×

Use limitations for secondary users of financial accounts

  • US 10,445,739 B1
  • Filed: 08/14/2014
  • Issued: 10/15/2019
  • Est. Priority Date: 08/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, by a processor of a financial institution device from a customer computing device associated with a primary account holder, a request to add a secondary user to an account of the primary account holder;

    receiving, by the processor and from the customer computing device, information relating to the secondary user;

    receiving, by the processor and from the customer computing device, rule and limitation information relating to at least one restriction on the secondary user'"'"'s ability to spend funds from the account, wherein the at least one restriction includes a group purchase rule that prevents the secondary user from spending funds from the account when the secondary user is within a threshold distance of an identified individual;

    updating, by the processor, at least one database based on the information relating to the secondary user and the rule and limitation information;

    receiving, by the processor from a merchant computing system, a purchase request provided by the secondary user;

    receiving, by the processor, location data for at least one of the secondary user or the identified individual from a mobile device associated with the secondary user, the location data gathered from an application on the mobile device interfacing with at least one of a Bluetooth device, a peer-to-peer chat application, a WiFi device, or a social media application on the mobile device;

    in response to receiving the purchase request, determining, by the processor, whether the secondary user is within the threshold distance of the identified individual using the location data;

    approving or denying, by the processor, the purchase request based at least in part on whether the secondary user is within the threshold distance of the identified individual; and

    based on the approval or denial, transmitting, by the processor, a notification to the mobile device associated with the secondary user, the notification configured to be displayed as an alert on the mobile device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×