You are on page 1of 32
cu») United States US 2016014819681 2) Patent Application Publication (0) Pub. No.: US 2016/0148196 Al Dides et al. (64) MODULAR DEVICE PAYMENT SYSTEM (71) Applicant: PAYPAL, IN fan Jose, CA (US) (72) Inventors: Emil Dides, Sun Jose, CA (US): Shercen Kamalle, San Jose, CA (US) (21) Appl. Nos 14971,626 (22) Filed: Dee. 16,2018 Related US. Application Data (63) Continuation of application No, 14/585,144, filed on Nov. 26, 2014, now Pat. No. 9,275,389, Publication Classification Gb Ince Go69 20236 (2005.01) 606g 2034 (2006.01) 100 S t04a, (43) Pub. Date May 26, 2016 (2) US.Cl cee 6060 20/36 (2013.01): G69 20341 (2013.01); G06Q 20351 201301) on ABSTRACT module includes a chassis, A located om the chassis. pay- ‘meat module database in the cisss stores Funding source information and security information. A payment module engine in the chassis determines thatthe modular device ‘conneetor has been connected toa modular device frame ofa ‘modlular device, and retrieves modular device identifying information from the modular deviee. The payment module ‘then determines thatthe modular device identifying informa- tion matches an authorized modular device identited by the security infomation inthe payment module database and, in response, enables the transmission of at least some of the funding source information from the payment module data- base to conduct a payment transaction, Patent Application Publication May 26,2016 Sheet 1of19 US 2016/0148196 AL FIGURE 1a 102 3 Patent Application Publication May 26,2016 Sheet 2 0f19 US 2016/0148196 A1 114 FIGURE 1 102 Patent Application Publication May 26, 2016 Sheet 3 of 19 US 2016/0148196 AI Patent Application Publication May 26,2016 Sheet 4 of 19 US 2016/0148196 A1 202f 202 202 C 202¢ FIGURE 2a 202d 2022 ~ 2028 Patent Application Publication May 26,2016 Sheet Sof 19 US 2016/0148196 A1 2026 — 2028 [ No pit ls 5 | 202b 202 US 2016/0148196 AI May 26, 2016 Sheet 6 of 19 Patent Application Publication eaunold ‘aE SnGOM INaMAVE WE INaISAS NOULOINNINOD ‘aE asvavive SSaTaUIM, INGOW ANAHAVE ‘aaE NOUWHROSNI : aE ‘Auesno3s ae Fae NOUWHRHONI 30'NOS ONIONN snaorl iNaWave For /eINI WOISAH Patent Application Publication May 26,2016 Sheet 70f19 US 2016/0148196 A1 202 202 2028 2026 FIGURE 4 202d 402 2028 2020 ~ Patent Application Publication 202 202 Sm 502 May 26, 2016 Sheet 8 of 19 2026 2026 ~~ 202a 2024 504 04a US 2016/0148196 AI FIGURE 5 Patent Application Publication May 26,2016 Sheet 9 of 19 US 2016/0148196 A1 202 202b 202 602 504 2026 | FIGURE 6 2028 2028 2024 US 2016/0148196 AI May 26, 2016 Sheet 10 of 19 Patent Application Publication 234unold ‘02 FINGOW ANSWAWE OE ANIONS aINGOW INaWAVd ‘ZOLMOSIAUSdAH VOL ANIHOW TWALEIA ‘OIL GUO WALYIA ‘BOL GUO TVALMIA ‘30Z EVO TWNLYIA POHL ROL 501 astm | fe Ast ASTM, AONSHuNO AONaYYNO ANSEHEN TWALMIA vat TWALAIA one. AWALMIA ssh ‘US 2016/0148196 AL May 26, 2016 Sheet 11 of 19 Patent Application Publication eaunols a NOUOVSNYL INSIAV 19NGNOD E re SSUBAVTALINORS: SO ALMWENd SUVOLLNSHUNY me NOWOV ALRiNO3S iOsead oe LuaTIVN, AONSuUND TWNLBIA SS300¥ ‘OL4sanogu Gamngow ANaNAYA HO (GBLVOUNSHLNY 391930 NOUWHHOSNT ONIAGLINAGI SOINadNYINGON BATHS t Eg soinaaavingow (OL aTNGOM-INAMAY L9ANNOO Bos JORG uF INGOW US 2016/0148196 AI May 26, 2016 Sheet 13 of 19 Patent Application Publication 206 206 6 3unold Dee S0nSG uv INGON quomssvd (Eeeeeeee | AWN wasn Co piomssed pue ewewesn e apiroid eseetes UMALNSO ADNSNYND TWALUIA YNOA OL SWOOTAM Com te @N0wd COCee 205 906 US 2016/0148196 AI May 26, 2016 Sheet 14 of 19 Patent Application Publication 206 oe 26 3uNeI ‘08 S010 wvINGON Cm ce YALNAD ADNAXYND TWNLYIA & Ad’ COC|e US 2016/0148196 AI May 26, 2016 Sheet 15 of 19 Patent Application Publication 206 a6 Peaunot ‘as 3oMa0 HINGON LATIWM NIOOLIG HNOA NAdO OL MO1SE SLVOILNSHLAY ASW31d YALNAD AONAYYND TWALYIA COM otk @A0id COC@e Pes US 2016/0148196 AI May 26, 2016 Sheet 16 of 19 Patent Application Publication 206 v6 26 auno1 ‘ae SING EV TNGON 01a UNOA NO NVOS BINAHL V ONIGIAOLE Ad SIVOLNSHLNV asad ‘LATIWM NIOOLIG HNOA SSAOOW OL LSTIVM NIOOLIE &NOWd COCee erie US 2016/0148196 AI May 26, 2016 