Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia
First Claim
1. A method comprising:
- providing, by a processor configured to manage a plurality of data sets, information relating to a first data set and a second data set for selection, wherein the information includes the first data set and the second data set being associated with transaction categories;
determining, by the processor, a selection of at least one of the first data set and the second data set based in part on a preference of data set use and a transaction category of a transaction request; and
configuring, by the processor, a first method of authentication corresponding to the first data set and a second method of authentication corresponding to the second data set,wherein the first data set is owned by a first data set owner and the second data set is owned by a second data set owner, wherein the first data set owner is distinct from the second data set owner;
wherein the first method of authentication and the second method of authentication (1) are configured by the first data set owner and the second data set owner independently and (2) each include a distinct access authentication protocol defined by the first data set owner and the second data set owner, respectively;
providing, by the processor, the first data set owner access rights to the first data set, in response to authentication of the first data set owner using the respective distinct access authentication protocol defined by the first data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the first format;
providing, by the processor, the second data set owner access rights to the second data set, in response to authentication of the second data set owner using the respective distinct access authentication protocol defined by the second data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the second format;
receiving, from a user, a request to modify the first data set or the second data set;
receiving authorization of the user requested modification from the respective data set owner;
in response to the receiving authorization of the user requested modification from the respective data set owner, modifying, by the processor, the first data set or the second data set based on the user requested modification.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are configured to manage data sets associated with a transaction device. For example, a method is provided for facilitating the management of distinct data sets on a transaction device that are provided by distinct data set owners, wherein the distinct data sets may include differing formats. The method includes the steps of: adding, by a read/write, a first data set to the financial transaction device, wherein the first data set is owned by a first owner; adding, by the read/write device, a second data set to the financial transaction device, wherein the second data set is owned by a second owner; and storing the first data set and the second data set on the financial transaction device in accordance with an owner defined format. The first and second data sets are associated with first and second owners, respectively, and are configured to be stored independent of each other. The transaction device user may be permitted to select at least one of the multiple data sets for transaction completion using a secondary identifier indicia. Where the user selects multiple accounts for transaction completion, the user may be permitted to allocate portions of a transaction to the selected transaction accounts. The transaction request may be processed in accordance with the user'"'"'s allocations.
100 Citations
19 Claims
-
1. A method comprising:
-
providing, by a processor configured to manage a plurality of data sets, information relating to a first data set and a second data set for selection, wherein the information includes the first data set and the second data set being associated with transaction categories; determining, by the processor, a selection of at least one of the first data set and the second data set based in part on a preference of data set use and a transaction category of a transaction request; and configuring, by the processor, a first method of authentication corresponding to the first data set and a second method of authentication corresponding to the second data set, wherein the first data set is owned by a first data set owner and the second data set is owned by a second data set owner, wherein the first data set owner is distinct from the second data set owner; wherein the first method of authentication and the second method of authentication (1) are configured by the first data set owner and the second data set owner independently and (2) each include a distinct access authentication protocol defined by the first data set owner and the second data set owner, respectively; providing, by the processor, the first data set owner access rights to the first data set, in response to authentication of the first data set owner using the respective distinct access authentication protocol defined by the first data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the first format; providing, by the processor, the second data set owner access rights to the second data set, in response to authentication of the second data set owner using the respective distinct access authentication protocol defined by the second data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the second format; receiving, from a user, a request to modify the first data set or the second data set; receiving authorization of the user requested modification from the respective data set owner; in response to the receiving authorization of the user requested modification from the respective data set owner, modifying, by the processor, the first data set or the second data set based on the user requested modification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An article of manufacture including a non-transitory, tangible computer readable storage medium having instructions stored thereon that, in response to execution by a processor configured to manage a plurality of data sets, cause the processor to perform operations comprising:
-
providing, by the processor, information relating to a first data set and a second data set for selection, wherein the information includes the first data set and the second data set being associated with transaction categories; determining, by the processor, a selection of at least one of the first data set and the second data set based in part on a preference of data set use and a transaction category of a transaction request; and configuring, by the processor, a first method of authentication corresponding to the first data set and a second method of authentication corresponding to the second data set, wherein the first data set is owned by a first data set owner and the second data set is owned by a second data set owner, wherein the first data set owner is distinct from the second data set owner; wherein the first method of authentication and the second method of authentication (1) are configured by the first data set owner and the second data set owner independently and (2) each include a distinct access authentication protocol defined by the first data set owner and the second data set owner, respectively; providing, by the processor, the first data set owner access rights to the first data set, in response to authentication of the first data set owner using the respective distinct access authentication protocol defined by the first data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the first format; providing, by the processor, the second data set owner access rights to the second data set, in response to authentication of the second data set owner using the respective distinct access authentication protocol defined by the second data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the second format; receiving, from a user, a request to modify the first data set or the second data set; receiving authorization of the user requested modification from the respective data set owner; in response to the receiving authorization of the user requested modification from the respective data set owner, modifying, by the processor, the first data set or the second data set based on the user requested modification.
-
Specification