Secure exchange of indicia of value and associated information

ABSTRACT

Secure exchange of value and associated information in financial transactions involving beneficial offers available for customers is provided. Various offers, including discounts, prepaid amounts, and the like may be purchased by customers for use with various merchants. A third party issuer obtains information from the customer in selling the offers and issues some kind of indicium of value having a representation of the value of the offer associated therein. Record of the indicia are maintained and either transmitted to the merchant or kept by the issuer or associated financial institutions. When the customer redeems the offer by presenting the indicium to the merchant, the merchant may either authenticate the indicium using the records received by the issuer, or establish communication with the issuer for the issuer to authenticate the indicium, either by itself or in cooperation with one or more related financial institutions.

TECHNICAL FIELD

The present disclosure relates, in general, to financial transactionsand, more particularly, to secure exchange of indicia of value andassociated information.

BACKGROUND

Merchants and financial entities sometimes offer coupons or discounts(collectively, “offers”) on various products and services. For smallercompanies, marketing such offers can be burdensome. As such, smallercompanies may often use third party marketing companies or issuingentities that generally have the ability to reach more customers andadminister the offers. Many such offers are based on selling a certainnumber of offers to consumers. Because these offers are administered bythe third party, when presented with such offers by the customers, it isoften difficult for the merchant to determine if the offers are valid,how many are out there, or other valuable information that the merchantmay need to effectively manage the offers.

BRIEF SUMMARY

Various aspects of the present disclosure are directed to the secureexchange of value and associated information in financial transactionsinvolving beneficial offers available for customers. Various offers,including discounts, prepaid amounts, and the like may be purchased bycustomers for use with various merchants. A third party issuer obtainsinformation from the customer in selling the offers and issues some kindof indicium of value having a representation of the value of the offerassociated therein. Record of the indicium are maintained and eithertransmitted to the merchants or kept by the issuer or associatedfinancial institution. When the customer redeems the offer by presentingthe indicium to the merchant, the merchant may either authenticate theindicium using the records received by the issuer, or establishcommunication with the issuer for the issuer to authenticate theindicium, either by itself or in cooperation with one or more relatedfinancial institutions.

In a first aspect, a method of facilitating a financial transactionincludes receiving a request to purchase an offer from a customer,prompting the customer to provide payment information for a value of theoffer, processing the payment information to obtain the value inresponse to receiving the payment information, associating the value ofthe offer with an indicium of value, issuing the indicium of value tothe customer, and transmitting a record of the indicium of value,including identification (ID) information of the indicium of value, to amerchant associated with the offer.

In a second aspect, a computer program product to facilitate a financialtransaction includes a computer-readable medium having program coderecorded thereon. The program code includes code to receive a request topurchase an offer from a customer, code to prompt the customer toprovide payment information for a value of the offer, code, executablein response to receiving the payment information, to process the paymentinformation to obtain the value, code to associate the value of theoffer with an indicium of value, code to issue the indicium of value tothe customer, and code to transmit a record of the indicium of value,including ID information of the indicium of value, to a merchantassociated with the offer.

In a third aspect, a computer system is configured to facilitate afinancial transaction. The computer system includes at least oneprocessor, a memory coupled to the processor, and an offer managementapplication stored in the memory. When executed by the processor, theexecuting offer management application configures the computer system toreceive a request to purchase an offer from a customer, to prompt thecustomer to provide payment information for a value of the offer, toprocess the payment information to obtain the value in response toreceiving the payment information, to associate the value of the offerwith an indicium of value, to issue the indicium of value to thecustomer, and to transmit a record of the indicium of value, includingID information of the indicium of value, to a merchant associated withthe offer.

In a fourth aspect, a method of facilitating a financial transactionincludes receiving an indicium of value from a customer during afinancial transaction, comparing ID information associated with theindicium of value against a record of valid indicia of value, the recordreceived from an issuer of the indicium of value, reading a valuerepresented in the indicium of value in response to the ID informationmatching one of the valid indicia of value of the record, and applyingthe value to the financial transaction.

In a fifth aspect, a computer program product to facilitate a financialtransaction includes a computer-readable medium having program coderecorded thereon. The program code includes code to receive an indiciumof value from a customer during a financial transaction and code tocompare ID information associated with the indicium of value against arecord of valid indicia of value, where the record received from anissuer of the indicium of value. The program code also includes code,executable in response to the ID information matching one of the validindicia of value of the record, to read a value represented in theindicium of value and code to apply the value to the financialtransaction.

In a sixth aspect, a computer system is configured to facilitate afinancial transaction. The computer system includes at least oneprocessor, a memory coupled to the processor, and an offer managementapplication stored in the memory. When executed by the processor, theexecuting offer management application configures the computer system toreceive an indicium of value from a customer during a financialtransaction, to compare ID information associated with the indicium ofvalue against a record of valid indicia of value, the record receivedfrom an issuer of the indicium of value, to read a value represented inthe indicium of value in response to the ID information matching one ofthe valid indicia of value of the record, and to apply the value to thefinancial transaction.

In a seventh aspect, a method of facilitating a financial transactionincludes receiving an indicium of value from a customer during afinancial transaction, transmitting ID information associated with theindicium of value to a third party processor for authentication,receiving an authentication from the third party processor authorizingthe indicium of value to an authorized amount, and applying theauthorized amount to the financial transaction.

In an eighth aspect, a computer program product to facilitate afinancial transaction includes a computer-readable medium having programcode recorded thereon. The program code include code to receiving anindicium of value from a customer during a financial transaction, codeto transmit ID information associated with the indicium of value to athird party processor for authentication, code to receive anauthentication from the third party processor authorizing the indiciumof value to an authorized amount, and code to apply the authorizedamount to the financial transaction.

In a ninth aspect, a computer system is configured to facilitate afinancial transaction. The computer system includes at least oneprocessor, a memory coupled to the at least one processor, and an offermanagement application stored in the memory. When executed by theprocessor, the executing offer management application configures thecomputer system to receiving an indicium of value from a customer duringa financial transaction, to transmit ID information associated with theindicium of value to a third party processor for authentication, toreceive an authentication from the third party processor authorizing theindicium of value to an authorized amount, and to apply the authorizedamount to the financial transaction.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present teachings, reference isnow made to the following description taken in conjunction with theaccompanying drawings.

FIG. 1 is a schematic representation of a system for financialtransactions, according to an example embodiment of the presentdisclosure;

FIG. 2 is a schematic representation of a computing system that can beused to implement aspects of the present disclosure;

FIG. 3 is an operational flow diagram of a method and system forfinancial transactions, according to an example embodiment of thepresent disclosure;

FIG. 4 is an operational flow diagram of a method and system forfinancial transactions, according to an example embodiment of thepresent disclosure;

FIG. 5 is a schematic representation of a consumer buying an offer,according to an example embodiment of the present disclosure;

FIG. 6 is a schematic representation of a consumer redeeming an offer,according to an example embodiment of the present disclosure;

FIG. 7 is a schematic representation of a consumer redeeming an offer,according to an example embodiment of the present disclosure;

FIG. 8 is a schematic representation of a consumer redeeming an offer,according to an example embodiment of the present disclosure;

FIG. 9 is a functional block diagram illustrating example blocksexecuted to implement one embodiment of the present disclosure;

FIG. 10 is a functional block diagram illustrating example blocksexecuted to implement one embodiment of the present disclosure; and

FIG. 11 is a functional block diagram illustrating example blocksexecuted to implement one embodiment of the present disclosure.

DETAILED DESCRIPTION

In the detailed description below, numerous specific details are setforth to provide a thorough understanding of claimed subject matter.However, it will be understood by those skilled in the art that claimedsubject matter may be practiced without these specific details. In otherinstances, methods, apparatuses or systems that would be known by one ofordinary skill have not been described in detail so as not to obscureclaimed subject matter. Some portions of the detailed description may bepresented in terms of algorithms or symbolic representations ofoperations on data bits or binary digital signals stored within acomputing system memory, such as a computer memory. These algorithmicdescriptions or representations are examples of techniques used by thoseof ordinary skill in the art to convey the substance of their work toothers skilled in the art.

An algorithm is here, and generally, considered to be a self-consistentsequence of operations or similar processing leading to a desiredresult. In this context, operations or processing involve physicalmanipulation of physical quantities. Typically, although notnecessarily, such physical quantities may take the form of electrical ormagnetic signals capable of being stored, transferred, combined,compared or otherwise manipulated. It has proven convenient at times,principally for reasons of common usage, to refer to such signals asbits, data, values, elements, symbols, characters, terms, numbers,numerals or the like. It should be understood, however, that all ofthese and similar terms are to be associated with appropriate physicalquantities and are merely convenient labels. Unless specifically statedotherwise, as apparent from the following discussion, it is appreciatedthat throughout this specification discussions utilizing terms such as“processing,” “computing,” “calculating,” “determining” or the like,refer to actions or processes of a computing platform, such as acomputer or a similar electronic computing device, that manipulates ortransforms data represented as physical electronic or magneticquantities within memories, registers, or other information storagedevices, transmission devices, or display devices of the computingplatform.