Sheet 17 of 19 Patent Application Publication oor 0130 LNVHOUAN oor { song | w3QIAOud LNNODOY ‘Toor O13 ‘wasn oF 3uno1s | 300 | 30130 aginoud SOURS INBWAVA wasn go13q 335 30130 sano INNOOOY US 2016/0148196 AI May 26, 2016 Sheet 18 of 19 Patent Application Publication Hane. wor ROMAN a YN SNOLLWOINARINOS wr YOSNES NOUWOOT a | ar wr BOWAMBINIIHONUBN] Lee OYINOD HOsEND ¥ * + wort sna BT inant ¥ ¥ ] ae —_ BANOASIO | BOT svNo1s OTT Asowan Tawissia —______} es US 2016/0148196 AI May 26, 2016 Sheet 19 of 19 Patent Application Publication zi aunols ‘Wozt 3dIAaG wasn wor aNGON aovHOLs fad aindow-sns BOVEOLS, vor SINGOW LNAWAWd et wor sinaon NOLLWOINAINWOO, Poet aingon-sns NOLLWOINNWNOO —> ROMAN on US 2016/0148196 AI MODULAR DEVICE PAYMENT SYSTEM (CROSS-REFERENCE TO RELATED "APPLICATIONS, [0001] This is « Continuation application to US. Utility pplication Ser. No. 14/5S5,144 filed Nov. 26,2014, entitled “MODULAR DEVICE PAYMENT SYSTEM." Awomey Docket No. 704811515, the diselosure of which is incorpo- rated herein by reference in its entity BACKGROUND [0002] 1. Field ofthe Disclosure [0003] The present disclosure generally relates to online anor mobile payments and more particularly to a module ‘device payment system. 0003) 2. Retated Art 10005] |More and more consumers are purchasing itemsand services over electronic networks such as, for example, the Internet. Consumers routinely purchase products and ser- vices from merchants and iividuals alike. The tansections may take place dinetly between a comentional or online ‘merchant or retailer and the consumer, and payment is typi- ‘ally made by entering eredit card or othe financial informa tion, Transactions may also lake place with the aid of ua ‘online of mobile payment service provider such as, for ‘example, PayPal, Inc. of San Jose, Cali. Such payment ser- vice providers ean make transactions easier and safer forthe partes involved. Purchasing with the assistance of payment Service provider from the eoavenience of virtually anywhere using a mobile device is one main reason why online and mobile purchases are growing very quickly. 10006] | Theuse of phones and other user devices for making ‘online andior mobile payments is proving rapidly, as tradi tional payment devices suchas eash anderedit cards are being replaced by wireless payment systems tht allow the user to tse their phone or other user deviee to transmit payment information to @ merchant device of merchant in order to ‘complete a purchase. 10007] Traditionally, phones have heen provided by mana- acturors to users asa integrated device that must be entirely replaced when one or more components fail orbecomte obso- Jete. However, recently the concept of a modular phone has been proposed, which provides # modular phone frame t Which different modular components of the plone may be tached (ea sereen module, a battery medlule, a storage module, a camera module, a speaker module etc.) The wse of ‘modular components, along with the provision of a modular ‘component ecosystem tht allows for phone manufactures and third party suppliers to provide users with modular con- ponents allows. user to replace modular components rather than the entre phone when one ofthe modular components on the plone fils or becomes obsolete, 10008] The concept ofthe modular phone provides for sev- ‘eral advantages in online andor mobile payments via phones ‘and/or other user devices that are deserbed in detail below. BRIEP DESCRIPTION OP THE FIGURES 10009] FIG. 1a is 9 exploded rear perspective view ilus- trating an embodiment of modular device [0010] FIG, 1b isa rear perspective view illustrating an ‘embosdiment ofthe modular deviceof FIG. tawitheachot the ‘moddiles connected tothe moda device frame of the moki- lar devices, May 26, 2016 [0011] FIG. te isa front perspective view illustrating an ‘embodiment of the modular device of FIG. 1; [012]. FIG. 2a isa front perspective view illustrating an embodiment of « payment module used with the modular device of FIGS, 1a, 1, and Le: [0013] FIG. 26 is a rear perspective view illustrating an embodiment of the payment module of FIG. 