throbber
(12) United States Patent
`Liberty et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,189,785 B2
`Nov. 17, 2015
`
`US009 189785B2
`
`(54) DEBITNETWORK ROUTING SELECTION
`USING ASCANNABLE CODE
`
`(71) Applicants: Michael A. Liberty, Windermere, FL
`(US); Steve Bacastow, Cumming, GA
`(US)
`(72) Inventors: Michael A. Liberty, Windermere, FL
`(US); Steve Bacastow, Cumming, GA
`(US)
`(73) Assignee: Mozido, Inc., Austin, TX (US)
`(*) Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 13/974,375
`(22) Filed:
`Aug. 23, 2013
`
`(65)
`
`Prior Publication Data
`US 2014/OO54369 A1
`Feb. 27, 2014
`
`Related U.S. Application Data
`(60) Provisional application No. 61/704,337, filed on Sep.
`21, 2012, provisional application No. 61/693,055,
`filed on Aug. 24, 2012.
`(51) Int. Cl.
`G06K 19/00
`G06K 5/00
`G06O40/00
`G06O20/26
`G06O20/32
`(52) U.S. Cl.
`CPC ............ G06O20/26 (2013.01); G06O20/3274
`(2013.01)
`
`(2006.01)
`(2006.01)
`(2012.01)
`(2012.01)
`(2012.01)
`
`(58) Field of Classification Search
`CPC ..... G06Q 40/00: G06Q 20/26: G06Q 20/227;
`G06Q 20/354; G06Q 30/06; G06Q 30/02:
`G06Q 20/12: G06Q 20/204: G06Q 20/20;
`G06Q 20/36; G06Q 30/0601; G06Q 20/387:
`
`G06Q 30/0641; G06Q 20/351; G06Q 20/40:
`GO6K 197083
`See application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`2/2013 Laracey
`8,380,177 B2
`8,639,621 B1* 1/2014 Ellis et al. ....................... TO5/41
`2005/0027648 A1
`2/2005 Knowles et al.
`2005, 0125343 A1* 6/2005 Mendelovich ......... G06Q 20/04
`705/39
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`
`11, 2012
`2012.158133
`6, 2014
`2014O93943
`OTHER PUBLICATIONS
`
`International Search Report and Written Opinion of PCT/US 13/
`75199 dated Apr. 29, 2014.
`(Continued)
`Primary Examiner — Thien T Mai
`(74) Attorney, Agent, or Firm — Workman Nydegger
`(57)
`ABSTRACT
`Embodiments are directed to selecting a debit network using
`a quick response (QR) code and to processing a payment
`using a debit network selected according to information
`embedded in a QR code. In one scenario, a mobile computer
`system receives input indicating that a user has initiated a
`payment for various items sold by a provider of goods or
`services. The mobile computer system determines that the
`user or the provider has specified a preference indicating
`which debit network is to be used to process the payment. The
`mobile computer system then generates a QR code with the
`debit network selection and portions of the user's debit
`account information embedded in the QR code, and sends the
`generated QR code to a payment processing system. The
`payment processing system may be cloud-based, or may be
`run locally at the provider's point of sale.
`21 Claims, 5 Drawing Sheets
`
`200-
`\
`
`User
`205
`
`Mobile Computer System 20
`
`
`
`2f
`
`211
`
`212
`
`23
`
`214
`
`Mobile Wallet Application
`
`User Demographic
`information
`
`User Payment Preferences
`
`User Purchasing History
`
`Retailer's Debit
`Network Preferences
`
`Determining Module
`
`QR Code Generating Module
`
`
`
`24
`7
`Retailer's Debit
`Nstworks Preferences
`
`Retail location 225
`226
`
`Point Of Sale
`
`22
`Checkout Register
`
`W
`
`228
`
`Retaillems
`
`- - - - - - - - - -
`
`230
`
`Ex.1001
`APPLE INC. / Page 1 of 14
`
`