In general, the various aspects and embodiments of the presentdisclosure are related to delivering or exchanging indicia of value thatrepresent consumer offers, such as coupons, discounts, or the like,between a third party and a consumer. In particular, a third party maysell such consumer offers to consumers and deliver the indicium of valueto the consumer to represent such purchased offer. In the purchasingprocess, the third party also collects information from the consumer.The third party often partners with a financial entity and sharesinformation related to the consumer and the particular consumer offersold. In representative aspects of the present disclosure, in responseto the third party delivering the information, the financial entity mayissue an indicium of value to the consumer, such as a stored value card,a representative code, such as a numeric, optical, magnetic code, or thelike, associated with the value of the consumer offer, or any other typeof indicia that represents the value of the consumer offer stored on,embedded into, or encoded in the indicium of value. The indicium ofvalue issued by the financial entity may also include some associatedinformation stored on, embedded into, or encoded in the indicium aswell. With the value of the consumer offer and at least some of theassociated information found with the indicium of value, fraud may bereduced as the information stored on the indicium may be verified innear real-time by the financial entity prior to approval by themerchant.

Additionally, the financial entity and third party may partner to shareinformation and offer multiple products to a consumer during a singletransaction. For example, when a consumer decides to buy an offer, theconsumer may also apply for a stored value card, credit card, or thelike, with the same information gathered for purchasing the offer. Thethird party shares the information with the financial institution thatwould issue such card. As such, the issuance of the indicium of valuewould include the purchased consumer offer and an approval to have thestored value card or credit card issued by the financial institution, aswell as ID information related to the indicium that would allow amerchant to identify the particular indicium to an authenticatingentity.

Referring now to FIG. 1, a schematic representation of a financialtransaction system 100 is provided. The financial transaction system 100includes a consumer buying an offer 102. In buying the offer 102, theconsumer provides information, such as name, address, date of birth, andthe like, to an offer issuer. The offer issuer then shares thatinformation with a financial entity which uses it to fill in a creditapplication with the financial entity. Thus, in purchasing the offer102, the consumer is also applying for additional value 104 from afinancial institution. Such additional value may be a stored value card,a credit card account, or the like. When the financial institutionissues the indicium of value 106, which may be a card or some kind ofcode, it will include representations of both the purchased offer 102and the additional value 104. As the consumer uses the indicium of value106 to redeem the offer 102, the consumer would also be able to use theindicium of value for the additional value 104 for anything else aswell.

Referring now to FIG. 2, an exemplary environment for implementingembodiments of the present invention includes a general purposecomputing device in the form of a computing system 200, including atleast one processing system 202. A variety of processing units areavailable from a variety of manufacturers, for example, Intel orAdvanced Micro Devices. The computing system 200 also includes a systemmemory 204, and a system bus 206 that couples various system componentsincluding the system memory 204 to the processing unit 202. The systembus 206 may be any of a number of types of bus structures including amemory bus, or memory controller; a peripheral bus; and a local bususing any of a variety of bus architectures.

The system memory 204 includes read only memory (ROM) 208 and randomaccess memory (RAM) 210. A basic input/output system 212 (BIOS),containing the basic routines that help transfer information betweenelements within the computing system 200, such as during start up, istypically stored in the ROM 208.

The computing system 200 further includes a secondary storage device213, such as a hard disk drive, for reading from and writing to a harddisk (not shown), and/or a compact flash card 214.

The hard disk drive 213 and compact flash card 214 are connected to thesystem bus 206 by a hard disk drive interface 220 and a compact flashcard interface 222, respectively. The drives and cards and theirassociated computer readable media provide nonvolatile storage ofcomputer readable instructions, data structures, program modules andother data for the computing system 200.

Although the exemplary environment described herein employs a hard diskdrive 213 and a compact flash card 214, it should be appreciated bythose skilled in the art that other types of computer-readable media,capable of storing data, can be used in the exemplary system. Examplesof these other types of computer-readable mediums include magneticcassettes, flash memory cards, digital video disks, Bernoullicartridges, CD ROMS, DVD ROMS, random access memories (RAMs), read onlymemories (ROMs), and the like.