2; [0014] FIG. 3 isa schematic view illustating an emboal- ‘meat of payment module that may be the payment module illustrated in FIGS. 2a and 2; [0018] FIG. 4 is # front perspective view illustrating an embodiment of a payment module including a biometic input device: [0016] FIG. $ is a from perspective view iustrating an ‘embodiment of @ payment module including a ard informa tion provisioning member: [0017] FIG. 6 is » front perspective view iflustating an embodiment of a payment module including a card reader device: [0018] FIG. 7 isa schematic view illustrating an embo- ment of payment module inckiding a plurality of viral currency wallets: [019] FIG. 8s ow char il ‘method for making payments; 0020} FIG. 9q is sercen shot illustrating a virtual cur- reney wallet management application icon provided on a ‘mealular device home sereen: [021] FIG. 96 is sereen shot illustrating @ virtual cut reney center wallet management application proving a first security ayers [0022] FIG. 9c isa seroen shot illustrating @ viral eur reney center wallet management application displaying aph- nity of viral currency wallet application icons: [023] FIG. 91 is @ screen shot illistating «vietal cute rency center wallet management application providing a sec- ond security layer, [024] FIG. 9e isa seroen shot illustrating @ virwal eure reney wallet application providing a third security layer: [025] FIG. 10 sw schematic view illustrating an embodi- ‘meat of networked system; [0026] FIG. 11 isa schematic view illustrating an emboat- ‘meat of computer system: and [0027] FIG. 12s 9 schematic view lusting an emboct- sent of user device [0028] Fmbodiments of the present disclosure and their Advantages are best understood by referring to the detailed ‘description that follows. It should be appreciated that like reference numerals are used to identify lke elements ills- ‘wate in one or more ofthe figures, wherein showings therein are for purposes of illsicating embodiments ofthe present ‘sclosre and not for purposes of imiting the same. sgn embodiment of DETAILED DESCRIPTION [0029] The present disclosure provides modular device payment systems and methods for making payments using nodular device payment modules that are configured 10 con ‘ect to a modular device frame of a mosular device such as, {or example, a modular phone. The payment module may provide a self-contained payment device tha sores informa- ‘ion about one or more funding sources, that may ineude one ‘ormore communication systems, andthat provides payment ‘module engine that is configured to eondhet payment trans- factions ising the funding source information and the com- unication system(s) The payment module may store secu US 2016/0148196 AI rity information that ensures tbat the payment module cannot be used with uzauthorized modular devices, al upon con- nection to module device frame, the payment module may Fetrieve modular device identifying information from that ‘modular deve, determine whether matches an authorized ‘modular device identified by the security information and, if 0, enable the transmissio ofthe funding soure information for conducting 8 payment transaction. tthe modular device ‘Mentfying information retrieved from the modular device ‘doesnot matchan authorized modular device identified bythe security information, the payment module may take steps suchas disabling the transmission of the funding source infor mation, locking the payment module, and even erasing the funding source information and/or other informa payment module. In addition, the payment tnclude additional integrated Jor example, a biometric input deviee, a card reader, a card information provisioning member, and or other payment and security features. Inspecitic embodiments, the payment mod- tle may provide a highly secure, multiple vitwal currency ‘wallet management system that wilizesa vital machineand Physical or virtua cards that each store a respective virtual ‘curency wallet and that operate to present multiple layers of sulhentication to protect virtual carrencies that are accessible ‘on the payment module, [0030] Referring