Andrew nematalla add to account download pdf






















Download - Livro 2 pdf Robson Pinheiro. Download Aardse schoonheid, hemelse kunst pdf. Download Address Book. Download Bonsai pdf Marc Noelanders. Landrum pdf. Download De Frans-Duitse oorlogen pdf F. Download GIMP 2. Download Hoe en waarom boek ontdekkingen pdf Robbin.

Jahrhundert pdf Axel Heike-Gmelin. Download Leos Backbuch pdf Leo Kebernik. Jeff Horton pdf. Bright pdf. Download Over alle hindre pdf Ingeborg Arvola. Download Pictures in the Fire by Eileen Walker pdf.

Download Raggningsboken - J W Rom pdf. Ellen Netting. Download St. Download Sweetbitter: Roman pdf Sabine Kray. Download Talk to Me, Baby! Arthur T Bradley. Download Verdens bedste bedstefar - Janry, Tome pdf. Hammer pdf. Dusk maiden of amnesia: 1 scarica. He Still Does. Lucado, Max by Max Lucado pdf.

El remiso mr. Episodios Nacionales IV. Even blij met Evenblij Annemarie ebook - Annemarie Evenblij. Grazie per quella volta. Confessioni di una donna difettosa scarica - Serena Dandini pdf. Hent Bogslugeren 1 Henning Brudholm pdf. Het uitgebreide grote vaardigheden boek boek - Pijs. Den nya ekonomiska supermakten Loretta Napoleoni pdf. I demoni di mezzanotte.

I nationens intresse bok. Space Program Download. PDF Medezin, Aberglaube, etc. The Scented Garden. Anthropology of the Sex Life in the Levant Translated by David Berger ePub. PDF Mrs. PDF Spenser. Edited by G. K ePub. PDF Vive le Color!

Read Cleaning Historic Buildings: v. Educating smartest, brightest kids Book 1 PDF. Read Egograms PDF. For example, in some embodiments, the user account used to purchase the consumable content item can select whether the consumable content item should be shared with the other user accounts in the group or remain exclusive to the purchasing user account.

Alternatively, the master user account can be allowed to set whether consumable content items are shared or remain exclusive to the purchasing user account. In contrast, non-consumable content items that cannot be exhausted can generally be shared amongst the group. This can include content items such music, video, games, magazines, etc. Further, this can include in-application purchases that cannot be exhausted, such as magazine subscriptions, new game levels, non-exhaustible game power-ups, etc.

Although non-consumable content items are generally shared, the linked user accounts can be configured to share content items in any of a number of ways and this disclosure appreciates all such possibilities. Although specific steps are show in FIG. As shown, the method begins at block where a request to add a user account to a group of user accounts is received. At block it is determined whether the user account is already included in a different group of linked user accounts.

If at block it is determined that the user account is included in a different group of linked user accounts, the method continues to block where the request to add the user account to the group is denied and the method ends. If at block it is determined that the user account is not included in a different group of linked user accounts, the method continues to block where it is determined if a predetermined amount of time has elapsed since the last time the user account was added to a group of linked user accounts.

For example, as a general rule, a user account may be allowed to join only one group within a year. Thus, at block it can be determined whether the user account has been added to a group within the last year.

If at block it is determined that the predetermined amount of time has not elapsed since the user account having been added to a group, the method continues to block where the request to add the user account to the group is denied and the method ends. However, if at block it is determined that the predetermined amount of time has elapsed, the method continues to block where it is determined whether the group of linked user accounts includes a predetermined number of user accounts.

For example, as a general rule, each group of user accounts can be limited to including up to ten user accounts. Thus, at block it can be determined whether the group includes ten user accounts.

If at block it is determined that the group includes the predetermined number of user accounts, the method continues to block where the request to add the user account to the group is denied and the method ends. If at block it is determined that the group does not include the predetermined number of user accounts, the method continues to block where the user account is added to the group of user accounts.

The method then ends. As shown, the method begins at block where access to a user account is authorized. This can be the result of a client device accessing a content management system and providing a correct user name and password associated with the user account. The client device can then be authorized to access the user account. At block content items assigned to the user account are identified.

In some embodiments, the user account can include account data including content item identifiers that identify the content items assigned to the user account. The user account can thus be accessed to retrieve the content item identifiers and identify the content items assigned to the user account. At block it is determined whether the user account is linked to other user accounts.

In some embodiments, the user account can include unique account identifiers identifying each user account linked to the user account. If the user account is not linked to other user accounts, the method continues to block where the identified content items are presented. This can include transmitting data identifying the identified content items to the client device used to access the user account. The client device can then present the received data identifying the content items.

