Patent application number | Description | Published |
20100312636 | SYSTEM AND METHOD FOR APPLYING STORED VALUE TO A FINANCIAL TRANSACTION - A transaction processing service operates as an intermediary between acquirers of financial transaction requests and issuing institutions that process the financial transaction requests. The intermediary receives an authorization request generated based on a transaction initiated by a customer at a point of purchase. The intermediary service then determines one or more stored value items that can be applied to the transaction. Stored value items may be determined based on the customer's identity or based on transaction characteristics, such as the point of purchase or the transaction items. The service sends a transaction notification to a mobile device associated with the customer to notify the customer of the available stored value items. The service then applies the stored value items to pay a portion of the transaction amount and initiates a payment process to pay the remainder of the transaction amount. | 12-09-2010 |
20100312700 | SYSTEM AND METHOD FOR MANAGING STATUS OF A PAYMENT INSTRUMENT - A transaction processing service operates as an intermediary between acquirers of financial transaction requests and issuing institutions that process the financial transaction requests. The intermediary service enables a customer to selectively change the status of an account's associated with a payment instrument by activating or deactivating the account. The intermediary service may manage account status locally using a rules module. Alternatively, the issuing institution may manage account status, while the intermediary service provides an interface for customers. A customer communicates with the intermediary service to direct the service to change the account status. The intermediary service determines the account's issuing institution and provides an indication to the issuing institution of the current status of the account (or of the change in status). The intermediary service may provide the indication by transmitting a message to the issuing institution or by storing the account status information in its own database. The issuing institution may then request account status from the intermediary service whenever it needs the information, such as when it receives an authorization request. | 12-09-2010 |
20130007849 | SECURE CONSUMER AUTHORIZATION AND AUTOMATED CONSUMER SERVICES USING AN INTERMEDIARY SERVICE - A transaction processing service that operates as an intermediary between aggregators of transaction requests, service providers, consumers, and third-party recipients of data, is disclosed. As used herein, a transaction request is a request for consumer services to be provided to a consumer or third-party, a consumer's authorization of such consumer services, and/or a consumer's authorization of applicable terms, policies, contracts, or agreements. The intermediary service utilizes a consumer's mobile device as an out-of-band communication channel to notify a consumer of a received transaction request and to receive a consumer's authorization of the transaction. Once a transaction is authorized, the intermediary service facilitates the consumer services related to the transaction and provides a service response from one or more service providers to the user's mobile device and/or another service target. | 01-03-2013 |
Patent application number | Description | Published |
20110282850 | Concurrently Accessing Data - A database management system having a database component, which includes a lock manager, and a filesystem component. The filesystem component is configured to: generate a mapping between one or more filesystem access modes, one or more filesystem sharing modes and one or more database locks, receive a request from a filesystem stack to perform one or more actions on data in a database, identify a filesystem access mode and a filesystem share mode of the request, determine which one of the database locks corresponds to the filesystem access mode and the filesystem share mode of the request based on the mapping, and receive a notification lock on the data from the lock manager when no other database locks conflict with the notification lock, wherein the notification lock corresponds to the one of the database locks. After receiving the notification lock on the data, the lock manager is configured to send a notification to the filesystem component when a subsequent request from a database stack includes accessing the data. | 11-17-2011 |
20110289100 | MANAGING A BINARY OBJECT IN A DATABASE SYSTEM - A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol. | 11-24-2011 |
20120303667 | MANAGING A BINARY OBJECT IN A DATABASE SYSTEM - A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol. | 11-29-2012 |