A number of program modules may be stored on the hard disk 213, compactflash card 214, ROM 208, or RAM 210, including an operating system 226,one or more application programs 228, other program modules 230, andprogram data 232. A user may enter commands and information into thecomputing system 200 through an input device 234. Examples of inputdevices might include a keyboard, mouse, microphone, joystick, game pad,satellite dish, scanner, digital camera, touch screen, and a telephone.These and other input devices are often connected to the processing unit202 through an interface 240 that is coupled to the system bus 206.These input devices also might be connected by any number of interfaces,such as a parallel port, serial port, game port, or a universal serialbus (USB). A display device 242, such as a monitor or touch screen LCDpanel, is also connected to the system bus 206 via an interface, such asa video adapter 244. The display device 242 might be internal orexternal. In addition to the display device 242, computing systems, ingeneral, typically include other peripheral devices (not shown), such asspeakers, printers, and palm devices.

When used in a LAN networking environment, the computing system 200 isconnected to the local network through a network interface or adapter252. When used in a WAN networking environment, such as the Internet,the computing system 200 typically includes a modem 254 or other means,such as a direct connection, for establishing communications over thewide area network. The modem 254, which can be internal or external, isconnected to the system bus 206 via the interface 240. In a networkedenvironment, program modules depicted relative to the computing system200, or portions thereof, may be stored in a remote memory storagedevice. It will be appreciated that the network connections shown areexemplary and other means of establishing a communication link betweenthe computing systems may be used.

The computing system 200 might also include a recorder 260 connected tothe memory 204. The recorder 260 includes a microphone for receivingsound input and is in communication with the memory 204 for bufferingand storing the sound input. Preferably, the recorder 260 also includesa record button 261 for activating the microphone and communicating thesound input to the memory 204.

A computing device, such as computing system 200, typically includes atleast some form of computer-readable media. Computer readable media canbe any available media that is accessible by the computing system 200.By way of example, and not limitation, computer-readable media mightcomprise computer storage media and communication media.

Computer storage media includes volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer readable instructions, data structures,program modules or other data. Computer storage media includes, but isnot limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or any other medium that can be used tostore the desired information and that can be accessed by the computingsystem 200.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared, and other wireless media. Combinations of any ofthe above should also be included within the scope of computer-readablemedia. Computer-readable media may also be referred to as computerprogram product.

The computing system 200 may be used to implement the processes definingthe various embodiments of the present disclosure, including the flowand functional block processes as defined in FIGS. 3, 4, and 9-11, aswell as any of the other processes and procedures described inimplementing the various aspects of the present disclosure.

Referring now to FIG. 3, a flow diagram of a purchase transaction system300 is illustrated. Preferably, the purchase transaction system 300 isinstantiated by a start operation 305. Operational flow proceeds to abuy operation 310. For example, a third party website may offer tovisitors of the website the ability to buy coupons for merchant. Onesuch merchant may include Erik's steak house. Erik's steak house maywish to offer a $200 meal for $100. In other words, the user buys the$200 gift card to Erik's steak house for only $100. The buy operation310 receives a request from a user to buy a coupon, or a gift card. Inthe above example, the user requests to buy the $200 gift card for the$100.

A checkout operation 315 checks out the user as is well known. A paymentoperation 320 receives a request from the user as to the method ofpayment, i.e. a credit or debit card. An approval operation 325determines if the payment has been approved. If the approval operation325 determines that the payment has not been approved, then operationalflow branches “NO” to the payment operation 320 for the user to select adifferent method of payment. If the approval operation 325 determinesthat the payment has been approved, the operational flow branches “YES”to a tipping operation 330.

The tipping operation 330 determines if a tipping point has beenachieved. A merchant, i.e. Erik's steak house, may only be interested inissuing such coupons or gift cards if a certain number of them are sold(the tipping point). In the example user, Erik's steak house is onlyinterested in selling if 100 gift cards are sold. Thus, the tippingoperation 330 determines if the 100 gift card threshold has beenachieved. If the tipping operation 330 determines that the tipping pointhas not been achieved, i.e. not 100 gift cards, then operational flowbranches “NO” to the buy operation 310. If the tipping operation 330determines that the tipping point has been achieved, i.e. 100 giftcards, then operational flow branches “YES” to a send operation 335.

The send operation 335 sends an email to each customer including thecustomer's coupon. A report operation 345 sends a report and file to themerchant. Such report and file can include how many coupons were issued,who they were issued to, and include financial information.

FIG. 4 is a flow diagram of a redemption transaction system 400.Preferably, the redemption transaction system 400 is instantiated by astart operation 405. Operational flow proceeds to a redemption operation410. At the redemption operation 410, the customer redeems the coupon. Avalidate operation 415 validates the coupon to ensure its validity. Forexample, the validate operation 415 can looked at the printed report ora spreadsheet to make sure that corresponding numbers on the coupon andthe report match. Once validated, a completion operation 430 completesthe transaction using the coupon. A balance operation 435 determines ifany balance is remaining If the balance operation 435 determines that nobalance is due, operational flow branches “NO” to an end operation 440.If the balance operation 435 determines that a balance is due,operational flow branches “YES” to a payment operation 445. The paymentoperation 445 collects any remaining balance due.

Using the above example, the customer is at Erik's steak house withtheir $200 coupon. The customer spends $275. The completion operation430 uses the coupon to reduce to the balance to $75. The balanceoperation 435 determines that a balance is due and the payment operation445 receives payment from the customer for the $75. A transactionoperation 450 completes the transaction. Operational flow ends at theend operation 440.

FIG. 5 is a block diagram of a purchase transaction system 500.Preferably, the purchase transaction system 500 includes a consumer 505,a third party coupon issuer 510, a payment gateway 515, a third partyprocessor 520, and an issuer 525. The consumer 505 goes to the couponissuer 510 to purchase a $20 coupon for $10. The coupon issuer 510 sendsan authorization request 531 for the $10 to the payment gateway 515. Thepayment gateway 515 sends the authorization request 531 to the thirdparty processor 520, who in turns sends it 531 to the issuer 525 forapproval.

The issuer 525 sends an approval 532 to the third party processor 520,who sends it to the payment gateway 515, who sends the approval to thecoupon issuer 510. The coupon issuer then sends a settlement 533 to thepayment gateway 515 on through to the issuer 525. The issuer 525 thensends the funding, i.e. $10,534 to the third party processor 520 minusfees. The third party processor 520 then sends the remaining funding,minus its fees to the payment gateway 515. The payment gateway 515 thensends the remaining funding, minus its fees to the coupon issuer 510.

FIG. 6 is a block diagram of a redemption transaction system 600.Preferably, the transaction system 600 includes a consumer 605, amerchant 610, a third party processor 615, a first financial entity 620,a second financial entity 625, and a coupon issuer 630. The consumer 605goes to the merchant 610 to redeem its coupon, i.e. the $20 couponpurchase in connection with FIG. 5 for $10. The merchant 610 sends anauthorization request 631 for the coupon of $20 to the third partyprocessor 615. The third party processor 615 sends the authorizationrequest 631 to a first financial entity 620. The first financial entity620 sends the authorization request 631 to the second financial entity625 for approval. The second financial entity 625 sends an approval 632back to the first financial entity 620, who passes the approval 632 tothe third party processor 615, who passes the approval 632 to themerchant 610.

The merchant 610 sends the settlement 633 for $20 to the third partyprocessor 615 who processes the settlement. The third party 615processor sends the settlement 633 to the first financial entity 620.The first financial entity 620 sends the settlement to the secondfinancial entity 625. Unlike, FIG. 5, funding 634 is not providedbecause no money is changing hands. The $10 was collected in connectionwith FIG. 5. FIG. 6 is mainly an authorization/validation of the $20coupon. Thus, the merchant knows that the coupon is valid and after useis empty or invalid. The third party processor 615 does charge atransaction fee to the merchant 610. A merchant statement would show asales transaction of $20 along with a coupon credit of $20 for a balanceowed the merchant of $0.

The transaction could also be for more than the $20 coupon. For example,the consumer might spend $30 at the merchant. The consumer 605 wouldpresent its coupon to the merchant 610 for $20. The merchant 610 wouldsend a request to the third party processor for $30 ($10 plus the $20coupon), which would be passed through to the second financial entity625. The second financial entity could decline or approve the extra $10and the money could be funded to the merchant 610 through a funding 634that would be $10 instead of $0. For example, the coupon might be partof a stored value card or charge card. Thus, the extra $10 could bededucted from the stored value or charged to the customer's 605 account.