now to FIGS. 1a, 12, and to, an example ‘of modular device 100 is provided that, in the illustrated ‘embodiment, is a modular phone. However, as discussed below, the modular devieeimodulae phone maybe a variety of other modular devices known in the art. Furthermore in some ‘embodiments, the fanetionality discussed below with regard to the modular device may be provided in an integrated or rnon-mosluarusee device while remaining within the scope of the present disclosure, The modular device 100 includes @ ‘modular device frame 102 having a plurality of module con- rectors 102a(bothona frst side ilustrated in FIG. 1a, aswell ‘8 second sie that isnot illustrated but that is located ‘opposite the modular device frame 102 from the ist side) Whilenotilusrated, one of skin the atin possession the present disclosure will recognize thatthe modular device Jame 102 houses plurality of electrical connections, busses, ‘and/or other links between tse module connectors 102a 10 ‘allow modules connected othe modular device fame 1020 ‘communicate with eachother, as discussed further below. The modular device 100 also includes a plurality of modules tht, in the illustrated embodiment, include display mode 104 that includes medular device connectors 10da tha are con- figured toeagage the module connectors 102a0n the modular device frame 102, a Wi-Fi communication module 106 (shich includes modular device connectors no illustrated, that are configured io engage the module connectors 1024 07 the modular device frame 102), camera module 108 (Wich includes modular device connectors, not ilustrated, that are configured to engage the module connectors 1024 on the moddolar deviee frame 102), a speaker module 110 (whieh includes modular device eonnectors, not istraed, that are ‘configured to engage the module coanectors 1024 on the modular deviee frame 102), a battery module 112 (whieh includes modular device connectors, not ilustrated, that are ‘configured to engage the module connectors 1024 on the modular device frame 102) a processing module 114 (which ‘includes modular device connectors, not istrated, that are ‘configured to engage the module comnectors 1022 on the modular deviee frame 102), a security module 116 (whieh May 26, 2016 Jneludes modular device connectors, not ilstated that are configured to engage the module connectors 102a of the ‘modular device frame 102) andr other modules that ae not ‘elereoe by reference numbers in FIGS. a, 1b, or Le but ‘which may ince memory modules, other communication ‘modules, ay ofa variety of computing componeas knowin the ant and the payment module diseussed below [0031] _Asillusteted in FIGS. 1a 19, ad te each of the ‘mods maybe enanccted othe module device frame 102 to provide the medlar device 100, and as discussed above, ‘ser may replace ied modes a illerent modules and "parade modules depending onthe user's dese fanetion- ality ofthe modular device 10, For example, i storage ‘module i running ot of space, the user may upgrade the creat storage module withahighercapaciy sloragemodale fn soancet tothe module device frame 102, Furhormor, asdiscussed below, a payment module may be provided tt conneets 0 the modular device frame 102 and that may be onigurd 1 conduct payment transactions, either by ise (Ce. without the need to communicite with ether modules connected to the modular device frame 102) or with the assistance of andor uilizing communication with other most bles connected to the modular device Frame 102, While a Specific modular device 100 has been illite’ and dseribed, one of sil inte ain possession f the present Cisclosue will roognize that a wide varity of diferent ypes of modular devices having different for fats diferent ‘modular device frames, diferent module conection melhe cds, and/orothe diferent mexola device characteristics wil ‘benef rom the teachings ofthe present disclosure and thus will a within is scope. [0032] _Referriog now wo FIGS. 2e and 28 an embexinent ‘fa payment module 200s llstrated. The pyment modole 200 nciodesa chassis 202 having front surface 2020 a rear surface 2025 lated opposite