`

`US 9,189,785 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2006/0208065 A1
`
`9, 2006 Mendelovich ......... G06Q 20/04
`235,380
`
`3/2007 Arseneau et al.
`2007/0058041 A1
`4/2007 Vaughn et al.
`2007/0088624 A1
`6, 2007 Walker et al.
`2007. O13001.6 A1
`7/2008 Deibert et al.
`2008/O1723.17 A1
`9/2008 Higgins et al.
`2008/0222048 A1
`3988:
`A. 858 E.
`2010/005 1685 A1* 3/2010 Royyuru et al. .............. 235,379
`2010/028283.6 A1 1 1/2010 Kempfet al.
`2012fOO78673 A1
`3/2012 Koke et al.
`2012/0085829 A1
`4/2012 Ziegler
`
`2012/0209749 A1* 8, 2012 Hammad et al. ............. 705/27.1
`2012fO267432 A1 10, 2012 Kuttuva
`2012/0290421 A1 1 1/2012 Qawami et al.
`2013/022861.6 A1* 9, 2013 Bhosle et al. ................. 235,375
`2014/0058834 A1
`2/2014 Liberty et al.
`2014/0172531 A1
`6/2014 Liberty et al.
`
`OTHER PUBLICATIONS
`
`International Search Report for PCT/US 11/00855 dated Nov. 9,
`2011.
`Gao et al. "A 2-D Barcode-Based Mobile Payment System.” In. MUE
`'09 Third International Conference on Multimedia and Ubiquitous
`Engineering, 2009, pp. 320-329.
`* cited by examiner
`
`Ex.1001
`APPLE INC. / Page 2 of 14
`
`

`

`U.S. Patent
`U.S. Patent
`
`Nov. 17, 2015
`
`Sheet 1 of 5
`
`US 9,189,785 B2
`US 9,189,785 B2
`
`
`
`S}eM SOW
`
`ELLswaysAyedpe
`
`(IGeqAIPAD)Md
`quawAeg
`
`dndo| ewiniy
`
`(Alesi4 9 Jaq)
`quawced |IId
`
`(waysAg Buyig)
`ONAW / ON
`
`(leA yedAouoy)
`JOqUaa
`
`(Jeye/duooueg)
`
`(don 8 Sad)
`JOSS890/d ‘XJ
`
`(nM 8 IDW)
`SsoUenIWIAY
`
`
`
`Ja|pueyjuuswAed
`
`GOL
`
`
`
`BuueaBGuea|9OLL
`
`euibuy
`
`JOSSaI0Id
`
`
`
`LebaueN
`
`
`
`
`
`EQ}.suojeuuogaaimeg
`
`
`
`(yoieg)(ongqa)
`
`
`
`
`
`asnoyasnoy_
`
`Aueqyoelg aINjoayyouy
`
`JeUOOUNWOE}4
`
`
`
`
`
`——Bulyojeyy
`
`60Lauibuysainy
`Zhpsuoneouon
`ZOLsania
`UOHEDYHON
`bOl
`
`
`rolS801AI9S8899014SSSUISNG
`
`LLLhI
`
`saoueguonezZWOYINY
`
`LO|29ULuonesBayu
`
`SOLjpeseqeieg90OLsaoiaagAqunaag
`
`JeuleyoD
`AQuol|
`
`s1alqo
`[Old
`
`AJOSH XL
`AJOJSIH XL
`
`wo
`Auedwo5
`wo
`uossed
`
`LOL
`
`Ex.1001
`APPLEINC./ Page 3 of 14
`
`Ex.1001
`APPLE INC. / Page 3 of 14
`
`

