`
`305
`
`ACCESS
`PROCESSOR
`
`505
`
`HF(§°§'B
`
`YES
`
`0
`
`PROVTDE DESIRED
`INFOR MATION
`
`(FIGS 5. 5 OR’ 7)
`507
`
`
`
` ANY
`
`CHANGES TO BE
`MADE?
`
`
`
`334
`
`N0
`
`331
`
`SET CATEGORIES AND
`LIMITS FOR MAIN USER
`
`307
`
`N0
`
`309
`
`
`
`310
`
`311
`
`
`_
`WILL
`
`
`
`SOME USERS HAVE
`DIFFERENT LIMITS, CATEGORIES,
`muss on OTHER
`
`PARAMETERS?
`SET ALL PARAMETERS FOR EACH USER
`(CATEGORIES, AMOUNTS, TIMES, my
`
`
`WILL THERE
`BE AUTOMATIC LIMIT OR
`TIMING CI-IANGES?
`
`
`
`
`
`
`
`
`Page 00005
`
`
`Page 00005
`
`
`
`U.S. Patent
`
`Dec. 27, 2011
`
`Sheet 4 of 7
`
`US 8,083,137 B2
`
`FIG. 3B
`
`FROM
`FIG. 3A
`
`/30
`
`
`
` NOTIFY
`ONLY P.0.S USER
`?
`
`321
`
`Page 00006
`
`
`
`
`
`
`
`SET NAME(S)
`AND MODE OF
`NUHHCAHDN OF
`
`sEr MODES or NOTIFICATION
`(PRINT ON RECEIPT)
`(CELL CALL)
`(EMAIL)
`INTERNET ACCESS
`OTHER
`
`
`
`
`
`
`3520
`
`STORE IN DATABASE
`
` THIRD FARMS)
`
`
`
`
`
`OTHER
`USERS T0 EDIT
`'2
`
`322
`
`YES
`
`
`
`FINISH
`
`
`Page 00006
`
`
`
`U.S. Patent
`
`Dec. 27, 2011
`
`Sheet 5 of7
`
`US 8,083,137 B2
`
`401
`
`P.0.S. LOG—0N '
`
`403
`
`N0
`
`402
`DOES
`USER HAVE A
`
`PROFILE?
`YES
`ACCESS PROFILE
`
`MESSAGE To
`
`
`BE SENT (on OTHER
`
`ACTION TAKEN)
`?
`
`YES
`
`OBTAIN INFORMATION mom P03
`
`OBTAIN INFORMATION mom
`
`DATABASE,
`
`IF NECESSARY
`
`407
`
`"0
`
`15
`MESSAGE TO
`BE SENT To THIRD
`PARTY
`I
`
`403
`
`"55
`SEND (POST) MESSAGE
`
`409
`
`FIG 4
`
`40
`
`‘I
`
`412
`
`
`
`‘S
`TRANSACTION TO BE
`
`153
`
`
`
`416
`
`B._ggK
`TRANSACTION
`I
`SEND BLOCKING
`MESSAGE To USER
`
`YES
`
`4-17
`
`415
`
`
`
`
`USER AT POS
`,_,
`
`414
`
`_
`
`N0
`st-:LEcT
`COMMUNICATION MODE
`
`'
`
`SELECT
`COMMUNICATION
`PATH
`
`SEND (POST) MESSAGE
`
`SEND MESSAGE
`
`
`
`
`MUST
`SYSTEM WAIT FOR
`VERIFICATION
`?
`
`
`
`
`YES
`
`
`
`WA"
`
`YES
`
`STOP
`
`419
`
`418
`
`Page 00007
`
`
`Page 00007
`
`
`
`U.S. Patent
`
`Dec. 27, 2011
`
`Sheet 6 of 7
`
`US 8,083,137 B2
`
`]?[(?.
`
`5?
`
`
`
`/6
`
`CODE AMOUNT ACEEERJENG
`0000
`000
`0
`
`02
`00
`
`‘:.°‘-gg-38:30‘!:30?)