The transactions illustrated in FIGS. 5 and 6 are advantageous becausethe merchant has the ability to validate the coupon before allowing thecustomer the credit. Likewise, each entity involves has up-to-dateinformation about the coupon and the transaction. That information canbe passed to the coupon issuer 630 for its own purposes.

Referring to FIGS. 5 and 6, when the consumer 505 buys the coupon fromthe third party coupon issuer 510, the consumer provides certaininformation for purchase of the coupon. The third party coupon issuer510/630 can share that information with the second financial entity 625in order to apply the consumer for an account with the second financialentity 625. If approved, the purchase of the offer by the consumer 505will result in the consumer getting the coupon and opening an accountwith the second financial entity 625. The coupon can then be stored onthe new card issued by the second financial entity 625 and sent to theconsumer for use.

When the consumer uses the card to use the coupon, the card can also beused to fund the balance of the transaction over the coupon value eitherthrough some sort of stored value, debit arrangement or creditarrangement. During further transactions, information can also be sharedbetween the coupon issuer 630 and the second financial entity 625. Suchinformation could include when the consumer used the coupon, what wasthe total price, what type of merchandise or service was purchased, etc.Such information could be valuable the coupon issuer 630 in futuredecisions. The sharing is also valuable to the financial entity 625 inthat new customers are enrolled for use of the financial entities cardsfrom which fees are generated.

FIG. 7 is a block diagram of a purchase transaction system 700,according to another example embodiment. Preferably, the transactionsystem 700 includes a consumer 705, a merchant 710, a third partyprocessor 715, a first financial entity 720, a second financial entity725, and a coupon issuer 730. The consumer 705 goes to the merchant 710to redeem its coupon, i.e. the $20 coupon purchase in connection withFIG. 5 for $10. The merchant 710 sends an authorization request 731 forthe coupon of $20 to the third party processor 715. The third partyprocessor 715 sends the authorization request 731 to a first financialentity 720. The first financial entity 720 sends the authorizationrequest 731 to the second financial entity 725 for approval. The secondfinancial entity 725 sends an approval 732 back to the first financialentity 720, who passes the approval 732 to the third party processor715, who passes the approval 732 to the merchant 710.

The merchant 710 sends the settlement 733 for $20 to the third partyprocessor 715 who processes the settlement. The third party 715processor sends the settlement 733 to the first financial entity 720.The first financial entity 720 sends the settlement to the secondfinancial entity 725. In addition, a reconciliation file 736 is sentfrom the second financial entity 725 to the first financial entity 720.The reconciliation file 736, 734 can also be sent to the merchant 710showing the details of the transaction. Like FIG. 6, the merchant knowsthat the coupon is valid and after use is empty or invalid. The thirdparty processor 715 does charge a transaction fee to the merchant 710. Amerchant statement would show a sales transaction of $20 along with acoupon credit of $20 for a balance owed the merchant of $0.

FIG. 8 is a block diagram of a purchase transaction system 800,according to another example embodiment. Preferably, the transactionsystem 800 includes a consumer 805, a merchant 810, a third partyprocessor 815, a first financial entity 820, a second financial entity825, a third financial entity 830, a fourth financial entity 835, and acoupon issuer 840. The transaction occurs a in FIG. 7, but with furtherauthentication communication occurring with the fourth financial entity835.

FIG. 9 is a functional block diagram illustrating example blocksexecuted to implement one embodiment of the present disclosure. In block900, a request to purchase an offer is received from a customer. Thecustomer is prompted, in block 901, to provide payment information for avalue of the offer. The payment information is processed to obtain thevalue, in block 902, in response to receiving the payment information.The value of the offer is associated with an indicium of value in block903. An indicium of value may take various forms, including a card, achip (e.g., a casino chip), an email, a facsimile, a text message, anaudio file, a video file, or the like. In block 904, the indicium ofvalue is issued to the customer, while a record of the indicium ofvalue, including ID information for the indicium, is transmitted to amerchant associated with the offer in block 905.

In associating the value of the offer with the indicium of value, somekind of representation is provided for the indicium. For example, theassociation may be a code or number that is encoded into or on theindicium, for instance, magnetically encoding a magnetic strip,optically encoding by displaying/printing an optical code, such as abarcode, Denso Wave Incorporated's QR CODE™, and the like, displayingthe serial number or value in alphanumeric characters on the indicium,or the like. When redeeming the offer by presenting the indicium ofvalue, to a merchant, the merchant uses the associated value and any IDinformation for the indicium during the authentication process.

FIG. 10 is a functional block diagram illustrating example blocksexecuted to implement one embodiment of the present disclosure. In block1000, an indicium of value is received from a customer during afinancial transaction. ID information associated with the indicium ofvalue is then compared against a record of value indicia of value, inblock 1001, the record received by an issuer of the indicium of value. Avalue represented in the indicium of value is read, in block 1002, inresponse to the ID information matching one of the valid indicia in therecord. The value is then applied to the financial transaction in block1003.

In additional and/or alternative embodiments of the present disclosure,instead of receiving a record of value indicia of value from the issuer,against which the presented indicium are checked, a communicationprocess is established between the merchant and a third party processingentity, which authenticates and then provides an authentication signalto the merchant during the transaction.

FIG. 11 is a functional block diagram illustrating example blocksexecuted to implement one embodiment of the present disclosure. In block1100, an indicium of value is received from a customer during afinancial transaction. ID information associated with the indicium ofvalue is transferred, in block 1101, to a third party processor forauthentication. An authentication is received from the third partyprocessor, in block 1102, authorizing the indicium of value to anauthorized amount. In block 1103, the authorized amount is applied tothe financial transaction.

It should be noted that in various aspects of the present disclosure,the third party processor may authenticate the indicium itself, or maycommunicate with one or more financial institution to obtainauthentication and any related authentication information, such as theamount of the indicium of value and the like.

Moreover, in still further aspects of the present disclosure, whereadditional value has been granted to the customer by virtue of theapplication completed at the purchase of the offer, any transactionsthat cost more than the value of the offer associated on the indicium ofvalue may be satisfied by this additional value. In authenticating theindicium, the third party processor may negotiate or communicate withthe various associated financial institutions to access the approvedadditional value for the cost amount over the offer value. In theauthentication signal communicated to the merchant, the third partyprocessor would include not only the verification of the indicium for acertain amount, but would also communicate an appropriate signalrepresenting the additional amount approved by the associated financialinstitution. In this manner, the merchant can complete the transaction.

Aspects of the invention described as being carried out by a computingsystem or are otherwise described as a method of control or manipulationof data may be implemented in one or a combination of hardware,firmware, and software. Embodiments of the invention may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by at least one processor to perform theoperations described herein. A machine-readable medium may include anymechanism for storing or transmitting information in a form readable bya machine (e.g., a computer). For example, a machine-readable medium mayinclude read-only memory (ROM), random-access memory (RAM), magneticdisc storage media, optical storage media, flash-memory devices,electrical, optical, acoustical or other form of propagated signals(e.g., carrier waves, infrared signals, digital signals, etc.), andothers.

In the foregoing detailed description, various features are occasionallygrouped together in a single embodiment for the purpose of streamliningthe disclosure. This method of disclosure is not to be interpreted asreflecting an intention that the claimed embodiments of the subjectmatter require more features than are expressly recited in each claim.Rather, as the following claims reflect, inventive subject matter liesin less than all features of a single disclosed embodiment. Thus, thefollowing claims are hereby incorporated into the detailed description,with each claim standing on its own as a separate preferred embodiment.Therefore, the spirit and scope of the appended claims should not belimited to the description of the preferred versions contained herein.

Although the present teachings and their advantages have been describedin detail, it should be understood that various changes, substitutionsand alterations can be made herein without departing from the technologyof the teachings as defined by the appended claims. Moreover, the scopeof the present application is not intended to be limited to theparticular aspects of the process, machine, manufacture, composition ofmatter, means, methods and steps described in the specification. As oneof ordinary skill in the art will readily appreciate from thedisclosure, processes, machines, manufacture, compositions of matter,means, methods, or steps, presently existing or later to be developedthat perform substantially the same function or achieve substantiallythe same result as the corresponding aspects described herein may beutilized according to the present teachings. Accordingly, the appendedclaims are intended to include within their scope such processes,machines, manufacture, compositions of matter, means, methods, or steps.