`

`U.S. Patent
`
`Nov. 17, 2015
`
`Sheet 2 of 5
`
`US 9,189,785 B2
`
`LeeLL|
`
`
`
`
`
`
`
`uoleo07|Ie}ay199SJele}oyp02922ddSODUAIBJAgSYIOMONUO!JEOI|AAyYJSI|EAA[1QO/\\fGez
`
`
`
`
`
`
`
`
`
`
`
`
`
`uojoesuel|}igequoljoesuel|jigeqainpow-Buluiwwajaq
`
`
`
`
`
`
`
`
`
`JONSON(1e}5“B'2)yYJONjaN
`
`c‘9
`
`
`
`
`
`ainpoywBuyjesauayapo9YH
`
`
`
`SWS}[IP}Oy
`
`alesJOJulod
`
`
`
`Cca1ydesbowagJasn
`
` ,Ja\sifiayinoyoaG0¢
`
`
`
`
`
`
`ReednopeyoUOULUOJU|Jasn
`
`
`
`
`
`SEOUala}el4JUBWARYJaf)
`
`
`
`
`
`AsojsiqBuiseyoungJas)
`
`
`
`{g8qSJaIIejoY
`
`
`
`SOOUIOJAI4OMJON
`
`Ex.1001
`APPLEINC./ Page 4 of 14
`
`
`
`
`
`10zwashsJejndwo4siqoyy
`
`Ex.1001
`APPLE INC. / Page 4 of 14
`
`
`
`

`

`U.S. Patent
`
`Nov. 17, 2015
`
`Sheet 3 of 5
`
`US 9,189,785 B2
`
`300
`
`
`
`Receive input indicating That User Has
`Initiated A Payment
`
`Determine That User And/Or Provider HaS
`Specified Debit Network Preference
`
`Generate QR COde With Embedded Debit NetWOrk
`Selection User Debit ACCOUnt Information
`
`Send Generated QR Code To Payment
`Processing System
`
`310
`
`320
`
`330
`
`340
`
`FIG. 3
`
`Ex.1001
`APPLE INC. / Page 5 of 14
`
`

`

`U.S. Patent
`
`Nov. 17, 2015
`
`Sheet 4 of 5
`
`US 9,189,785 B2
`
`
`
`Receive QR COde With Embedded
`Payment Information
`
`Determine Which Debit NetWOrk To Use TO
`Process Payment
`
`Send Payment Amount And User's Debit ACCount
`Information To Determined Debit Network
`
`Receive indication That Payment Was
`Processed By Determined Debit Network
`
`410
`
`420
`
`430
`
`440
`
`FIG. 4
`
`Ex.1001
`APPLE INC. / Page 6 of 14
`
`

`

`U.S. Patent
`
`Nov. 17, 2015
`
`Sheet 5 of 5
`
`US 9,189,785 B2
`
`
`
`QR Code 501
`
`Embedded Information
`
`502
`
`User's Preferred Debit
`NetWOrk
`
`Provider's Preferred
`Debit NetWOrk
`
`Total Payment
`AmOUnt
`
`GOOds Or Services
`Being Purchased
`
`USer's Debit
`ACCOUnt Information
`
`USer's Purchase
`History
`
`Rewards
`
`Selected NetWOrk
`
`FIG. 5
`
`Ex.1001
`APPLE INC. / Page 7 of 14
`
`