the chasse 200 from the foot Surace 2020, atop srlace 202cextending between the font Surice 202« and therersurlace202h atom srlace 202d extending berween he ron srace 2020 ad the rear surface 202} and located opposite the chassis 200 from the top sar {ace 202c, anda pairof opposing sidecurlices 202 and 202/ extending between the font suefae 2024, the eur suc 202b, the top surface 202, andthe bottom surface 2024 and located opposite the chassis 200 from cach other. purity of mdr device connectors 204 extend fom the reat Sut {ace 2028 and sre coupled to components howsed in andlor provided by the payment module 200, discussed in further dui! below Ia he ills embodiment «plurality of Sub-module conneetions 206 are included on the payment ‘odule 202 and ae coupled to components housed in ador Provided bythe payment module 200s cisessed bol in Some embodiments subsmodiles may be coupled to the poy= ‘ment module 20 trough the submodule connections 206, While in oer embodiments, the st-madile functionality dixcossed below may be iterated as pact of the payment nde 20, {0033} Referring now to FIG. 3, an embodiment of pay ‘ment module 300 js illustrated that may be the payment ‘module 200 discussed abave with eference to FIGS. 2a ad 2 As sch, the components inci in andlor provided by tn payment mole 00 discussed helo may be housed ia tho chassis 202 ofthe payment module 200. The payment ‘module 300 may’inchde hardware processing system (ot ‘iustatd) anda nonsransitory,computerreadable media for memory system that inelodes itstetons that, wea US 2016/0148196 AI executed by te hardware processing system, cause the hard ware processing system to configure payment module ‘engine 302 that performs the funtonaiy of dhe payment ‘module engines and payenest modules taught herein. The payment module 30 may aso inelude ane or more py sia fnterZces 304 6. tbe mula device connectors 204 and! ‘oF the subsmodie connections 206) that are conpled 1 the payment module engine 302 though, for example, a bus oF ‘ther connection between the harware processing, stem fd the one or tore pysicl interfaces 304. The payment module 300 may also tnelode one or more wireless comimt- nication systems 306 such as, fr example, a Wi-Fi comme nicationsystm,« Blsstoothcommonicationsystemor Bhi twoth Low Eneryy (BLE) communication system, Near Field Communication (NFC) system, a beacon communica ton system, andor a variety of ote wireless communica tions systems known inthe ar tat ae couplet the payment module engine 302 through, for example, a bus oF other conection between the hardware processing system and the ‘wireless communication system 306. The pujment module $0 als includes «payment mode databare 308 that stores Tuding source infermation 308 and security information 08%, discussed in for detail Below an hati coupled to the poyment module engine 302 though for example, bs ‘rothr conscction heen te hardware processing sytem ‘and storage system tha provides the payment module dat base 308 10034} While exci ofthe components of the payment mode le 300 ceillustatd asinclodsin the payment mode 300, in some embodiments at lest some ofthe components of payment module 300 may be coupled othe payment male ‘engine 302 throvah the one or more physical interfaces 304 ‘and the modular device fame 102. For example, in some ‘thodimcnt, the wireless commonicaton system 306 may be included inthe Wi communication medole 196 and ‘coupled tothe payment module engine 302 through the onc or tore physical intrfees 304 andthe modular deviee frame 102.Assuch onc of skillindicartinpossesionof epreseat iseiosure will recognize that other components utilized by the payment module engine 302 os discussed below may’ be similarly provided as modules ineluded on the molar ‘evice 100 10035] In some embodiments, the payment module 300 may he wlzed in conjunetion witha payment service pro ‘er suchas, for example, PayPal ne of Sa ese Calif For ‘example, a payment service provider may utilize a payment service provider device to provide payment srvoes to sce ‘ofthe payment mosiule. Asin known in the a of payment