Alternatively, if at block it is determined that the user account is linked to other user accounts, the method continues to block where content items assigned to the user accounts linked to the user account are identified. This can be accomplished using the unique account identifiers identifying the linked user accounts to access the linked user accounts themselves and retrieve the content item identifiers assigned to the linked user accounts.

The method then continues to block where the identified content items, including those assigned to the user account and those assigned to the user accounts linked to the user account, are presented. This can include transmitting data identifying the content items to the client device from which the user account was accessed.

The data can then be presented on the client device. The linking interface lists that Don's user account is linked to the user accounts of Betty and Sally.

Further, the linking interface presents the payment method each of the linked user accounts is authorized to use for purchasing content items.

In this embodiment, Don's user account can be designated as the master user account enabling Don to vary settings affecting the group of linked user accounts. For example, the master user account can be enabled to add other user accounts to the group of user accounts. Selection of user interface element can enable Don to enter account information for other user accounts to add to the group.

Further, the master user account can vary settings regarding each of the linked user accounts, such as vary the payment method used by each of the linked user accounts to make purchases. To vary account settings in regards to Betty's user account, Don can select user interface element From this view, Don can vary settings in regards to Betty's user account. For example, Don can configure which content items assigned to Betty's user account are presented on Don's account.

As shown, music, video and books assigned to Betty's user account are currently set to be presented on Don's user account. To filter out certain types of content items assigned to Betty's user account, Don can change the settings as shown. For example, Don can select user interface element to toggle off music assigned to Betty's user account. When user interface element is toggled off, Don will not be presented with music assigned to Betty's user account. The linking interface further includes user interface element configured to remove Betty's user account from the group.

Don can choose to select user interface element to remove Betty's user account from the group, resulting in content items assigned to Betty's account no longer being accessible by Don's user account, and vice versa. To vary the payment method that Betty's user account is authorized to use to make purchases, Don can select user interface Further, the linking interface can include user interface element enabling Don to select whether receipts for purchases made using Betty's user account are sent to Don, for example via e-mail.

The more appropriate embodiment will be apparent to those of ordinary skill in the art when practicing the present technology. Persons of ordinary skill in the art will also readily appreciate that other system embodiments are possible.

Exemplary system includes a processing unit CPU or processor and a system bus that couples various system components including the system memory , such as read only memory ROM and random access memory RAM , to the processor The system can include a cache of high-speed memory connected directly with, in close proximity to, or integrated as part of the processor In this way, the cache can provide a performance boost that avoids processor delays while waiting for data.

These and other modules can control or be configured to control the processor to perform various actions. Other system memory may be available for use as well. The memory can include multiple different types of memory with different performance characteristics. The processor can include any general purpose processor and a hardware module or software module, such as module 1 , module 2 , and module 3 stored in storage device , configured to control the processor as well as a special-purpose processor where software instructions are incorporated into the actual processor design.

The processor may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc.

A multi-core processor may be symmetric or asymmetric. To enable user interaction with the computing device , an input device can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device can also be one or more of a number of output mechanisms known to those of skill in the art.

In some instances, multimodal systems can enable a user to provide multiple types of input to communicate with the computing device The communications interface can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed. Storage device is a non-volatile memory and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories RAMs , read only memory ROM , and hybrids thereof.

The storage device can include software modules , , for controlling the processor Other hardware or software modules are contemplated. The storage device can be connected to the system bus In one aspect, a hardware module that performs a particular function can include the software component stored in a computer-readable medium in connection with the necessary hardware components, such as the processor , bus , display , and so forth, to carry out the function.

Computer system is an example of computer hardware, software, and firmware that can be used to implement the disclosed technology. Processor can communicate with a chipset that can control input to and output from processor In this example, chipset outputs information to output device , such as a display, and can read and write information to storage device , which can include magnetic media, and solid state media, for example. Chipset can also read data from and write data to RAM A bridge for interfacing with a variety of user interface components can be provided for interfacing with chipset Such user interface components can include a keyboard, a microphone, touch detection and processing circuitry, a pointing device, such as a mouse, and so on.

Chipset can also interface with one or more communication interfaces that can have different physical interfaces. Such communication interfaces can include interfaces for wired and wireless local area networks, for broadband wireless networks, as well as personal area networks.

Some applications of the methods for generating, displaying, and using the GUI disclosed herein can include receiving ordered datasets over the physical interface or be generated by the machine itself by processor analyzing data stored in storage or Further, the machine can receive inputs from a user via user interface components and execute appropriate functions, such as browsing functions by interpreting these inputs using processor It can be appreciated that exemplary systems and can have more than one processor or be part of a group or cluster of computing devices networked together to provide greater processing capability.

For clarity of explanation, in some instances the present technology may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.

In some embodiments the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se. Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media.

Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code.

Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. The secondary user is associated with the account. The secondary user's access rights e. In an alternative arrangement, the primary account holder can fund a secondary wallet in the mobile wallet payment system with the funds of the account. The secondary wallet is essentially a second account in the name of the secondary user.

Accordingly, in arrangements where a new second account is created instead of adding a second authorized user to an existing account, the second account can be subject to the same rules and limitations as the secondary user's access rights are subject to in the described arrangement.

Referring to FIGS. The user interface relates to an overview of a user's account shown as a checking account, but may be any type of account with the financial institution as viewed from the user's mobile wallet client application The user is the primary account holder of the checking account.

The overview provides the user with general account information, such as account number or a portion there of, account balance, and any authorized secondary users of the checking account. As described above and in further detail below, secondary users can use their personal mobile wallets to make purchases from the primary account holder's account.

Accordingly, when a primary account holder adds a secondary user to the account, the primary account holder provides authorization for the secondary user to purchase goods and services with funds in the account via the secondary user's mobile wallet client application. To prevent or limit unauthorized spending by the secondary user, the primary account holder has the ability to place limits and rules on the secondary users. In the present example, Bob is the primary account holder and John Doe and Jim Smith are both authorized secondary users of the checking account.

Accordingly, John Doe and Jim Smith can both access the funds of the checking account via their respective mobile wallets as accessed via their respective mobile devices and mobile wallet client applications In the case of John Doe, John Doe has full access to the funds in the checking account i.

In the case of Jim Smith, Jim Smith has limited access to the funds in the checking account i. The arrangement of primary account holder and secondary users easily allows the primary account holder to provide funds to the secondary users. This may be beneficial in certain types of fiduciary relationships between people and entities. For example, the primary account holder may be a parent or a set of parents that authorizes their children as secondary users as a way of providing money to their children with restricted spending capabilities.

As another example, the primary account holder may be an employer e. Other primary-secondary relationships are also contemplated, such as trustee-beneficiary relationships and child-elderly parent relationships. Still further, it is possible that two primary joint account holders e. Additionally, it is possible for a primary account holder to self-impose limits on his spending out of an account as a way of budgeting. Since the user is the primary account holder, the user has various account management options.

In some arrangements, the account management options may also be available to secondary users having full access to the account. The primary account holder is directed to the user interface after interacting with button of user interface The user interface allows the primary account holder to add secondary users to the account. The secondary users can be added in multiple ways. A first way to add a secondary user is to add an existing secondary user. An existing secondary user is a user that was previously added by the primary account holder e.

Accordingly, the backend system stores information relating to the previously added secondary users by the primary account holder. The selected user is then added as a secondary user. Another way to add a secondary user is to manually add a secondary user through manual input of the secondary user's information, such as the secondary user's name, address, phone number, date of birth, social security number, the mobile wallet username, or a combination thereof.

To do so, the primary account holder presses button , and the mobile wallet client application directs the primary account holder to the appropriate interface to manually add the secondary user. A further way to add a secondary user is to import a contact i. For example, the secondary user's information may be imported from a social media account by pressing button As another example, the secondary user's information may be imported from an address book e.

If the secondary user is not already registered with the financial institution i. In some arrangements, the message includes a unique access code or invite code that allows the backend system to recognize the secondary user during the secondary user's registration with the financial institution The primary account holder is directed to the user interface by interacting with button of user interface Through the user interface , the primary account holder can limit a secondary user's access to the funds in the account by providing spending rules and limits for each secondary user.

As shown in FIG. Any one of the three rules can be edited e. Additionally, new rules can be added. A plurality of rule and limit types are available to the primary account holder.

Each rule and limitation restricts how a secondary user can spend the funds in the primary account holder's account. Each rule or limit type is described in further detail below. One type of rule or limit the primary account holder can impose on secondary users is a spending limit. The spending limit provides for a maximum amount of money the secondary user is allowed to spend from the primary account holder's account.

In some arrangements, the spending limit may be on a per purchase basis. In other arrangements, the spending limit is a cumulative spending limit. The cumulative spending limit may reset after a given period of time. The given period of time can be a number of minutes, a number of hours, a number of days, a number of weeks, a number of months, etc. This type of cumulative spending limit that resets after a given period of time may be good for parents primary account holders providing allowances to their children secondary users , employers primary account holders providing spending accounts to their employees secondary users , and the like.

As another example, the cumulative spending limit may reset responsive to inputs received from the primary account holder. Another type of rule or limit the primary account holder can impose on secondary users are restrictions on the types of goods and services the secondary user can purchase.

The restrictions on the types of goods and services may be implemented in different ways. A first way is for the primary account holder to indicate acceptable types of goods and services for the secondary users to purchase.

The acceptable types of goods and services may be a specific good or service or a category of goods and services.

For example, an employer primary account holder may be in the delivery business and provide his employee delivery drivers secondary users access to a spending account via the mobile wallet client application. The employer may limit the employees' spending to specific goods, such as gasoline, to specific types of goods, such as automotive related goods and services, or to a combination thereof.

Such a rule prevents or at least limits an employee's or secondary user's potential abuse of the spending privileges. A second way is for the primary account holder to indicate non-acceptable types of goods and services for the secondary users to purchase.

The non-acceptable types of goods and services may be a specific good or service or a category of goods and services. For example, a parent primary account holder may provide access to the account to his child secondary user. However, the parent may impose a rule that the child cannot spend money from the account for specific goods, such as Budweiser, for types of goods, such as alcohol, or for a combination thereof.

Such a rule prevents the secondary user from purchasing specific goods or services or specific types of goods and services via the mobile wallet client application. In some arrangements, the merchants may not provide specific product information with purchase requests.

Often, merchants view this information as a trade secret and a valuable customer metric tool. In these situations, the financial institution can partner with certain merchants to share this information to allow types of goods and services restrictions to be implemented. The merchants opting in to the program may be advertised as preferred merchants by the financial institution in exchange for their participation.

Further, the merchants can be listed as exclusive store options for the store specific restrictions as discussed in further detail below. Another type of rule or limit the primary account holder can impose on secondary users is restrictions on the stores that the secondary users can purchase goods and services with funds from the account.

Similar to the restrictions on the types of goods and services, the restrictions on the stores can work two different ways. A first way is for the primary account holder to indicate acceptable stores or store types for the secondary users. The acceptable stores may include specific branded stores e. The employer may limit the employees' spending to specific stores, such as Shell and BP gas stations, to specific types of stores, such as gas stations, or to a combination thereof.

A second way is for the primary account holder to indicate non-acceptable stores and store types for the secondary users. However, the parent may impose a rule that the child cannot spend money at a specific store, such as John's Bar and Tap, for types of store, such as liquor stores and bars, or a combination thereof.

Yet another type of rule or limit the primary account holder can impose on secondary users are restrictions of purchases by the secondary users from the account based on the purpose of the purchase. In some arrangements, the primary account holder can request that the secondary user provide a purpose for each purpose prior to the purchase being authorized by the mobile wallet client application.

Similar to the restrictions on the types of goods and services and the types of stores, the restrictions based on the purposes of the purchase can work two different ways.

A first way is for the primary account holder to indicate acceptable purchase purposes. The employer may limit the employees' spending to purchases for refueling purposes. A second way is for the primary account holder to indicate non-acceptable purchase purposes. However, the parent may impose a rule that the child cannot spend money for social events.

A further rule or type of limit the primary account holder can impose on secondary users is restrictions on the timing of purchases made by the secondary users.

The timing restriction may relate to allowing or prohibiting purchases during designated time periods. The designated time period may be a time range e. For example, an employer primary account holder may prohibit employees secondary users from making purchases during non-business hours e.

Another type of limit the primary account holder can impose on secondary users are restrictions of purchases based on the location of the secondary user. The geographic restriction may relate to either allowing or prohibiting purchases based on the secondary user's detected location. The primary account holder defines a specific geographic zone where purchases are either allowed or prohibited defines.

The geographic zone may relate to a radius from a specific geographic point e. The employer may limit the employees' spending to purchases made within the company's delivery zone e.

Such a limit prevents employee spending for tasks not related to their jobs. Yet another type of rule or limit the primary account holder can impose on secondary users is restrictions based on the secondary user being with e.

The primary account holder can program rules that prevent purchases when secondary users are in proximity e. A group purchase rule may help parents primary account users prevent their children secondary users from associating with certain individuals. Accordingly, prior to allowing a purchase by a secondary user, the system first determines whether the secondary user is near any identified prohibited individuals.

The system may locate the identified prohibited individuals based on known locations of mobile devices associated with the prohibited individuals that are running the mobile wallet client application, based on scanning social media activity of the secondary user e.

For example, if the prohibited individual is a registered user of the financial institution and the prohibited individual's mobile device is running the mobile wallet client application , the backend system can track the location of the prohibited individual and compare it with the location of the secondary user's purchase. As another example, some social media applications allow users to locate friends or contacts that are nearby.

The mobile wallet application client can interface with the social media application and compare the listing of nearby friends with the listing of prohibited individuals. If the secondary user is near a prohibited individual, the transaction is not allowed. Further, the group purchase rule can also add a timing aspect. For example, if the secondary user was near a prohibited individual within a certain time period e.

Such an arrangement prevents the prohibited individual and secondary user from tricking the system by either walking away from the secondary user or shutting off his mobile device at the time of the purchase to allow the purchase to continue.



0コメント

  • 1000 / 1000