`

`US 9,189,785 B2
`
`1.
`DEBITNETWORK ROUTING SELECTION
`USING ASCANNABLE CODE
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application claims priority to and the benefit of U.S.
`Provisional Application Ser. No. 61/704,337, entitled “Debit
`Network Routing Selection Using a QR Code, filed on Sep.
`21, 2012. This application also claims priority to and the
`benefit of U.S. Provisional Application Ser. No. 61/693,055,
`entitled “Debit Network Routing Selection Using a QR
`Code', filed on Aug. 24, 2012. Both of these applications are
`incorporated by reference herein in their entirety.
`
`10
`
`15
`
`2
`This Summary is provided to introduce a selection of con
`cepts in a simplified form that are further described below in
`the Detailed Description. This Summary is not intended to
`identify key features or essential features of the claimed sub
`5 ject matter, nor is it intended to be used as an aid in determin
`ing the scope of the claimed Subject matter.
`Additional features and advantages will be set forth in the
`description which follows, and in part will be apparent to one
`of ordinary skill in the art from the description, or may be
`learned by the practice of the teachings herein. Features and
`advantages of embodiments described herein may be realized
`and obtained by means of the instruments and combinations
`particularly pointed out in the appended claims. Features of
`the embodiments described herein will become more fully
`apparent from the following description and appended
`claims.
`
`BACKGROUND
`
`Computers have become highly integrated in the work
`force, in the home, in mobile devices, and many other places.
`Computers can process massive amounts of information
`quickly and efficiently. Software applications designed to run
`on computer systems allow users to perform a wide variety of
`functions including business applications, Schoolwork, enter
`tainment and more. Software applications are often designed
`to perform specific tasks, such as word processor applications
`for drafting documents, or email programs for sending,
`receiving and organizing email.
`Today's Smartphones use Software applications to perform
`a wide variety of functionality. In some cases, this function
`ality may include the ability to pay for items using a mobile
`payment system. Such a mobile payment system may allow
`users to pay for items at a store or over the internet using their
`phone.
`
`BRIEF SUMMARY
`
`25
`
`30
`
`35
`
`40
`
`Embodiments described herein are directed to selecting a
`debit network using a quick response (QR) code and to pro
`cessing a payment using a debit network selected according to
`information embedded in a QR code. In one embodiment, a
`mobile computer system receives input indicating that a user
`has initiated a payment for various items sold by a provider of
`goods or services. The mobile computer system determines
`that the user or the provider has specified a preference indi
`cating which debit network is to be used to process the pay
`45
`ment. The mobile computer system then generates a QR code
`with the debit network selection and portions of the user's
`debit account information embedded in the QR code, and
`sends the generated QR code to a payment processing system.
`The payment processing system may be cloud-based, or may
`be run locally at the provider's point of sale.
`In another embodiment, a computer system processes a
`payment using a debit network selected according to infor
`mation embedded in a QR code. The computer system
`receives a QR code that includes portions of embedded pay
`ment information. The embedded payment information
`includes at least the following: a total payment amount that is
`to be paid by a user, debit account information for the user,
`and an indication of which debit network is to be used to
`process the payment. The computer system determines which
`debit network is to be used to process the payment based on
`the indication provided in the embedded payment informa
`tion in the received QR code, sends the payment amount and
`the user's debit account information to the determined debit
`network and, after the payment has been processed, receives
`an indication that the payment was processed by the deter
`mined debit network.
`
`50
`
`55
`
`60
`
`65
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`To further clarify the above and other features of the
`embodiments described herein, a more particular description
`will be rendered by reference to the appended drawings. It is
`appreciated that these drawings depict only examples of the
`embodiments described herein and are therefore not to be
`considered limiting of its scope. The embodiments will be
`described and explained with additional specificity and detail
`through the use of the accompanying drawings in which:
`FIG. 1 illustrates a computer platform architecture for pro
`viding mobile wallet and payment processing services.
`FIG. 2 illustrates an embodiment in which a debit network
`is selected for performing a debit transaction.
`FIG. 3 illustrates a flowchart of an example method for
`selecting a debit network using a QR code.
`FIG. 4 illustrates a flowchart of an example method for
`processing a payment using a debit network selected accord
`ing to information embedded in a QR code.
`FIG. 5 illustrates a QR code with multiple portions of
`embedded information.
`
`DETAILED DESCRIPTION
`
`Embodiments described herein are directed to selecting a
`debit network using a quick response (QR) code and to pro
`cessing a payment using a debit network selected according to
`information embedded in a QR code. In one embodiment, a
`mobile computer system receives input indicating that a user
`has initiated a payment for various items sold by a provider of
`goods or services. The mobile computer system determines
`that the user or the provider has specified a preference indi
`cating which debit network is to be used to process the pay
`ment. The mobile computer system then generates a QR code
`with the debit network selection and portions of the user's
`debit account information embedded in the QR code, and
`sends the generated QR code to a payment processing system.
`The payment processing system may be cloud-based, or may
`be run locally at the provider's point of sale.
`In another embodiment, a computer system processes a
`payment using a debit network selected according to infor
`mation embedded in a QR code. The computer system
`receives a QR code that includes portions of embedded pay
`ment information. The embedded payment information
`includes at least the following: a total payment amount that is
`to be paid by a user, debit account information for the user,
`and an indication of which debit network is to be used to
`process the payment. The computer system determines which
`debit network is to be used to process the payment based on
`the indication provided in the embedded payment informa
`
`Ex.1001
`APPLE INC. / Page 8 of 14
`
`

