SYSTEM AND METHOD FOR PRESENTMENT OF NONCONFIDENTIAL TRANSACTION TOKEN IDENTIFIER
First Claim
1. A method for completing a purchase transaction via receipt of a non-confidential account number by a processor programmed to implement the method, comprising the steps of:
- associating at least one value account with a primary account number comprising a non-confidential number, wherein;
the value account is associated with a user;
the value account is also associated with a secondary account number that is unique to the value account; and
the non-confidential number is associated with a wireless telephone account of the user;
receiving the non-confidential number as part of a request to effect a purchase transaction;
debiting a value account associated with the non-confidential number, wherein the debit amount is associated with the purchase transaction; and
transmitting a request for authorization, wherein the request seeks authorization to debit the value account.
1 Assignment
0 Petitions
Accused Products
Abstract
In an exemplary embodiment, a method for leveraging a payment token comprising a non-confidential number (i.e., “cellcard number”), such as a phone number associated with a user'"'"'s portable computing device (“PCD”), to effect purchase transactions against one of possibly a plurality of value accounts associated with the non-confidential number comprises presenting a cellcard number for purchase of goods, requesting that a value account associated with the cellcard number be debited and, before debiting the value account and completing the purchase transaction, transmitting a request for authorization of the transaction to the user'"'"'s PCD.
248 Citations
40 Claims
-
1. A method for completing a purchase transaction via receipt of a non-confidential account number by a processor programmed to implement the method, comprising the steps of:
-
associating at least one value account with a primary account number comprising a non-confidential number, wherein; the value account is associated with a user; the value account is also associated with a secondary account number that is unique to the value account; and the non-confidential number is associated with a wireless telephone account of the user; receiving the non-confidential number as part of a request to effect a purchase transaction; debiting a value account associated with the non-confidential number, wherein the debit amount is associated with the purchase transaction; and transmitting a request for authorization, wherein the request seeks authorization to debit the value account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for completing a purchase transaction via presentment of a non-confidential account number, the system comprising:
a remote server operable to; associate at least one value account with a primary account number comprising a non-confidential number, wherein; the value account is associated with the user; the value account is also associated with a secondary account number that is unique to the value account; and the non-confidential number is associated with a wireless telephone account of the user; receive a request that a value account associated with the non-confidential number be debited, wherein the debit amount is associated with a purchase transaction; and transmit a request for authorization, wherein the request seeks authorization to debit the value account. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. A system for completing a purchase transaction via presentment of a non-confidential account number, the system comprising:
-
means for associating at least one value account with a primary account number comprising a non-confidential number, wherein; the value account is associated with a user; the value account is also associated with a secondary account number that is unique to the value account; and the non-confidential number is associated with a wireless telephone account of the user; means for receiving the non-confidential number as part of a request to effect a purchase transaction; means for debiting a value account associated with the non-confidential number, wherein the debit amount is associated with the purchase transaction; and means for transmitting a request for authorization, wherein the request seeks authorization to debit the value account. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer program product comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code executable to implement a method for completing a purchase transaction via presentment of a non-confidential account number, the method comprising:
-
associating at least one value account with a primary account number comprising a non-confidential number, wherein; the value account is associated with a user; the value account is also associated with a secondary account number that is unique to the value account; and the non-confidential number is associated with a wireless telephone account of the user; receiving the non-confidential number as part of a request to effect a purchase transaction; debiting a value account associated with the non-confidential number, wherein the debit amount is associated with the purchase transaction; and transmitting a request for authorization, wherein the request seeks authorization to debit the value account. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification