×

Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia

  • US 8,423,475 B2
  • Filed: 07/13/2011
  • Issued: 04/16/2013
  • Est. Priority Date: 07/10/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • providing, by a processor configured to manage a plurality of data sets, information relating to a first data set and a second data set for selection, wherein the information includes the first data set and the second data set being associated with transaction categories;

    determining, by the processor, a selection of at least one of the first data set and the second data set based in part on a preference of data set use and a transaction category of a transaction request; and

    configuring, by the processor, a first method of authentication corresponding to the first data set and a second method of authentication corresponding to the second data set,wherein the first data set is owned by a first data set owner and the second data set is owned by a second data set owner, wherein the first data set owner is distinct from the second data set owner;

    wherein the first method of authentication and the second method of authentication (1) are configured by the first data set owner and the second data set owner independently and (2) each include a distinct access authentication protocol defined by the first data set owner and the second data set owner, respectively;

    providing, by the processor, the first data set owner access rights to the first data set, in response to authentication of the first data set owner using the respective distinct access authentication protocol defined by the first data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the first format;

    providing, by the processor, the second data set owner access rights to the second data set, in response to authentication of the second data set owner using the respective distinct access authentication protocol defined by the second data set owner, wherein at least one access right includes authorization to at least one of add and remove a static field of the second format;

    receiving, from a user, a request to modify the first data set or the second data set;

    receiving authorization of the user requested modification from the respective data set owner;

    in response to the receiving authorization of the user requested modification from the respective data set owner, modifying, by the processor, the first data set or the second data set based on the user requested modification.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×