Services, one oF more aoount providers ulizing account provider devices mey provide funding soure accounts sch fschecking account, savings account, ret account nd ‘oF other payment accounts to the user. The usee may then provide fioding source information asocioted wih those ccoumls proved by the account providers to the payment Service provider (via the payment service provider device). and then use a payment service provider account to make pymients that may be drawn from ae oF more oF those funding sourees. In adlition, the payment service provider nay provide payment accounis the User as Well for making events 10036) In some embodiments, the funding source informa: tion 18a stored inthe payment module database 308 may be Provided by-a sacr and may incide any finding sources sociated witha user and provided by the account poviers May 26, 2016 and/or payment service providers discussed above. For ‘example, user may connect the payment moxlule 300 0 the smddilar device frame 102 the modular deviee 100, provide ‘username and password (or other authentication informa tion that may be verified by the payment module using the security information 308b in the payment module database 308) to authorize the payment module 300 to conduct pay~ ‘mea transactions when connected the modular device 100, ‘and provide information about checking seconnt funding sources (eg, checking account numbers, et.), savings ‘account funding sources (eg., savings aecount numbers, ce.) credit account funding sources (eg. eredit aeconnt ers expiration dates, security codes, te), and/oravari- ‘ly of Funding sources known in the art for authentication and storage inthe payment module database 308. As such, when provisioned with funding source information, the payment ‘module 300 may be considered an “electronic wallet” that storesinformation bout any funding souree thatthe usee may ‘wish to use with a merchant. Furthermore, the user may ad andor remove funding sources as desired to the payment module, 0037] However, in some embodiments, the payment mod- ‘ule 300 may be funding source specific such that itis only associated with asingle funding sour. Por example, aereit account provider may provide the user sith eredit account ‘payment module tat includes only Sanding source informa ‘ion associated with theirereit account (eg. acredit acconnt ‘number, expiration dat, security code, et.) andthe user may provide authentication information substantially as desribed fahove to authorize that eredit aecount payment module for ‘se in conducting payment transactions when connected to the modular device frame 102 of the modular deview 100. Similarly, the payment module may be solely a viral eur reney wallet manager as discussed below. As such, the user ‘may possess multiple funding-source-spcific payment mod- ules that may be connected fo the modular device frame 102 depending on which funding source theuser would ike to use tw cont a payment transaetos [0038] Referring wow FIG. 4,an embodiment ofa payment ‘module 400 is illustrated that i substantially similar to the ‘payment modules 200 andor 300 discussed above with ref- ference 10 FIGS, 2a, 2b, and 3, but with the provision of a biometrie input system 402, The biometric input system 402 may be houted in andr located on the chassis 202, and coupled tothe payment module engine 302 through 8 bus oF other conection between the hardware processing system and the biometric input yystem 402. Inthe lostratedembodi- ‘mea, the biometric input system 402 is a thumbprint oF fingerprint reader, but in other eibodiments may include eye scanners, facial capture and recognition system, andlor a ‘variety ofother biometric input systems known in heat. The payment module 400 illusiated in FIG, 4 provides an ‘example of the payment module 200 with an integrated sub- nodule (ie. a biometric input system sub-module) but ‘other embodiments the biometric input system submodule may be coupled to the payment module 200 via the sub- ‘moxdule connectors 206. As discussed below, the biometric ‘input system 402 allows for the user o authenticate with the payment modiale 400 to conduct payment transactions. As Sh, the user may repistera biometric input withthe payment ‘tile upon initial connection toa modular device by pro- viding authentication information and then allowing the bio- US 2016/0148196 AI mete input system 402 to receive and store biometric input as partof the security information 3080 inthe payment mod- lle database 308, 10039] Referring now FIG. S, an embodiment of a payment ‘module $00 is ilstrsted that ix substantially similar to the payment modules 200 andor 30 discussed above with re ‘erence to FIGS. 2, 2, and 3, but with the provision of acard subsmodule $02 that ineludes a card information provis Jing member 804 that extonds from the card sub-module 502 ‘tha includes an information transfer element S04, Inthe ithastratedembodiment, the card sub-modale 02 isa separate ‘ubsmodule that inlules sub-module connectors (aot ilus- trated) that engage the sub-module connections 206 on the payment module 200 to couple the card sub-module $02 10 the payment module engine 302 through a bus or other con- nection between the hardware processing system and the sub-module connections 206, but in other embodiments the ‘card sub-module 502 may be integrated with the payment ‘module $00, The card sub-module $02 provides the card ‘information provisioning member 504 with the information transfer clement 54a configure to transfer Funding source ‘information to card reader device. In some embodiments, the information transfer element Sbda may bea conventional ‘magnetic stripe information transfer element that is contig- tured to provide cand information to a card reader device. la ‘other embodiments, the payment module engine 302 may be ‘configured to dynamically program, push, or otherwise pro- vide card information to the information transfer clement 50a such that that card information may be transferred Irom the information transfer element 504a toa card reader when the card information provisioning member S04 is moved through the card reader (the user may select from differ ‘ent funding source information 308a in the payment module database 308 to have card information associated with a ‘clcted funding source be provided othe information trans- far eloment 04a to, for example, provide a particular credit ‘card aumber fora seleted creditcard account to the card reader using the cand information provision member S04). The payment module $00 illustrated in FIG. 5 provides an ‘example of sub-module coupled ta the payment mode 20 Via the sub-madule connectors 206, However, a discussed above, te functionality ofthe card sub-module 502 may be negrated Ge, without te ability to attached and detach the ‘card sub-miatle S02 fom the payment module chassis 202), ‘with the payment module 200 while remaining within the scope ofthe present disclosure, [0040] Referring now FG. 6, an embodiment ofa payment ‘module 600 is ilistrsted that i substantially similar to the payment modules 200 and/or 30 discussed above with rel- ‘erence FIGS. 2a, 2, und 3, but with the provision ofa card reader sob-modale 602 that includes a card reader channel 604 thats defined by the card reader sub-modie 602 and that ‘nchides an card reader element (not ilstated but eaten the card reader channel 604 as would he undersiood by one of shill inthe art. Inthe lustrated embodiment, the card reader subsmodule 602 isa separate sub-module that includes sub- moddle conneetors (no illustrated) that engage the sub-mod- tule connections 206 on te payment module 200 io couple the ‘ead reader sub-module 602 to the payment module engine 5302 through a bas or other connection betwen the hawdware processing system and the sub-module connections 206, bat ‘nother embodiments the card reader sb-modle 602 iy be ‘integrated with the payment module S00, In the illustrated ‘embodiment, the pay ment module engine 302s coatiguredio May 26, 2016 receive card information from cand when a manetie stripe or ollie information transfer element is moved through the ‘ard reader eiannel 604 and past the card reader element. As seh, the payment module 600 may'be uilized by a