US20160042330A1 - Methods for discovering and paying debts owed by a group - Google Patents
Methods for discovering and paying debts owed by a group Download PDFInfo
- Publication number
- US20160042330A1 US20160042330A1 US14/822,725 US201514822725A US2016042330A1 US 20160042330 A1 US20160042330 A1 US 20160042330A1 US 201514822725 A US201514822725 A US 201514822725A US 2016042330 A1 US2016042330 A1 US 2016042330A1
- Authority
- US
- United States
- Prior art keywords
- payment
- payor
- computer
- request
- requests
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/384—Payment protocols; Details thereof using social networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/386—Payment protocols; Details thereof using messaging services or messaging apps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present disclosure relates generally to peer-to-peer transactions, and more particularly to using social networking content and location data of a user to rank payment requests.
- Users of this technology are desirous of a simpler and faster method of locating the details of a transaction request.
- An example of a circumstance in which users may conduct this type of peer-to-peer transaction is when multiple parties are paying a bill while dining at a restaurant. If one person pays the restaurant for the bill of a group of diners and the other members of the party would like to pay that person for each share of the bill, entering information for the transaction would be burdensome.
- the method comprises receiving, using one or more computer devices, a payment request from a requester computing device; associating an identifier to the request; receiving location data of the requester network device, the location data indicating a location of the requester computing device at a time of initiating the request; receiving a request for a ranking of payment requests for a potential payor from a payor computing device; searching social network information of the payor for occurrences of the requester of the payment request; receiving location data of the payor network device, the location data comprising a location of the payor computing device and a location history of the payor computing device; searching a transaction history of the payor for occurrences of the requester of the payment request; ranking the payment requests based at least in part on one or more of the location of the requester, a strength of social network connections to the payor for each of the payment requesters, and number of previous transactions between the payor and the requester; and providing the ranking
- the computer program product includes a non-transitory computer-readable storage device having computer-readable program instructions stored therein.
- the computer-readable program instructions include computer program instructions for receiving, using one or more computer devices, a payment request from a requester computing device; associating an identifier to the request; receiving location data of the requester network device, the location data indicating a location of the requester computing device at a time of initiating the request; receiving a request for a ranking of payment requests for a potential payor from a payor computing device; searching social network information of the payor for occurrences of the requester of the payment request; receiving location data of the payor network device, the location data comprising a location of the payor computing device and a location history of the payor computing device; searching a transaction history of the payor for occurrences of the requester of the payment request; ranking the payment requests based at least in part on one
- FIG. 1 is a block diagram depicting a system for providing payment requests to potential payors, in accordance with certain example embodiments.
- FIG. 2 is a block flow diagram depicting a method to provide payment requests to potential payors, in accordance with certain example embodiments.
- FIG. 3 is a block flow diagram depicting a method for identifying a potential payor, in accordance with certain example embodiments.
- FIG. 4 is a block flow diagram depicting a method for selecting a ranked payment request, in accordance with certain example embodiments.
- FIG. 5 is a block diagram depicting a computing machine and a module, in accordance with certain example embodiments.
- the example embodiments provide a Peer-to-Peer (“P2P”) payment system that can employ a user's social graph and location data for identifying likely potential payors for a group transaction or other debt.
- P2P Peer-to-Peer
- the user will have to install an application, use a particular service, or otherwise engage in the techniques herein.
- the potential payors can locate the payment request and satisfy the request.
- the social graph of a user refers to all of a user's contacts, friends, family, and other members of a user's online network.
- the social graph can be any combination of social networks of the user, contact databases of the user, lists of email correspondents of the user, lists of frequent transaction counter-parties of the user, and any other suitable social graph data.
- the social graph not only determines the members of a user's network, but also determines how the members are related and how closely the members are related.
- the payment requester can pay a bill at a merchant for a group of users.
- the requester and the group can dine at a restaurant and receive a bill for payment. Instead of splitting the bill into numerous smaller bills, one person can pay for the group.
- a group of users desire to pay for a birthday gift. Instead of collecting money or trying to gather everyone together to make the purchase, one user can buy the gift for the group. Any other suitable group debt can be incurred and require repayment of the debt to a group member who pays the debt.
- the group member who pays the debt can submit a request for repayment on the P2P payment application operating on the user device of the requester.
- the P2P payment application can transmit the request to the P2P payment system.
- the request can be transmitted via any available technology such as an Internet connection over the network, email, text, or any other suitable communication technology.
- the requester can make the request on a website of the P2P payment system or via any other suitable method.
- the request can be managed by another party other than the P2P payment system.
- Any server system can be employed to host the request and monitor the repayment of the debts.
- a social network system can manage the request.
- a bank, credit card issuer, or other suitable financial institution can manage the request.
- a dedicated group payment server system can manage the request.
- the request can be a summary of the debt owed to the requester or any other suitable format to identify the debt.
- the requester can attach a copy or other representation of the bill or receipt.
- the requester can manually enter the request details.
- the P2P payment application can attach the bill payment transaction details from a P2P transaction or other transaction.
- the requester can assign specific amounts for each payor to submit, such as by assigning receipt line items to individual payors.
- the requester can manually input a different amount for each individual payor. Any other suitable format for the request can be submitted by the requester.
- the requester, the P2P payment application, the P2P payment system, or other suitable party assigns an identifier to the request.
- the identifier may be any code, text, picture, or other suitable identifier that will allow a payor to identify and select the correct request for payment.
- the request can be a descriptive identifier input by the requester, such as the date and location of the incurred debt. For example, the identifier could be “Outback Friday at Lunch” or “10 PM at Target.”
- the identifier could be the name or a nickname of the requester, a name of the group, a name of the company the payors have in common, or other name identifier. For example, the identifier could be “Grandma Smith gift” or “Jones Company outing.”
- the identifier can be a randomly generated code.
- the code can be generated by the P2P payment application, the P2P payment system, or other suitable party.
- a random code can allow the request to be anonymous and help protect the identity of the transaction, the requester, and the payors.
- the random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed.
- the requester can inform the payors of the random code verbally, via email, via text, or via any other suitable manner.
- the request can be a visual representation.
- a picture of the event For example, an avatar of the requester, a random picture or drawing, or any other visual identifier can be used.
- the P2P payment system can identify potential payors for the request.
- the P2P payment system can identify the potential payors from the location of the requester and the location of the potential payors, from the social graph of the recipient and the potential payors, by manual input of the recipient, from any other suitable methods or combination of methods.
- the P2P payment application can employ the Global Positioning System (“GPS”) location technology or other location identifying technology of the user device of the requester to transmit the location of the device, and thus the location of the requester.
- the location can be transmitted to a server located in a P2P payment system.
- the P2P payment application can gather the location data directly from the user device or the P2P payment application can request the location from another location-based application operating on the user device.
- the P2P payment application can determine the location of the user device from a device supplying a Wi-Fi connection.
- the recipient can employ a social network application or other suitable application to manually enter the location of the requester or “check in.” Any other suitable location determination hardware or software can be employed.
- the P2P payment system searches for other mobile devices operating in a predetermined proximity of the requester.
- the P2P payment system can use the same location technologies to locate the potential payor devices that the P2P payment system used to locate the recipient or any other location technology.
- the proximity threshold can be configured by the requester or the P2P payment system.
- the proximity threshold can further be variable based upon factors predetermined by the requester or the P2P payment system.
- the P2P payment system may vary the proximity based on the density of the potential payors identified or the quantity of social network data available from the requester's accounts.
- the P2P payment system can first gather the location data and identity of other users that have accounts on the P2P payment system. Additionally or alternatively, the P2P payment system can be configured to communicate with other location-based programs or applications that can supply location data and user identity to the P2P payment system server.
- the location recorded by a potential payor at the time of the request can be determined at a later time. For example, if the recipient entered the request at a time after leaving the location of the transaction, the P2P payment system can determine the transaction time and location and look for potential payors that were at the location at the time of the transaction.
- the potential payors may have an application that has logged the locations of the payor and the P2P payment system can extract the location at the time of the transaction. Additionally or alternatively, the potential payor may have “checked in” to the location and thus the P2P payment system can extract the location form the “check in” application. Any other suitable location determining method may be utilized to determine which potential payors may have been at the transaction location.
- the P2P payment system can identify potential payors in the social graph of the recipient. From the social graph data, the P2P payment system searches the identities of the requester's contacts, friends, business associates, family members or any other identities that can be extracted.
- the P2P payment system can gather the identities from any social network data available from the recipient's online activities. Examples of locations available from which the P2P payment system may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running on recipient user devices.
- the P2P payment system can rank the identities based on a set of criteria configured to determine the most likely potential payors to the user's transaction.
- One of the criteria used by the P2P payment system to rank the results can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend. If a friend is on the ranking list, then the friends of that friend may be included on the list and given a certain priority.
- Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of the P2P payment system application on the device.
- the P2P payment system compares the list of proximate user identities with a compilation of social network data from the user. Any combination of the location data, social graph data, or other identification or ranking criteria can be employed to identify potential payors.
- the P2P payment system, the recipient, or another suitable party can establish a threshold for an identified contact to be put on the potential payor list.
- the threshold may be based on the closeness of the social graph relationship, the proximity of the user device of the contact, the number of applications on the social graph in which the contact appears, or any suitable factor or combination of factors.
- the P2P payment system can compare the list of identified contacts to the threshold and determine which contacts to include on the potential payors list.
- the recipient can manually input the potential payors to be included in the list.
- the recipient can input the name or other identify of every potential payor.
- the recipient can request that every social network contact is identified as a potential payor.
- the recipient can request that every contact associated with the employer of the recipient is identified as a potential payor.
- the recipient can request that only contacts with which the recipient has had a previous P2P transaction are identified as potential payors. Any other suitable input from the recipient can assist in determining the potential payors.
- the P2P payment system can transmit the list to the P2P payment application on the user device of the recipient.
- the recipient can edit the names and accounts on the list of potential payors on a user interface.
- the P2P payment system can issue the payment request to the potential payors.
- the identification of the request can be listed on the account of the potential payor.
- the request can be emailed to the potential payor, texted to the potential payor, transmitted to a P2P payment application operating on the user device of the potential payor via an Internet connection, or in any suitable manner transmitted to the potential payor.
- a list of requests can be displayed on a website of the P2P payment system.
- the P2P payment system can provide the list of payment requests to all payors who access the P2P payment system. That is, the identifiers are available to every payor for selection. The payor can search the list of all payment requests and select the appropriate request.
- the payor can open the P2P payment application to view the requests for payment. Additionally or alternatively, the payor can access the account of the payor on the website of the P2P payment system or via any other suitable application or website. The payor can access a page or option that displays a ranked list of payment requests associated with the payor. For example, the payor can actuate a real or virtual button, open a link to a website, speak a voice command or in any suitable manner request the list of requests. The payor can view the list of requests in any format available to the user interface being utilized.
- the P2P payment system identifies payment requests that are previously associated with the payor. For example, the P2P payment system can identify payment requests that identified the name of the payor or the account of the payor. In another example, the P2P payment system can identify payment requests that were associated with the payor account at the time of the request. The payor may have been associated with a payment request in any other suitable manner.
- the P2P payment system accesses the location of the payor device at the time that the payor accesses the payment application or views a list of requests.
- the P2P payment system additionally or alternatively, accesses the location history of the payor.
- the location can be obtained from any hardware, software, or combination of hardware and software that can provide a location of the device.
- the global positioning system technology of the device can be used.
- the location can be determined from one or more Wi-Fi systems that communicate with the payor device.
- the location can be determined from a check in on a social network system or other location logging application or website. Any suitable location identifying technology can be employed.
- the P2P payment system accesses and searches the social graph of the payor.
- the social graph of a user refers to all of a user's contacts, friends, family, and other members of a user's online network.
- the social graph can be any combination of social networks of the payor, contact databases of the payor, lists of email correspondents of the payor, lists of frequent transaction counter-parties of the payor, and any other suitable social graph data.
- the search of the social graph not only determines the members of a network of the payor, but also determines how the members are related and how closely the members are related.
- the P2P payment system accesses and searches the transaction history of the payor.
- the transaction history can include some or all of the P2P transactions of the payor or any other suitable transactions accessible by the P2P payment system.
- the history may include the identities or accounts of transaction counter-parties or any suitable identifying characteristic.
- the P2P payment system displays a ranked list of payment requests for the payor.
- the P2P payment system can use the location history of the payor, the social graph information of the payor, and the transaction history of the payor to rank the payment requests.
- the payor can indicate a desire to have the P2P payment system use the data for the purposes of ranking the payment requests. The user can indicate this desire by installing the P2P payment application, providing authorization for the ranking, or otherwise engaging in the techniques herein.[ 1 ]
- the P2P payment system can rank the requests by determining the relatedness of the generator of the requester to the payor, the transaction history of the requester and the payor, the relatedness of the location history of the payor and the location at which the payment request was generated, or any other suitable ranking criteria.
- the P2P payment system can compare the location history of the payor to the location of the payment request. For example, the P2P payment system can identify the location of the requester device at the time of the request and determine if the payor was near the identified location at or near the time the request was entered. Based on a determination that the payor was near the identified location at or near the time the request was entered, the P2P payment system can promote the request on the list of payment requests to be presented to the payor.
- the P2P payment system can identify a merchant associated with a receipt included with the payment request.
- the P2P payment system can determine if the payor device was at the merchant at the time of the request or at any other time. Based on a determination that the payor was near the identified location, the P2P payment system can promote the request on the list of payment requests to be presented to the payor.
- the P2P payment system can determine if the requester associated with a request is related to the payor on the social graph of the payor. From the social graph data, the P2P payment system searches the identities of associates of the requester such as contacts, friends, business associates, family members or any other identities that can be extracted.
- the P2P payment system may gather the account identities from any social network data available from the recipient's online activities. Examples of locations available from which the P2P payment system may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running on recipient user devices.
- the P2P payment system can use the relatedness of the requestors to the payor to rank the requests.
- One of the criteria used by the P2P payment system to determine the relatedness can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend.
- Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of the P2P payment system application on the device.
- a request may be promoted or demoted on the ranking of requests.
- the number of previous transactions between a payor and a requester of a payment request can be used to rank the request. For example, if a payor and a requester have many previous P2P transactions, then a request generated by the requester may be promoted on the ranking of requests.
- the payor can search for a request with a specific identifier.
- the identifier may be any code, text, picture, or other suitable identifier that will allow the payor to identify and select the correct request for payment.
- the request can be a descriptive identifier input by the requester, such as the date and location of the incurred debt.
- the identifier could be “Outback Friday at Lunch” or “10 PM at Target.”
- the identifier could be the name or a nickname of the requester, a name of the group, a name of the company the payors have in common, or other name identifier.
- the identifier could be “Grandma Smith gift” or “Jones Company outing.”
- the identifier can be a randomly generated code.
- the code can be generated by the P2P payment application, the P2P payment system, or other suitable party.
- a random code can allow the request to be anonymous and help protect the identity of the transaction, the requester, and the payors.