`

`US 9,189,785 B2
`
`10
`
`15
`
`3
`tion in the received QR code, sends the payment amount and
`the user's debit account information to the determined debit
`network and, after the payment has been processed, receives
`an indication that the payment was processed by the deter
`mined debit network.
`The following discussion now refers to a number of meth
`ods and method acts that may be performed. It should be
`noted, that although the method acts may be discussed in a
`certain order or illustrated in a flow chart as occurring in a
`particular order, no particular ordering is necessarily required
`unless specifically stated, or required because an act is depen
`dent on another act being completed prior to the act being
`performed.
`Embodiments of the present invention may comprise or
`utilize a special-purpose or general-purpose computer system
`that includes computer hardware. Such as, for example, one or
`more processors and system memory, as discussed in greater
`detail below. Embodiments within the scope of the present
`invention also include physical and other computer-readable
`media for carrying or storing computer-executable instruc
`tions and/or data structures. Such computer-readable media
`can be any available media that can be accessed by a general
`purpose or special-purpose computer system. Computer
`readable media that store computer-executable instructions
`25
`and/or data structures are computer storage media. Com
`puter-readable media that carry computer-executable instruc
`tions and/or data structures are transmission media. Thus, by
`way of example, and not limitation, embodiments of the
`invention can comprise at least two distinctly different kinds
`of computer-readable media: computer storage media and
`transmission media.
`Computer storage media are physical storage media that
`store computer-executable instructions and/or data struc
`tures. Physical storage media include computer hardware,
`such as RAM, ROM, EEPROM, solid state drives (“SSDs),
`flash memory, phase-change memory (PCM), optical disk
`storage, magnetic disk storage or other magnetic storage
`devices, or any otherhardware storage device(s) which can be
`used to store program code in the form of computer-execut
`able instructions or data structures, which can be accessed
`and executed by a general-purpose or special-purpose com
`puter system to implement the functionality disclosed herein.
`Transmission media can include a network and/or data
`links which can be used to carry program code in the form of
`45
`computer-executable instructions or data structures, and
`which can be accessed by a general-purpose or special-pur
`pose computer system. A "network” is defined as one or more
`data links that enable the transport of electronic data between
`computer systems and/or modules and/or other electronic
`devices. When information is transferred or provided over a
`network or another communications connection (eitherhard
`wired, wireless, or a combination of hardwired or wireless) to
`a computer system, the computer system may view the con
`nection as transmission media. Combinations of the above
`should also be included within the scope of computer-read
`able media.
`Further, upon reaching various computer system compo
`nents, program code in the form of computer-executable
`instructions or data structures can be transferred automati
`cally from transmission media to computer storage media (or
`Vice versa). For example, computer-executable instructions
`or data structures received over a network or data link can be
`buffered in RAM within a network interface module (e.g., a
`“NIC), and then eventually transferred to computer system
`RAM and/or to less volatile computer storage media at a
`computer system. Thus, it should be understood that com
`
`55
`
`4
`puter storage media can be included in computer system
`components that also (or even primarily) utilize transmission
`media.
`Computer-executable instructions comprise, for example,
`instructions and data which, when executed at one or more
`processors, cause a general-purpose computer system, spe
`cial-purpose computer system, or special-purpose processing
`device to perform a certain function or group of functions.
`Computer-executable instructions may be, for example, bina
`ries, intermediate format instructions such as assembly lan
`guage, or even Source code.
`Those skilled in the art will appreciate that the invention
`may be practiced in network computing environments with
`many types of computer system configurations, including,
`personal computers, desktop computers, laptop computers,
`message processors, hand-held devices, multi-processor sys
`tems, microprocessor-based or programmable consumer
`electronics, network PCs, minicomputers, mainframe com
`puters, mobile telephones, PDAs, tablets, pagers, routers,
`Switches, and the like. The invention may also be practiced in
`distributed system environments where local and remote
`computer systems, which are linked (either by hardwired data
`links, wireless data links, or by a combination of hardwired
`and wireless data links) through a network, both perform
`tasks. As such, in a distributed system environment, a com
`puter system may include a plurality of constituent computer
`systems. In a distributed system environment, program mod
`ules may be located in both local and remote memory storage
`devices.
`In this description and the following claims, "cloud com
`puting is defined as a model for enabling on-demand net
`work access to a shared pool of configurable computing
`resources (e.g., networks, servers, storage, applications, and
`services). The definition of "cloud computing is not limited
`to any of the other numerous advantages that can be obtained
`from Such a model when properly deployed.
`For instance, cloud computing is currently employed in the
`marketplace so as to offer ubiquitous and convenient on
`demand access to the shared pool of configurable computing
`resources. Furthermore, the shared pool of configurable com
`puting resources can be rapidly provisioned via virtualization
`and released with low management effort or service provider
`interaction, and then scaled accordingly.
`A cloud computing model can be composed of various
`characteristics such as on-demand self-service, broad net
`work access, resource pooling, rapid elasticity, measured Ser
`vice, and so forth. A cloud computing model may also come
`in the form of various service models such as, for example,
`Software as a Service (“SaaS), Platform as a Service
`(“PaaS), and Infrastructure as a Service (IaaS). The cloud
`computing model may also be deployed using different
`deployment models such as private cloud, community cloud,
`public cloud, hybrid cloud, and so forth. In this description
`and in the claims, a "cloud computing environment is an
`environment in which cloud computing is employed.
`Additionally or alternatively, the functionally described
`herein can be performed, at least in part, by one or more
`hardware logic components. For example, and without limi
`tation, illustrative types of hardware logic components that
`can be used include Field-programmable Gate Arrays (FP
`GAs). Program-specific Integrated Circuits (ASICs), Pro
`gram-specific Standard Products (ASSPs), System-on-a-chip
`systems (SOCs), Complex Programmable Logic Devices
`(CPLDs), and other types of programmable hardware.
`Still further, system architectures described herein can
`include a plurality of independent components that each con
`tribute to the functionality of the system as a whole. This
`
`30
`
`35
`
`40
`
`50
`
`60
`
`65
`
`Ex.1001
`APPLE INC. / Page 9 of 14
`
`

`

`5
`modularity allows for increased flexibility when approaching
`issues of platform scalability and, to this end, provides a
`variety of advantages. System complexity and growth can be
`managed more easily through the use of Smaller-scale parts
`with limited functional scope. Platform fault tolerance is
`enhanced through the use of these loosely coupled modules.
`Individual components can be grown incrementally as busi
`ness needs dictate. Modular development also translates to
`decreased time to market for new functionality. New func
`tionality can be added or subtracted without impacting the
`core system.
`FIG. 1 illustrates an example system architecture for a
`mobile wallet platform. Integration tier 101 is configured to
`manage mobile wallet sessions and maintain integrity of
`financial transactions. Integration tier 101 can also include a
`15
`communication (e.g., Web services) API and/or other com
`munication mechanisms to accept messages from channels
`111. Other mechanisms include, but are not limited to: Inter
`national Standards Organization (“ISO) 8583 for Point of
`Sale (“POS) and Automated Teller Machines (ATM)
`devices and Advanced Message Queuing Protocol (AMOP)
`for queue based interfaces. Each of channels 111 can be
`integrated to one or more mechanisms for sending messages
`to integration tier 101. Notification services 102 is configured
`to send various notifications through different notification
`channels 112, such as, for example, Short Message Peer-to
`Peer (“SSMP) for Short Messaging Service (“SMS) and
`Simple Mail Transfer Protocol (“SMTP) for emails. Notifi
`cation services 102 can be configured through a web services
`API.
`Service connectors 103 are a set of connectors configure to
`connect to 3rd party systems 113. Each connector can be a
`separate module intended to integrate an external service to
`the system architecture. Business process services 104 are
`configured to implement business workflows, including
`executing financial transactions, auditing financial transac
`tions, invoking third-party services, handling errors, and log
`ging platform objects. Payment handler 105 is configured to
`wrap APIs of different payment processors, such as, for
`example, banking accounts, credit/debit cards or processor
`121. Payment handler 105 exposes a common API to facilitate
`interactions with many different kinds of payment proces
`SOS.
`Security services 106 are configured to perform subscriber
`authentication. Authorization services 107 are configured to
`perform client authorization, Such as, for example, using a
`database-based Access Control List (ACL) table.
`Database 108 is configured to manage customer accounts
`(e.g., storing customer accounts and properties), manage
`company accounts (e.g., storing company accounts and prop
`erties), manage transaction histories (e.g., storing financial
`transaction details), store customer profiles, storing dictionar
`ies used by the mobile wallet platform, such as, for example,
`countries, currencies, etc., and managing money containers.
`Rules engine 109 is configured to gather financial transaction
`statistics and uses the statistics to provide transaction prop
`erties, such as, for example, fees and bonuses. Rules engine
`109 is also configured to enforce business constraints, such
`as, for example, transactions and platform license constraints.
`Name matching engine 110 is configured to match differ
`ent objects according to specified configuration rules. Match
`ing engine 110 can be used to find similarities between
`names, addresses, etc. Transaction processor 121 is config
`ured to manage financial accounts and transactions. The
`transaction processor 121 can be used to hold, load, withdraw
`and deposit funds to mobile wallet accounts. Transaction
`processor 121 can also be used as a common interface to a
`
`65
`
`40
`
`45
`
`50
`
`55
`
`60
`
`US 9,189,785 B2
`
`10
`
`25
`
`30
`
`35
`
`6
`third party processor System. When used as a common inter
`face, financial operations may be delegated to the external
`processor. A Clearing House Subsystem of transaction pro
`cessor 121 can be used to exchange the financial information
`with a bank.
`Components of a mobile wallet platform can be connected
`to one another over (or be part of) a system bus and/or a
`network. Networks can include a Local Area Network
`(“LAN”), a Wide Area Network (“WAN”), and even the Inter
`net. Accordingly, components of the mobile wallet platform
`can be “in the cloud'. As such, mobile wallet platform com
`ponents as well as any other connected computer systems and
`their components, can create message related data and
`exchange message related data (e.g., Internet Protocol (“IP)
`datagrams and other higher layer protocols that utilize IP
`datagrams, such as, Transmission Control Protocol (“TCP),
`Hypertext Transfer Protocol (“HTTP), Simple Mail Transfer
`Protocol (“SMTP), etc.) over the system bus and/or network.
`The components depicted in FIG. 1 can interoperate to
`provide a number of financial and other services including but
`not limited to enrolling a customer for a mobile wallet, adding
`a stored value account (either hosted by a mobile wallet
`platform or a third party), adding a bank or credit union
`account to a mobile wallet, adding a debit or credit card
`account to a mobile wallet, depositing funds in a mobile
`wallet, withdrawing funds from a mobile wallet, paying bills
`from a mobile wallet, topping up a prepaid mobile account
`through a mobile wallet, transferring funds through a mobile
`wallet (nationally or internationally), making in-store pur
`chases using a mobile wallet, and various other tasks as
`described herein below.
`The telephone, smartphone, tablet or other computing sys
`tem that interacts with the mobile payment system typically
`includes a camera, image sensor, image scanner or other
`hardware that allows a user to scan or capture an image. For
`instance, as shown in environment 200 of FIG. 2, computer
`system 201 may include a camera 202. The computer system
`201 may include a telephone, smartphone, tablet or other type
`of mobile computing system. The user of the phone 201 (i.e.
`user/customer 205) may thus point the camera 202 or other
`hardware at an object Such as a can of Soup and either take a
`picture of the object, or allow software to scan the image
`using the camera. Software on the phone or tablet 201 then
`performs a local search or consults a database (e.g. over the
`internet) to retrieve information related to that item or product
`including coupons or price discounts.
`In addition to receiving product information and discounts,
`the user 205 may also use their phone 201 or other device to
`pay for the items they wish to buy. In one embodiment, a
`customer may be at a retail location 225 shopping for various
`items 228. Once the customer 205 has finished shopping, he
`or she proceeds to the checkout area. The checkout area
`includes a point of sale 226 with a checkout register 227 that
`typically accepts cash, debit or credit cards as payment. The
`checkout register 227 may also be configured to allow users to
`pay using a mobile wallet. Accordingly, the customer may use
`a mobile wallet application 210 on a smartphone (e.g. 201),
`tablet or other computer system to pay for the items.
`When paying for the items 228, the determining module
`215 of user's digital device 201 may determine that the user
`205 is attempting to use their mobile wallet application 210 to
`pay for the items. The mobile wallet application may use
`various types of information to determine which debit net
`work (e.g. 230A or 230B) is to be used to process the payment
`transaction. As will be understood by one skilled in the art,
`various different debit networks exist for processing debit
`transactions (e.g. Star or Nice). These debit networks conduct
`
`Ex.1001
`APPLE INC. / Page 10 of 14
`
`

`

`7
`the transactions between the retailer's bank and the custom
`er's bank that allow the user to pay for items using a debit card
`linked to their own checking (or other type of) account. These
`debit networks typically charge different fee amounts for
`each transaction, and typically receive at least a portion of that
`fee as income. Debit networks are thus incentivized to process
`an increased number of transactions and provide debit trans
`action services for a lower price than their competitors. Simi
`larly, retailers are incentivized to select debit networks that
`process debit transactions for a lower amount. Allowing the
`user and/or the retailer to specify a certain debit network for
`processing debit transactions may lead to an increased num
`ber of users for a given network, and may lead to reduced
`transaction fees for retailers.
`As will further be understood by one skilled in the art, debit
`transactions may be transactions that are processed by tradi
`tional Electronic Funds Transfer (EFT) debit networks (e.g.
`Star, NYCE, PULSE, etc.), but they may alternatively be
`transactions that are processed via direct automated clearing
`house (ACH) debits. In such cases, the debit transactions
`would be sent to an Originating Depository Financial Insti
`tution (ODFI). A user may need to provide additional infor
`mation about their bank (in addition to their debit account
`information) that would allow the ACH transaction to be
`routed through the ODFI, as opposed to using the traditional
`debit networks. As such, it will be understood that when
`describing debit transactions herein, the debit transactions
`may be processed by either a traditional debit network, or via
`an ACH debit that uses an ODFI to process the transaction.
`In some cases, the decision as to which debit network to use
`for a given transaction will be based on either the customer's
`demographic information, the customer's payment prefer
`ences or the customer's purchasing history. For example, the
`user 205 may provide demographic information 211 to the
`mobile wallet application 210 indicating their age or age
`range, income or income range, general housing location (e.g.
`area code) or other similar information. This information may
`be used, at least in Some cases, to provide targeted advertise
`ments, promotions or coupons to the user via the mobile
`wallet. The user's demographic information 211 may provide
`indications or other clues that the user may prefer one debit
`network over another (e.g. for cost reasons, convenience rea
`Sons, or because the user is receiving a discount or reward 231
`from a particular debit network). Accordingly, this informa
`tion may be used by determining module 215 when determin
`ing which debit network to use for a given transaction.
`Similarly, user payment preferences 212 and/or user pur
`chasing history 213 for user 205 may be used to determine
`which debit network to use for a debit transaction. For
`example, if the user has indicated in their payment prefer
`ences which debit network to use, that information may be
`provided to the determining module 215. Moreover, if the
`user's purchasing history indicates that a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket