Systems and methods for ghost card creation via a browser extension

ABSTRACT

Embodiments described herein disclose methods and systems for identifying that a user is accessing a retailer or service provider website and automatically enabling an interactive window that includes personalized user information. The system can detect that the user is accessing a payment webpage associated with the website, and, in response, generate a selectable list of payment instruments associated with the user. When the user selects a payment instrument, the system can create an electronic ghost card linked to the payment instrument and the electronic ghost card information can be input into the payment webpage.

BACKGROUND

Multiple issues can arise with online purchases. First, securitybreaches by retailers and service providers have become a near-everydayevent. Data compromised in such breaches can include payment card data,email addresses, and other personal information, requiring customers andpayment card issuers to take steps to remedy the situation. For example,if payment card information is compromised, the payment card issuer willcancel the payment card and send a new payment card to the customer.Second, when making an online purchase, many customers select a paymentcard without knowing the balance of the payment card or how the purchasemay affect their budget instead of logging onto the payment cardissuer's website to verify balances.

The present technology overcomes these and other limitations of currentsystems and provides other benefits that will become clearer to thoseskilled in the art from the following description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating an overview of devices on whichsome implementations can operate.

FIG. 2 is a block diagram illustrating an overview of an environment inwhich some implementations can operate.

FIG. 3 is a block diagram illustrating components which, in someimplementations, can be used in a system employing the disclosedtechnology.

FIG. 4 is a flow diagram illustrating a process used in someimplementations for creating a ghost card via a browser extension.

FIG. 5 is a flow diagram illustrating a process used in someimplementations for generating personalized information via the browserextension.

FIGS. 6-14 are examples of user interfaces used in some implementationsof the technology.

The techniques introduced here may be better understood by referring tothe following Detailed Description in conjunction with the accompanyingdrawings, in which like reference numerals indicate identical orfunctionally similar elements. Moreover, while the technology isamenable to various modifications and alternative forms, specificembodiments have been shown by way of example in the drawings and aredescribed in detail below. The intention, however, is not to limit thetechnology to the particular embodiments described. On the contrary, thetechnology is intended to cover all modifications, equivalents, andalternatives falling within the scope of the technology as defined bythe appended claims.

DETAILED DESCRIPTION

Embodiments described herein provide systems and methods for creation ofa ghost (i.e., secure) card via a browser extension. Online shopping canpose challenges that are addressed by the present technology. First,payment card data in the hands of retailers or service providers caneasily be compromised. Second, payment card information, budgetinformation, and other financial information is often not readilyavailable to the user when the user is shopping online. Instead, if theuser needs to access such information, the user must open a separate tabor window, provide access credentials, and locate the relevantinformation. Most users will skip these steps in hopes that they aremaking purchases within their means, selecting the payment instrumentthat provides the most benefits, and staying on track with their budget,but without knowing. Methods and systems disclosed herein address bothof these issues with a single solution.

In some embodiments, a user can download a browser extension thatidentifies when a user is accessing a website of a retailer or serviceprovider. In some embodiments, the user is required to provideauthentication credentials to the browser and/or the browser extensionbefore the browser extension provides user-specific information. Thebrowser extension can identify the retailer or service provider websitein various ways such as a predefined list, a category of website (e.g.,top level domain), or historical transaction information, or in somecases, the user can enable (e.g., right click and select an option) thebrowser extension for a website. Once the browser extension is enabled,the system can cause an interactive window or icon to be displayed onthe user's device. The interactive window can include personalizedinformation such as a listing of payment cards or account balances,budget information, alerts to other deals, or other information. Forexample, the user can ask “How much have I spent on clothing thismonth?”, and the system can provide a response via the interactivewindow. In some embodiments, the browser extension can detect that theuser has certain items in the shopping cart of the retailer or serviceprovider and then tailor the information to the user. For example, theinteractive window can state, “If you purchase the $100 jacket in yourshopping cart, you will be $5.00 over your clothing budget this month,”or the interactive window can recommend that a particular paymentinstrument be used.

In some embodiments, the browser extension can detect that the user isaccessing a payment webpage associated with the retailer or serviceprovider website, and in response, can generate a selectable list ofpayment instruments. In some embodiments, only the eligible paymentinstruments (i.e., payment instruments that are not expired and have asufficient limit or funds remaining) can appear in the window. In otherembodiments, all payment instruments can appear with the ineligiblepayment instruments greyed out or not available for selection. In someembodiments, the list can appear in the interactive window or near thepayment information when the user clicks in a field to provide thepayment information. In other embodiments, the browser extension cancause a payment icon to appear (e.g., near the payment information onthe payment webpage) and can generate and display the list when the userselects the payment icon. In some embodiments, the browser extension canautomatically insert payment instrument information based on factorssuch as user preferences, historical transactions at the retailer orservice provider, or category of purchase.

In some embodiments, the browser extension can receive a selection of apayment instrument and can, upon request or automatically, create anelectronic ghost card that is linked to a selected payment instrument.The browser extension can enter the information associated with theelectronic ghost card into the payment section of the payment webpage.The electronic ghost card can be a secure card in that it has nointrinsic value in itself and it is temporary.

To create the electronic ghost card, the system can generate a set ofnumbers including a payment card number, expiration date, and CVV orother verification code and link these numbers to the selected paymentinstrument. When the retailer or service provider sends an authorizationrequest for a transaction with these numbers, the system can determinewhich payment card was linked and prior to authorizing the transaction,determine whether the transaction is authorized based on the linkedpayment instrument. In some embodiments, authorization for thetransaction is made when the system creates the ghost card based on theamount of the transaction and the selected payment card. In this way, ifthe retailer or service provider had a data breach, the user's paymentcard information would not be compromised.

In some embodiments, the electronic ghost card is a one-time use paymentcard whereas in other embodiments, the electronic ghost card can be usedmultiple times. In some embodiments, the user can specify parameters forthe electronic ghost card by, for example, using dynamically generatedquestions. The parameters can include eligible retailers, credit limit,and an expiration date, though the credit limit and the date are boundedby the credit limit and the expiration date of the selected paymentinstrument.

This disclosure describes systems and processes designed to provideon-demand financial information and to protect the user's payment cardinformation by generating and using a secure card. Various embodimentsmay provide one or more of the following technological improvements: (1)increased security of payment card data, (2) immediate access to anelectronic ghost card, (3) on-demand account balance information, and(4) real-time budget projections based on shopping cart data or userinput data.

In the following description and for purposes of explanation, numerousspecific details (e.g., screen shots) are set forth in order to providea thorough understanding of embodiments of the present technology. Itwill be apparent, however, that embodiments of the present technologymay be practiced without some of these specific details.

Suitable System

Several implementations are discussed below in more detail in referenceto the figures. Turning now to the figures, FIG. 1 is a block diagramillustrating an overview of devices on which some implementations of thedisclosed technology can operate. The devices can comprise hardwarecomponents of a device 100 that manage contact information. In someembodiments, the contact information is included in documents such ascontracts. Device 100 can include one or more input devices 120 thatprovide input to the CPU (processor) 110, notifying it of actions. Theactions are typically mediated by a hardware controller that interpretsthe signals received from the input device and communicates theinformation to the CPU 110 using a communication protocol. Input devices120 include, for example, a mouse, a keyboard, a touchscreen, aninfrared sensor, a touchpad, a wearable input device, a camera- orimage-based input device, a microphone, or other user input devices.

CPU 110 can be a single processing unit or multiple processing units ina device or distributed across multiple devices. CPU 110 can be coupledto other hardware devices, for example, with the use of a bus, such as aPCI bus or SCSI bus. The CPU 110 can communicate with a hardwarecontroller for devices, such as for a display 130. Display 130 can beused to display text and graphics. In some examples, display 130provides graphical and textual visual feedback to a user. In someimplementations, display 130 includes the input device as part of thedisplay, such as when the input device is a touchscreen or is equippedwith an eye direction monitoring system. In some implementations, thedisplay is separate from the input device. Examples of display devicesare: an LCD display screen; an LED display screen; a projected,holographic, or augmented reality display (such as a heads-up displaydevice or a head-mounted device); and so on. Other I/O devices 140 canalso be coupled to the processor, such as a network card, video card,audio card, USB, FireWire or other external device, camera, printer,speakers, CD-ROM drive, DVD drive, disk drive, or Blu-Ray device.

In some implementations, the device 100 also includes a communicationdevice capable of communicating wirelessly or wire-based with a networknode. The communication device can communicate with another device or aserver through a network using, for example, TCP/IP protocols. Device100 can utilize the communication device to distribute operations acrossmultiple network devices.

The CPU 110 can have access to a memory 150. A memory includes one ormore of various hardware devices for volatile and non-volatile storage,and can include both read-only and writable memory. For example, amemory can comprise random access memory (RAM), CPU registers, read-onlymemory (ROM), and writable non-volatile memory, such as flash memories,hard drives, floppy disks, CDs, DVDs, magnetic storage devices, tapedrives, device buffers, and so forth. A memory is not a propagatingsignal divorced from underlying hardware; thus, a memory isnon-transitory. Memory 150 can include program memory 160 that storesprograms and software, such as an operating system 162, ghost cardcreation platform 164, and other application programs 166. Memory 150can also include data memory 170 that can include payment instrumentinformation (credit, debit or gift card numbers, expiration dates,verification numbers), account balances, budget information, paydays,income sources, authentication information, transaction information, andpreferences, etc., which can be provided to the program memory 160 orany element of the device 100.

Some implementations can be operational with numerous other generalpurpose or special purpose computing system environments orconfigurations. Examples of well-known computing systems, environments,and/or configurations that may be suitable for use with the technologyinclude, but are not limited to, personal computers, server computers,handheld or laptop devices, cellular telephones, wearable electronics,gaming consoles, tablet devices, multiprocessor systems,microprocessor-based systems, set-top boxes, programmable consumerelectronics, network PCs, minicomputers, mainframe computers,distributed computing environments that include any of the above systemsor devices, or the like.

FIG. 2 is a block diagram illustrating an overview of an environment 200in which some implementations of the disclosed technology can operate.Environment 200 can include one or more client computing devices 205A-D,examples of which can include device 100. Client computing devices 205can operate in a networked environment using logical connections throughnetwork 230 to one or more remote computers, such as a server computingdevice 210.

In some implementations, server computing device 210 can be an edgeserver that receives client requests and coordinates fulfillment ofthose requests through other servers, such as servers 220A-C. Servercomputing devices 210 and 220 can comprise computing systems, such asdevice 100. Though each server computing device 210 and 220 is displayedlogically as a single server, server computing devices can each be adistributed computing environment encompassing multiple computingdevices located at the same or at geographically disparate physicallocations. In some implementations, each server computing device 220corresponds to a group of servers.

Client computing devices 205 and server computing devices 210 and 220can each act as a server or client to other server/client devices.Server 210 can connect to a database 215. Servers 220A-C can eachconnect to a corresponding database 225A-C. As discussed above, eachserver 220 can correspond to a group of servers, and each of theseservers can share a database or can have their own database. Databases215 and 225 can warehouse (e.g., store) information such as paymentinstrument information (credit, debit, or gift card numbers, expirationdates, verification numbers), account balances, budget information,paydays, income sources, authentication information, transactioninformation, and preferences. Though databases 215 and 225 are displayedlogically as single units, databases 215 and 225 can each be adistributed computing environment encompassing multiple computingdevices, can be located within their corresponding server, or can belocated at the same or at geographically disparate physical locations.

Network 230 can be a local area network (LAN) or a wide area network(WAN), but it can also be other wired or wireless networks. Network 230may be the Internet or some other public or private network. Clientcomputing devices 205 can be connected to network 230 through a networkinterface, such as by wired or wireless communication. While theconnections between server 210 and servers 220 are shown as separateconnections, these connections can be any kind of local, wide area,wired, or wireless network, including network 230 or a separate publicor private network.

FIG. 3 is a block diagram illustrating components 300 which, in someimplementations, can be used in a system employing the disclosedtechnology. The components 300 include hardware 302, general software320, and specialized components 340. As discussed above, a systemimplementing the disclosed technology can use various hardware,including processing units 304 (e.g., CPUs, GPUs, APUs, etc.), workingmemory 306, storage memory 308, and input and output devices 310.Components 300 can be implemented in a client computing device such asclient computing devices 205 or on a server computing device, such asserver computing device 210 or 220.

General software 320 can include various applications, including anoperating system 322, local programs 324, and a basic input outputsystem (BIOS) 326. Specialized components 340 can be subcomponents of ageneral software application 320, such as local programs 324.Specialized components 340 can include access module 344, websitedetection module 346, information module 348, list generation module350, ghost card creation module 352, and payment module 354, andcomponents that can be used for transferring data and controlling thespecialized components, such as interface 342. In some implementations,components 300 can be in a computing system that is distributed acrossmultiple computing devices or can be an interface to a server-basedapplication executing one or more of specialized components 340.

Access module 344 can allow the user to use the browser extension bymaking the browser extension available for download and collectingauthentication data to ensure the user has the proper credentials to usethe browser extension to see the personalized information and to createghost cards. In an example, the user can download the browser extensionand provide credentials (e.g., username, password, biometrics). In someembodiments, the user is also or alternatively logged into a particularbrowser (e.g., Google Chrome). In some embodiments, the user is requiredto provide credentials each time a new browser is activated if the userwould like to enable the browser extension.

Website detection module 346 can detect the website the user isaccessing. When the website is one of a list of identified websites, isof a particular category (e.g., retail websites, websites with a certainextension, websites in which the user previously used the browserextension), website detection module can display an icon or window suchas element 602 in FIG. 6. In some embodiments, the user can selectelement 602 in FIG. 6 and website detection module 346 can display iconsor windows such as element 702 in FIG. 7, element 802 in FIG. 8, element902 in FIG. 9, element 1002 in FIG. 10, and element 1102. If a websiteis not one of the identified websites, a user can manually bring up theicon or window (e.g., by right clicking and making a selection from amenu).

Information module 348 can provide user-specific information to theuser. For example, information module 348 can access the user's accountsand provide account balances (e.g., credit card account balances,savings or checking account balances) and budget information, and cananswer questions such as “How much money have I spent on clothing thismonth?,” and “What will my credit card balance be if I make thispurchase?,” or “When is my next pay day?.” In some embodiments,information module 348 can detect an item or an amount due based on ashopping cart or payment page on the retailer's website and providequestions or answers based on the items in the shopping cart or amountdue on a payment webpage.

List generation module 350 can generate a list of payment instrumentsavailable to the user, including balances, and cause the list to bedisplayed on the user's device. List generation module 350 can displaythe payment instruments after detecting that the user is on a paymentwebpage of the retailer or service provider website or when the userbegins to type in a payment information field. In some embodiments, listgeneration module 350 can place an icon next to the payment informationfield and when the user selects the icon, a selectable list of paymentinstruments can be displayed. In some embodiments, when the user hasalready made a purchase from a website, the same payment instrument canbe automatically input into the payment information fields or thepayment instruments can be arranged such that the most recently usedpayment instrument is placed at the most accessible place on the list(e.g., top or bottom, nearest the icon). In some embodiments, listgeneration module 350 recommends a payment instrument and asks the userwhich payment card the user would like to use via the interactivewindow.

Ghost card creation module 352 can create an electronic ghost card uponreceiving a selection of a payment instrument with which to link theghost card. The electronic ghost card can be a temporary paymentmechanism linked to a user's payment card to anonymize the user's actualpayment card information. The ghost card can include randomly generatednumbers to insert into a payment webpage of a retailer or serviceprovider website, including a credit or debit card number, CVV (orsimilar verification number), and expiration date. Ghost card creationmodule creates the electronic ghost card and associates the electronicghost card with the selected payment instrument of the user. By doingso, when the issuing organization of the electronic ghost card receivesan authorization request from the retailer or service provider, theissuing organization can determine the user's selected paymentinstrument that is linked to electronic ghost card, authorize thetransaction (assuming the purchase falls within the boundaries of theselected payment instrument such as an expiration date and availablefunds or credit), and charge the selected payment instrument. In thisway, the retailer is paid without ever seeing the user's actual paymentinstrument information. Should there by a security breach at theretailer or service provider, the user would not need to be issuedanother credit card.

Ghost card creation module 352 can create the electronic ghost cardusing various processes. For example, ghost card creation module 352 cancreate the electronic ghost card when the user clicks in one of thepayment information fields so long as ghost card creation module 352 hasan indication of which payment instrument to link the electronic ghostcard to. In other embodiments, the system can provide an icon or window(e.g., next to or near) the payment instrument input information on theretailer or service provider website that the user can select. Whenselected, the system can list the user's payment instrument and the usercan choose a payment instrument with which to link the ghost card. Whenthe user indicates the payment instrument, ghost card creation module352 can create the electronic ghost card. In some embodiments, the ghostcard creation module 352 selects the payment instrument that providesthe most benefit to the user (e.g., lowest interest rate, lowestbalance, most preferential or highest rewards) and automatically createsan electronic ghost card linked to the selected payment instrument.

In some embodiments, the electronic ghost card is a one-time use paymentmechanism, and a new ghost card must be created each time the userwishes to use a ghost card to pay at the retailer or service providerwebsite. In other embodiments, the user can use the electronic ghostcard again at the same retailer or service provider website (e.g., theelectronic ghost card can be included in a list of available paymentinstruments or the electronic ghost card is automatically input at theretailer's website). In some embodiments, the user can indicate theirpreferences for the electronic ghost card. For example, the user canindicate an expiration date of the electronic ghost card, a limit on theamount of funds the electronic ghost card can be used to make apurchase, and the retailers at which the electronic ghost card can beused. The expiration date and the limit of funds can be bounded by(i.e., cannot exceed) the expiration date and the limit of funds of thepayment instrument linked to the electronic ghost card. In someembodiments, the user cannot view the electronic ghost card informationand the system input information should the user want to use theelectronic ghost card again. In other embodiments, the user is given theghost card information and can use the ghost card within therestrictions selected by the user or the issuing organization.

Payment module 354 can automatically fill in payment information in apayment section of the payment webpage based on the selected paymentinstrument (e.g., electronic ghost card or other payment instrument). Ifa payment instrument was previously selected as preferred for theretailer or service provider website, then payment module 354 canautomatically input the preferred payment instrument.

Those skilled in the art will appreciate that the components illustratedin FIGS. 1-3 described above, and in each of the flow diagrams discussedbelow, may be altered in a variety of ways. For example, the order ofthe logic may be rearranged, substeps may be performed in parallel,illustrated logic may be omitted, other logic may be included, etc. Insome implementations, one or more of the components described above canexecute one or more of the processes described below.

FIG. 4 is a flow diagram illustrating a set of operations 400 forcreating a ghost card via a browser extension. Detecting operation 402detects that the user is accessing a retailer or service providerwebsite. Enabling operation 404 enables an interactive window or iconthat can provide information as requested. Detecting operation 406detects that the user is accessing a payment webpage of the retailer orservice provider. Generating operation 408 generates a list of paymentinstruments associated with the user. The list can be displayed in theinteractive window or via a separate window or icon. Receiving operation410 receives a selection of a payment instrument. Creating operation 412creates an electronic ghost card and linking operation 414 links theelectronic ghost card with the selected payment instrument. In someembodiments, the user can provide restrictions on the electronic ghostcard such as a credit or amount limit, expiration date, and/or number ofallowed uses. Entering operation 416 enters the electronic ghost cardinto the payment webpage. Receiving operation 418 receives a request forauthorization of the transaction using the electronic ghost card.Reviewing operation 420 reviews whether the payment instrument linked tothe electronic ghost card has sufficient credit or funds to support thetransaction. Authorizing operation 420 authorizes the transaction whenthe payment instrument has sufficient funds or credit. Chargingoperation 422 charges the payment instrument for the transaction.

FIG. 5 is a flow diagram illustrating a set of operations 500 forgenerating personalized information via the browser extension.Identifying operation 502 identifies that the user is accessing aretailer or service provider website. Enabling operation 504 enables aninteractive window used to communicate with the user. The system cansend personalized information to the user via the interactive window,and the user can ask questions or otherwise request information via theinteractive window (e.g., budget information, payment card, or accountbalances). Detecting operation 506 detects items in the user's shoppingcart of the retailer or service provider website. Providing operation508 can communicate about the items via the interactive window (e.g.,“If you purchase these items, you will have $50 remaining in yourclothing budget for this month.”).

FIGS. 6-11 are examples of user interfaces that can be used in someimplementations. FIG. 6 depicts an example of a user interface with anicon 602 that can appear when a retailer or service provider websitesuch as Amazon is being accessed.

FIG. 7 depicts an example of a user interface with an icon 702 that canappear when icon 602 is selected. Icon 702 can display the balance of apayment instrument typically used by the user at the website.

FIG. 8 depicts an example of a user interface with an icon 802 that canappear when a menu item requesting a listing of all payment instrumentsis selected. In some embodiments, the menu item can appear when icon 602or 702 is selected.

FIG. 9 depicts an example of a user interface with an interactive window902. Interactive window 902 can appear when icon 602 or 702 is selected,when a menu item associated with icon 602 or 702 is selected, or whenthe system recognizes the retailer or service provider website. The usercan ask questions and receive personalized answers.

FIG. 10 depicts an example of a user interface with an interactivewindow 1002 listing payment instruments and other accounts (e.g.,checking, savings) associated with a user.

FIG. 11 depicts an example of a user interface with an interactivewindow 1102 showing specific information regarding an account associatedwith a user.

FIG. 12 depicts an example of a user interface where the browserextension includes a selectable button near the card input field for theuser to generate a ghost card number (“generate number” button).

FIG. 13 depicts an example of a user interface that shows a windowallowing a user to select features of the ghost card (e.g., recurringvs. single use, maximum amount of funds or transactions, expiration)after the user selects the “generate number” button in FIG. 12.

FIG. 14 depicts an example of a user interface that shows completedpayment information fields after the browser extension automaticallyinputs the created ghost card number and associated information.

CONCLUSION

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof means any connection or coupling,either direct or indirect, between two or more elements; consequently,the coupling or connection between the elements can be physical,logical, or a combination thereof. Additionally, the words “herein,”“above,” “below,” and words of similar import, when used in thisapplication, refer to this application as a whole and not to anyparticular portions of this application. Where the context permits,words in the above Detailed Description using the singular or pluralnumber may also include the plural or singular number respectively. Theword “or,” in reference to a list of two or more items, covers all ofthe following interpretations of the word: any of the items in the list,all of the items in the list, and any combination of the items in thelist.

Several implementations of the disclosed technology are described abovein reference to the figures. The computing devices on which thedescribed technology may be implemented can include one or more centralprocessing units, memory, input devices (e.g., keyboards and pointingdevices), output devices (e.g., display devices), storage devices (e.g.,disk drives), and network devices (e.g., network interfaces). The memoryand storage devices are computer-readable storage media that can storeinstructions that implement at least portions of the describedtechnology. In addition, the data structures and message structures canbe stored or transmitted via a data transmission medium, such as asignal on a communications link. Various communications links can beused, such as the Internet, a local area network, a wide area network,or a point-to-point dial-up connection. Thus, computer-readable mediacan comprise computer-readable storage media (e.g., “non-transitory”media) and computer-readable transmission media.

As used herein, being above a threshold means that a value for an itemunder comparison is above a specified other value, that an item undercomparison is among a certain specified number of items with the largestvalue, or that an item under comparison has a value within a specifiedtop percentage value. As used herein, being below a threshold means thata value for an item under comparison is below a specified other value,that an item under comparison is among a certain specified number ofitems with the smallest value, or that an item under comparison has avalue within a specified bottom percentage value. As used herein, beingwithin a threshold means that a value for an item under comparison isbetween two specified other values, that an item under comparison isamong a middle specified number of items, or that an item undercomparison has a value within a middle specified percentage range.

As used herein, the word “or” refers to any possible permutation of aset of items. For example, the phrase “A, B, or C” refers to at leastone of A, B, C, or any combination thereof, such as any of: A; B; C; Aand B; A and C; B and C; A, B, and C; or multiple of any item, such as Aand A; B, B, and C; A, A, B, C, and C; etc.

The above Detailed Description of examples of the technology is notintended to be exhaustive or to limit the technology to the precise formdisclosed above. While specific examples for the technology aredescribed above for illustrative purposes, various equivalentmodifications are possible within the scope of the technology. Forexample, while processes or blocks are presented in a given order,alternative implementations may perform routines having steps, or employsystems having blocks, in a different order, and some processes orblocks may be deleted, moved, added, subdivided, combined, and/ormodified to provide alternative or subcombinations. Each of theseprocesses or blocks may be implemented in a variety of different ways.Also, while processes or blocks are at times shown as being performed inseries, these processes or blocks may instead be performed orimplemented in parallel or may be performed at different times. Furtherany specific numbers noted herein are only examples. Alternativeimplementations may employ differing values or ranges.

The teachings of the technology provided herein can be applied to othersystems, not necessarily the system described above. The elements andacts of the various examples described above can be combined to providefurther implementations of the technology. Some alternativeimplementations of the technology may include not only additionalelements to those implementations noted above, but also may includefewer elements.

These and other changes can be made to the technology in light of theabove Detailed Description. While the above description describescertain examples of the technology, and describes the best modecontemplated, no matter how detailed the above appears in text, thetechnology can be practiced in many ways. Details of the system may varyconsiderably in its specific implementation, while still beingencompassed by the technology disclosed herein. As noted above,particular terminology used when describing certain features or aspectsof the technology should not be taken to imply that the terminology isbeing redefined herein to be restricted to any specific characteristics,features, or aspects of the technology with which that terminology isassociated. In general, the terms used in the following claims shouldnot be construed to limit the technology to the specific examplesdisclosed in the specification, unless the above Detailed Descriptionsection explicitly defines such terms. Accordingly, the actual scope ofthe technology encompasses not only the disclosed examples, but also allequivalent ways of practicing or implementing the technology under theclaims.

To reduce the number of claims, certain aspects of the technology arepresented below in certain claim forms, but the applicant contemplatesthe various aspects of the technology in any number of claim forms. Forexample, while only one aspect of the technology is recited as acomputer-readable medium claim, other aspects may likewise be embodiedas a computer-readable medium claim, or in other forms, such as beingembodied in a means-plus-function claim. Any claims intended to betreated under 35 U.S.C. § 112(f) will begin with the words “means for,”but use of the term “for” in any other context is not intended to invoketreatment under 35 U.S.C. § 112(f). Accordingly, the applicant reservesthe right to pursue additional claims after filing this application topursue such additional claim forms, in either this application or in acontinuing application.

We claim:
 1. A computing system for creating a ghost card for electronicpurchases, the computing system comprising: . . . place, via the webbrowser extension, an icon that, when selected by the user, displays thelist of selectable payment Instruments; receive an indication of apayment instrument from the list of selectable payment instruments, thatwas selected by the user; receive, from the user, ghost card parametersthat include a credit limit and an expiration date, wherein the creditlimit and an expiration date are bounded by a credit limit andexpiration date of the selected payment instrument; create an electronicghost card linked to the selected payment instrument; and automaticallyenter, in the payment webpage, information associated with theelectronic ghost card, wherein the automatically entered Informationassociated with the electronic ghost card Is submitted as a transactionrequest for purchase of the Items In the virtual cart.
 2. The system ofclaim 1, wherein the instructions, when executed by the one or moreprocessors, further cause the computing system to: identify that theuser is accessing the payment webpage a second time; and automaticallyenter the information associated with the ghost card when the useraccesses the payment webpage.
 3. The system of claim 1, wherein theghost card is a one-time use payment card.
 4. The system of claim 1,wherein the instructions, when executed by the one or more processors,further cause the computing system to enable an interactive window thatincludes personalized information that includes at least one of anaccount balance or budget information.
 5. The system of claim 1, whereinthe instructions, when executed by the one or more processors, furthercause the computing system to: enable an interactive window thatincludes personalized information; receive, via the interactive window,a question related to items in the shopping cart and a budget of theuser; and cause answers to be displayed.
 6. The system of claim 1,wherein the instructions, when executed by the one or more processors,further cause the computing system to: enable an interactive window thatincludes personalized information; wherein displaying the list ofselectable Payment instruments is performed in the interactive window.7. The system of claim 1, wherein the instructions, when executed by theone or more processors, further cause the computing system to: inresponse to receiving the transaction request from the retailer usingthe ghost card, charge the selected payment instrument linked to theghost card, for the transaction.
 8. A computerized method for creating aghost card for electronic purchases, the method comprising: . . .placing, via the web browser extension, an icon that when selected bythe user displays the list of selectable payment Instruments; receivingan indication of a payment instrument, from the list of selectablepayment Instruments, that was selected by the user; receiving, from theuser, ghost card parameters that include a credit limit and anexpiration date, wherein the credit limit and an expiration date arebounded by a credit limit and expiration date of the selected paymentinstrument; creating the electronic ghost card linked to the selectedpayment instrument; automatically entering, in the payment webpage,information associated with the electronic ghost card, wherein theautomatically entered information associated with the electronic ghostcard is submitted as a transaction request for purchase of the items inthe virtual cart.
 9. The computerized method of claim 8, wherein themethod further comprises: identifying that the user is accessing thepayment webpage a second time; and automatically entering theinformation associated with the ghost card when the user accesses thepayment webpage.
 10. The computerized method of claim 8, wherein theghost card is a one-time use payment card.
 11. The computerized methodof claim 8, wherein the method further comprises: receiving, via aninteractive window, a question related to at least one of: items in theshopping cart or a budget of the user; and causing answers to bedisplayed.
 12. The computerized method of claim 8, further comprising:enabling an interactive window that includes personalized information;and wherein displaying the list of selectable payment instruments isperformed in the interactive window.
 13. The computerized method ofclaim 8, wherein the method further comprises: receiving the transactionrequest from the retailer using the ghost card; and charging theselected payment instrument linked to the ghost card for thetransaction.
 14. A non-transitory computer-readable storage mediumstoring instructions that, when executed by a computing system, causethe computing system to perform a process for creating a ghost card forelectronic purchases, the process comprising: . . . placing, via the webbrowser extension, an icon that when selected by the user, displays thelist of selectable payment Instruments; receiving an Indication of apayment Instrument, from the list of selectable payment Instruments,that was selected by the user; receiving, from the user, ghost cardparameters that include a credit limit and an expiration date, whereinthe credit limit and an expiration date are bounded by a credit limitand expiration date of the selected payment instrument; creating theelectronic ghost card linked to the selected payment instrument;automatically entering, in the payment webpage, information associatedwith the electronic ghost card, wherein the automatically enteredinformation associated with the electronic ghost card is submitted as atransaction request for purchase of the items in the virtual cart. 15.The non-transitory computer-readable storage medium of claim 14, whereinthe process further comprises: identifying that the user is accessinganother webpage; and automatically entering the information associatedwith the ghost card when the user accesses the other webpage.