`
`
`
`CATEGORY
`
`
`
`
`
`
`
`
`
`
`
`
`USERNo
`ADJUSWENT
`OUNT
`AM
`
`00
`
`000
`
`l'’‘
`“'2
`
`
`
`
`5”’
`
`to
`
`CU
`
`Z(32 [TI
`
`-
`
`0 :1
`M 0-1
`-ea:4-‘-c:C
`M 00
`CD
`00000000 III 0000--
`— 00000
`W
`499!Is.)CIDC3(II
`
`
`--
`
`PROFILE CATEGORY
`
`
`
`
`
`FOOD
`
`FOOD
`
`FOOD
`
`SNACKS
`
`SNACKS
`
`BOAT
`
`CLOTHING
`
`CLONNNC
`
`BOAT
`
`HOME
`
`
`
`
`
`
`
`
`%
`
`Page 00003
`
`\,
`
`FIG. 6
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 00008
`
`
`
`U.S. Patent
`
`Dec. 27, 2011
`
`Sheet 7 of 7
`
`US 8,083,137 B2
`
`asmagQ05,58$
`
`
`
`
`
`
`
`85%2.E»3?.3:3.5:an___,%a§:._.,a_,_<zoE_$maEE3:
`
`
`
`
`
`55Eneac_,,=,EeEwas:$553%E3“go:%_..,o2%E8;zazazmmamwmmmm89>flex
`
`3Q
`
`M20:
`
`
`
`E20filmmac:.3;zfifism
`
`mamamama
`
`8;_.__.EEEea
`
`%%%EQ:wziodma
`
`$5gg8;z_§E_,mca
`
`IE292éom
`
`N
`
`C-4
`
`C3
`f."'~l
`
`I$9,:$3 92%ez_Eod3;mazmm._,m_,_I$253%IEO;8:“
`
`
`
`.uEEo.aca
`
`Hem
`
`=,m§__,Eg
`
`Page 00009
`
`ll
`
`u.9:x
`
`E
`
`
`Page 00009
`
`
`
`
`
`
`
`1
`ADMINISTRATION OF FINANCIAL
`ACCOUNTS
`
`RELATED APPLICATIONS
`
`This application claims priority to U.S. application Ser.
`No. 11/567,044 which, in turn, is a divisional of and claims
`priority to U.S. application Ser. No. 10/192,426, now U.S.
`Pat. No. 7,254,548. This application also claims priority to
`U.S. patent application Ser. Nos.: 11/567,032; 11/767,246;
`and 11/567,069, all of which claim priority to U.S. Pat. No.
`7,254,548. The subject matter ofU.S. Pat. No. 7,254,548, and
`application Ser. Nos. 11/567,044; 11/567,032; 11/767,246;
`and 1 1/567,069 is expressly incorporated by reference herein.
`
`BACKGROUND
`
`The popularity of credit cards, debit cards, and other facili-
`ties for financing transactions for the consuming public at the
`point of sale is now without question. It is easy, and all too
`prevalent, that along with such popularity and ease of use of
`most point of sale credit facilities, comes financial difficulty
`for many people.
`It is difiicult, even for the most disciplined person, to resist
`the temptation of purchasing a product spontaneously. This
`impulse buying is often encouraged by merchants and, when
`done well, is highly effective.
`Today, most credit facilities, such as credit cards, have
`ultimate spending limits, such that when the limit is exceeded
`(or the most recent invoice not paid promptly) the consumer
`user is denied further access to credit. Usually, by this time,
`the consumer is in financial distress.
`
`Many credit facilities today allow consumerusers to obtain
`current balances, as well as recent purchase information, by
`telephone or Internet, or other on-line access. This historical
`data does not adequately address the problem, as it does not
`help the consumer in making purchasing decisions at the time
`a purchase decision is being contemplated. Also, many credit
`facilities give annual print-out summaries of purchases by
`category. While such reports are nice to have at tax season, or
`for next year’s plarming, they are a backward-looking view
`and do not serve to help the consumer on a day-to-day basis.
`People on fixed incomes, low incomes and people with debt
`“problems,” should be on rigid budgets and may require cur-
`rent financial information in a more timely manner. People
`striving simply to “watch” their spending also require current
`information, if they are to make intelligent buying decisions.
`Another problem exists today when some users have the
`use of a card issued to another person. For example, in an
`employer/employee situation often an employee is given use
`ofa credit card for the purchase ofgoods or services which are
`business related. Unfortunately, such credit facilities are
`sometimes misused, or the balances go too high, and by the
`time the employer learns of the problem it may be too late to
`remedy the situation.
`
`SUMMARY
`
`This Summary is provided to introduce a selection of con-
`cepts in a simplified form that are further described below in
`the Detailed Description. This Summary is not intended to
`identify key features or essential features of the claimed sub-
`ject matter, nor is it intended to be used to limit the scope of
`the claimed subject matter.
`Various embodiments are directed to a system and method
`which allows consumer users to establish self-imposed limits
`on the user’ s spending (borrowing) such that when the limit is
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 8,083,137 B2
`
`2
`
`reached the consuming user is notified. This notification can
`be before, during or after the point of sale transaction, and can
`be delivered, if desired, by the account clearing network and
`printed on the user’s purchase receipt. The notification mes-
`sage can be delivered via a phone call, email or over an
`Internet connection to the user. The notification can be to one
`
`or more designated third parties, such as a parent, or card
`owner, or a debt counselor.
`In at least one embodiment, the user will pre-establish
`self-imposed spending limits (guidelines) on a category by
`category basis, and each category can have, if desired, a
`different accounting period. For example, the food category
`can have a monthly (or weekly) limit, while the hobby cat-
`egory can have, for example, an annual or semi-annual limit.
`Since these limits are self-imposed, they do not impact the
`user’s ability to complete any transaction, but rather they
`serve to provide the user meaningful information at a time
`when that information is mo st useful.
`
`the user may access his/her
`In another embodiment,
`account, other than at the point of sale, to see (or hear) a
`running total of category balances, based on accounting peri-
`ods, as well as comparisons against the user imposed pre-
`established category by category budget.
`In another embodiment, the user can establish the limits,
`and can change the limits when desired, by telephone, email,
`Internet or the like. Also the limits need not be constant from
`
`accounting period to accounting period. Thus, if a person’s
`ability to repay the charged (borrowed) amount fluctuates
`during the year, the user may pre-establish that the limits will
`automatically change during those periods. Also, the user
`might decide that if his/her total outstanding balance reaches
`a certain amount, certain budgeted categories then will be
`reduced until the total unpaid amount recedes below the
`“critical” level. In this regard different categories canbe given
`different priorities.
`For example, assume a user has a total line of credit of, say,
`$5,000. Also assume that the user has established that his/her
`food budget is to be $200 per week (with the highest priority
`set), and that the boat budget is $1,000 per year (with the
`lowest priority set). Also let us assume that the user has set a
`self-imposed arbitrary cap on his/her outstanding credit card
`balance of, $2,000, let us assume also that the current out-
`standing balance has exceeded the self-imposed $2000 limit,
`but has not reached the $5,000 card limit.
`Now let us assume that the user desires to buy a new $100
`fishing rod for his boat and this will be the first “boat” pur-
`chase this year. The user can access his account in any number
`of ways, for example, by voice, or by Internet or at the point
`of sale. When the user accesses the account, since the self-
`imposed outstanding balance cap of $2,000 has been
`exceeded, the user will be informed that the available budget
`for the fishing rod is zero, even though the available budget
`amount is $1,000 and even though the line of credit still
`allows for $3000 worth of spending. Note, that had the user
`inquired about a food category he/she would have been told
`the actual amount available (or the actual amount used, if
`desired) in the “food” category.
`In a still further embodiment, the user may establish sub-
`users on his/her account and may authorize each user to use
`the account only with respect to certain categories, or cat-
`egory amounts, or only up to a certain credit limit, or only for
`a certain period of time, or a combination of the above.
`The foregoing has outlined rather broadly the features and
`technical advantages ofthe various embodiments in order that
`the detailed description ofthe embodiments that follows may
`be better understood. Additional features and advantages will
`be described hereinafter which form the subject of the
`
`Page 00010
`
`
`Page 00010
`
`
`
`US 8,083,137 B2
`
`3
`claimed subject matter. It should be appreciated by those
`skilled in the art that the conception and specific embodi-
`ments disclosed may be readily utilized as a basis for modi-
`fying or designing other structures for carrying out the same
`purposes of the described embodiments. It should also be
`realized by those skilled in the art that such equivalent con-
`structions do not depart from the spirit and scope of the
`claimed subject matter as set forth in the appended claims. It
`is to be expressly understood that each of the figures is pro-
`vided for the purpose of illustration and description only and
`is not intended as a definition of the limits of the claimed
`
`subject matter.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding ofthe claimed embodi-
`ments, reference is now made to the following descriptions
`taken in conjunction with the accompanying drawing, in
`which:
`
`FIG. 1 shows a block diagram of one embodiment where
`the credit-card user is making a purchase at a point of sale
`located at a merchant’s premises;
`FIG. 2 shows a block diagram of another embodiment
`where the credit card user is making a purchase, editing a
`profile or obtaining account information via an on-line Inter-
`net (or telephone) connection;
`FIGS. 3A and 3B show one embodiment of an operation
`where the user obtains information from and/or edits his/her
`
`profile;
`FIG. 4 shows one embodiment where the processing sys-
`tem, in response to a request, provides a message and/or
`blocks the transaction dependant, in part, upon the informa-
`tion contained in the user’s profile;
`FIGS. 5 and 6 show embodiments of profile data bases on
`a category by category basis; and
`FIG. 7 shows one embodiment of a user account organized
`by category.
`
`DETAILED DESCRIPTION
`
`Turning now to FIG. 1, there is shown System 10, which is
`one embodiment showing user 100 with credit card 11, get-
`ting ready to insert the card into card reader 12 to complete a
`sales transaction at a point of sale. The information from card
`reader 12 is communicated via communications links 14.1
`
`and 14.2 and network 101 to central processor 15. Processor
`15, in conjunction with database 16 and profiles 17, then
`categorizes the various purchases being made and stores
`those purchase amounts and categories in database 16,
`according to profiles of user 17, as stored, for example, in
`profile data base 17.
`As will be discussed, these profiles can include not only the
`budget amounts for each category, but what types of items
`would fit into the different categories. Based upon the pro-
`files, processor 15 then can communicate in one or more of
`several ways, such as, for example, back over communica-
`tions links 14-1, 14-1 to user 100 or over alternate commu-
`nication paths via auxiliary communication 18. This commu-
`nication can be, for example, via printer 13, or it can be via
`auxiliary communication path 18. Auxiliary communication
`18 can be, for example, to the user via cell phone, pager, or
`other device. At the same time, if desired, third parties, such
`as parents, employers, debt counselors and others, could also
`be notified. This communication can, if desired, occur for all
`purchases, or for certain of the purchases by category or by
`amount.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`The system can be designed, if desired, such that if the
`amounts in a category (or if the total outstanding balance at
`that time) were to exceed a certain amount, user 1 00, or a third
`party as identified in the user’s profile, would be required to
`give specific approval for a particular purchase. This system
`could be extended so that third parties (such as parents) can
`allow a child to use a credit card, but certain purchases over a
`certain amount, or all purchases, or purchases in certain cat-
`egories, will require approval from the parent (or other third
`party), who would not actually be present at the point of sale.
`For example, a parent could allow a child to have a credit
`card for the purpose of buying clothes. The child then selects
`his or her purchases at a location and runs card 11 through the
`card reader at the point of sale. The system, via profile 17,
`database 16 and processor 15, then recognizes that this is a
`card which is a sub-account card of a main account, or an
`account that is otherwise special to this person. Processor 15
`then enables a communication to the third person identified
`by profile 17 via auxiliary communication 18. This commu-
`nication could be, for example, cellular, landline, Internet,
`pager, PDA, or the like. The purchase can only be completed,
`if the third person responds in a positive manner (perhaps by
`pushing a button or speaking an acceptance word as set out in
`the user’ s profile). Processor 15, perhaps working in conjunc-
`tion with other network processors, controls the acceptance
`back to the point of sale.
`In some situations, it could be appropriate for the item that
`is being purchased to have a picture, available either in an
`auxiliary database 16-1, or transmitted from the point of sale
`at the time ofpurchase, transmitted to a third person, either for
`approval or simply for information purposes. This would be
`helpful, for example, when a husband is buying a suit and
`wants his wife to see the suit before the purchase is consum-
`mated. A picture ofthe suit couldbe captured by camera 12-1,
`communicated over the communication link to processor 15,
`and then through auxiliary communication 18 to a designated
`third party at a cell phone, computer, pager, FDA, or the like.
`In some situations, the purchaser may desire additional
`information, such as warranties, specifications, pictures,
`assembly instructions, to be sent to a specific location (such as
`the point of sale, or to his/her home), or the purchaser may
`wish to register his/her purchase with the seller, or even apply
`for a rebate, all at the time or purchase. Processor 15, working
`in conjunction with database 16 and profiles 17 then could
`send the purchaser’s address and other information to the
`seller. The seller’s information obtained from transmitted
`POS information, or from data contained at the central loca-
`tion, such as from auxiliary database 16-1, would be com-
`bined with the user’s (purchaser’s) information as obtained
`from database 16, and sent to the seller. Since the user specific
`database contains information pertaining to the user’s prior
`purchases it could be used, for example to aid the purchaser in
`making new purchases, perhaps by providing compatibility
`information to the user, either at the POS or on demand. This
`compatibility information could be within system 10, but
`would likely reside with each specific seller and could be
`supplied to the user at the POS (or on demand) in response to
`the above-discussed purchase registration.
`Note that auxiliary database 16-1 can hold any type of
`information that is desired to be communicated to either user
`
`100 or to third parties. This information could be sound,
`video, or any type of information, and can be stored in com-
`pressed format in the well-known manner. Also the informa-
`tion sent to a third party could be, for example, pictures,
`video, color, audio or any combination thereof. In addition,
`the information could be partially located in the database,
`such as database 16-1 and available based upon some infor-
`
`Page 00011
`
`
`Page 00011
`
`
`
`US 8,083,137 B2
`
`5
`mation, perhaps a bar code or other information sent from
`card reader 12 or from camera 12-1.
`
`In addition, the system could use camera 12-1 to take a live
`picture of user 100 at the point of sale and to then match that
`picture against a known picture or other information. This
`could then be sent to a third party for verification based upon
`a profile in database 17. Thus, when a main user of a credit
`card allows other sub-users, which could be employees, chil-
`dren, relatives, temporary workers, to use the sub-account
`card, each purchase using the sub-account card could trigger,
`if desired, the taking of a picture of the then user at the POS.
`This picture, or other information (such as a password) could
`be transmitted, under control of profile 17, database 16 and
`processor 15 to the main user, as discussed above, such that
`the transaction would not be completed until the main user
`signified acceptance.
`This system, for example, could be used to keep an account
`“open” for the real user for a period of time when a card is
`reported lost or stolen. In such an event, the profile would be
`used to provide the system with a special verification proce-
`dure unique to the user. This verification could be for
`example, a password necessary at each purchase, or a biomet-
`ric sent from the POS for comparison during each transaction.
`System 10 could operate such that the main user, as will be
`discussed, can at any time change his/her profile, thereby
`adding or changing passwords, and assigning passwords or
`other control information to the profile. These passwords
`could be for the main account, or for any sub-account. When
`the credit card is presented at a POS, system 10 would check
`the user’s profile to see if any such passwords, third party
`approvals, etc, are required. If so, the salesperson at the point
`of sale could then follow directions sent to that person via
`network 101 so as to obtain the proper identification of the
`user. This would give an added measure of security to credit
`card users. For example, the profile of a user might specify
`that call-in purchases (ones where the card is not physically
`present at the POS location) will need to be verified by a
`specified pas sword, or verified by a communication placed by
`the salesperson (or by system 10) to a third person. The user’ s
`own created profile will allow for flexibility in this regard.
`Note that the profile of the user, including database infor-
`mation if desired, could be stored on the user’s card along
`with, if desired, at least some of the processing. In such a
`scenario, information from the profile would be sent to a
`central processing network to provide the services for the user
`as discussed above. A so called “smart card” would be one
`
`method of accomplishing this objective.
`Turning now to FIG. 2, there is shown System 20 in which
`user 200 is utilizing keyboard 22 and computer 23 to access
`his or her account via communication links 201-1 and 210-2
`
`and public network 24 to web portal or phone operator 25.
`Portal 25 then accesses processor 15 via communication link
`202-1. Such accessing of the system by user 200 could be for
`the purpose of obtaining account information at any time on
`a category by category basis, or for establishing (as will be
`discussed) various account categories, balances and sub-us-
`ers, or user 200 could be using computer 23 (which could be
`a telephone, pager, PDA, or the like) as a POS device. Note
`that connection 201-1, as well as the other connections
`shown, could also be by pager network, cellular network or
`any other type of network, including for example, wireless,
`wire line or the cable satellite network typically utilized for
`broadcast signals into the home for entertainment purposes.
`Once connected to processor 15, the system operates as dis-
`cussed above with respect to FIG. 1. In the situation where at
`least a portion of the processing is on the user’s smart card,
`then the user would insert his/her card at a reader (not shown)
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`associated with computer 23. Of course, if the smart card
`included wireless technology, such a reader would be unnec-
`essary, both in FIG. 2 as well as in FIG. 1.
`FIG. 3A shows system 30 which is one embodiment of a
`system utilized to enable system 10 (FIG. 1), or system 20
`(FIG. 2) where a user can establish various categories and
`credit limits and/or view the existing account at any time. In
`process 301 the user logs onto the system as is well known. In
`process 302 the user is identified and is validated by the
`system. At this point the user is given several choices, three of
`which are shown in FIG. 3A. One such option, as shown in
`process 303, allows the user to view the account limits and
`current status. The user in process 304 could edit the profile
`and in process 305 the user may establish new profiles.
`Assuming the user wanted to view the account limits, then
`the user in process 330 would select the desired information.
`The system in process 306 would access the processor and
`other databases and profiles to provide the desired informa-
`tion, via process 307, which could be in the form of FIG. 5, 6
`or 7, or other profile information. If the user desired to just
`view the information, process 334, then when the user was
`finished, as shown by process 331, the connection would be
`terminated in a well known manner.
`
`If changes were to be made, as controlled by process 334,
`then the user would be directed to edit profile process 3 04, and
`the user could either edit the main user or subusers . Assuming
`the main user is to be edited, the user is directed to the same
`path as would be utilized if there was to be established a new
`profile via process 305, such that the user, under control of
`process 307 would set the categories and limits for the main
`user.
`
`Going back to process 308, had the main user decided to
`edit some profile other than the main user’s profile, then the
`users would be identified via process 306 and the paths then
`would be concurrent for both the sub-users’ and main user,
`such that process 309 would inquire as to whether some users
`would have different limits, categories, times or parameters.
`If the answer was yes, then those parameters would be set
`for each user as to which category, amount, time or any other
`parameter desired for individual sub-users and the main user.
`If everybody were to have the same limits, then process 309
`would skip to process 311 and the question would be
`answered as to whether there are automatic limits with timing
`changes to be applied. If there were, those parameters would
`be set via process 312. Process 312 would also control any
`other parameter that needed to be set, such as, by way of
`example,
`the user’s home address, phone number, email
`address, auxiliary addresses (both physical and electronic),
`cell phone numbers, pagers, PDA addresses, third party noti-
`fications, together with their respective contact information,
`passcodes, special limits.
`After the user is finished entering all of the desired param-
`eters, the question would be asked as to whether the normal
`categories of purchase goods were to be used. By this it is
`meant that some categories would be preset by the system
`itself, such that clothes being purchased would always go
`under the clothing category. However, if desired, a user could
`decide that clothes from certain stores, or certain types of
`clothing, such as sporting clothes, would go under a sporting
`category. The user could decide, for example, such that cer-
`tain foods would go under a discretionary category other than
`food. This can be seen in FIG. 6 where the natural category
`for, say ice cream, would be food, but a user could switch the
`natural category to a profile category of snack, if desired.
`Likewise, fishing gear would have a normal category of sport-
`ing goods, whereas this user would have a profile category of
`boating. This would allow a user to more finely tailor his or
`
`Page 00012
`
`
`Page 00012
`
`
`
`US 8,083,137 B2
`
`7
`her profile to be more accommodating of the user’s needs. It
`would allow a fine tuning ofbudgeting and expenses on an ‘as
`you go’ basis.
`In process 314, the user can assign items to categories and
`can do so by sub-user if desired, so that certain sub-users can
`have access to all categories, or some categories, and also
`what items are included in those subcategories. For example,
`a parent may allow a child a credit card for the purchase of
`food, and restrict the child from buying alcohol or cigarettes,
`if so desired. Or, the parent could allow the child to have a
`credit card for the purchase of gasoline for the family car, but
`other products sold at the service station would fall into a
`different category, either naturally or as a selection under the
`categories selected under process 314, such that only certain
`products such as gasoline could be purchased by certain users
`of the credit card.
`
`Continuing on FIG. 3B, if the user desired to set priorities
`for different categories, process 315, such that as discussed
`above, based upon the priority level set in process 31 6, and the
`trigger amounts in 318, the user would be notified of different
`category levels such that the user is better able to maintain a
`strict budget when necessary. Since these limits are all self-
`imposed the user can determine, on a category by category
`basis, the difficulty and manner for overriding any “inhibit-
`ing” message.
`In process 317 it is determined whether only the point of
`sale user is to be notified, and if so, how that notification is to
`be made via process 319. Notification can be printed on the
`receipt, or the notification can be by cellular phone call, email
`or other notification and can be contemporaneously with the
`transaction or thereafter. Ifthird parties are to be notified, then
`the names of the third parties and mode of notification can be
`set via process 321, all of which would be stored in database
`16 and profile 17 (FIG. 1) via process 320.
`Before exiting the system, the user may wish to edit the
`profil