- the random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed.
- the requester can inform the payors of the random code (or any other identifier) verbally, via email, via text, or via any other suitable manner.
- the payor searches for a payment request, and the request identifier matches the search keywords, then the payment request can be promoted on the request ranking list.
- the identifier can be a visual representation.
- a picture of the event an avatar of the requester, a randomly generated picture or drawing, or any other visual identifier can be used.
- the display can be presented to the payor on the P2P payment application, on the website of the P2P payment system, or on any other suitable user interface.
- the display can present the top ranked requests, such as the top 5 or top 10 ranked requests.
- the display can present all of the requests that are associated with the payor.
- the display can present a ranked list of all requests in the system. Any other suitable display of the ranked list of requests can be employed and presented to the user.
- the payor can select the request that the payor would like to pay. With the user interface on a P2P payment application, the payor can pay the amount that is requested or the payor can enter an alternate amount to pay. If the request is on the P2P payment system then the P2P payment system can fill in the data to conduct the transaction with the information of the recipient, the payor, and the transaction details. Alternatively, the payor can manually enter the information or select information from a list on the user interface.
- the payor can alternatively pay the recipient in another manner, such as cash or a check, and update the request on the P2P payment system. That is, the payor can utilize the user interface on the P2P payment application or a website of the P2P payment system and manually enter an amount paid to the recipient.
- the P2P payment system can update the request with the entered information. Alternatively, the P2P payment system may require a confirmation of the payment from the recipient before the request is updated.
- FIG. 1 is a block diagram depicting a system for using social network content and location data to identify likely counter-parties for a peer-to-peer transaction with a mobile device, in accordance with certain exemplary embodiments.
- the system 100 includes network devices 110 , 120 , 150 , and 160 that are configured to communicate with one another via one or more networks 105 .
- Each network 105 includes a wired or wireless telecommunication means by which network devices (including devices 110 , 120 , 150 , 160 ) can exchange data.
- each network 105 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, a mobile telephone network, or any combination thereof.
- LAN local area network
- WAN wide area network
- intranet an Internet
- Internet a mobile telephone network
- Each network device 110 , 120 , 150 , 160 includes a device having a communication module capable of transmitting and receiving data over the network 105 .
- each network device 110 , 120 , 150 , 160 can include a server, desktop computer, laptop computer, tablet computer, a television with one or more processors embedded therein and/or coupled thereto smart phone, handheld computer, personal digital assistant (“PDA”), or any other wired or wireless, processor-driven device.
- PDA personal digital assistant
- the network devices 110 , 120 , 150 , 160 are operated by end-users or consumers, likely transaction counter-party users, publishers of social network system, and a peer-to-peer payment system operator, respectively.
- the user 101 can use a communication application 112 , such as a web browser application or a stand-alone application, to view, download, upload, or otherwise access documents or web pages via a distributed network 105 .
- the network 105 includes a wired or wireless telecommunication system or device by which network devices (including devices 110 , 120 , 150 , 160 ) can exchange data.
- the network 105 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, storage area network (SAN), personal area network (PAN), a metropolitan area network (MAN), a wireless local area network (WLAN), a virtual private network (VPN), a cellular or other mobile communication network, Bluetooth, NFC, or any combination thereof or any other appropriate architecture or system that facilitates the communication of signals, data, and/or messages.
- LAN local area network
- WAN wide area network
- intranet an Internet
- SAN storage area network
- PAN personal area network
- MAN metropolitan area network
- WLAN wireless local area network
- VPN virtual private network
- Bluetooth any combination thereof or any other appropriate architecture or system that facilitates the communication of signals, data, and/or messages.
- the communication application 112 can interact with web servers (or other computing devices) connected to the network 105 , payor device 120 , web server 151 of the social network system 150 , and the web server 161 of the P2P payment system 160 .
- the user network device 110 may include a digital wallet application module 111 .
- the digital wallet application module 111 may encompass any application, hardware, software, or process the user device 110 may employ to assist the user 101 in completing a purchase.
- the digital wallet application module 111 can interact with the communication application 112 or can be embodied as a companion application of the communication application 112 .
- the digital wallet application module 111 executes within the communication application 112 . That is, the digital wallet application module 111 may be an application program embedded in the communication application 112 .
- the payor device 120 operated by the payor 102 can use a communication application 122 similar to the communication application 112 .
- the user device 110 can include a P2P payment application 115 .
- the P2P payment application 115 can interact with the communication application 112 or be embodied as a companion application of the communication application 112 and execute within the communication application 112 .
- the P2P payment application 115 may additionally or alternatively be embodied as a companion application of the digital wallet application module 111 and execute within the digital wallet application module 111 .
- the P2P payment application 115 may employ a software interface for configuration that may open in the digital wallet application module 111 or may open in the communication application 112 .
- the P2P payment application 115 may execute on the user device 110 independent of the digital wallet application module 111 and the communication application 112 .
- the P2P payment application 115 is operable to allow a user 101 to configure payment accounts on the user device 110 and the P2P payment system 160 .
- the P2P payment application 115 can be used to send device location data to the P2P payment system 160 and receive a likely transaction list from the P2P payment system 160 .
- the P2P payment system 160 that develops the list and prosecutes the transaction can include a set of computer-readable program instructions, for example, using JavaScript, that enable the P2P payment system 160 to interact with the P2P payment application 115 .
- the payor device 120 operated by a payor 102 can use a P2P payment application 125 similar to the P2P payment application 115 or a compatible transaction application that will allow transactions with the user device 110 .
- the user device 110 also includes a data storage unit 113 accessible by the digital wallet application module 111 , the P2P payment application 115 , and the communication application 112 .
- the example data storage unit 113 can include one or more tangible computer-readable storage devices.
- the data storage unit 113 can be stored on the user device 110 or can be logically coupled to the user device 110 .
- the data storage unit 113 can include on-board flash memory and/or one or more removable memory cards or removable flash memory.
- the user device 110 may include a location based application 114 that the P2P payment application 115 or the P2P payment system 160 may utilize to access location data for the user device 110 .
- Examples of applications that may utilize the location data, and thus may make it available to the P2P payment system 160 may include, but would not be limited to, business finder applications, location based social networks, location based gaming, or friend locater applications.
- the payor device 120 can utilize a location application 124 that is similar to the location based application 114 .
- the user device 110 may include one or more contact applications 116 .
- a contact application 116 may be any program or application on the user device 110 that maintains a list of contacts of the user that the P2P payment system 160 may access. Examples of contact applications 116 might include, but not be limited to, email applications, text applications, instant messaging, calendar invite lists, or contact databases.
- the contacts from a contact application 116 may be prioritized by factors such as frequency of communication with user 101 , the number of contact applications on which a particular contact appears, or any other prioritizing factors which may be extracted from the applications.
- the payor device 120 may represent the devices with which the user 101 may conduct a peer-to-peer transaction or other transaction.
- the payor device 120 may be a mobile device, (for example, notebook computer, tablet computer, netbook computer, personal digital assistant (PDA), video game device, GPS locator device, cellular telephone, a television with one or more processors embedded therein and/or coupled thereto smart phone, smartphone, or other mobile device), or other appropriate technology that includes or is coupled to a communication application 112 .
- a mobile device for example, notebook computer, tablet computer, netbook computer, personal digital assistant (PDA), video game device, GPS locator device, cellular telephone, a television with one or more processors embedded therein and/or coupled thereto smart phone, smartphone, or other mobile device
- PDA personal digital assistant
- the P2P payment system 160 utilizes a P2P payment system server 161 .
- the P2P payment system server 161 may represent the computer implemented system that the P2P payment system 160 employs to configure user accounts, create and maintain user profiles, collect the location data, communicate with the social network system 150 , develop likely transaction lists, submit the list to the user 101 or the payor 101 , and conduct the transaction.
- the P2P payment system website 163 may represent any web-based interface that allows users to interact with the P2P payment system 160 to configure the user accounts and change account settings.
- the P2P payment system server 161 can communicate with one or more social network systems 150 , one or more payor devices 120 , and a user device 110 via any available technologies.
- the P2P payment system 160 may include a data storage unit 162 accessible by the server 161 of the PPS 160 .
- the data storage unit 162 can include one or more tangible computer-readable storage devices.
- the social network system 150 utilizes a social network system server 151 .
- the social network server 151 may represent the computer-implemented system that the social network system 150 employs to host the social network website 153 and all of the profiles and communities that use the social network website 153 .
- the social network website 153 may represent any web-based community that allows users to interact over the Internet with others who typically share a common interest.
- the social network system 150 may provide the P2P payment system 160 with a list of members of the user's online community.
- the social network system 150 may prioritize the relationship of each member of the community with the user 101 . This may be determined by factors that may apply to the structure of each particular social network system 150 . For example, a social network system may categorize members of the community as “friends” or “friends of friends.” Another social network system may categorize members as first, second, or third degree contacts.
- the social network system server 151 can communicate with a P2P payment system 160 and user devices 110 and payor devices 120 via any available technologies. These technologies may include, but would not be limited to, an Internet connection via the network 105 , email, text, instant messaging, or other suitable communication technologies.
- the social network system 150 may include a data storage unit 152 accessible by the server 151 of the social network system 150 .
- the data storage unit 152 can include one or more tangible computer-readable storage devices.
- FIG. 2 is a block flow diagram depicting a method 200 to provide payment requests to potential payors, in accordance with certain example embodiments.
- a user 101 initiates a request for payment.
- the user (or “requester”) 101 can pay a bill at a merchant for a group of users.
- the requester 101 and the group can dine at a restaurant and receive a bill for payment. Instead of splitting the bill into numerous smaller bills, one person can pay for the group.
- a group of users desire to pay for a birthday gift. Instead of collecting money or trying to gather everyone together to make the purchase, one user can buy the gift for the group. Any other suitable group debt can be incurred and require repayment of the debt to a group member who pays the debt.
- the group member who pays the debt, the requester 101 can submit a request for repayment on the P2P payment application 115 operating on the user device 110 of the requester.
- the P2P payment application 115 can transmit the request to the P2P payment system 160 .
- the request can be transmitted via any available technology such as an Internet connection over the network, email, text, or any other suitable communication technology.
- the requester 101 can make the request on a website 161 of the P2P payment system 160 or via any other suitable method.
- the request can be managed by another party other than the P2P payment system 160 .
- Any server system can be employed to host the request and monitor the repayment of the debts.
- a social network system 150 can manage the request.
- a bank, credit card issuer, or other suitable financial institution can manage the request.
- a dedicated group payment server system can manage the request.
- the request can be a summary of the debt owed to the requester 101 or any other suitable format to identify the debt.
- the requester 101 can attach a copy or other representation of the bill or receipt.
- the requester 101 can manually enter the request details.
- the P2P payment application 115 can attach the bill payment transaction details from a P2P transaction or other transaction.
- the requester 101 can assign specific amounts for each payor 102 to submit, such as by assigning receipt line items to individual payors 102 .
- the requester 101 can manually input a different amount for each individual payor 102 . Any other suitable format for the request can be submitted by the requester 101 .
- the requester 101 may collect funds from multiple people prior to actually paying a bill or otherwise paying the funds to another party.
- the requester 101 may collect funds from multiple people for a charity and donate all collected funds to the charity, or may collect funds from multiple people prior to purchasing a gift from the group of people.
- the request initiated by the requester 101 may be a general request for the multiple people to contribute.
- the payment application 115 is configured to receive the requester's 101 input of the payment information and any other suitable details.
- the payment application 115 can present a user interface on the requester device 110 with fields for the requester 101 to input the information.
- the payment application 115 can access payment information from a transaction completed with the requester device 110 , such as via the digital wallet application module 111 , and can insert the accessed payment information into the corresponding fields of the user interface.
- the requester 101 , the P2P payment application 115 , the P2P payment system 160 , or other suitable party assigns an identifier to the request.
- the identifier may be any code, text, picture, or other suitable identifier that will allow a payor 102 to identify and select the correct request for payment.
- the request can be a descriptive identifier input by the requester 101 , such as the date and location of the incurred debt. For example, the identifier could be “Steakhouse Friday at Lunch” or “10 PM at department store.”
- the identifier could be the name or a nickname of the requester 101 , a name of the group, a name of the company the payors 102 have in common, or other name identifier.
- the identifier could be “Grandma Smith gift” or “Jones Company outing.”
- the identifier can be a randomly generated code.
- the code can be generated by the P2P payment application 115 , the P2P payment system 160 , or other suitable party.
- a random code can allow the request to be anonymous and help protect the identity of the transaction, the requester 101 , and the payors 102 .
- the random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed.
- the requester 101 can inform the payors 102 of the random code (or any other identifier) verbally, via email, via text, or via any other suitable manner.
- the identifier can be a visual representation.
- a picture of the event an avatar of the requester 101 , a randomly generated picture or drawing, or any other visual identifier can be used.
- the P2P payment system 160 can identify potential payors 102 for the request.
- the P2P payment system 160 can identify the potential payors 102 from the location of the requester 101 and the location of the potential payors 102 , from the social graph of the recipient and the potential payors 102 , by manual input of the recipient, from any other suitable methods or combination of methods. The details of a method to identify potential payors 102 for the request are discussed in greater detail in the method 215 in FIG. 3 .
- FIG. 3 is a block flow diagram depicting a method 215 for identifying a potential payor 102 , in accordance with certain example embodiments.
- the P2P payment application 115 can employ the Global Positioning System (“GPS”) location technology or other location identifying technology of the user device 110 of the requester 101 to transmit the location of the device 110 , and thus the location of the requester 101 .
- the location can be transmitted to a server 161 located in a P2P payment system 160 .
- the P2P payment application 115 can gather the location data directly from the user device 110 or the P2P payment application 115 can request the location from another location-based application operating on the user device 110 .
- the P2P payment application 115 can determine the location of the user device 110 from a device supplying a Wi-Fi connection.
- the recipient 101 can employ an application from a social network system 150 or other suitable application to manually enter a location or “check in.” Any other suitable location determination hardware or software can be employed.
- the P2P payment system 160 searches for other mobile devices operating in a predetermined proximity of the requester 101 , such as the payor device 120 .
- the P2P payment system 160 can use the same location technologies to locate the potential payor devices 120 that the P2P payment system 160 used to locate the recipient or any other location technology.
- the proximity threshold can be configured by the requester 101 or the P2P payment system.
- the proximity threshold can further be variable based upon factors predetermined by the requester 101 or the P2P payment system 160 .
- the P2P payment system 160 can vary the proximity based on the density of the potential payors 102 identified or the quantity of social network data available from the requester 101 accounts.
- the P2P payment system 160 can first gather the location data and identity of other users that have accounts on the P2P payment system. Additionally or alternatively, the P2P payment system 160 can be configured to communicate with other location-based programs or applications that can supply location data and user identity to the P2P payment system server 161 .
- the location recorded by a potential payor 102 at the time of the request can be determined at a later time. For example, if the recipient 101 entered the request at a time after leaving the location of the transaction, the P2P payment system 160 can determine the transaction time and location and look for potential payors 102 that were at the location at the time of the transaction.
- the potential payors 102 can have an application that has logged the locations of the payor 102 and the P2P payment system 160 can extract the location at the time of the transaction. Additionally or alternatively, the potential payor 102 may have “checked in” to the location and thus the P2P payment system 160 can extract the location form the “check in” application. Any other suitable location determining method can be utilized to determine which potential payors 102 may have been at the transaction location.
- the P2P payment system 160 can identify potential payors 102 in the social graph of the recipient 101 . From the social graph data, the P2P payment system 160 searches the identities of associates of the requester 101 such as contacts, friends, business associates, family members or any other identities that can be extracted.
- the P2P payment system 160 may gather the identities from any social network data available from the recipient's online activities. Examples of locations available from which the P2P payment system 160 may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running on recipient user devices 110 .
- the P2P payment system 160 ranks the identities based on a set of criteria configured to determine the most likely potential payors 102 to the user's transaction.
- One of the criteria used by the P2P payment system 160 to rank the results can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend. If a friend is on the ranking list, then the friends of that friend may be included on the list and given a certain priority.
- Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of the P2P payment system 160 application on the device.
- the P2P payment system 160 compares the list of proximate user identities with a compilation of social network data from the user. Any combination of the location data, social graph data, or other identification or ranking criteria can be employed to identify potential payors 102 .
- the P2P payment system 160 can establish a threshold for an identified contact to be put on the list of potential payors 102 .
- the threshold may be based on the closeness of the social graph relationship, the proximity of the user device of the contact, the number of applications on the social graph in which the contact appears, or any suitable factor or combination of factors.
- the P2P payment system 160 can compare the list of identified contacts to the threshold and determine which contacts to include on the list of potential payors 102 .
- the recipient 101 can manually input the potential payors 102 to be included in the list.
- the recipient 101 can input the name or other identify of every potential payor 102 .
- the recipient 101 can request that every social network contact is identified as a potential payor 102 .
- the recipient 101 can request that every contact associated with the employer of the recipient 101 is identified as a potential payor 102 .
- the recipient 101 can request that only contacts with which the recipient 101 has had a previous P2P transaction are identified as potential payors 102 .
- the recipient 101 can input instructions to exclude any potential payors 102 .
- the recipient 101 can input the name or other identity of one or more potential payors 102 that the recipient 101 does not want included on any list of potential payors 102 . Any other suitable input from the recipient 101 can assist in determining the potential payors 102 .
- the P2P payment system 160 can transmit the list to the P2P payment application 115 on the user device 110 of the recipient 101 .
- the recipient 101 can further edit the names and accounts on the list of potential payors 102 on a user interface.
- the method 215 returns to block 220 in FIG. 2 .
- the P2P payment system 160 issues the payment request to the potential payors 102 .
- the identification of the request can be listed on the account of the potential payor 102 .
- the request can be emailed to the potential payor 102 , texted to the potential payor 102 , transmitted to a P2P payment application 115 operating on the user device 120 of the potential payor 102 via an Internet connection, or in any suitable manner transmitted to the potential payor 102 .
- a list of requests can be displayed on a website of the P2P payment system 160 .
- the P2P payment system 160 can provide the list of payment request to all payors 102 who access the P2P payment system 160 . That is, the identifiers are available to every payor 102 for selection. The payor 102 can search the list of all payment requests and select the appropriate request.
- block 225 the payor can review a ranked list of payment requests and select a request for payment. The details of block 225 are discussed in greater detail in method 225 in FIG. 4 .
- the P2P payment system 160 maintains a database of payment requests.
- the database can have all payment requests that are in the system in on database. Additionally or alternatively, the database can have requests that are associated with a requester 101 in a database or in a particular category in the database. Additionally or alternatively, the database can have the requests associated with a payor 102 in a database or in a particular category in the database.
- the database can be categorized in any suitable manner.
- the database can be stored on the web server 161 of the P2P payment system 160 , on a remote server, or on any other suitable web server or storage location.
- the payor 102 can open the P2P payment application 115 to view the requests for payment. Additionally or alternatively, the payor 102 can access the account of the payor 102 on the website 163 of the P2P payment system 160 , or via any other suitable application or website. The payor 102 can access a page or option that displays a ranked list of payment requests associated with the payor 102 . For example, the payor 102 can actuate a real or virtual button, open a link to a website, speak a voice command or in any suitable manner request the list of requests. The payor 102 can view the list of requests in any format available to the user interface being utilized.
- the P2P payment system 160 identifies payment requests that are previously associated with the payor 102 .
- the P2P payment system 160 can identify payment requests that identified the name of the payor 102 or the account of the payor 102 .
- the P2P payment system 160 can identify payment requests that were associated with the payor account at the time of the request, such as described in FIG. 3 .
- the payor 102 may have been associated with a payment request in any other suitable manner.
- the P2P payment system 160 accesses the location of the payor device 120 at the time that the payor accesses the P2P payment application 115 or views a list of requests.
- the P2P payment system 160 additionally or alternatively, accesses the location history of the payor 102 .
- the location can be obtained from any hardware, software, or combination of hardware and software that can provide a location of the device 120 .
- the global positioning system technology of the device 120 can be used.
- the location can be determined from one or more Wi-Fi systems that communicate with the payor device 120 .
- the location can be determined from a check in on a social network system 150 or other location logging application or website. Any suitable location identifying technology can be employed.
- the P2P payment system 160 accesses and searches the social graph of the payor 102 .
- the social graph of a user refers to all of a user's contacts, friends, family, and other members of a user's online network.
- the social graph can be any combination of social networks of the payor 102 , contact databases of the payor 102 , lists of email correspondents of the payor 102 , lists of frequent transaction counter-parties of the payor 102 , and any other suitable social graph data.
- the search of the social graph not only determines the members of a network of the payor 102 , but also determines how the members are related and how closely the members are related.
- the P2P payment system 160 accesses and searches the transaction history of the payor 102 .
- the transaction history can include some or all of the P2P transactions of the payor 102 or any other suitable transactions accessible by the P2P payment system 160 .
- the history may include the identities or accounts of transaction counter-parties or any suitable identifying characteristic.
- the P2P payment system 160 displays a ranked list of payment requests for the payor 102 .
- the P2P payment system 160 can use the location history of the payor 102 , the social graph information of the payor 102 , and the transaction history of the payor 102 to rank the payment requests.
- the P2P payment system 160 can rank the requests by determining the relatedness of the generator of the requester 101 to the payor 102 , the transaction history of the requester 101 and the payor 102 , the relatedness of the location history of the payor 102 and the location at which the payment request was generated, or any other suitable ranking criteria.
- the P2P payment system 160 can compare the location history of the payor 102 to the location of the payment request. For example, the P2P payment system 160 can identify the location of the requester device 110 at the time of the request and determine if the payor 102 was near the identified location at or near the time the request was entered. Based on a determination that the payor 102 was near the identified location at or near the time the request was entered, the P2P payment system 160 can promote the request on the list of payment requests to be presented to the payor 102 .
- the P2P payment system 160 can identify a merchant associated with a receipt included with the payment request. The P2P payment system 160 can determine if the payor device 120 was at the merchant at the time of the request or at any other time. Based on a determination that the payor 102 was near the identified location, the P2P payment system 160 can promote the request on the list of payment requests to be presented to the payor 102 .
- the P2P payment system 160 can determine if the requester 101 associated with a request is related to the payor 102 on the social graph of the payor 102 . From the social graph data, the P2P payment system 160 searches the identities of associates of the requester 101 such as contacts, friends, business associates, family members or any other identities that can be extracted.
- the P2P payment system 160 may gather the account identities from any social network data available from the recipient's online activities. Examples of locations available from which the P2P payment system 160 may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running on recipient user devices 110 .
- the P2P payment system 160 can use the relatedness of the requestors 101 to the payor 102 to rank the requests.
- One of the criteria used by the P2P payment system 160 to determine the relatedness can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend. Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of the P2P payment system 160 application on the device. Based on the relatedness of a requestor 102 , a request may be promoted or demoted on the ranking of requests.
- the number of previous transactions between a payor 102 and a requester 101 of a payment request can be used to rank the request. For example, if a payor 102 and a requester 101 have many previous P2P transactions, then a request generated by the requester 101 may be promoted on the ranking of requests.
- the payor 102 can search for a request with a specific identifier.
- the identifier may be any code, text, picture, or other suitable identifier that will allow the payor 102 to identify and select the correct request for payment.
- the request can be a descriptive identifier input by the requester 101 , such as the date and location of the incurred debt.
- the identifier could be “Outback Friday at Lunch” or “10 PM at Target.”
- the identifier could be the name or a nickname of the requester 101 , a name of the group, a name of the company the payors 102 have in common, or other name identifier.
- the identifier could be “Grandma Smith gift” or “Jones Company outing.”
- the identifier can be a randomly generated code.
- the code can be generated by the P2P payment application 115 , the P2P payment system 160 , or other suitable party.
- a random code can allow the request to be anonymous and help protect the identity of the transaction, the requester 101 , and the payors 102 .
- the random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed.
- the requester 101 can inform the payors 102 of the random code (or any other identifier) verbally, via email, via text, or via any other suitable manner.
- the payor 102 searches for a payment request, and the request identifier matches the search keywords, then the payment request can be promoted on the request ranking list.
- the identifier can be a visual representation.
- a picture of the event an avatar of the requester 101 , a randomly generated picture or drawing, or any other visual identifier can be used.
- the display can be presented to the payor 102 on the P2P payment application 115 , on the website 161 of the P2P payment system 160 , or on any other suitable user interface.
- the display can present the top ranked requests, such as the top 5 or top 10 ranked requests.
- the display can present all of the requests that are associated with the payor 102 .
- the display can present a ranked list of all requests in the system. Any other suitable display of the ranked list of requests can be employed and presented to the user.
- the payor 102 can select the request that the payor 102 would like to pay.
- the payor 102 can select the request to pay by indicating the selection on the user interface.
- the P2P payment application 115 or the P2P payment system 160 can direct the payor 102 to a payment page on the user interface with the transaction data populated.
- the payor 102 can modify any entries in the payment page, such as by lowering the payment amount, changing the recipient, adding a note or message, or any other suitable modification.
- the payor 102 can pay the amount that is requested or the payor 102 can enter an alternate amount to pay. If the request is on the P2P payment system 160 then the P2P payment system 160 can fill in the data to conduct the transaction with the information of the recipient 101 , the payor 102 , and the transaction details. Alternatively, the payor 102 can manually enter the information or select information from a list on the user interface.
- the payor 102 can alternatively pay the recipient 101 in another manner, such as cash or a check, and update the request on the P2P payment system 160 . That is, the payor 102 can utilize the user interface on the P2P payment application 115 or a website 163 of the P2P payment system 160 and manually enter an amount paid to the recipient 101 .
- the P2P payment system 160 can update the request with the entered information. Alternatively, the P2P payment system 160 may require a confirmation of the payment from the recipient 101 before the request is updated.
- FIG. 5 depicts a computing machine 2000 and a module 2050 in accordance with certain example embodiments.
- the computing machine 2000 may correspond to any of the various computers, servers, mobile devices, embedded systems, or computing systems presented herein.
- the module 2050 may comprise one or more hardware or software elements configured to facilitate the computing machine 2000 in performing the various methods and processing functions presented herein.
- the computing machine 2000 may include various internal or attached components such as a processor 2010 , system bus 2020 , system memory 2030 , storage media 2040 , input/output interface 2060 , and a network interface 2070 for communicating with a network 2080 .
- the computing machine 2000 may be implemented as a conventional computer system, an embedded controller, a laptop, a server, a mobile device, a smartphone, a set-top box, a kiosk, a vehicular information system, one more processors associated with a television, a customized machine, any other hardware platform, or any combination or multiplicity thereof.
- the computing machine 2000 may be a distributed system configured to function using multiple computing machines interconnected via a data network or bus system.
- the processor 2010 may be configured to execute code or instructions to perform the operations and functionality described herein, manage request flow and address mappings, and to perform calculations and generate commands.
- the processor 2010 may be configured to monitor and control the operation of the components in the computing machine 2000 .
- the processor 2010 may be a general purpose processor, a processor core, a multiprocessor, a reconfigurable processor, a microcontroller, a digital signal processor (“DSP”), an application specific integrated circuit (“ASIC”), a graphics processing unit (“GPU”), a field programmable gate array (“FPGA”), a programmable logic device (“PLD”), a controller, a state machine, gated logic, discrete hardware components, any other processing unit, or any combination or multiplicity thereof.
- DSP digital signal processor
- ASIC application specific integrated circuit
- GPU graphics processing unit
- FPGA field programmable gate array
- PLD programmable logic device
- the processor 2010 may be a single processing unit, multiple processing units, a single processing core, multiple processing cores, special purpose processing cores, co-processors, or any combination thereof. According to certain embodiments, the processor 2010 along with other components of the computing machine 2000 may be a virtualized computing machine executing within one or more other computing machines.
- the system memory 2030 may include non-volatile memories such as read-only memory (“ROM”), programmable read-only memory (“PROM”), erasable programmable read-only memory (“EPROM”), flash memory, or any other device capable of storing program instructions or data with or without applied power.
- the system memory 2030 may also include volatile memories such as random access memory (“RAM”), static random access memory (“SRAM”), dynamic random access memory (“DRAM”), synchronous dynamic random access memory (“SDRAM”). Other types of RAM also may be used to implement the system memory 2030 .
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- SDRAM synchronous dynamic random access memory
- Other types of RAM also may be used to implement the system memory 2030 .
- the system memory 2030 may be implemented using a single memory module or multiple memory modules.
- system memory 2030 is depicted as being part of the computing machine 2000 , one skilled in the art will recognize that the system memory 2030 may be separate from the computing machine 2000 without departing from the scope of the subject technology. It should also be appreciated that the system memory 2030 may include, or operate in conjunction with, a non-volatile storage device such as the storage media 2040 .
- the storage media 2040 may include a hard disk, a floppy disk, a compact disc read only memory (“CD-ROM”), a digital versatile disc (“DVD”), a Blu-ray disc, a magnetic tape, a flash memory, other non-volatile memory device, a solid state drive (“SSD”), any magnetic storage device, any optical storage device, any electrical storage device, any semiconductor storage device, any physical-based storage device, any other data storage device, or any combination or multiplicity thereof.
- the storage media 2040 may store one or more operating systems, application programs and program modules such as module 2050 , data, or any other information.
- the storage media 2040 may be part of, or connected to, the computing machine 2000 .
- the storage media 2040 may also be part of one or more other computing machines that are in communication with the computing machine 2000 such as servers, database servers, cloud storage, network attached storage, and so forth.
- the module 2050 may comprise one or more hardware or software elements configured to facilitate the computing machine 2000 with performing the various methods and processing functions presented herein.
- the module 2050 may include one or more sequences of instructions stored as software or firmware in association with the system memory 2030 , the storage media 2040 , or both.
- the storage media 2040 may therefore represent examples of machine or computer readable media on which instructions or code may be stored for execution by the processor 2010 .
- Machine or computer readable media may generally refer to any medium or media used to provide instructions to the processor 2010 .
- Such machine or computer readable media associated with the module 2050 may comprise a computer software product.
- a computer software product comprising the module 2050 may also be associated with one or more processes or methods for delivering the module 2050 to the computing machine 2000 via the network 2080 , any signal-bearing medium, or any other communication or delivery technology.
- the module 2050 may also comprise hardware circuits or information for configuring hardware circuits such as microcode or configuration information for an FPGA or other PLD.
- the input/output (“I/O”) interface 2060 may be configured to couple to one or more external devices, to receive data from the one or more external devices, and to send data to the one or more external devices. Such external devices along with the various internal devices may also be known as peripheral devices.
- the I/O interface 2060 may include both electrical and physical connections for operably coupling the various peripheral devices to the computing machine 2000 or the processor 2010 .
- the I/O interface 2060 may be configured to communicate data, addresses, and control signals between the peripheral devices, the computing machine 2000 , or the processor 2010 .
- the I/O interface 2060 may be configured to implement any standard interface, such as small computer system interface (“SCSI”), serial-attached SCSI (“SAS”), fiber channel, peripheral component interconnect (“PCI”), PCI express (PCIe), serial bus, parallel bus, advanced technology attached (“ATA”), serial ATA (“SATA”), universal serial bus (“USB”), Thunderbolt, FireWire, various video buses, and the like.
- SCSI small computer system interface
- SAS serial-attached SCSI
- PCIe peripheral component interconnect
- PCIe PCI express
- serial bus parallel bus
- ATA advanced technology attached
- SATA serial ATA
- USB universal serial bus
- Thunderbolt FireWire
- the I/O interface 2060 may be configured to implement only one interface or bus technology.
- the I/O interface 2060 may be configured to implement multiple interfaces or bus technologies.
- the I/O interface 2060 may be configured as part of, all of, or to operate in conjunction with, the system bus 2020 .
- the I/O interface 2060 may couple the computing machine 2000 to various input devices including mice, touch-screens, scanners, biometric readers, electronic digitizers, sensors, receivers, touchpads, trackballs, cameras, microphones, keyboards, any other pointing devices, or any combinations thereof.
- the I/O interface 2060 may couple the computing machine 2000 to various output devices including video displays, speakers, printers, projectors, tactile feedback devices, automation control, robotic components, actuators, motors, fans, solenoids, valves, pumps, transmitters, signal emitters, lights, and so forth.
- the computing machine 2000 may operate in a networked environment using logical connections through the network interface 2070 to one or more other systems or computing machines across the network 2080 .
- the network 2080 may include wide area networks (WAN), local area networks (LAN), intranets, the Internet, wireless access networks, wired networks, mobile networks, telephone networks, optical networks, or combinations thereof.
- the network 2080 may be packet switched, circuit switched, of any topology, and may use any communication protocol. Communication links within the network 2080 may involve various digital or an analog communication media such as fiber optic cables, free-space optics, waveguides, electrical conductors, wireless links, antennas, radio-frequency communications, and so forth.
- the processor 2010 may be connected to the other elements of the computing machine 2000 or the various peripherals discussed herein through the system bus 2020 . It should be appreciated that the system bus 2020 may be within the processor 2010 , outside the processor 2010 , or both. According to some embodiments, any of the processor 2010 , the other elements of the computing machine 2000 , or the various peripherals discussed herein may be integrated into a single device such as a system on chip (“SOC”), system on package (“SOP”), or ASIC device.
- SOC system on chip
- SOP system on package
- ASIC application specific integrated circuit
- the users may be provided with an opportunity to control whether programs or features collect user information (e.g., information about a user's social network, social actions or activities, profession, a user's preferences, or a user's current location), or to control whether and/or how to receive content from the content server that may be more relevant to the user.
- user information e.g., information about a user's social network, social actions or activities, profession, a user's preferences, or a user's current location
- certain data may be treated in one or more ways before it is stored or used, so that personally identifiable information is removed.
- a user's identity may be treated so that no personally identifiable information can be determined for the user, or a user's geographic location may be generalized where location information is obtained (such as to a city, ZIP code, or state level), so that a particular location of a user cannot be determined.
- location information such as to a city, ZIP code, or state level
- the user may have control over how information is collected about the user and used by a content server.
- Embodiments may comprise a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions.
- the embodiments should not be construed as limited to any one set of computer program instructions.
- a skilled programmer would be able to write such a computer program to implement an embodiment of the disclosed embodiments based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use embodiments.
- the example embodiments described herein can be used with computer hardware and software that perform the methods and processing functions described previously.
- the systems, methods, and procedures described herein can be embodied in a programmable computer, computer-executable software, or digital circuitry.
- the software can be stored on computer-readable media.
- computer-readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc.
- Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (FPGA), etc.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Tourism & Hospitality (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 14/148,704 filed Jan. 6, 2014 and entitled “Methods for Discovering and Paying Debts Owed by a Group,” which is a continuation of U.S. Pat. No. 8,700,526 filed Dec. 5, 2012 and entitled “Methods for Discovering and Paying Debts Owed by a Group.” The entire contents of the above-identified priority applications are hereby fully incorporated herein by reference.
- The present disclosure relates generally to peer-to-peer transactions, and more particularly to using social networking content and location data of a user to rank payment requests.
- Users of smartphones and other similar devices are conducting an increasing number of electronic transactions with the devices. While financial transactions with merchants have become more user-friendly and commonplace, users are additionally employing their devices to conduct transactions with other mobile device users. These types of conventional peer-to-peer transactions often require an overwhelming amount of data input to identify the other party in the transaction and to conduct the transaction.
- Users of this technology are desirous of a simpler and faster method of locating the details of a transaction request. An example of a circumstance in which users may conduct this type of peer-to-peer transaction is when multiple parties are paying a bill while dining at a restaurant. If one person pays the restaurant for the bill of a group of diners and the other members of the party would like to pay that person for each share of the bill, entering information for the transaction would be burdensome.
- Conventional systems do not present a list of likely transactions that are recommended for a payor. Additionally, such systems do not present a rank or order of the most likely transactions.
- Techniques herein provide a computer-implemented method to provide payment requests to potential payors. The method comprises receiving, using one or more computer devices, a payment request from a requester computing device; associating an identifier to the request; receiving location data of the requester network device, the location data indicating a location of the requester computing device at a time of initiating the request; receiving a request for a ranking of payment requests for a potential payor from a payor computing device; searching social network information of the payor for occurrences of the requester of the payment request; receiving location data of the payor network device, the location data comprising a location of the payor computing device and a location history of the payor computing device; searching a transaction history of the payor for occurrences of the requester of the payment request; ranking the payment requests based at least in part on one or more of the location of the requester, a strength of social network connections to the payor for each of the payment requesters, and number of previous transactions between the payor and the requester; and providing the ranking of the payment requests to the payor for display on the payor computing device.
- Another aspect of the present invention provides a computer program product that is installed on a server located in a payment system to provide payment requests to potential payors. The computer program product includes a non-transitory computer-readable storage device having computer-readable program instructions stored therein. The computer-readable program instructions include computer program instructions for receiving, using one or more computer devices, a payment request from a requester computing device; associating an identifier to the request; receiving location data of the requester network device, the location data indicating a location of the requester computing device at a time of initiating the request; receiving a request for a ranking of payment requests for a potential payor from a payor computing device; searching social network information of the payor for occurrences of the requester of the payment request; receiving location data of the payor network device, the location data comprising a location of the payor computing device and a location history of the payor computing device; searching a transaction history of the payor for occurrences of the requester of the payment request; ranking the payment requests based at least in part on one or more of the location of the requester, a strength of social network connections to the payor for each of the payment requesters, and number of previous transactions between the payor and the requester; and providing the ranking of the payment requests to the payor for display on the payor computing device.
- These and other aspects, objects, features and advantages of the example embodiments will become apparent to those having ordinary skill in the art upon consideration of the following detailed description of illustrated example embodiments, which include the best mode of carrying out the invention as presently presented.
-
FIG. 1 is a block diagram depicting a system for providing payment requests to potential payors, in accordance with certain example embodiments. -
FIG. 2 is a block flow diagram depicting a method to provide payment requests to potential payors, in accordance with certain example embodiments. -
FIG. 3 is a block flow diagram depicting a method for identifying a potential payor, in accordance with certain example embodiments. -
FIG. 4 is a block flow diagram depicting a method for selecting a ranked payment request, in accordance with certain example embodiments. -
FIG. 5 is a block diagram depicting a computing machine and a module, in accordance with certain example embodiments. - The example embodiments provide a Peer-to-Peer (“P2P”) payment system that can employ a user's social graph and location data for identifying likely potential payors for a group transaction or other debt. In order to receive the benefits of the techniques described herein, in certain embodiments, the user will have to install an application, use a particular service, or otherwise engage in the techniques herein. The potential payors can locate the payment request and satisfy the request. The social graph of a user refers to all of a user's contacts, friends, family, and other members of a user's online network. The social graph can be any combination of social networks of the user, contact databases of the user, lists of email correspondents of the user, lists of frequent transaction counter-parties of the user, and any other suitable social graph data.
- The social graph not only determines the members of a user's network, but also determines how the members are related and how closely the members are related.
- In an example embodiment, the payment requester can pay a bill at a merchant for a group of users. For example, the requester and the group can dine at a restaurant and receive a bill for payment. Instead of splitting the bill into numerous smaller bills, one person can pay for the group. In another example, a group of users desire to pay for a birthday gift. Instead of collecting money or trying to gather everyone together to make the purchase, one user can buy the gift for the group. Any other suitable group debt can be incurred and require repayment of the debt to a group member who pays the debt.
- The group member who pays the debt can submit a request for repayment on the P2P payment application operating on the user device of the requester. The P2P payment application can transmit the request to the P2P payment system. The request can be transmitted via any available technology such as an Internet connection over the network, email, text, or any other suitable communication technology. Alternatively, the requester can make the request on a website of the P2P payment system or via any other suitable method.
- In an alternate example embodiment, the request can be managed by another party other than the P2P payment system. Any server system can be employed to host the request and monitor the repayment of the debts. For example, a social network system can manage the request. In another example, a bank, credit card issuer, or other suitable financial institution can manage the request. In another example, a dedicated group payment server system can manage the request.
- The request can be a summary of the debt owed to the requester or any other suitable format to identify the debt. For example, the requester can attach a copy or other representation of the bill or receipt. In another example, the requester can manually enter the request details. In another example, the P2P payment application can attach the bill payment transaction details from a P2P transaction or other transaction. In another example, the requester can assign specific amounts for each payor to submit, such as by assigning receipt line items to individual payors. In another example, the requester can manually input a different amount for each individual payor. Any other suitable format for the request can be submitted by the requester.
- The requester, the P2P payment application, the P2P payment system, or other suitable party assigns an identifier to the request. The identifier may be any code, text, picture, or other suitable identifier that will allow a payor to identify and select the correct request for payment. The request can be a descriptive identifier input by the requester, such as the date and location of the incurred debt. For example, the identifier could be “Outback Friday at Lunch” or “10 PM at Target.” The identifier could be the name or a nickname of the requester, a name of the group, a name of the company the payors have in common, or other name identifier. For example, the identifier could be “Grandma Smith gift” or “Jones Company outing.”
- The identifier can be a randomly generated code. The code can be generated by the P2P payment application, the P2P payment system, or other suitable party. A random code can allow the request to be anonymous and help protect the identity of the transaction, the requester, and the payors. The random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed. The requester can inform the payors of the random code verbally, via email, via text, or via any other suitable manner.
- The request can be a visual representation. For example, a picture of the event, an avatar of the requester, a random picture or drawing, or any other visual identifier can be used.
- The P2P payment system can identify potential payors for the request. The P2P payment system can identify the potential payors from the location of the requester and the location of the potential payors, from the social graph of the recipient and the potential payors, by manual input of the recipient, from any other suitable methods or combination of methods.
- The P2P payment application can employ the Global Positioning System (“GPS”) location technology or other location identifying technology of the user device of the requester to transmit the location of the device, and thus the location of the requester. The location can be transmitted to a server located in a P2P payment system. The P2P payment application can gather the location data directly from the user device or the P2P payment application can request the location from another location-based application operating on the user device. In another example, the P2P payment application can determine the location of the user device from a device supplying a Wi-Fi connection. In another example, the recipient can employ a social network application or other suitable application to manually enter the location of the requester or “check in.” Any other suitable location determination hardware or software can be employed.
- The P2P payment system searches for other mobile devices operating in a predetermined proximity of the requester. The P2P payment system can use the same location technologies to locate the potential payor devices that the P2P payment system used to locate the recipient or any other location technology.
- The proximity threshold can be configured by the requester or the P2P payment system. The proximity threshold can further be variable based upon factors predetermined by the requester or the P2P payment system. For example, the P2P payment system may vary the proximity based on the density of the potential payors identified or the quantity of social network data available from the requester's accounts. The P2P payment system can first gather the location data and identity of other users that have accounts on the P2P payment system. Additionally or alternatively, the P2P payment system can be configured to communicate with other location-based programs or applications that can supply location data and user identity to the P2P payment system server.
- Additionally or alternatively, the location recorded by a potential payor at the time of the request can be determined at a later time. For example, if the recipient entered the request at a time after leaving the location of the transaction, the P2P payment system can determine the transaction time and location and look for potential payors that were at the location at the time of the transaction. The potential payors may have an application that has logged the locations of the payor and the P2P payment system can extract the location at the time of the transaction. Additionally or alternatively, the potential payor may have “checked in” to the location and thus the P2P payment system can extract the location form the “check in” application. Any other suitable location determining method may be utilized to determine which potential payors may have been at the transaction location.
- The P2P payment system can identify potential payors in the social graph of the recipient. From the social graph data, the P2P payment system searches the identities of the requester's contacts, friends, business associates, family members or any other identities that can be extracted.
- The P2P payment system can gather the identities from any social network data available from the recipient's online activities. Examples of locations available from which the P2P payment system may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running on recipient user devices.
- The P2P payment system can rank the identities based on a set of criteria configured to determine the most likely potential payors to the user's transaction. One of the criteria used by the P2P payment system to rank the results can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend. If a friend is on the ranking list, then the friends of that friend may be included on the list and given a certain priority. Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of the P2P payment system application on the device.
- Additionally or alternatively, the P2P payment system compares the list of proximate user identities with a compilation of social network data from the user. Any combination of the location data, social graph data, or other identification or ranking criteria can be employed to identify potential payors.
- The P2P payment system, the recipient, or another suitable party can establish a threshold for an identified contact to be put on the potential payor list. The threshold may be based on the closeness of the social graph relationship, the proximity of the user device of the contact, the number of applications on the social graph in which the contact appears, or any suitable factor or combination of factors. The P2P payment system can compare the list of identified contacts to the threshold and determine which contacts to include on the potential payors list.
- Additionally or alternatively, the recipient can manually input the potential payors to be included in the list. For example, the recipient can input the name or other identify of every potential payor. In another example, the recipient can request that every social network contact is identified as a potential payor. In another example, the recipient can request that every contact associated with the employer of the recipient is identified as a potential payor. In another example, the recipient can request that only contacts with which the recipient has had a previous P2P transaction are identified as potential payors. Any other suitable input from the recipient can assist in determining the potential payors.
- In an alternate example embodiment, after generating a ranked list of potential payors, the P2P payment system can transmit the list to the P2P payment application on the user device of the recipient. The recipient can edit the names and accounts on the list of potential payors on a user interface.
- The P2P payment system can issue the payment request to the potential payors. For example, the identification of the request can be listed on the account of the potential payor. In another example, the request can be emailed to the potential payor, texted to the potential payor, transmitted to a P2P payment application operating on the user device of the potential payor via an Internet connection, or in any suitable manner transmitted to the potential payor. In another example, a list of requests can be displayed on a website of the P2P payment system.
- In an alternate example embodiment, the P2P payment system can provide the list of payment requests to all payors who access the P2P payment system. That is, the identifiers are available to every payor for selection. The payor can search the list of all payment requests and select the appropriate request.
- The payor can open the P2P payment application to view the requests for payment. Additionally or alternatively, the payor can access the account of the payor on the website of the P2P payment system or via any other suitable application or website. The payor can access a page or option that displays a ranked list of payment requests associated with the payor. For example, the payor can actuate a real or virtual button, open a link to a website, speak a voice command or in any suitable manner request the list of requests. The payor can view the list of requests in any format available to the user interface being utilized.
- The P2P payment system identifies payment requests that are previously associated with the payor. For example, the P2P payment system can identify payment requests that identified the name of the payor or the account of the payor. In another example, the P2P payment system can identify payment requests that were associated with the payor account at the time of the request. The payor may have been associated with a payment request in any other suitable manner.
- The P2P payment system accesses the location of the payor device at the time that the payor accesses the payment application or views a list of requests. The P2P payment system additionally or alternatively, accesses the location history of the payor. The location can be obtained from any hardware, software, or combination of hardware and software that can provide a location of the device. For example, the global positioning system technology of the device can be used. In another example, the location can be determined from one or more Wi-Fi systems that communicate with the payor device. In another example, the location can be determined from a check in on a social network system or other location logging application or website. Any suitable location identifying technology can be employed.
- The P2P payment system accesses and searches the social graph of the payor. The social graph of a user refers to all of a user's contacts, friends, family, and other members of a user's online network. The social graph can be any combination of social networks of the payor, contact databases of the payor, lists of email correspondents of the payor, lists of frequent transaction counter-parties of the payor, and any other suitable social graph data. The search of the social graph not only determines the members of a network of the payor, but also determines how the members are related and how closely the members are related.
- The P2P payment system accesses and searches the transaction history of the payor. The transaction history can include some or all of the P2P transactions of the payor or any other suitable transactions accessible by the P2P payment system. The history may include the identities or accounts of transaction counter-parties or any suitable identifying characteristic.
- The P2P payment system displays a ranked list of payment requests for the payor. The P2P payment system can use the location history of the payor, the social graph information of the payor, and the transaction history of the payor to rank the payment requests. The payor can indicate a desire to have the P2P payment system use the data for the purposes of ranking the payment requests. The user can indicate this desire by installing the P2P payment application, providing authorization for the ranking, or otherwise engaging in the techniques herein.[1]
- The P2P payment system can rank the requests by determining the relatedness of the generator of the requester to the payor, the transaction history of the requester and the payor, the relatedness of the location history of the payor and the location at which the payment request was generated, or any other suitable ranking criteria.
- In an example embodiment, the P2P payment system can compare the location history of the payor to the location of the payment request. For example, the P2P payment system can identify the location of the requester device at the time of the request and determine if the payor was near the identified location at or near the time the request was entered. Based on a determination that the payor was near the identified location at or near the time the request was entered, the P2P payment system can promote the request on the list of payment requests to be presented to the payor.
- In another example, the P2P payment system can identify a merchant associated with a receipt included with the payment request. The P2P payment system can determine if the payor device was at the merchant at the time of the request or at any other time. Based on a determination that the payor was near the identified location, the P2P payment system can promote the request on the list of payment requests to be presented to the payor.
- In another example, the P2P payment system can determine if the requester associated with a request is related to the payor on the social graph of the payor. From the social graph data, the P2P payment system searches the identities of associates of the requester such as contacts, friends, business associates, family members or any other identities that can be extracted.
- The P2P payment system may gather the account identities from any social network data available from the recipient's online activities. Examples of locations available from which the P2P payment system may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running on recipient user devices.
- The P2P payment system can use the relatedness of the requestors to the payor to rank the requests. One of the criteria used by the P2P payment system to determine the relatedness can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend. Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of the P2P payment system application on the device. Based on the relatedness of a requestor, a request may be promoted or demoted on the ranking of requests.
- In another example embodiment, the number of previous transactions between a payor and a requester of a payment request can be used to rank the request. For example, if a payor and a requester have many previous P2P transactions, then a request generated by the requester may be promoted on the ranking of requests.
- In another example embodiment, the payor can search for a request with a specific identifier. For example, the identifier may be any code, text, picture, or other suitable identifier that will allow the payor to identify and select the correct request for payment. The request can be a descriptive identifier input by the requester, such as the date and location of the incurred debt. For example, the identifier could be “Outback Friday at Lunch” or “10 PM at Target.” The identifier could be the name or a nickname of the requester, a name of the group, a name of the company the payors have in common, or other name identifier. For example, the identifier could be “Grandma Smith gift” or “Jones Company outing.”
- In an alternative exemplary embodiment, the identifier can be a randomly generated code. The code can be generated by the P2P payment application, the P2P payment system, or other suitable party. A random code can allow the request to be anonymous and help protect the identity of the transaction, the requester, and the payors. The random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed. The requester can inform the payors of the random code (or any other identifier) verbally, via email, via text, or via any other suitable manner.
- If the payor searches for a payment request, and the request identifier matches the search keywords, then the payment request can be promoted on the request ranking list.
- In another alternative exemplary embodiment, the identifier can be a visual representation. For example, a picture of the event, an avatar of the requester, a randomly generated picture or drawing, or any other visual identifier can be used.
- The display can be presented to the payor on the P2P payment application, on the website of the P2P payment system, or on any other suitable user interface. The display can present the top ranked requests, such as the top 5 or top 10 ranked requests. The display can present all of the requests that are associated with the payor. The display can present a ranked list of all requests in the system. Any other suitable display of the ranked list of requests can be employed and presented to the user.
- The payor can select the request that the payor would like to pay. With the user interface on a P2P payment application, the payor can pay the amount that is requested or the payor can enter an alternate amount to pay. If the request is on the P2P payment system then the P2P payment system can fill in the data to conduct the transaction with the information of the recipient, the payor, and the transaction details. Alternatively, the payor can manually enter the information or select information from a list on the user interface.
- The payor can alternatively pay the recipient in another manner, such as cash or a check, and update the request on the P2P payment system. That is, the payor can utilize the user interface on the P2P payment application or a website of the P2P payment system and manually enter an amount paid to the recipient. The P2P payment system can update the request with the entered information. Alternatively, the P2P payment system may require a confirmation of the payment from the recipient before the request is updated.
- Turning now to the drawings, in which like numerals represent like (but not necessarily identical) elements throughout the figures, example embodiments of the present invention are described in detail.
-
FIG. 1 is a block diagram depicting a system for using social network content and location data to identify likely counter-parties for a peer-to-peer transaction with a mobile device, in accordance with certain exemplary embodiments. As depicted inFIG. 1 , thesystem 100 includesnetwork devices more networks 105. - Each
network 105 includes a wired or wireless telecommunication means by which network devices (includingdevices network 105 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, a mobile telephone network, or any combination thereof. Throughout the discussion of example embodiments, it should be understood that the terms “data” and “information” are used interchangeably herein to refer to text, images, audio, video, or any other form of information that can exist in a computer-based environment. - Each
network device network 105. For example, eachnetwork device FIG. 1 , thenetwork devices - The
user 101 can use acommunication application 112, such as a web browser application or a stand-alone application, to view, download, upload, or otherwise access documents or web pages via a distributednetwork 105. Thenetwork 105 includes a wired or wireless telecommunication system or device by which network devices (includingdevices network 105 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, storage area network (SAN), personal area network (PAN), a metropolitan area network (MAN), a wireless local area network (WLAN), a virtual private network (VPN), a cellular or other mobile communication network, Bluetooth, NFC, or any combination thereof or any other appropriate architecture or system that facilitates the communication of signals, data, and/or messages. Throughout the discussion of exemplary embodiments, it should be understood that the terms “data” and “information” are used interchangeably herein to refer to text, images, audio, video, or any other form of information that can exist in a computer based environment. - The
communication application 112 can interact with web servers (or other computing devices) connected to thenetwork 105,payor device 120,web server 151 of thesocial network system 150, and theweb server 161 of theP2P payment system 160. - The
user network device 110 may include a digitalwallet application module 111. The digitalwallet application module 111 may encompass any application, hardware, software, or process theuser device 110 may employ to assist theuser 101 in completing a purchase. The digitalwallet application module 111 can interact with thecommunication application 112 or can be embodied as a companion application of thecommunication application 112. As a companion application, the digitalwallet application module 111 executes within thecommunication application 112. That is, the digitalwallet application module 111 may be an application program embedded in thecommunication application 112. Thepayor device 120 operated by thepayor 102 can use acommunication application 122 similar to thecommunication application 112. - The
user device 110 can include aP2P payment application 115. TheP2P payment application 115 can interact with thecommunication application 112 or be embodied as a companion application of thecommunication application 112 and execute within thecommunication application 112. TheP2P payment application 115 may additionally or alternatively be embodied as a companion application of the digitalwallet application module 111 and execute within the digitalwallet application module 111. TheP2P payment application 115 may employ a software interface for configuration that may open in the digitalwallet application module 111 or may open in thecommunication application 112. Alternatively, theP2P payment application 115 may execute on theuser device 110 independent of the digitalwallet application module 111 and thecommunication application 112. - The
P2P payment application 115 is operable to allow auser 101 to configure payment accounts on theuser device 110 and theP2P payment system 160. TheP2P payment application 115 can be used to send device location data to theP2P payment system 160 and receive a likely transaction list from theP2P payment system 160. TheP2P payment system 160 that develops the list and prosecutes the transaction can include a set of computer-readable program instructions, for example, using JavaScript, that enable theP2P payment system 160 to interact with theP2P payment application 115. Thepayor device 120 operated by apayor 102 can use aP2P payment application 125 similar to theP2P payment application 115 or a compatible transaction application that will allow transactions with theuser device 110. - The
user device 110 also includes adata storage unit 113 accessible by the digitalwallet application module 111, theP2P payment application 115, and thecommunication application 112. The exampledata storage unit 113 can include one or more tangible computer-readable storage devices. Thedata storage unit 113 can be stored on theuser device 110 or can be logically coupled to theuser device 110. For example, thedata storage unit 113 can include on-board flash memory and/or one or more removable memory cards or removable flash memory. - The
user device 110 may include a location basedapplication 114 that theP2P payment application 115 or theP2P payment system 160 may utilize to access location data for theuser device 110. Examples of applications that may utilize the location data, and thus may make it available to theP2P payment system 160, may include, but would not be limited to, business finder applications, location based social networks, location based gaming, or friend locater applications. Thepayor device 120 can utilize alocation application 124 that is similar to the location basedapplication 114. - The
user device 110 may include one ormore contact applications 116. Acontact application 116 may be any program or application on theuser device 110 that maintains a list of contacts of the user that theP2P payment system 160 may access. Examples ofcontact applications 116 might include, but not be limited to, email applications, text applications, instant messaging, calendar invite lists, or contact databases. The contacts from acontact application 116 may be prioritized by factors such as frequency of communication withuser 101, the number of contact applications on which a particular contact appears, or any other prioritizing factors which may be extracted from the applications. - The
payor device 120 may represent the devices with which theuser 101 may conduct a peer-to-peer transaction or other transaction. Like theuser device 110, thepayor device 120 may be a mobile device, (for example, notebook computer, tablet computer, netbook computer, personal digital assistant (PDA), video game device, GPS locator device, cellular telephone, a television with one or more processors embedded therein and/or coupled thereto smart phone, smartphone, or other mobile device), or other appropriate technology that includes or is coupled to acommunication application 112. - The
P2P payment system 160 utilizes a P2Ppayment system server 161. The P2Ppayment system server 161 may represent the computer implemented system that theP2P payment system 160 employs to configure user accounts, create and maintain user profiles, collect the location data, communicate with thesocial network system 150, develop likely transaction lists, submit the list to theuser 101 or thepayor 101, and conduct the transaction. The P2Ppayment system website 163 may represent any web-based interface that allows users to interact with theP2P payment system 160 to configure the user accounts and change account settings. The P2Ppayment system server 161 can communicate with one or moresocial network systems 150, one or morepayor devices 120, and auser device 110 via any available technologies. These technologies may include, but would not be limited to, an Internet connection via thenetwork 105, email, text, instant messaging, or other suitable communication technologies. TheP2P payment system 160 may include adata storage unit 162 accessible by theserver 161 of thePPS 160. Thedata storage unit 162 can include one or more tangible computer-readable storage devices. - The
social network system 150 utilizes a socialnetwork system server 151. Thesocial network server 151 may represent the computer-implemented system that thesocial network system 150 employs to host thesocial network website 153 and all of the profiles and communities that use thesocial network website 153. Thesocial network website 153 may represent any web-based community that allows users to interact over the Internet with others who typically share a common interest. - The
social network system 150 may provide theP2P payment system 160 with a list of members of the user's online community. Thesocial network system 150 may prioritize the relationship of each member of the community with theuser 101. This may be determined by factors that may apply to the structure of each particularsocial network system 150. For example, a social network system may categorize members of the community as “friends” or “friends of friends.” Another social network system may categorize members as first, second, or third degree contacts. - The social
network system server 151 can communicate with aP2P payment system 160 anduser devices 110 andpayor devices 120 via any available technologies. These technologies may include, but would not be limited to, an Internet connection via thenetwork 105, email, text, instant messaging, or other suitable communication technologies. Thesocial network system 150 may include adata storage unit 152 accessible by theserver 151 of thesocial network system 150. Thedata storage unit 152 can include one or more tangible computer-readable storage devices. - The components of the
example operating environment 100 are described hereinafter with reference to the example methods illustrated inFIGS. 2 . -
FIG. 2 is a block flow diagram depicting amethod 200 to provide payment requests to potential payors, in accordance with certain example embodiments. - With reference to
FIGS. 1 and 2 , inblock 205, auser 101 initiates a request for payment. The user (or “requester”) 101 can pay a bill at a merchant for a group of users. For example, therequester 101 and the group can dine at a restaurant and receive a bill for payment. Instead of splitting the bill into numerous smaller bills, one person can pay for the group. In another example, a group of users desire to pay for a birthday gift. Instead of collecting money or trying to gather everyone together to make the purchase, one user can buy the gift for the group. Any other suitable group debt can be incurred and require repayment of the debt to a group member who pays the debt. - The group member who pays the debt, the
requester 101, can submit a request for repayment on theP2P payment application 115 operating on theuser device 110 of the requester. TheP2P payment application 115 can transmit the request to theP2P payment system 160. The request can be transmitted via any available technology such as an Internet connection over the network, email, text, or any other suitable communication technology. Alternatively, therequester 101 can make the request on awebsite 161 of theP2P payment system 160 or via any other suitable method. - In an alternate example embodiment, the request can be managed by another party other than the
P2P payment system 160. Any server system can be employed to host the request and monitor the repayment of the debts. For example, asocial network system 150 can manage the request. In another example, a bank, credit card issuer, or other suitable financial institution can manage the request. In another example, a dedicated group payment server system can manage the request. - The request can be a summary of the debt owed to the requester 101 or any other suitable format to identify the debt. For example, the
requester 101 can attach a copy or other representation of the bill or receipt. In another example, therequester 101 can manually enter the request details. In another example, theP2P payment application 115 can attach the bill payment transaction details from a P2P transaction or other transaction. In another example, therequester 101 can assign specific amounts for each payor 102 to submit, such as by assigning receipt line items toindividual payors 102. In another example, therequester 101 can manually input a different amount for eachindividual payor 102. Any other suitable format for the request can be submitted by therequester 101. In an alternative exemplary embodiment, therequester 101 may collect funds from multiple people prior to actually paying a bill or otherwise paying the funds to another party. For example, therequester 101 may collect funds from multiple people for a charity and donate all collected funds to the charity, or may collect funds from multiple people prior to purchasing a gift from the group of people. In this case, the request initiated by therequester 101 may be a general request for the multiple people to contribute. - The
payment application 115 is configured to receive the requester's 101 input of the payment information and any other suitable details. For example, thepayment application 115 can present a user interface on therequester device 110 with fields for the requester 101 to input the information. In certain exemplary embodiments, thepayment application 115 can access payment information from a transaction completed with therequester device 110, such as via the digitalwallet application module 111, and can insert the accessed payment information into the corresponding fields of the user interface. - In
block 210, therequester 101, theP2P payment application 115, theP2P payment system 160, or other suitable party assigns an identifier to the request. The identifier may be any code, text, picture, or other suitable identifier that will allow apayor 102 to identify and select the correct request for payment. The request can be a descriptive identifier input by therequester 101, such as the date and location of the incurred debt. For example, the identifier could be “Steakhouse Friday at Lunch” or “10 PM at department store.” The identifier could be the name or a nickname of therequester 101, a name of the group, a name of the company thepayors 102 have in common, or other name identifier. For example, the identifier could be “Grandma Smith gift” or “Jones Company outing.” - In an alternative exemplary embodiment, the identifier can be a randomly generated code. The code can be generated by the
P2P payment application 115, theP2P payment system 160, or other suitable party. A random code can allow the request to be anonymous and help protect the identity of the transaction, therequester 101, and thepayors 102. The random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed. The requester 101 can inform thepayors 102 of the random code (or any other identifier) verbally, via email, via text, or via any other suitable manner. - In another alternative exemplary embodiment, the identifier can be a visual representation. For example, a picture of the event, an avatar of the
requester 101, a randomly generated picture or drawing, or any other visual identifier can be used. - In
block 215, theP2P payment system 160 can identifypotential payors 102 for the request. TheP2P payment system 160 can identify thepotential payors 102 from the location of therequester 101 and the location of thepotential payors 102, from the social graph of the recipient and thepotential payors 102, by manual input of the recipient, from any other suitable methods or combination of methods. The details of a method to identifypotential payors 102 for the request are discussed in greater detail in themethod 215 inFIG. 3 . -
FIG. 3 is a block flow diagram depicting amethod 215 for identifying apotential payor 102, in accordance with certain example embodiments. - In
block 305, theP2P payment application 115 can employ the Global Positioning System (“GPS”) location technology or other location identifying technology of theuser device 110 of the requester 101 to transmit the location of thedevice 110, and thus the location of therequester 101. The location can be transmitted to aserver 161 located in aP2P payment system 160. TheP2P payment application 115 can gather the location data directly from theuser device 110 or theP2P payment application 115 can request the location from another location-based application operating on theuser device 110. In another example, theP2P payment application 115 can determine the location of theuser device 110 from a device supplying a Wi-Fi connection. In another example, therecipient 101 can employ an application from asocial network system 150 or other suitable application to manually enter a location or “check in.” Any other suitable location determination hardware or software can be employed. - In
block 310, theP2P payment system 160 searches for other mobile devices operating in a predetermined proximity of therequester 101, such as thepayor device 120. TheP2P payment system 160 can use the same location technologies to locate thepotential payor devices 120 that theP2P payment system 160 used to locate the recipient or any other location technology. - The proximity threshold can be configured by the
requester 101 or the P2P payment system. The proximity threshold can further be variable based upon factors predetermined by therequester 101 or theP2P payment system 160. For example, theP2P payment system 160 can vary the proximity based on the density of thepotential payors 102 identified or the quantity of social network data available from the requester 101 accounts. TheP2P payment system 160 can first gather the location data and identity of other users that have accounts on the P2P payment system. Additionally or alternatively, theP2P payment system 160 can be configured to communicate with other location-based programs or applications that can supply location data and user identity to the P2Ppayment system server 161. - Additionally or alternatively, the location recorded by a
potential payor 102 at the time of the request can be determined at a later time. For example, if therecipient 101 entered the request at a time after leaving the location of the transaction, theP2P payment system 160 can determine the transaction time and location and look forpotential payors 102 that were at the location at the time of the transaction. Thepotential payors 102 can have an application that has logged the locations of thepayor 102 and theP2P payment system 160 can extract the location at the time of the transaction. Additionally or alternatively, thepotential payor 102 may have “checked in” to the location and thus theP2P payment system 160 can extract the location form the “check in” application. Any other suitable location determining method can be utilized to determine whichpotential payors 102 may have been at the transaction location. - In
block 315, theP2P payment system 160 can identifypotential payors 102 in the social graph of therecipient 101. From the social graph data, theP2P payment system 160 searches the identities of associates of the requester 101 such as contacts, friends, business associates, family members or any other identities that can be extracted. - The
P2P payment system 160 may gather the identities from any social network data available from the recipient's online activities. Examples of locations available from which theP2P payment system 160 may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running onrecipient user devices 110. - In
block 320, theP2P payment system 160 ranks the identities based on a set of criteria configured to determine the most likelypotential payors 102 to the user's transaction. One of the criteria used by theP2P payment system 160 to rank the results can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend. If a friend is on the ranking list, then the friends of that friend may be included on the list and given a certain priority. Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of theP2P payment system 160 application on the device. - In
block 325, theP2P payment system 160 compares the list of proximate user identities with a compilation of social network data from the user. Any combination of the location data, social graph data, or other identification or ranking criteria can be employed to identifypotential payors 102. - The
P2P payment system 160, therecipient 101, or another suitable party can establish a threshold for an identified contact to be put on the list ofpotential payors 102. The threshold may be based on the closeness of the social graph relationship, the proximity of the user device of the contact, the number of applications on the social graph in which the contact appears, or any suitable factor or combination of factors. TheP2P payment system 160 can compare the list of identified contacts to the threshold and determine which contacts to include on the list ofpotential payors 102. - Additionally or alternatively, in
block 330, therecipient 101 can manually input thepotential payors 102 to be included in the list. For example, therecipient 101 can input the name or other identify of everypotential payor 102. In another example, therecipient 101 can request that every social network contact is identified as apotential payor 102. In another example, therecipient 101 can request that every contact associated with the employer of therecipient 101 is identified as apotential payor 102. In another example, therecipient 101 can request that only contacts with which therecipient 101 has had a previous P2P transaction are identified aspotential payors 102. Therecipient 101 can input instructions to exclude anypotential payors 102. For example, therecipient 101 can input the name or other identity of one or morepotential payors 102 that therecipient 101 does not want included on any list ofpotential payors 102. Any other suitable input from therecipient 101 can assist in determining thepotential payors 102. - In an alternate example embodiment, after generating a ranked list of
potential payors 102, theP2P payment system 160 can transmit the list to theP2P payment application 115 on theuser device 110 of therecipient 101. Therecipient 101 can further edit the names and accounts on the list ofpotential payors 102 on a user interface. - From
block 330, themethod 215 returns to block 220 inFIG. 2 . - Returning to
FIG. 2 , inblock 220, theP2P payment system 160 issues the payment request to thepotential payors 102. For example, the identification of the request can be listed on the account of thepotential payor 102. In another example, the request can be emailed to thepotential payor 102, texted to thepotential payor 102, transmitted to aP2P payment application 115 operating on theuser device 120 of thepotential payor 102 via an Internet connection, or in any suitable manner transmitted to thepotential payor 102. In another example, a list of requests can be displayed on a website of theP2P payment system 160. - In alternate example embodiments, the
P2P payment system 160 can provide the list of payment request to allpayors 102 who access theP2P payment system 160. That is, the identifiers are available to everypayor 102 for selection. Thepayor 102 can search the list of all payment requests and select the appropriate request. - In
block 225, the payor can review a ranked list of payment requests and select a request for payment. The details ofblock 225 are discussed in greater detail inmethod 225 inFIG. 4 . - Turning now to
method 225 inFIG. 4 , inblock 405, theP2P payment system 160 maintains a database of payment requests. The database can have all payment requests that are in the system in on database. Additionally or alternatively, the database can have requests that are associated with a requester 101 in a database or in a particular category in the database. Additionally or alternatively, the database can have the requests associated with apayor 102 in a database or in a particular category in the database. The database can be categorized in any suitable manner. The database can be stored on theweb server 161 of theP2P payment system 160, on a remote server, or on any other suitable web server or storage location. - In
block 410, thepayor 102 can open theP2P payment application 115 to view the requests for payment. Additionally or alternatively, thepayor 102 can access the account of thepayor 102 on thewebsite 163 of theP2P payment system 160, or via any other suitable application or website. Thepayor 102 can access a page or option that displays a ranked list of payment requests associated with thepayor 102. For example, thepayor 102 can actuate a real or virtual button, open a link to a website, speak a voice command or in any suitable manner request the list of requests. Thepayor 102 can view the list of requests in any format available to the user interface being utilized. - In
block 415, theP2P payment system 160 identifies payment requests that are previously associated with thepayor 102. For example, theP2P payment system 160 can identify payment requests that identified the name of thepayor 102 or the account of thepayor 102. In another example, theP2P payment system 160 can identify payment requests that were associated with the payor account at the time of the request, such as described inFIG. 3 . Thepayor 102 may have been associated with a payment request in any other suitable manner. - In
block 420, theP2P payment system 160 accesses the location of thepayor device 120 at the time that the payor accesses theP2P payment application 115 or views a list of requests. TheP2P payment system 160 additionally or alternatively, accesses the location history of thepayor 102. The location can be obtained from any hardware, software, or combination of hardware and software that can provide a location of thedevice 120. For example, the global positioning system technology of thedevice 120 can be used. In another example, the location can be determined from one or more Wi-Fi systems that communicate with thepayor device 120. In another example, the location can be determined from a check in on asocial network system 150 or other location logging application or website. Any suitable location identifying technology can be employed. - In
block 425, theP2P payment system 160 accesses and searches the social graph of thepayor 102. The social graph of a user refers to all of a user's contacts, friends, family, and other members of a user's online network. The social graph can be any combination of social networks of thepayor 102, contact databases of thepayor 102, lists of email correspondents of thepayor 102, lists of frequent transaction counter-parties of thepayor 102, and any other suitable social graph data. The search of the social graph not only determines the members of a network of thepayor 102, but also determines how the members are related and how closely the members are related. - In
block 430, theP2P payment system 160 accesses and searches the transaction history of thepayor 102. The transaction history can include some or all of the P2P transactions of thepayor 102 or any other suitable transactions accessible by theP2P payment system 160. The history may include the identities or accounts of transaction counter-parties or any suitable identifying characteristic. - In
block 435, theP2P payment system 160 displays a ranked list of payment requests for thepayor 102. TheP2P payment system 160 can use the location history of thepayor 102, the social graph information of thepayor 102, and the transaction history of thepayor 102 to rank the payment requests. TheP2P payment system 160 can rank the requests by determining the relatedness of the generator of the requester 101 to thepayor 102, the transaction history of therequester 101 and thepayor 102, the relatedness of the location history of thepayor 102 and the location at which the payment request was generated, or any other suitable ranking criteria. - In an example embodiment, the
P2P payment system 160 can compare the location history of thepayor 102 to the location of the payment request. For example, theP2P payment system 160 can identify the location of therequester device 110 at the time of the request and determine if thepayor 102 was near the identified location at or near the time the request was entered. Based on a determination that thepayor 102 was near the identified location at or near the time the request was entered, theP2P payment system 160 can promote the request on the list of payment requests to be presented to thepayor 102. - In another example, the
P2P payment system 160 can identify a merchant associated with a receipt included with the payment request. TheP2P payment system 160 can determine if thepayor device 120 was at the merchant at the time of the request or at any other time. Based on a determination that thepayor 102 was near the identified location, theP2P payment system 160 can promote the request on the list of payment requests to be presented to thepayor 102. - In another example, the
P2P payment system 160 can determine if the requester 101 associated with a request is related to thepayor 102 on the social graph of thepayor 102. From the social graph data, theP2P payment system 160 searches the identities of associates of the requester 101 such as contacts, friends, business associates, family members or any other identities that can be extracted. - The
P2P payment system 160 may gather the account identities from any social network data available from the recipient's online activities. Examples of locations available from which theP2P payment system 160 may gather data may include, but not be limited to, social network websites accounts, contact list entries, email contacts, or other programs and applications running onrecipient user devices 110. - The
P2P payment system 160 can use the relatedness of therequestors 101 to thepayor 102 to rank the requests. One of the criteria used by theP2P payment system 160 to determine the relatedness can be based on the status of the contact on the social network status, such as a “friend” on a social network or a friend of a friend. Other criteria may include, but would not be limited to, frequency of emails or texts with a contact, physical distance from user based on the location data, previous transactions with the recipient, or recent activation of theP2P payment system 160 application on the device. Based on the relatedness of a requestor 102, a request may be promoted or demoted on the ranking of requests. - In another example embodiment, the number of previous transactions between a payor 102 and a
requester 101 of a payment request can be used to rank the request. For example, if apayor 102 and a requester 101 have many previous P2P transactions, then a request generated by therequester 101 may be promoted on the ranking of requests. - In another example embodiment, the
payor 102 can search for a request with a specific identifier. For example, the identifier may be any code, text, picture, or other suitable identifier that will allow thepayor 102 to identify and select the correct request for payment. The request can be a descriptive identifier input by therequester 101, such as the date and location of the incurred debt. For example, the identifier could be “Outback Friday at Lunch” or “10 PM at Target.” The identifier could be the name or a nickname of therequester 101, a name of the group, a name of the company thepayors 102 have in common, or other name identifier. For example, the identifier could be “Grandma Smith gift” or “Jones Company outing.” - In an alternative exemplary embodiment, the identifier can be a randomly generated code. The code can be generated by the
P2P payment application 115, theP2P payment system 160, or other suitable party. A random code can allow the request to be anonymous and help protect the identity of the transaction, therequester 101, and thepayors 102. The random code can be any alphanumeric code such as “abc123” or one or more random words. Any other suitable random code can be employed. The requester 101 can inform thepayors 102 of the random code (or any other identifier) verbally, via email, via text, or via any other suitable manner. - If the payor 102 searches for a payment request, and the request identifier matches the search keywords, then the payment request can be promoted on the request ranking list.
- In another alternative exemplary embodiment, the identifier can be a visual representation. For example, a picture of the event, an avatar of the
requester 101, a randomly generated picture or drawing, or any other visual identifier can be used. - The display can be presented to the
payor 102 on theP2P payment application 115, on thewebsite 161 of theP2P payment system 160, or on any other suitable user interface. The display can present the top ranked requests, such as the top 5 or top 10 ranked requests. The display can present all of the requests that are associated with thepayor 102. The display can present a ranked list of all requests in the system. Any other suitable display of the ranked list of requests can be employed and presented to the user. - In
block 440, thepayor 102 can select the request that thepayor 102 would like to pay. Thepayor 102 can select the request to pay by indicating the selection on the user interface. TheP2P payment application 115 or theP2P payment system 160 can direct thepayor 102 to a payment page on the user interface with the transaction data populated. Thepayor 102 can modify any entries in the payment page, such as by lowering the payment amount, changing the recipient, adding a note or message, or any other suitable modification. - From
block 440, themethod 225 returns to block 230 inFIG. 2 . - Returning now to
FIG. 2 , inblock 230, with the user interface on aP2P payment application 115, thepayor 102 can pay the amount that is requested or thepayor 102 can enter an alternate amount to pay. If the request is on theP2P payment system 160 then theP2P payment system 160 can fill in the data to conduct the transaction with the information of therecipient 101, thepayor 102, and the transaction details. Alternatively, thepayor 102 can manually enter the information or select information from a list on the user interface. - The
payor 102 can alternatively pay therecipient 101 in another manner, such as cash or a check, and update the request on theP2P payment system 160. That is, thepayor 102 can utilize the user interface on theP2P payment application 115 or awebsite 163 of theP2P payment system 160 and manually enter an amount paid to therecipient 101. TheP2P payment system 160 can update the request with the entered information. Alternatively, theP2P payment system 160 may require a confirmation of the payment from therecipient 101 before the request is updated. - From
block 230, themethod 200 ends. -
FIG. 5 depicts acomputing machine 2000 and amodule 2050 in accordance with certain example embodiments. Thecomputing machine 2000 may correspond to any of the various computers, servers, mobile devices, embedded systems, or computing systems presented herein. Themodule 2050 may comprise one or more hardware or software elements configured to facilitate thecomputing machine 2000 in performing the various methods and processing functions presented herein. Thecomputing machine 2000 may include various internal or attached components such as aprocessor 2010,system bus 2020,system memory 2030,storage media 2040, input/output interface 2060, and anetwork interface 2070 for communicating with anetwork 2080. - The
computing machine 2000 may be implemented as a conventional computer system, an embedded controller, a laptop, a server, a mobile device, a smartphone, a set-top box, a kiosk, a vehicular information system, one more processors associated with a television, a customized machine, any other hardware platform, or any combination or multiplicity thereof. Thecomputing machine 2000 may be a distributed system configured to function using multiple computing machines interconnected via a data network or bus system. - The
processor 2010 may be configured to execute code or instructions to perform the operations and functionality described herein, manage request flow and address mappings, and to perform calculations and generate commands. Theprocessor 2010 may be configured to monitor and control the operation of the components in thecomputing machine 2000. Theprocessor 2010 may be a general purpose processor, a processor core, a multiprocessor, a reconfigurable processor, a microcontroller, a digital signal processor (“DSP”), an application specific integrated circuit (“ASIC”), a graphics processing unit (“GPU”), a field programmable gate array (“FPGA”), a programmable logic device (“PLD”), a controller, a state machine, gated logic, discrete hardware components, any other processing unit, or any combination or multiplicity thereof. Theprocessor 2010 may be a single processing unit, multiple processing units, a single processing core, multiple processing cores, special purpose processing cores, co-processors, or any combination thereof. According to certain embodiments, theprocessor 2010 along with other components of thecomputing machine 2000 may be a virtualized computing machine executing within one or more other computing machines. - The
system memory 2030 may include non-volatile memories such as read-only memory (“ROM”), programmable read-only memory (“PROM”), erasable programmable read-only memory (“EPROM”), flash memory, or any other device capable of storing program instructions or data with or without applied power. Thesystem memory 2030 may also include volatile memories such as random access memory (“RAM”), static random access memory (“SRAM”), dynamic random access memory (“DRAM”), synchronous dynamic random access memory (“SDRAM”). Other types of RAM also may be used to implement thesystem memory 2030. Thesystem memory 2030 may be implemented using a single memory module or multiple memory modules. While thesystem memory 2030 is depicted as being part of thecomputing machine 2000, one skilled in the art will recognize that thesystem memory 2030 may be separate from thecomputing machine 2000 without departing from the scope of the subject technology. It should also be appreciated that thesystem memory 2030 may include, or operate in conjunction with, a non-volatile storage device such as thestorage media 2040. - The
storage media 2040 may include a hard disk, a floppy disk, a compact disc read only memory (“CD-ROM”), a digital versatile disc (“DVD”), a Blu-ray disc, a magnetic tape, a flash memory, other non-volatile memory device, a solid state drive (“SSD”), any magnetic storage device, any optical storage device, any electrical storage device, any semiconductor storage device, any physical-based storage device, any other data storage device, or any combination or multiplicity thereof. Thestorage media 2040 may store one or more operating systems, application programs and program modules such asmodule 2050, data, or any other information. Thestorage media 2040 may be part of, or connected to, thecomputing machine 2000. Thestorage media 2040 may also be part of one or more other computing machines that are in communication with thecomputing machine 2000 such as servers, database servers, cloud storage, network attached storage, and so forth. - The
module 2050 may comprise one or more hardware or software elements configured to facilitate thecomputing machine 2000 with performing the various methods and processing functions presented herein. Themodule 2050 may include one or more sequences of instructions stored as software or firmware in association with thesystem memory 2030, thestorage media 2040, or both. Thestorage media 2040 may therefore represent examples of machine or computer readable media on which instructions or code may be stored for execution by theprocessor 2010. Machine or computer readable media may generally refer to any medium or media used to provide instructions to theprocessor 2010. Such machine or computer readable media associated with themodule 2050 may comprise a computer software product. It should be appreciated that a computer software product comprising themodule 2050 may also be associated with one or more processes or methods for delivering themodule 2050 to thecomputing machine 2000 via thenetwork 2080, any signal-bearing medium, or any other communication or delivery technology. Themodule 2050 may also comprise hardware circuits or information for configuring hardware circuits such as microcode or configuration information for an FPGA or other PLD. - The input/output (“I/O”)
interface 2060 may be configured to couple to one or more external devices, to receive data from the one or more external devices, and to send data to the one or more external devices. Such external devices along with the various internal devices may also be known as peripheral devices. The I/O interface 2060 may include both electrical and physical connections for operably coupling the various peripheral devices to thecomputing machine 2000 or theprocessor 2010. The I/O interface 2060 may be configured to communicate data, addresses, and control signals between the peripheral devices, thecomputing machine 2000, or theprocessor 2010. The I/O interface 2060 may be configured to implement any standard interface, such as small computer system interface (“SCSI”), serial-attached SCSI (“SAS”), fiber channel, peripheral component interconnect (“PCI”), PCI express (PCIe), serial bus, parallel bus, advanced technology attached (“ATA”), serial ATA (“SATA”), universal serial bus (“USB”), Thunderbolt, FireWire, various video buses, and the like. The I/O interface 2060 may be configured to implement only one interface or bus technology. Alternatively, the I/O interface 2060 may be configured to implement multiple interfaces or bus technologies. The I/O interface 2060 may be configured as part of, all of, or to operate in conjunction with, thesystem bus 2020. The I/O interface 2060 may include one or more buffers for buffering transmissions between one or more external devices, internal devices, thecomputing machine 2000, or theprocessor 2010. - The I/
O interface 2060 may couple thecomputing machine 2000 to various input devices including mice, touch-screens, scanners, biometric readers, electronic digitizers, sensors, receivers, touchpads, trackballs, cameras, microphones, keyboards, any other pointing devices, or any combinations thereof. The I/O interface 2060 may couple thecomputing machine 2000 to various output devices including video displays, speakers, printers, projectors, tactile feedback devices, automation control, robotic components, actuators, motors, fans, solenoids, valves, pumps, transmitters, signal emitters, lights, and so forth. - The
computing machine 2000 may operate in a networked environment using logical connections through thenetwork interface 2070 to one or more other systems or computing machines across thenetwork 2080. Thenetwork 2080 may include wide area networks (WAN), local area networks (LAN), intranets, the Internet, wireless access networks, wired networks, mobile networks, telephone networks, optical networks, or combinations thereof. Thenetwork 2080 may be packet switched, circuit switched, of any topology, and may use any communication protocol. Communication links within thenetwork 2080 may involve various digital or an analog communication media such as fiber optic cables, free-space optics, waveguides, electrical conductors, wireless links, antennas, radio-frequency communications, and so forth. - The
processor 2010 may be connected to the other elements of thecomputing machine 2000 or the various peripherals discussed herein through thesystem bus 2020. It should be appreciated that thesystem bus 2020 may be within theprocessor 2010, outside theprocessor 2010, or both. According to some embodiments, any of theprocessor 2010, the other elements of thecomputing machine 2000, or the various peripherals discussed herein may be integrated into a single device such as a system on chip (“SOC”), system on package (“SOP”), or ASIC device. - In situations in which the systems discussed here collect personal information about users, or may make use of personal information, the users may be provided with an opportunity to control whether programs or features collect user information (e.g., information about a user's social network, social actions or activities, profession, a user's preferences, or a user's current location), or to control whether and/or how to receive content from the content server that may be more relevant to the user. In addition, certain data may be treated in one or more ways before it is stored or used, so that personally identifiable information is removed. For example, a user's identity may be treated so that no personally identifiable information can be determined for the user, or a user's geographic location may be generalized where location information is obtained (such as to a city, ZIP code, or state level), so that a particular location of a user cannot be determined. Thus, the user may have control over how information is collected about the user and used by a content server.
- Embodiments may comprise a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions. However, it should be apparent that there could be many different ways of implementing embodiments in computer programming, and the embodiments should not be construed as limited to any one set of computer program instructions. Further, a skilled programmer would be able to write such a computer program to implement an embodiment of the disclosed embodiments based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use embodiments. Further, those skilled in the art will appreciate that one or more aspects of embodiments described herein may be performed by hardware, software, or a combination thereof, as may be embodied in one or more computing systems. Moreover, any reference to an act being performed by a computer should not be construed as being performed by a single computer as more than one computer may perform the act.
- The example embodiments described herein can be used with computer hardware and software that perform the methods and processing functions described previously. The systems, methods, and procedures described herein can be embodied in a programmable computer, computer-executable software, or digital circuitry. The software can be stored on computer-readable media. For example, computer-readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc. Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (FPGA), etc.
- The example systems, methods, and acts described in the embodiments presented previously are illustrative, and, in alternative embodiments, certain acts can be performed in a different order, in parallel with one another, omitted entirely, and/or combined between different example embodiments, and/or certain additional acts can be performed, without departing from the scope and spirit of various embodiments. Accordingly, such alternative embodiments are included in the inventions described herein.
- Although specific embodiments have been described above in detail, the description is merely for purposes of illustration. It should be appreciated, therefore, that many aspects described above are not intended as required or essential elements unless explicitly stated otherwise. Modifications of, and equivalent components or acts corresponding to, the disclosed aspects of the example embodiments, in addition to those described above, can be made by a person of ordinary skill in the art, having the benefit of the present disclosure, without departing from the spirit and scope of embodiments defined in the following claims, the scope of which is to be accorded the broadest interpretation so as to encompass such modifications and equivalent structures.
Claims (23)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/822,725 US20160042330A1 (en) | 2012-12-05 | 2015-08-10 | Methods for discovering and paying debts owed by a group |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/706,350 US8700526B1 (en) | 2012-12-05 | 2012-12-05 | Methods for discovering and paying debts owed by a group |
US14/148,704 US9123038B2 (en) | 2012-12-05 | 2014-01-06 | Methods for discovering and paying debts owed by a group |
US14/822,725 US20160042330A1 (en) | 2012-12-05 | 2015-08-10 | Methods for discovering and paying debts owed by a group |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/148,704 Continuation US9123038B2 (en) | 2012-12-05 | 2014-01-06 | Methods for discovering and paying debts owed by a group |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160042330A1 true US20160042330A1 (en) | 2016-02-11 |
Family
ID=50441561
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/706,350 Expired - Fee Related US8700526B1 (en) | 2012-12-05 | 2012-12-05 | Methods for discovering and paying debts owed by a group |
US14/148,704 Active US9123038B2 (en) | 2012-12-05 | 2014-01-06 | Methods for discovering and paying debts owed by a group |
US14/822,725 Abandoned US20160042330A1 (en) | 2012-12-05 | 2015-08-10 | Methods for discovering and paying debts owed by a group |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/706,350 Expired - Fee Related US8700526B1 (en) | 2012-12-05 | 2012-12-05 | Methods for discovering and paying debts owed by a group |
US14/148,704 Active US9123038B2 (en) | 2012-12-05 | 2014-01-06 | Methods for discovering and paying debts owed by a group |
Country Status (5)
Country | Link |
---|---|
US (3) | US8700526B1 (en) |
EP (1) | EP2929491A4 (en) |
KR (3) | KR102023586B1 (en) |
CN (2) | CN104995647B (en) |
WO (1) | WO2014089309A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018206468A1 (en) * | 2017-05-06 | 2018-11-15 | Vivaro Ltd | Mediated peer to peer transaction systems and methods |
US10410184B2 (en) | 2012-03-30 | 2019-09-10 | Google Llc | Tracking and managing group expenditures |
US11263635B2 (en) * | 2015-12-22 | 2022-03-01 | Toshiba Tec Kabushiki Kaisha | Check-out system and registration apparatus |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130144785A1 (en) * | 2011-03-29 | 2013-06-06 | Igor Karpenko | Social network payment authentication apparatuses, methods and systems |
US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
US11538102B2 (en) * | 2012-12-17 | 2022-12-27 | Capital One Services, Llc | Systems and methods for providing a user interface for facilitating personal payment transactions |
US10235682B2 (en) * | 2013-03-11 | 2019-03-19 | Capital One Services, Llc | Systems and methods for providing social discovery relationships |
US9536232B2 (en) | 2013-03-15 | 2017-01-03 | Square, Inc. | Transferring money using email |
US9449321B2 (en) | 2013-03-15 | 2016-09-20 | Square, Inc. | Transferring money using email |
US10621563B1 (en) * | 2013-12-27 | 2020-04-14 | Square, Inc. | Apportioning a payment card transaction among multiple payers |
US10013694B1 (en) * | 2013-12-30 | 2018-07-03 | EMC IP Holding Company LLC | Open data collection for threat intelligence posture assessment |
US20150310404A1 (en) * | 2014-04-23 | 2015-10-29 | Square, Inc. | Transferring money using email |
US10614445B1 (en) | 2014-06-04 | 2020-04-07 | Square, Inc. | Proximity-based payments |
US20160117651A1 (en) * | 2014-10-27 | 2016-04-28 | Facebook, Inc. | Facilitating sending and receiving of payments between users in a group |
CN105654293B (en) * | 2014-12-03 | 2020-01-17 | 阿里巴巴集团控股有限公司 | Payment method and device |
CN105809502A (en) * | 2014-12-30 | 2016-07-27 | 阿里巴巴集团控股有限公司 | Transaction risk detection method and apparatus |
US20160247132A1 (en) * | 2015-02-25 | 2016-08-25 | Ebay Inc. | Affiliated individual identification and account recoupment |
US10600039B2 (en) | 2015-05-20 | 2020-03-24 | Mastercard International Incorporated | Systems and methods for managing financial payments between parties |
CN106296142B (en) * | 2015-06-12 | 2020-05-22 | 深圳云游四海信息科技有限公司 | Method and system for selecting multiple payment channels |
US10410194B1 (en) | 2015-08-19 | 2019-09-10 | Square, Inc. | Customized tipping flow |
US10127532B1 (en) | 2015-08-19 | 2018-11-13 | Square, Inc. | Customized transaction flow |
US10810567B2 (en) | 2015-10-12 | 2020-10-20 | Walmart Apollo, Llc | System, method, and non-transitory computer-readable storage media related to transactions using a mobile device |
US20170185989A1 (en) * | 2015-12-28 | 2017-06-29 | Paypal, Inc. | Split group payments through a sharable uniform resource locator address for a group |
US10380561B2 (en) * | 2016-01-22 | 2019-08-13 | Walmart Apollo, Llc | System, method, and non-transitory computer-readable storage media related to transactions using a mobile device |
US10504099B2 (en) | 2016-09-02 | 2019-12-10 | Moneygram International, Inc. | Smart stager |
US20180225649A1 (en) * | 2017-02-06 | 2018-08-09 | American Express Travel Related Services Company, Inc. | Charge splitting across multiple payment systems |
US11151563B2 (en) * | 2017-06-28 | 2021-10-19 | Paypal, Inc. | Automatic payment determination |
US10453061B2 (en) | 2018-03-01 | 2019-10-22 | Capital One Services, Llc | Network of trust |
US11386412B1 (en) | 2018-04-12 | 2022-07-12 | Wells Fargo Bank, N.A. | Authentication circle management |
US11481837B1 (en) | 2018-04-12 | 2022-10-25 | Wells Fargo Bank, N.A. | Authentication circle management |
US10943308B1 (en) | 2018-05-03 | 2021-03-09 | Wells Fargo Bank, N.A. | Systems and methods for pervasive advisor for major expenditures |
US11842331B2 (en) * | 2018-10-24 | 2023-12-12 | Capital One Services, Llc | Network of trust for bill splitting |
US11494757B2 (en) | 2018-10-24 | 2022-11-08 | Capital One Services, Llc | Remote commands using network of trust |
US10588175B1 (en) | 2018-10-24 | 2020-03-10 | Capital One Services, Llc | Network of trust with blockchain |
US20200265407A1 (en) * | 2019-02-20 | 2020-08-20 | Capital One Services, Llc | Systems and methods for associating a p2p service with a card transaction |
CN110472955A (en) * | 2019-07-17 | 2019-11-19 | 口碑(上海)信息技术有限公司 | A kind of data processing method and system |
CN111539710A (en) * | 2020-03-30 | 2020-08-14 | 北京小米移动软件有限公司 | Payment mode determining method and device and storage medium |
US12223474B2 (en) | 2023-04-05 | 2025-02-11 | OneCard LLC | System and method for providing a group payment vehicle |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060085259A1 (en) * | 2004-10-20 | 2006-04-20 | Nicholas Frank C | Method and system for providing cooperative purchasing over social networks |
US20080255989A1 (en) * | 2007-04-10 | 2008-10-16 | Utbk, Inc. | Systems and Methods to Facilitate Real Time Communications between Members of a Social Network |
US20090012895A1 (en) * | 2007-07-06 | 2009-01-08 | Kevin Raumean Mehrabi | System and method for creating and promoting a cause and processing payments for the cause by utilizing social networks |
US20120143761A1 (en) * | 2010-12-03 | 2012-06-07 | Ebay, Inc. | Social network payment system |
US20120265678A1 (en) * | 2011-04-15 | 2012-10-18 | Bank Of America Corporation | Social network payment settlement system |
US8326770B1 (en) * | 2011-07-01 | 2012-12-04 | Google Inc. | Monetary transfer in a social network |
US20130006788A1 (en) * | 2011-06-30 | 2013-01-03 | Tiger T G Zhou | Retail environments within social networking engines |
US20130173456A1 (en) * | 2012-01-01 | 2013-07-04 | Bank Of America Corporation | Presentation of mobile payment transactionhistory on a mobile communication device |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7343335B1 (en) | 2000-08-08 | 2008-03-11 | Ebay Inc. | Method for managing group finances via an electronic network |
US7206768B1 (en) | 2000-08-14 | 2007-04-17 | Jpmorgan Chase Bank, N.A. | Electronic multiparty accounts receivable and accounts payable system |
US20030233321A1 (en) | 2001-11-30 | 2003-12-18 | Scolini Anthony J. | Integrated invoice solution |
JP2006243788A (en) | 2005-02-28 | 2006-09-14 | Sharp Corp | Electronic money system, portable terminal device and program |
KR20070013048A (en) * | 2005-07-25 | 2007-01-30 | 주식회사 팬택앤큐리텔 | Joint Payment System and Method in Electronic Commerce |
US7873573B2 (en) | 2006-03-30 | 2011-01-18 | Obopay, Inc. | Virtual pooled account for mobile banking |
CN101079133A (en) * | 2006-06-29 | 2007-11-28 | 腾讯科技(深圳)有限公司 | Batch payment system and batch payment method |
US20080086431A1 (en) * | 2006-09-15 | 2008-04-10 | Icebreaker, Inc. | Social interaction messaging and notification |
JP2008107874A (en) | 2006-10-23 | 2008-05-08 | Nec Infrontia Corp | Separate accounting system, mobile terminal, separate accounting method, separate accounting program, and program storage medium |
US20080119162A1 (en) | 2006-11-20 | 2008-05-22 | Motorola, Inc. | Sharing prepaid mobile telephony credit among a group |
WO2008094168A1 (en) | 2007-02-02 | 2008-08-07 | Facebook, Inc. | System and method for giving gifts and displaying assets in a social network environment |
WO2008123851A1 (en) * | 2007-04-04 | 2008-10-16 | Center'd Corporation | Demand aggregation in a geo-spatial network |
US8028896B2 (en) * | 2007-12-14 | 2011-10-04 | Bank Of America Corporation | Authentication methods for use in financial transactions and information banking |
US20120150731A1 (en) | 2010-12-14 | 2012-06-14 | Moneyhoney Llc | System and method for processing group gift cards |
US8732246B2 (en) * | 2008-03-14 | 2014-05-20 | Madhavi Jayanthi | Mobile social network for facilitating GPS based services |
US8280788B2 (en) | 2009-10-29 | 2012-10-02 | Visa International Service Association | Peer-to-peer and group financial management systems and methods |
JP2011204148A (en) * | 2010-03-26 | 2011-10-13 | Mizuho Information & Research Institute Inc | Settlement-order determining system, method and program |
US20110282793A1 (en) * | 2010-05-13 | 2011-11-17 | Microsoft Corporation | Contextual task assignment broker |
CN102339430B (en) * | 2010-07-26 | 2016-03-16 | 阿里巴巴集团控股有限公司 | The method and apparatus of social network services relation is set up in a kind of initiation |
JP4883240B1 (en) | 2010-08-04 | 2012-02-22 | Jfeスチール株式会社 | Steel sheet for hot press and method for producing hot press member using the same |
US20120166332A1 (en) * | 2010-12-22 | 2012-06-28 | Ebay Inc. | Bill splitting system |
US20120173396A1 (en) | 2010-12-30 | 2012-07-05 | Paydivvy, Inc. | Bill division and group payment systems and methods |
US8620799B2 (en) | 2011-01-18 | 2013-12-31 | The Western Union Company | Universal ledger |
KR101194252B1 (en) * | 2011-02-28 | 2012-11-20 | 김민식 | Personal Relations Management System for Mobile Phone |
US9317835B2 (en) | 2011-03-08 | 2016-04-19 | Bank Of America Corporation | Populating budgets and/or wish lists using real-time video image analysis |
US9355394B2 (en) | 2011-08-11 | 2016-05-31 | Visa International Service Association | Systems and methods of aggregating split payments using a settlement ecosystem |
KR20120112297A (en) * | 2012-08-24 | 2012-10-11 | 인포뱅크 주식회사 | Method for providing partial payment using near field communication |
-
2012
- 2012-12-05 US US13/706,350 patent/US8700526B1/en not_active Expired - Fee Related
-
2013
- 2013-12-05 WO PCT/US2013/073342 patent/WO2014089309A1/en active Application Filing
- 2013-12-05 CN CN201380069627.6A patent/CN104995647B/en active Active
- 2013-12-05 CN CN201710966169.6A patent/CN107748986B/en active Active
- 2013-12-05 EP EP13861092.8A patent/EP2929491A4/en not_active Ceased
- 2013-12-05 KR KR1020167031245A patent/KR102023586B1/en active Active
- 2013-12-05 KR KR1020167013375A patent/KR101676453B1/en active Active
- 2013-12-05 KR KR1020157018073A patent/KR101624682B1/en active Active
-
2014
- 2014-01-06 US US14/148,704 patent/US9123038B2/en active Active
-
2015
- 2015-08-10 US US14/822,725 patent/US20160042330A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060085259A1 (en) * | 2004-10-20 | 2006-04-20 | Nicholas Frank C | Method and system for providing cooperative purchasing over social networks |
US20080255989A1 (en) * | 2007-04-10 | 2008-10-16 | Utbk, Inc. | Systems and Methods to Facilitate Real Time Communications between Members of a Social Network |
US20090012895A1 (en) * | 2007-07-06 | 2009-01-08 | Kevin Raumean Mehrabi | System and method for creating and promoting a cause and processing payments for the cause by utilizing social networks |
US20120143761A1 (en) * | 2010-12-03 | 2012-06-07 | Ebay, Inc. | Social network payment system |
US20120265678A1 (en) * | 2011-04-15 | 2012-10-18 | Bank Of America Corporation | Social network payment settlement system |
US20130006788A1 (en) * | 2011-06-30 | 2013-01-03 | Tiger T G Zhou | Retail environments within social networking engines |
US8326770B1 (en) * | 2011-07-01 | 2012-12-04 | Google Inc. | Monetary transfer in a social network |
US20130173456A1 (en) * | 2012-01-01 | 2013-07-04 | Bank Of America Corporation | Presentation of mobile payment transactionhistory on a mobile communication device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10410184B2 (en) | 2012-03-30 | 2019-09-10 | Google Llc | Tracking and managing group expenditures |
US10963847B2 (en) | 2012-03-30 | 2021-03-30 | Google Llc | Tracking and managing group expenditures |
US11263635B2 (en) * | 2015-12-22 | 2022-03-01 | Toshiba Tec Kabushiki Kaisha | Check-out system and registration apparatus |
WO2018206468A1 (en) * | 2017-05-06 | 2018-11-15 | Vivaro Ltd | Mediated peer to peer transaction systems and methods |
Also Published As
Publication number | Publication date |
---|---|
US9123038B2 (en) | 2015-09-01 |
KR20150093215A (en) | 2015-08-17 |
KR102023586B1 (en) | 2019-09-23 |
KR20160133009A (en) | 2016-11-21 |
CN107748986B (en) | 2021-09-24 |
US20140156521A1 (en) | 2014-06-05 |
EP2929491A4 (en) | 2016-05-11 |
KR101676453B1 (en) | 2016-11-15 |
CN104995647A (en) | 2015-10-21 |
KR101624682B1 (en) | 2016-05-26 |
CN107748986A (en) | 2018-03-02 |
WO2014089309A1 (en) | 2014-06-12 |
KR20160062212A (en) | 2016-06-01 |
US8700526B1 (en) | 2014-04-15 |
CN104995647B (en) | 2017-11-17 |
EP2929491A1 (en) | 2015-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9123038B2 (en) | Methods for discovering and paying debts owed by a group | |
US10579981B2 (en) | Selecting a preferred payment instrument | |
US10325307B2 (en) | Method, medium, and system for a secure direct purchase option | |
KR102111194B1 (en) | Virtual assistant in communication session | |
US8738522B2 (en) | Prioritizing potential transaction counter-parties with social network content | |
US20190213671A1 (en) | Annotating a transaction history record with merchant information identified from a merchant identifier and user computing device location data | |
US8676709B2 (en) | Merchant category codes in a proxy card transaction | |
US20190187864A1 (en) | Providing optimized displays on user interfaces based on user generated lists of items | |
US8788420B1 (en) | Generating peer-to-peer transaction risk ratings | |
US20160267569A1 (en) | Providing Search Results Comprising Purchase Links For Products Associated With The Search Results | |
US20230066550A1 (en) | Verified transactions through integrations | |
US20160180317A1 (en) | Offline peer-to-peer transactions | |
US20200210029A1 (en) | Rule-based optimization of object displays on user interfaces | |
US20220414720A1 (en) | Systems and methods for facilitating reservation trading |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GOOGLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:COZENS, NARELLE;DEPASQUALE, MICHAEL;GREEN, TRAVIS HARRISON KROLL;AND OTHERS;SIGNING DATES FROM 20121120 TO 20121203;REEL/FRAME:036326/0763 |
|
AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044129/0001 Effective date: 20170929 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |