Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
UNTETHERED RESOURCE DISTRIBUTION AND MANAGEMENT
Document Type and Number:
WIPO Patent Application WO/2019/190786
Kind Code:
A1
Abstract:
A method is disclosed. The method includes receiving, at a computing system, from a user, a request for an access code and one or more constraints on a use of the access code, and identifying a portable device to be associated with the access code. The method also includes obtaining, using the portable device, authorization for one or more potential interactions using the access code. Upon obtaining authorization for the one or more interactions, the method includes generating the access code, which includes an identifier that causes an access request that includes the access code be routed to the computing system. The method also includes receiving, from an access device, an access request comprising the access code in an interaction. Upon determining that the interaction complies with the one or more transaction constraints, the computing system provides an indication to the access device that the interaction is authorized.

Inventors:
LEGLER MATTHEW AARON (US)
Application Number:
PCT/US2019/022591
Publication Date:
October 03, 2019
Filing Date:
March 15, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
VISA INT SERVICE ASS (US)
International Classes:
G06Q20/38; G06Q20/02; G06Q20/10; G06Q20/32
Foreign References:
US7600676B12009-10-13
US20100312704A12010-12-09
US20160248773A12016-08-25
US20090113530A12009-04-30
US20170169422A12017-06-15
Attorney, Agent or Firm:
BOUQUET, Bert E. et al. (US)
Download PDF:
Claims:
WHAT IS CLAIMED IS:

1. A computer-implemented method comprising:

receiving, at a computing system, from a user, a request for an access code and one or more constraints on a use of the access code;

identifying, by the computing system, a portable device to be associated with the access code;

obtaining, by the computing system and using the portable device, authorization for one or more potential interactions using the access code;

upon obtaining authorization for the one or more interactions, generating, by the computing system, the access code, which includes an identifier that causes an access request that includes the access code be routed to the computing system;

receiving, at the computing system, from an access device, an access request comprising the access code in an interaction; and

upon determining that the interaction complies with the one or more transaction constraints, providing, by the computing system, an indication to the access device that the interaction is authorized.

2. The computer-implemented method of claim 1 , wherein obtaining authorization comprises transmitting, by the computing system, an authorization request message to an authorization entity computer associated with the portable device, the authorization request message including at least a portion of the one or more

constraints.

3. The computer-implemented method of claim 1 , wherein at least a portion of the access code is provided by the user.

4. The computer-implemented method of claim 1 , wherein the access code comprises a routing identifier and a request identifier.

5. The computer-implemented method of claim 4, wherein the routing identifier identifies the computing system.

6. The computer-implemented method of claim 4, wherein the request identifier identifies the request for the access code.

7. The computer-implemented method of claim 4, wherein the request identifier comprises a combination of two randomly selected words.

8. The computer-implemented method of claim 7, wherein the two randomly selected words comprise a randomly selected adjective and a randomly selected noun.

9. The computer-implemented method of claim 1 , wherein the constraints comprise at least one of a type of resource provider at which the one or more potential interactions may be completed, a type of resource that the one or more potential interactions may involve, a geographic region within which the one or more potential interactions are to be completed, or a period of time within which the one or more potential interactions are to be completed.

10. The computer-implemented method of claim 1 , wherein the one or more potential interactions may be completed without verifying an identity of a second user that presents the access code to the access device.

11. A computing system comprising:

a processor; and

a memory including instructions that, when executed with the processor, cause the computing system to, at least:

receive, from a user, a request for an access code and one or more constraints on a use of the access code;

identifying a portable device to be associated with the access code;

obtain, using the portable device, authorization for one or more potential interactions using the access code;

upon obtaining authorization for the one or more interactions, generating the access code, which includes an identifier that causes an access request that includes the access code be routed to the computing system; receive from an access device, an access request comprising the access code in an interaction; and

upon determining that the interaction complies with the one or more transaction constraints, provide an indication to the access device that the interaction is authorized.

12. The computing system of claim 1 1 , wherein the access code has

16 digits.

13. The computing system of claim 12, wherein the access request is routed to the computing system by a transaction processing network.

14. The computing system of claim 12, wherein the access code comprises words.

15. The computing system of claim 12, wherein the access code comprises a routing identifier that includes a single digit that identifies a transaction processing network.

16. The computing system of claim 12, wherein the access code comprises a routing identifier that includes a five digit number that identifies the computing system.

17. The computing system of claim 1 1 , wherein the instructions further cause the computing system to use the portable device in the interaction.

18. The computing system of claim 1 1 , wherein the instructions further cause the computing system to provide a notification to the user upon completion of the interaction.

19. The computing system of claim 1 1 , wherein the access request is a request to obtain access to remote resources over a network.

20. The computing system of claim 19, wherein the access code enables the access device to view one or more webpages related to the remote resources.

Description:
UNTETHERED RESOURCE DISTRIBUTION AND MANAGEMENT

BACKGROUND

[0001] This international application claims priority to U.S. Patent Application No. 15/938,540, filed on March 28, 2018, the disclosure of which is herein incorporated by reference in its entirety for all purposes.

[0002] As technology surrounding electronic resource distribution systems has continued to advance, the biggest limitation to the capabilities of such systems has become the limited functionality of legacy resource provider systems (e.g., access devices, transaction processing devices, etc.). Such legacy systems are often not capable of adapting to new functionality as it becomes available to the electronic resource distribution systems.

[0003] For example, users often avoid carrying currency, either for security reasons or because the use of currency has become increasingly inconvenient.

However, these same users often find themselves in a position in which they would like to provide access to funds or other resources to another user, but only they have access to electronic accounts. Funds or other resources associated with an electronic account may be tethered to a particular user’s identity, such that only an authorized user for an account is typically able to access those resources. Hence, even if a first user could provide an account access instrument to a second user, that user would need to be authenticated prior to providing access to resources of the account.

[0004] Embodiments of the present invention address these problems and other problems, individually and collectively.

SUMMARY

[0005] Embodiments of the disclosure are directed to a system in which a user is able to untether some amount of resources from an account to be associated with a code. The code may be used by any party having possession of that code to complete an interaction such as a transaction using the resources. In some embodiments, the user may request the generation of a code from a computing system operated by a service provider by submitting a selection of an account and a number of constraints to be associated with a potential transaction using that code. The service provider, in some embodiments, may seek authorization for a potential transaction based on the provided constraints from an authorization entity computer operated by an authorization entity associated with the account. Upon receiving authorization for the potential transaction, the service provider may provide the code to the user. The user may use the code or may transfer the code to another party for use. In some embodiments, the code may be presented to a resource provider and may be used to obtain resources from that resource provider in a transaction so long as the transaction complies with the constraints provided in the request.

[0006] One embodiment of the invention is directed to a computer-implemented method comprising receiving, at a computing system, from a user, a request for an access code and one or more constraints on a use of the access code; identifying, by the computing system, a portable device to be associated with the access code;

obtaining, by the computing system and using the portable device, authorization for one or more potential interactions using the access code; upon obtaining authorization for the one or more interactions, generating, by the computing system, the access code, which includes an identifier that causes an access request that includes the access code be routed to the computing system; receiving, at the computing system, from an access device, an access request comprising the access code in an interaction; and upon determining that the interaction complies with the one or more transaction constraints, providing, by the computing system, an indication to the access device that the interaction is authorized.

[0007] Another embodiment of the invention is directed to a computing system comprising: a processor, and a memory including instructions that, when executed with the processor, cause the computing system to receive, from a

user, a request for an access code and one or more constraints on a use of the access code; identifying a portable device to be associated with the access code;

obtain, using the portable device, authorization for one or more potential interactions using the access code; upon obtaining authorization for the one or more interactions, generating the access code, which includes an identifier that causes an access request that includes the access code be routed to the

computing system; receive from an access device, an access request comprising the access code in an interaction; and upon determining that the interaction

complies with the one or more transaction constraints, provide an indication to the access device that the interaction is authorized..

[0008] Further details regarding embodiments of the invention can be found in the Detailed Description and the Figures.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009] FIG. 1 depicts an illustrative example interaction that may take place in accordance with at least some embodiments;

[0010] FIG. 2 depicts a diagram of an exemplary service provider computer 200 that may be configured to enable the generation and use of codes generated in accordance with at least some embodiments;

[0011] FIG. 3 depicts a flow chart illustrating a process for generating and redeeming a code in accordance with at least some embodiments;

[0012] FIG. 4A depicts a first illustrative example of a code that may be generated using techniques described herein;

[0013] FIG. 4B depicts a second illustrative example of a code that may be generated using techniques described herein;

[0014] FIG. 5 depicts a number of example graphical user interface interactions that may be used to illustrate a code request submission process in accordance with at least some embodiments;

[0015] FIG. 6 depicts an example of an interaction that may occur using the system described in accordance with at least some embodiments; and [0016] FIG. 7 depicts a flow diagram illustrating an example process for generation of, and subsequent redemption of, a code in accordance with at least some embodiments.

DETAILED DESCRIPTION

[0017] Prior to discussing specific embodiments of the invention, some terms may be described in detail.

[0018] An“access device” may be any suitable device for communicating with a resource provider computer or transaction processing network, and for interacting with a payment device, a user computer apparatus, and/or a client device. An access device may generally be located in any suitable location, such as at the location of a resource provider (e.g., a merchant). An access device may be in any suitable form. Some examples of access devices include point-of-sale (POS) terminals/devices, cellular phones, personal data assistants (PDAs), personal computers (PCs), tablet PCs, hand- held specialized readers, set-top boxes, electronic cash registers (ECRs), automated teller machines (ATMs), virtual cash registers (VCRs), kiosks, security systems, access systems, Websites, and the like. An access device may use any suitable contact or contactless mode of operation to send or receive data from, or associated with, a client device. In some embodiments, where an access device may comprise a POS terminal, any suitable POS terminal may be used and may include a reader, a processor, and a computer-readable medium. A reader may include any suitable contact or contactless mode of operation. For example, readers can include radio frequency (RF) antennas, optical scanners, bar code readers, or magnetic stripe readers to interact with a communication device. In some embodiments, an access device may also be referred to as a terminal device.

[0019] “Account data” may refer to any content of an account of a user

conducting a transaction. In some embodiments, account data may be payment account data that may be utilized to make a purchase. In other embodiments, account data may be any content associated with a user’s non-financial account. For example, account data may include electronic files, photos, videos, and documents stored by the user’s account. In some embodiments, account data may be stored by an authorization computer.

[0020] An“authorization request message” may be an electronic message that requests authorization for a transaction. In some embodiments, it is sent to a

transaction processing computer and/or an issuer of a payment card to request authorization for a transaction. An authorization request message according to some embodiments may comply with ISO 8583, which is a standard for systems that exchange electronic transaction information associated with a payment made by a user using a payment device or payment account. The authorization request message may include an issuer account identifier that may be associated with a payment device or payment account. An authorization request message may also comprise additional data elements corresponding to“identification information” including, by way of example only: a service code, a CW (card verification value), a dCW (dynamic card verification value), a PAN (primary account number or“account number”), a payment token, a user name, an expiration date, etc. An authorization request message may also comprise “transaction information,” such as any information associated with a current transaction, such as the transaction amount, resource provider identifier, resource provider location, acquirer bank identification number (BIN), card acceptor ID, information identifying items being purchased, etc., as well as any other information that may be utilized in determining whether to identify and/or authorize a transaction.

[0021] An“authorization response message” may be a message that responds to an authorization request. In some cases, it may be an electronic message reply to an authorization request message generated by an issuing financial institution or a transaction processing computer. The authorization response message may include, by way of example only, one or more of the following status indicators: Approval -- transaction was approved; Decline -- transaction was not approved; or Call Center -- response pending more information, resource provider must call the toll-free

authorization phone number. The authorization response message may also include an authorization code, which may be a code that a credit card issuing bank returns in response to an authorization request message in an electronic message (either directly or through the transaction processing computer) to the resource provider's access device (e.g. POS equipment) that indicates approval of the transaction. The code may serve as proof of authorization. In some embodiments, a transaction processing network may generate or forward the authorization response message to the resource provider.

[0022] A“client device” may be any electronic device capable of establishing a communication session with another electronic device (e.g., an application server) and transmitting / receiving data from that device. A client device may include the ability to download and/or execute mobile applications. Client devices may include mobile communication devices as well as personal computers and thin-client devices.

[0023] An“issuer” may typically refer to a business entity (e.g., a bank) that maintains an account for a user that is associated with a portable communication device such as an account enrolled in a mobile application installed on a portable

communication device. An issuer may also issue account parameters associated with the account to a portable communication device. An issuer may be associated with a host system that performs some or all of the functions of the issuer on behalf of the issuer.

[0024] A“portable device” may refer to any suitable device that may be portable.

It may be used to conduct a financial transaction, such as to provide payment

information to a merchant. A portable device may be in any suitable form. For example, suitable portable devices may be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). They may include smart cards, magnetic stripe cards, keychain devices (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. Other examples of portable devices include cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, 2-D barcodes, an electronic or digital wallet, wearable devices such as smart watches, fitness bands, ankle bracelets, rings, earrings, and the like. If the portable device is in the form of a debit, credit, or smartcard, the payment device may also optionally have features such as magnetic stripes. Such devices can operate in either a contact or contactless mode. [0025] The term“resource” generally refers to any asset that may be used or consumed. For example, the resource may be computer resource (e.g., stored data or a networked computer account), a physical resource (e.g., a tangible object or a physical location), or other electronic resource or communication between computers (e.g., a communication signal corresponding to an account for performing a transaction). Some non-limiting examples of a resource may be a good or service, a physical building, a computer account or file, or a payment account. In some embodiments, a resource may refer to a financial product, such as a loan or line of credit.

[0026] A“resource provider” may be an entity that can provide a resource such as goods, services, information, and/or access to such a resource. Examples of a resource provider include merchants, online or other electronic retailers, access devices, secure data access points, etc. A“merchant” may typically be an entity that engages in transactions and can sell goods or services, or provide access to goods or services. A“resource provider computer” may be any computing device operated by a resource provider.

[0027] A“computing system” may including any suitable computation device or devices. In some embodiments, a computing system may include a server computer.

[0028] A“server computer” may include a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a

minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a Web server. The server computer may be coupled to a database and may include any hardware, software, other logic, or combination of the preceding for servicing the requests from one or more client computers. The server computer may comprise one or more computational apparatuses and may use any of a variety of computing structures, arrangements, and compilations for servicing the requests from one or more client devices.

[0029] An“interaction” may be a reciprocal action or influence. An example of an interaction may be a transaction. [0030] A“transaction” may be any suitable exchange between two or more entities. For example, a transaction may include a first electronic device (e.g., a client device) requesting resources from a second electronic device (e.g., a resource provider).

[0031] A“transaction processing network” (e.g., VisaNet ® ) may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, and clearing and settlement services. An exemplary transaction processing network may include VisaNet ® . Transaction

processing networks such as VisaNet ® are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet ® in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services.

[0032] The term "verification" and its derivatives may refer to a process that utilizes information to determine whether an underlying subject is valid under a given set of circumstances. Verification may include any comparison of information to ensure some data or information is correct, valid, accurate, legitimate, and/or in good standing.

[0033] FIG. 1 depicts an illustrative example interaction that may take place in accordance with at least some embodiments. In FIG. 1 , a user may connect to a service provider computer 102 via a client device 104. In some embodiments, the service provider computer 102 may maintain a number of accounts. In some embodiments, the service provider computer 102 may maintain an account associated with the client device 104 and/or its user. The account maintained by the service provider computer 102 may store a number of data related to the user. For example, the service provider computer 102 may store user data, payment device data, user preference data, or any other suitable user data.

[0034] The service provider computer 102 may be any computing device capable of performing at last a portion of the functions described herein. The service provider computer 102 may be a remote server computer that is part of a computing system. In some embodiments, the service provider computer 102 may be a mobile application server that provides backend support for a mobile application installed upon the client device 104. In some embodiments, the service provider computer 102 may maintain one or more databases 106 that include account data and/or transaction related mappings to codes.

[0035] The client device 104 may comprise any suitable computing device capable of receiving a request from a user and presenting a code in accordance with embodiments of the disclosure. The client device 104 may include at least a processor and a memory. The memory of the client device 104 may include at least computer- executable instructions that cause the processor to perform certain functions in accordance with embodiments of this disclosure. For example, the memory may include a mobile application that causes the client device 104 to initiate a process to generate a code 108. The code 108 may be an access code, which allows a person in possession of the code 108 to obtain access to a resource such as goods, services, data, etc. This may involve transmitting a request for a code to a service provider computer 102.

[0036] In some embodiments, upon execution of a mobile application installed upon the client device 104, the client device 104 may establish a communication session with a service provider computer 102 in which at least some processing is performed by the service provider computer 102 on behalf of the mobile application.

The service provider computer 102 may, upon receiving a request from the mobile application, associate that request with a code to be used in accordance with

constraints specified within the request. In some embodiments, the code may be generated by the service provider computer 102. In some embodiments, the code may be selected from a list of available codes. In some embodiments, the service provider computer 102 may receive the code from the client device 104. The service provider computer 102 may then provide, to the client device 104, the code associated with the request. In some embodiments, the service provider computer 102 may obtain pre- authorization for the transaction prior to providing the code 108 to the client device 104.

[0037] In some embodiments, a code 108 may include any suitable string of characters that may be used by the service provider computer 102 to identify a particular transaction. In some embodiments, the code 108 may be a numeric string. In at least some of these embodiments, the code 108 may be a 16-digit numeric string which is formatted similar to a credit card number. In some embodiments, the code 108 may be a word or phrase. The word or phrase may be nonsensical.

[0038] In the example interaction of FIG. 1 , the code 108 may be provided to another person or a resource provider as a bearer instrument (i.e. , it can be used by any person having possession of the code 108) on some medium 110. In some embodiments, the code 108 may be transferred to some other form of media. For example, the code 108 may be written on a piece of paper. The code 108, once generated, may be used to conduct any transaction at any resource provider that has the capability to accept the code, so long as the transaction complies with one or more constraints indicated within the request. The code 108 may also be used by any person, regardless of whether that person is the one for whom the code was generated.

[0039] In some embodiments, the code 108 may be formatted such that it can be entered at an access device 112 in order to complete a transaction. In some

embodiments, the code 108 may be formatted in a manner similar to that of a credit card number or other primary account number (PAN). In these embodiments, an operator of the access device 112 may enter the code 108 in lieu of a PAN when accepting payment for a transaction. For example, the operator may manually enter the code 108 using a manual credit card number input process. The access device 112, or a transport computer 114 in communication with the access device 112, upon receiving the code 108, may generate an authorization request message in a manner similar to that in which a credit card number has been used. The authorization request message may then be routed to a transaction processing network 116 in a manner similar to that in which a credit card number has been used. The transaction processing network 116 may then determine, based on information included in the code 108, that the

authorization request message should be routed to the service provider computer 102 instead of a typical authorization entity computer operated by an authorization entity (e.g., an issuer). Once the service provider computer 102 receives the authorization request message, it may determine whether to approve or decline the transaction based on constraints indicated within the earlier request, and may transmit an authorization response message to the access device 112 via the transaction processing network 116. The transaction for which the code 108 has been presented may then be completed or declined based on the received authorization response message.

[0040] For simplicity of illustration, a certain number of components are shown in FIG. 1. It is understood, however, that embodiments of the invention may include more than one of each component. In addition, some embodiments of the invention may include fewer than or greater than all of the components shown in FIG. 1. In addition, the components in FIG. 1 may communicate via any suitable communication medium (including the Internet), using any suitable communications policy. In at least some embodiments, each component of the depicted architecture may represent one or more special purpose devices configured to perform the described functions. In some embodiments, each component of the depicted architecture may comprise a cluster or group of devices that each perform the same, or a similar, function.

[0041] FIG. 2 depicts a diagram of an exemplary service provider computer 200 that may be configured to enable the generation and use of codes generated in accordance with at least some embodiments. The service provider computer 200 may be an example service provider computer 102 described with respect to FIG. 1. FIG. 2 also shows that the service provider computer 200 is in communication with a client device 220 via a network 222.

[0042] The service provider computer 200 may be any type of computing device capable of receiving a request from a client device, identifying a number of constraints associated with the request, associating a code with the request, and providing the code to the client device in response to the request. In at least some embodiments, the service provider computer 200 may include at least one memory 202 and one or more processing units (or processor(s)) 204. The processor(s) 204 may be implemented as appropriate in hardware, computer-executable instructions, firmware or combinations thereof. Computer-executable instruction or firmware embodiments of the processor(s) 204 may include computer-executable or machine executable instructions written in any suitable programming language to perform the various functions described. [0043] The memory 202 may store program instructions that are loadable and executable on the processor(s) 204, as well as data generated during the execution of these programs. Depending on the configuration and type of service provider computer 200, the memory 202 may be volatile (such as random access memory (RAM)) and/or non-volatile (such as read-only memory (ROM), flash memory, etc.). The service provider computer 200 may also include additional storage 206, such as either removable storage or non-removable storage including, but not limited to, magnetic storage, optical disks, and/or tape storage. The disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for the service provider computer 200. In some embodiments, the memory 202 may include multiple different types of memory, such as static random access memory (SRAM), dynamic random access memory (DRAM) or ROM.

[0044] Turning to the contents of the memory 202 in more detail, the memory 202 may include an operating system and one or more application programs or services for implementing the features disclosed herein including at least a module for generating or selecting a code to be associated with a transaction (code generator 208) and a module for determining whether a code received complies with constraints for a transaction (verification module 210). The memory 202 may also include account data 212, which maintains information associated with individual accounts, as well as code data 214, which maintains mappings between generated codes and various transactions / constraints.

[0045] In some embodiments, the code generator 208 may, in conjunction with the processor 204, be configured to receive a request for a code. The request may include a number of different transaction criteria. For example, the request may indicate a type of resource provider at which the code can be redeemed, a type of resource (e.g., good or service) for which the code can be redeemed, a maximum currency threshold for which the code can be redeemed, or any number of other suitable criteria. In some embodiments, the request may include an indication of a payment device to be used in completing the transaction. For example, the request may include a selection of a credit card associated with an account related to the transaction. In some embodiments, the account may be associated with only one payment device, which may be selected by default. In some embodiments, the request may include an identifier for a payment account which is not currently associated with the account.

[0046] In some embodiments, prior to generating a code in response to receiving the request, the code generator 208 may obtain pre-authorization for one or more interactions (e.g., a specific transaction) related to the request. For example, the service provider may generate an authorization request message comprising an account number associated with the selected payment device to be routed to an authorization entity (e.g., an issuer) associated with the selected payment device. In this example, because the potential resource provider may not be known, the service provider may act as the resource provider for the purposes of the authorization request message. Once the service provider computer 200 receives confirmation that the transaction is approved (e.g., via an authorization response message), the code generator 208 may associate a code with the received request. The authorization entity may place a hold of the account for an amount stated in the authorization request message. For example, a user’s credit card may be selected and one hundred dollars may be held against a credit limit of one thousand dollars, such that the available to buy amount is now nine-hundred dollars. The user may be not be invoiced on the one hundred dollars, but will only be invoiced when actual transactions are conducted using the code. If the code is not used within a predetermined amount of time, the hold may be released.

[0047] In other embodiments, an actual authorization and settlement process may be performed at the time of code generation. In this case, the service provider computer 200 may maintain an escrow account with funds. When the code is used to conduct a transaction, funds can be withdrawn from the escrow account. If the code is not used within a predetermined amount of time, the funds can be returned to the user’s account at the authorizing entity.

[0048] In some embodiments, the code may be selected by the service provider computer 200 from some list of maintained codes. For example, the service provider computer 200 may select a code which is currently not in use from a list of codes. In some embodiments, the service provider computer 200 may ensure that the latest use of the code was some threshold amount of time prior to a current date/time or pertains to a transaction limited to a geographic area some predetermined distance from a geographic location of the client device from which the request was received. In some embodiments, the code may be generated by the service provider computer 200. For example, the service provider may generate some random, or seemingly random, string of characters and/or numbers. In some embodiments, the code may include a static portion and an identifier. For example, the first portion of the code may comprise a routing identifier (e.g., a banking identification number (BIN)) that identifies the service provider computer 200 whereas the second portion of the code may comprise a string of characters unique to the request (e.g., a request identifier).

[0049] In some embodiments, the verification module 210 may, in conjunction with the processor 204, be configured to verify whether or not a transaction complies with the constraints associated with a code used in that transaction. In some

embodiments, an authorization request message received by the service provider computer 200 in relation to the transaction may include a code and transaction details. Upon identifying the code, the verification module 210 may identify the constraints associated with that code. For example, the verification module 210 perform a query operation to identify one or more constraints associated with the code within a database table. The verification module 210 may then compare transaction details in the authorization request message with the identified one or more constraints to verify that the transaction complies with those constraints. For example, the verification module 210 may determine whether a resource provider type associated with the authorization request message (e.g., as indicated by a merchant code) matches those allowed via a constraint on resource provider type. If the verification module 210 determines that the authorization request message complies with each of the constraints stored in relation to the code, then the verification module 210 may generate an authorization response message that indicates the transaction should be approved. Otherwise, the verification module 210 may generate an authorization response message that indicates the transaction should be declined. In some embodiments, the verification module 210 may generate an authorization request to be sent to an authorization entity (e.g., the same authorization entity from which pre-authorization was obtained) in order to obtain payment for the amount of the transaction as indicated in the received authorization request message.

[0050] The service provider computer 200 may also contain communications interface(s) 216 that enable the service provider computer 200 to communicate with a stored database, another computing device or server, one or more client devices, and/or any other suitable electronic devices. In some embodiments, the communication interface 216 may enable the service provider computer 200 to communicate with other electronic devices on a network (e.g., on a private network). The service provider computer 200 may also include input/output (I/O) device(s) and/or ports 218, such as for enabling connection with a keyboard, a mouse, a pen, a voice input device, a touch input device, a display, speakers, a printer, etc.

[0051] The service provider computer 200 may be in communication with a number of client devices 220 via a network 222. A client device 220 may be capable of interacting with the service provider 200 to access an account. For example, the client device 220 may include a web browser or other application that enables a user of the client device 220 to access a website maintained by the service provider 200. Each client device may include at least a processor 224 and memory 226 that stores program instructions that are loadable and executable on the processor 224. The memory 226 may include at least an operating system 228, but may also include a mobile application 230.

[0052] In some embodiments, the client device 220 may include a mobile application 230 configured to, in conjunction with the processor(s) 224, provide an operator of the client device 220 with the ability to submit a request to the service provider 200 for a code, as well as to present a received code to the operator. In some embodiments, upon execution of the mobile application 230, the client device 220 may be caused to display a graphical user interface (GUI) that enables communication between the operator of the client device 220 and the service provider 200. In some embodiments, the operator may be required to log into an account maintained by the service provider 200 in order to authenticate the operator. In some embodiments, various other techniques for authenticating the operator may be used. Once the operator has been authenticated, the operator may be presented with a number of options for constraining a transaction for which a code may be requested. For example, the operator may interact with a number of radio buttons, drop-down menus, or text input fields to identify each of the constraints for a particular transaction. Each of the operator’s selections may be conveyed to the code generator 208 of the service provider 200. This is described in greater detail elsewhere in this disclosure.

[0053] In some examples, the network(s) 222 may include any one or a

combination of many different types of networks, such as cable networks, the Internet, wireless networks, cellular networks, and other private and/or public networks. While the illustrated example represents the client device 220 accessing the service provider 200 via the network(s) 222, the described techniques may equally apply in instances where the client device 220 interacts with a service provider 200 via a landline phone, via a kiosk, or in any other manner. It is also noted that the described techniques may apply in other client/server arrangements (e.g., set-top boxes, etc.), as well as in non- client/server arrangements (e.g., locally stored applications, peer to-peer systems, etc.).

[0054] FIG. 3 depicts a flow chart illustrating a process for generating and redeeming a code in accordance with at least some embodiments. Some or all of the process 300 (or any other processes described herein, or variations and/or

combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions and may be implemented as code (e.g., executable instructions, one or more computer programs or one or more applications).

In accordance with at least one embodiment, the process 300 of FIG. 3 may be performed by at least the service provider computer 200 shown in FIG. 2. The code may be stored on a computer-readable storage medium, for example, in the form of a computer program including a plurality of instructions executable by one or more processors. The computer-readable storage medium may be non-transitory.

[0055] Process 300 may begin at 302, when a request is received with respect to a proposed transaction. At 302, a service provider computer may receive a request from a client device that a code be generated in association with one or more transaction constraints. In some embodiments, the request may be received via a mobile

application installed upon a client device. The mobile application may cause the client device to authenticate the user prior to allowing the user to submit the request.

[0056] At 304, the service provider may identify a number of constraints for the potential transaction from the received request. For example, the received request may include an indication of a type of resource provider at which the proposed transaction may be completed, a type of resource that the proposed transaction may involve, a geographic location/region within which the proposed transaction must be completed, a maximum amount for which the transaction may be completed, a period of time within which the proposed transaction must be completed, or any other suitable constraint that may limit the proposed transaction.

[0057] At 306, the service provider computer may obtain pre-authorization for the proposed transaction. In some embodiments, the service provider computer may generate an authorization request message that includes an indication of one or more of the constraints in the received request. For example, the service provider computer may generate an authorization request message to obtain pre-approval for an amount indicated as being a maximum amount for the proposed transaction. In some

embodiments, the service provider computer may generate the authorization request message to indicate that the service provider computer is the resource provider for the purposes of the proposed transaction.

[0058] Once the authorization entity has received the authorization request message, the authorization entity may determine whether to approve or decline the transaction based on the information provided in that authorization request message at 308. In some embodiments, this may involve determining whether the account associated with the selected payment device has sufficient funds to cover a maximum amount associated with the proposed transaction. In some embodiments, the

authorization entity may determine whether the likelihood that the transaction is fraudulent is above or below some acceptable threshold level of risk. The authorization entity may respond to the authorization request message by providing an authorization response message that includes an indication as to whether or not the transaction is authorized.

[0059] Upon receiving pre-authorization for the transaction, the service provider computer may generate a code to be associated with the request at 310. In some embodiments, the service provider may generate the code. In at least some of these embodiments, the service provider may randomly generate or select a string of characters. By way of illustration, in a first example, the service provider may generate a random string of numeric characters. In s second example, the service provider may randomly select and combine words or phrases from a list of available words or phrases. In some embodiments, the service provider computer may maintain a list of codes from which the service provider computer may select. Once the code has been generated, the service provider computer may provide the code to the client device from which the request was received at 312.

[0060] At 314, the service provider computer may receive an authorization request message that includes the code generated at 310. The authorization request message may be received via a transaction processing network. Upon receiving the authorization request message, the service provider computer may identify a number of details related to the transaction for which the authorization request message was generated at 316.

[0061] At 318, the service provider computer may identify each of the constraints provided in relation to the code at 304. The service provider may then approve or decline the transaction based on the transaction’s compliance with the constraints at 320. To do this, the service provider may compare the details of the transaction to each of those constraints in order to assess whether or not the transaction is in compliance with those constraints. For example, the transaction details may include a merchant category code (MCC) that indicates a category or type of merchant from which the authorization request message was received. The service provider may also determine that one of the constraints associated with the code is that the proposed transaction must be completed at a grocer. In this example, if the MCC indicates that the

authorization request message has originated at a resource provider which is not a grocer, then the service provider may determine that the transaction is not in compliance with the constraints provided, and may subsequently decline the

transaction. In some embodiments, the service provider computer may decline a transaction if the transaction is not in compliance with each and every constraint. In some embodiments, one or more constraints may be optional, in that the transaction may not be declined if the constraints are not complied with.

[0062] In some embodiments, the service provider computer, upon determining that the transaction is to be approved, may obtain authorization for the transaction at 322. To do this, the service provider computer may generate a second authorization request message that includes at least a portion of the details provided in the

authorization request message that was received by the service provider computer at 314. For example, the service provider computer may identify an amount of the transaction from the received authorization request message, for which authorization may subsequently be sought by the service provider computer.

[0063] The service provider computer may respond to the authorization request message received at 314 with an authorization response message at 324. The authorization response message may include an indication as to whether or not the transaction indicated in the received authorization request message is approved or declined. In some embodiments, the service provider computer may also provide a notification to the client device from which the request was received at 302.

[0064] In other embodiments, the service provider computer, after checking to see that a transaction using a code satisfies the constraints associated with the code, can forward an authorization request message to an authorizing entity computer such as an issuer computer for the actual amount of the current interaction (e.g., transaction). For example, a pre-authorization hold of one hundred dollars may have previously been placed on a credit card account when the code was generated. The actual transaction conducted with the code may only be twenty dollars. The authorization request message transmitted to the authorizing entity computer may be for twenty dollars and may then seek approval for that twenty dollar transaction, while also reducing the hold on that code to eighty dollars. A conventional clearing and settlement process on the twenty dollars can then be performed.

[0065] It should be noted that in the process 300 described above, in some embodiments, the payment device associated with the generated code is not charged until the final transaction has been conducted. Hence, it should be noted that the generated code of the system described herein differs from a conventional prepaid device in that the user that provides the code is not charged until the code is used. Additionally, there is no“lost” value in that the user that provides the code need not pay some predetermined amount, of which some amount may remain unused. Hence, one skilled in the art would recognize that embodiments of the disclosure enable the use of a code which, if unused, would not result in financial loss to the user for whom the code was generated.

[0066] FIG. 4 depicts some illustrative examples of embodiments of a code that may be generated in accordance with at least some embodiments. In FIG. 4, two different embodiments of such a code are depicted as FIG. 4A and FIG. 4B. As depicted, each code may include a routing identifier 402 and a request identifier 404.

[0067] FIG. 4A depicts a first illustrative example of a code that may be generated using techniques described herein. In FIG. 4A, the code may be a 16-digit string of numeric characters that mimics a credit card number.

[0068] A routing identifier 402 may be any string of characters that identifies a transaction processing network and/or an authorization entity. In some embodiments, the routing identifier 402 may be a banking identification number (BIN). The routing identifier may include an indication of a transaction processing network 406 that comprises one or more digits. In some embodiments, the routing identifier may include a single digit that identifies the transaction network. The routing identifier may also include an indication of an authorization entity 408 configured to process the code in accordance with embodiments described herein, which may be the computing system.

In some embodiments, the routing identifier may include a five digit number that identifies the computing system (i.e. , authorization entity). Hence, an access device that receives the depicted code may first ensure that the string is of an appropriate length. It should be noted that credit card numbers are typically 16 digits long, so a code designed to be used on existing access devices capable of inputting credit card numbers may also be 16 digits in length. After checking the length of the code, the access device may identify the transaction processing network from the indication of the transaction processing network 406. In this system, the access device that receives the depicted code may transmit an authorization request to the indicated transaction processing network, which may subsequently forward that request to the service provider based on the indication of the authorization entity 408. The service provider may then identify the request associated with the code based on the request identifier 404. It should be noted that the service provider identified by the indication of the authorization entity 408 may be an entity which only handles codes generated and used in the fashion described. However, in some embodiments, the request identifier 404 may also include an indication that the code is one generated in the manner described.

[0069] FIG. 4B depicts a second illustrative example of a code that may be generated using techniques described herein. In FIG. 4B, the code may be any string of alphanumeric characters. In some embodiments, an access device for a resource provider may need to be configured to receive and/or utilize a code as depicted in FIG. 4B.

[0070] An access device that receives the code of FIG. 4B may be programmed to identify a transaction processing network from a first string of alphanumeric characters of the routing identifier 402. For example, if the routing identifier 402 includes the identifier“ABC”, then the access device may be configured to route an authorization request message generated for a transaction that includes the code to the ABC transaction processing network for processing. The ABC transaction processing network may be configured to, based on the format of the received code, determine that the code is one used in accordance with the system described herein.

[0071] In some embodiments, the code may include a request identifier 404 that consists of some word or phrase that may indicate a specific request. It should be noted that the request identifier 404 may include a number of characters which is less than or equal to some maximum number of characters for the request identifier 404. In some embodiments, the request identifier 404 may consist of some nonsensical (or unintentionally sensical) word pairing or phrase. For example, the request identifier 404 may be generated by pairing a random adjective with a random noun. The use of this structure, along with the nonsensical nature of the word or phrase, may enable easier memorization of the code by a user of the system. In some embodiments, the request identifier 404 may be associated with a particular geographic region or location so that multiple of the same request identifier 404 can be used, each of which is associated with a different request based on geographic region. In some embodiments, the service provider, when generating a request identifier 404, may select a word or phrase which is not currently in use. In some embodiments, the word or phrase may be provided by a user of the system.

[0072] In some embodiments, an access device that receives the code shown in FIG. 4B may be able to convert the word phrase into numerical values using a lookup table or the like, before it is transmitted to a service provider computer.

[0073] In both FIG. 4A and FIG. 4B, the code may be formatted to include a first portion that identifies a transaction processing network and/or an authorization entity (routing identifier 402) and a second portion that identifies a request associated with the code (request identifier 404). It should be noted that the transaction processing network may also be an authorization entity.

[0074] FIG. 5 depicts a number of example graphical user interface interactions that may be used to illustrate a code request submission process in accordance with at least some embodiments. The graphical user interface (GUI) may be a GUI displayed in accordance with instructions executed by a mobile application installed on a client device. For illustrative purposes, the GUI interactions are presented below as a series of screens.

[0075] Screen 502 depicts a login element for a mobile application installed on, and executed from, a client device. As depicted at 502, a user may be prompted to log in to an account maintained by a service provider computer. Based on the login information provided, the service provider computer may identify information associated with the user and/or the client device. For example, the service provider computer may identify one or more payment devices associated with the user based on the user information provided.

[0076] As depicted in screen 504, upon attempting login for the mobile

application, the mobile application may cause the client device to initiate one or more authentication processes. An authentication process may involve any suitable collection and comparison of user information in order to authenticate a user’s identity. In some embodiments, this may involve the use of biometric information (such as a fingerprint), providing login information associated with an account maintained by the service provider computer, answering personal questions, etc. It should be noted that authentication of the user in the manner depicted may assure the service provider computer that the user has assumed financial responsibility for the code to be generated.

[0077] Upon login, the user may be provided a list of payment devices available to that user as depicted at 506. In some embodiments, the list of payment devices may be an aggregated list of wallet services and other payment devices known to be associated with the user or client device. Some of the payment devices may represent electronic wallet applications or other token services and some of the payment devices may represent issuer-supported payment device options (e.g., credit cards). For example, the user may add a payment device to his or her account maintained by the service provider using an enrollment process. In this example, the service provider may retrieve each of the payment devices that the user has enrolled and list those payment devices in the screen 506. In some embodiments, the user may be associated with a single payment device or a default payment device. In these embodiments, the default or single payment device may automatically (e.g., without user interaction) be selected and the screen 506 may not be presented.

[0078] As depicted in screens 508 and 510, the mobile application may enable a user to provide an indication of one or more constraints (or limits) to be placed upon a proposed transaction. In some embodiments, the user may interact with a number of radio buttons, drop-down menus, text input fields, or other suitable indicators to identify each of the constraints for a particular proposed transaction. Each aspect of a proposed transaction may be either constrained or unconstrained based on user selection. An unconstrained aspect of a transaction may be an indication of a transaction detail for which any value is acceptable. A constrained aspect of a transaction may be an indication of a transaction detail for which only certain values are acceptable. In some embodiments, aspects of a transaction may be constrained by a range of values, a maximum value, a minimum value, an exact value, or any other suitable limitation on an aspect of a transaction. In some embodiments, the service provider computer may maintain a predefined set of constraints (e.g., a shortcut) that the user can quickly select. A predefined set of constraints may include a set of default constraints, or it may include a set of constraints which has previously been selected by the user.

[0079] Once a number of constraints have been selected by the user, the mobile application may convey those constraints, along with the user’s selection of the payment device, to the service provider, which may then generate and provide a code.

In some embodiments, the service provider may obtain authorization or pre- authorization from some authorization entity (e.g., an issuer). For example, upon receiving a selection of a payment device and a maximum amount of the transaction, the service provider may obtain pre-authorization for a transaction in the maximum amount from an issuer of the selected payment device. The service provider computer may then generate a code upon obtaining authorization/pre-authorization of the transaction. Upon receiving the code from the service provider, the code may be displayed by the mobile application as depicted in screen 512. Once provided, the code may be used to complete a transaction that complies with the indicated constraints. It should be noted that because the user has been authenticated to generate the code, a bearer of the code may not need to be authenticated upon presentation of the code to complete a transaction. Hence, the code may be used to complete a transaction by any entity having possession (physical or mental) of the code.

[0080] FIG. 6 depicts an example of an interaction that may occur using the system described in accordance with at least some embodiments. In FIG. 6, a user may request a code in relation to a proposed transaction using techniques described herein. For example, the user may submit a request for a code using the techniques illustrated in, and described with respect to, FIG. 5.

[0081] At 602, upon submitting and receiving a code via processes described herein, a user may transfer the code to another medium in some embodiments. For example, the user may write down the code on a piece of paper or memorize the code.

It should be noted that the particular medium onto which the code is transferred will have no bearing on the use of such code. In some embodiments, the code may be transferred to another client device electronically. For example, the code may be included in a text message or other messaging service transmission. In some

embodiments, a code may be converted into a machine readable code (e.g., a barcode or quick response (QR) code). For example, a code transmitted to another electronic device may be converted into a QR code so that an access device may read the code from the screen of that electronic device. In some embodiments, the code may be printed by a printing device in communication with the client device. In at least some of these embodiments, the code may be printed as a machine-readable code.

[0082] At 604, the user that generated the code may transfer possession of the code and/or the medium that includes the code to a second user. There is no

requirement that the second user have any relationship to the user that generated the code. It should be noted that transaction constraints associated with a particular code may not be readily apparent to one that receives that code. Flence, the user that generates and provides the code may need to make the second user aware of those constraints. For example, the user that generates the code may provide an indication that the maximum amount available by using the code is $20.00 and that the code can only be used to purchase food items.

[0083] At 606, the user may present the code as a payment device to complete a transaction at any resource provider capable of accepting that code. In some

embodiments, the resource provider may manually enter the code into an access device (e.g., a POS terminal) in a manner similar to inputting a credit card number. In some cases, the access device may not be capable of differentiating the received code from an actual credit card number. In some embodiments, use of the code may not require any verification of the user’s identity or other user authentication. This means that the code may be a bearer instrument in that any user is capable of redeeming the code by virtue of being in possession of (bearing) the code. In some embodiments, the user may be provided with the option to supplement a transaction by presenting a second payment device. For example, if the maximum amount for which the code can be redeemed is $20.00, and the transaction totals $25.00, then the user may make a payment of $20.00 with the code and may make a second payment of $5.00 using a different payment device. It should be noted that the resource provider, upon entering the code, is then provided with an indication as to whether the transaction is approved or declined based on whether the transaction is in compliance with constraints associated with that transaction. It should also be noted that, in contrast to various welfare and/or food stamp programs, there is no analysis of item types that takes place at the access device.

[0084] By way of illustration, consider some examples which illustrate various uses of the system described herein. In a first example, a user may encounter an unbanked individual (i.e., a person that does not have access to a bank account) such as a homeless individual. The user may wish to provide funds to the unbanked individual, but the user may be uncomfortable with providing such funds in that he or she cannot be sure that the funds will be spent appropriately. In this example, the user may generate a code that can be used at any merchant, but for food purchases only. In this scenario, the code can then be given to the unbanked individual and the user can be sure that the funds accessed using the code will be spent toward purchasing food. The user is able to provide this code even if he or she is not currently in possession of any cash.

[0085] In a second example, a first user may be approached by a second user. The second user may indicate to the first user that she is making a coffee run and may ask if the first user wants anything. The first user may generate a code that can be used to purchase a coffee from the local coffee vendor. The first user may then provide the code, along with his or her coffee order, to the second user. The second user may then use the code at the coffee vendor to pay for the first user’s coffee order.

[0086] In a third example, a user that plans to travel in the future may generate a code that can be used anywhere in the location to which he or she is traveling. In this example, the user may memorize the code which is generated. In the event that the user is left without access to his or her funds (e.g., the user loses her wallet / purse), the user may use the memorized code to complete a transaction.

[0087] FIG. 7 depicts a flow diagram illustrating an example process for generation of, and subsequent redemption of, a code in accordance with at least some embodiments. In accordance with at least some embodiments, process 700 of FIG. 7 may be performed by a service provider computer (e.g., the service provider computer 200 of FIG. 2).

[0088] Process 700 may begin at 702, when a request for a payment code is received with respect to a proposed transaction. At 702, the process may involve receiving a request from a client device for a payment code to be generated along with an indication of one or more transaction constraints to be associated with that payment code. Various techniques for submitting such a request are described in greater detail above with respect to FIG. 5.

[0089] At 704, the process may involve identifying the one or more transaction constraints for the potential transaction from the received request. As described above, the received request may include an indication of a type of resource provider at which the proposed transaction may be completed, a type of resource that the proposed transaction may involve, a geographic location/region within which the proposed transaction must be completed, a maximum amount for which the transaction may be completed, a period of time within which the proposed transaction must be completed, or any other suitable constraint that may limit the proposed transaction.

[0090] At 706, the process may involve identifying a portable device such as a payment device to be associated with the proposed transaction. As described above, a user may be presented with a list of payment devices available to that user and may select a payment device from that list of payment devices. Alternatively, the user may be associated with a single payment device or a default payment device. In these embodiments, the default or single payment device may be selected automatically.

[0091] At 708, the process may involve obtaining authorization for the proposed transaction in relation to the identified payment device. In some embodiments, the process may involve generating an authorization request message that includes an indication of one or more of the constraints in the received request, and routing that authorization request message to an authorization entity associated with the identified payment device for authorization. For example, the process may involve generating an authorization request message for an amount indicated as being a maximum amount for the proposed transaction. In some embodiments, the process may involve determining whether the likelihood that the proposed transaction is fraudulent is above or below some acceptable threshold level of risk based on characteristics of the user.

[0092] At 710, the process may involve generating an access code such as a payment code. In at least some of these embodiments, the code may be randomly generated or the code may be selected. By way of illustration, in a first example, the process may involve generating a random string of numeric characters. In a second example, the process may involve randomly selecting and combining words or phrases (e.g., adjectives and nouns) from a list of available words or phrases. In some

embodiments, a list of codes may be maintained from which a code that is not currently in use may be selected. In some embodiments, at least a portion of the payment code may be provided by the user. For example, the user may select a word or phrase that he or she would like included in the payment code. In these embodiments, the word or phrase provided by the user may comprise at least a portion of the payment code.

Some examples of codes that may be generated at this step are described in greater detail with respect to FIG. 4. Once the code has been generated, the process may involve providing the code to the client device from which the request was received at 712.

[0093] At 714, the process may involve receiving an authorization request message that includes the code generated at 710. The authorization request message may be received via a transaction processing network. Upon receiving the authorization request message, the process may involve identifying a number of details related to the transaction for which the authorization request message was generated at 716. For example, the process may involve identifying a category or type of resource provider from which the authorization request message was received based upon a merchant category code (MCC) included in the authorization request message. It should be noted that an authorization request message typically includes a number of different transaction details arranged in a specific format. The format of an authorization request message is dictated by International Standards Organization (ISO) 8583, which also dictates the types of information included in such a message. It should be noted that a constraint may be created to correspond to any transaction detail included in an authorization request message.

[0094] At 718, the process may involve identifying each of the constraints provided in relation to the code at 704. The process may involve then approving or declining the transaction based on the transaction’s compliance with the constraints at 720. To do this, the process may involve comparing the details of the transaction to each of those constraints in order to assess whether or not the transaction is in compliance with those constraints. For example, the transaction details may include a merchant category code (MCC) that indicates a category or type of merchant from which the authorization request message was received. The process may involve also determining that one of the constraints associated with the code is that the proposed transaction must be completed at a grocer. In this example, if the MCC indicates that the authorization request message has originated at a resource provider which is not a grocer, then the process may involve determining that the transaction is not in compliance with the constraints provided, and may subsequently decline the

transaction. In some embodiments, the process may involve declining a transaction if the transaction is not in compliance with each and every constraint. In some

embodiments, one or more constraints may be optional, in that the transaction may not be declined if the constraints are not complied with. [0095] In some embodiments, upon determining that the transaction is to be approved, process may involve obtaining authorization for the transaction at 722. To do this, the process may involve generating a second authorization request message that includes at least a portion of the details provided in the authorization request message that was received at 714. For example, the process may involve identifying an amount of the transaction from the received authorization request message, for which authorization may subsequently be sought.

[0096] The process may further involve responding to the authorization request message received at 714 with an authorization response message at 724. The authorization response message may include an indication as to whether or not the transaction indicated in the received authorization request message is approved or declined. In some embodiments, the process may involve also providing a notification to the client device from which the request was received at 702 indicating a status of the transaction.

[0097] In some embodiments, the system described herein may be used to obtain access to remote resources over a network (e.g., resources on the Internet). For example, the access code may be used to gain access to specific data or services available via a remote device. In some embodiments, a user or administrator of a network resource may request the ability to provide access to that resource. In these embodiments, the user may request, and be provided with, an access code using the techniques described above.

[0098] By way of illustration, consider a scenario in which a website host manages access to remote resources over a network. In this example, the resources may be services (e.g., firewall services, anti-virus services, etc.) or data (content). The remote resources may be hosted on one or more webpages. In this scenario, the website host may request an access code that includes constraints on the access to the resource. For example, the request may specify an access code that grants a specific amount of time for, or a specific level of access to, the one or more webpages / resources. Once generated, the access code may be provided to a second user. The second user in this scenario may then access the resources using the access code provided that the request for access conforms to the constraints associated with the code. For example, upon entering the access code into a prompt, the second user may be directed to the remote resource or a webpage that includes the remote resource.

[0099] Embodiments of the disclosure provide for a number of advantages over conventional systems. For example, embodiments of the system described herein enable a user to untether and earmark funds from his or her payment device to be used later (either by that user or by another user). By doing this, the system enables use of a code by a person that need not be authenticated or verified. Flence, a user wishing to provide limited access some amount of his or her funds to an unverifiable individual is able to do so in an easy manner, while also enabling the ability to control what those funds are used for. Furthermore, embodiments provide advantages over prepaid device systems in that funds are not drawn upon until a transaction is actually completed, and only then for the amount of the transaction.

[0100] Furthermore, one skilled in the art would recognize that there are a number of technical challenges addressed by the embodiments described herein. In particular, the disclosure addresses challenges related to the ability to implement various concepts described herein. For example, the disclosure describes novel techniques that enable the creation of a payment code that can be used on existing hardware without any updates to that hardware. This enables the introduction of new functionality to legacy systems without imposing any burden on the owners of those legacy systems. To do this, some embodiments of the disclosure describe that the payment code may comprise data in a specific format. This formatted code may be used in the same manner as a credit card number or other payment device, which enables its use in existing point-of-sale systems capable of inputting such formats. The transaction information may then be routed to a service provider (in a manner similar to that of a credit card) based on the information in the formatted code. Once the service provider receives this transaction data, it is able to recognize that the transaction relates to a previously received request and process that transaction data differently than from that of a typical credit card number using the novel techniques described herein. Flence, the disclosure describes a system which is architected so that the novel functionality described herein can be provided while the downstream system participants are not impacted.

[0101] As described, the inventive service may involve implementing one or more functions, processes, operations or method steps. In some embodiments, the functions, processes, operations or method steps may be implemented as a result of the

execution of a set of instructions or software code by a suitably-programmed computing device, microprocessor, data processor, or the like. The set of instructions or software code may be stored in a memory or other form of data storage element which is accessed by the computing device, microprocessor, etc. In other embodiments, the functions, processes, operations or method steps may be implemented by firmware or a dedicated processor, integrated circuit, etc.

[0102] Any of the software components or functions described in this application may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer-readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.

[0103] While certain exemplary embodiments have been described in detail and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not intended to be restrictive of the broad invention, and that this invention is not to be limited to the specific arrangements and constructions shown and described, since various other modifications may occur to those with ordinary skill in the art.

[0104] As used herein, the use of "a", "an" or "the" is intended to mean "at least one", unless specifically indicated to the contrary.