1. A method of facilitating a financial transaction, comprising:receiving an indicium of value from a customer during a financialtransaction; transmitting identification (ID) information associatedwith said indicium of value to a third party processor forauthentication; receiving an authentication from said third partyprocessor authorizing said indicium of value to an authorized amount;and applying said authorized amount to said financial transaction. 2.The method of claim 1 wherein, in response to said authorized amountexceeding a cost associated with said financial transaction: associatinga residual value with said indicium of value, said residual valuecomprising a difference between said authorized amount and said cost;and transmitting said residual value and said ID information to saidthird party processor to update said authorized amount associated withsaid indicium of value.
 3. The method of claim 1 wherein, in response toa cost of said financial transaction exceeding said authorized amount:inspecting said indicium of value for an additional value approved foruse by said customer; in response to finding said additional value:transmitting a request to access said additional value to said thirdparty processor; and applying said additional value to a balance of saidtransaction in response to receiving authorization from the said thirdpart processor to access said additional value, said balance comprisinga difference between said cost and said authorized amount; and inresponse to finding no additional value associated with said indicium ofvalue, prompting said customer for payment information to cover saidbalance.
 4. The method of claim 1 wherein said third party processorobtains said authentication from one or more of: verification of saidindicium of value at said third party processor; or communicating withone or more financial institutions associated with said indicium ofvalue.
 5. A computer program product to facilitate a financialtransaction, comprising: a computer-readable medium having program coderecorded thereon, said program code comprising: program code toreceiving an indicium of value from a customer during a financialtransaction; program code to transmit identification (ID) informationassociated with said indicium of value to a third party processor forauthentication; program code to receive an authentication from saidthird party processor authorizing said indicium of value to anauthorized amount; and program code to apply said authorized amount tosaid financial transaction.
 6. The computer program product of claim 5wherein, in response to said authorized amount exceeding a costassociated with said financial transaction, program code is executed: toassociate a residual value with said indicium of value, said residualvalue comprising a difference between said authorized amount and saidcost; and to transmit said residual value and said ID information tosaid third party processor to update said authorized amount associatedwith said indicium of value.
 7. The computer program product of claim 5wherein, in response to a cost of said financial transaction exceedingsaid authorized amount, program code is executed: to inspect saidindicium of value for an additional value approved for use by saidcustomer; program code is further executed, in response to finding saidadditional value: to transmit a request to access said additional valueto said third party processor; and to apply said additional value to abalance of said transaction in response to receiving authorization fromthe said third part processor to access said additional value, saidbalance comprising a difference between said cost and said authorizedamount; and program code is further executed, in response to finding noadditional value associated with said indicium of value, to prompt saidcustomer for payment information to cover said balance.
 8. The computerprogram product of claim 5 wherein said third party processor obtainssaid authentication from one or more of: verification of said indiciumof value at said third party processor; or communicating with one ormore financial institutions associated with said indicium of value.
 9. Acomputer system configured to facilitate a financial transaction, saidcomputer system comprising: at least one processor; a memory coupled tosaid at least one processor; and an offer management application storedin said memory, wherein, when executed by said at least one processor,said executing offer management application configures said computersystem: to receiving an indicium of value from a customer during afinancial transaction; to transmit identification (ID) informationassociated with said indicium of value to a third party processor forauthentication; to receive an authentication from said third partyprocessor authorizing said indicium of value to an authorized amount;and to apply said authorized amount to said financial transaction. 10.The computer system of claim 9 wherein, in response to said authorizedamount exceeding a cost associated with said financial transaction, saidexecuting offer management application further configures said computersystem: to associate a residual value with said indicium of value, saidresidual value comprising a difference between said authorized amountand said cost; and to transmit said residual value and said IDinformation to said third party processor to update said authorizedamount associated with said indicium of value.
 11. The computer systemof claim 9 wherein, in response to a cost of said financial transactionexceeding said authorized amount, said executing offer managementapplication further configures said computer system: to inspect saidindicium of value for an additional value approved for use by saidcustomer; further in response to finding said additional value saidcomputer system is configured: to transmit a request to access saidadditional value to said third party processor; and to apply saidadditional value to a balance of said transaction in response toreceiving authorization from the said third part processor to accesssaid additional value, said balance comprising a difference between saidcost and said authorized amount; and further in response to finding noadditional value associated with said indicium of value, said computersystem is configured to prompt said customer for payment information tocover said balance.
 12. The computer system of claim 9 wherein saidthird party processor obtains said authentication from one or more of:verification of said indicium of value at said third party processor; orcommunicating with one or more financial institutions associated withsaid indicium of value.