merchant or accepting payments in a payment transoetion, rather than ‘customer providing payment in a payment tnsaction, [041] Referring now to FIG. 7, un embodiment of a pay- ‘meat mode 700 is strated tha s substantially similae to the payment modules 200 andior 300 discussed above with reference to FIGS. 24,2, and 3, bt with the provision of a highly secure, multiple virtual curency wallet management system. The payment madule 700 includes the payment mod- ‘leengine 302 thats coupled wo a hypervisor 702 dat may’ be provided by instructions on the non-ranstory memory sy3- ‘em that, when executed by the hurdware processing system, ‘cause the hardware processing system fo perform the fun tionality of the hypervisor 702 and its subcomponents dis ceussed below. One those subcomponents includes avirual nachine 704 that is configured to be communicatively coupled to, orto otlenvise access, plurality of cards dis cessed below that may include, for example, secure digital (SD) cards andor other storage ears known in the at In an ‘embodiment, the virtual machine TIM may be provided by’ hardware processing system that is provided in the payment sodile 700 and that is dedicated to providing the viral ‘machine 704 (e thats separate from the hardware process- og system that provides the payment module engine 302), or say be provided by a viralized processing module that is dicated 0 providing the viral machine 704. In theillus- trated embodiment, the cards are virtual eards 706, 708, and ‘up (0 710, but in some embodiments the cards 706, 708, and 7710 may be physical cards that are coupled to the payment meddle 700, [0042] Each ofthe virua eards includes diffrent virtual currency wallet by, for example, inchiding a virtual currency ‘wallet application that stores one or more private Keys that ravi the ability to transfer virtual currency assaciated with ‘ne oF more public addresses, sis known inthe at of virtual ccurency. For example, each vftal card may include a True- Crypt or similar) Inked folder that stores the virtua eureney wallet application on that virtual card. As such, etal card 706 inchudes a first vidual eureney wallet 706a, virial card 708 includes a second virtual currency wallet 78a, and vir tua card 710 includes an Nth virtual curency wallet 710. In some embodiments, cach of the virtual currency wallets 706, “Hi, and TH may be associated with differen types of virtual curency (e., virtual currency wallet 7064 may pro- vide access t0 Bitcoin, virwal cureney wallet 7084 may provide aovess to Litecoin, virtual cureney wallet 7L0a may provide access to Dogecoin, ete). In her embodiment, at Teast some of the vital curreney wallets 7062, 708<, and 71a may be ssoeiated withthe same typeof virtual eurrency (ex, the frst virtual cureney wallet 706e may stone one oF mor first private Keys that provide the ability to transfer Virtual curency (eg. Biteoin) associated with one or more fist public addresses, and the second virtual currency wallet 08a may store one or more second private keys that provide the ability to transfer the same type of virtual eurency (eg. [iteoin) associated with one oF more soon public adresses that are diferent fom the ane or more first public addresses. [0043] ‘The highly secure, multiple vital currency wallet ‘manager provided by the payment module 700 provides the to manage and store multiple vital exerency wallets of the same andor different types of viral curency, while US 2016/0148196 AI presenting thee security layers toa user attempting to access ‘8 virtual currency. wallet to transfer vital currency 10 ‘another user. As discussed in further detail below, a user wishing to access any of the fist viral crrency wallet 7060, the second virtal currency wallet 7084, or the Nib viral ‘currency wallet 71a must provide a frst authentication tothe virtual machine 704, hen must provide a second authentica- tion tthe virtual card that stores the viral currency wallet the user wishes to access, and must thea provide a third authentication tothe virtual currency wallet theuser wishes ‘access, In addition, the virtual or physical cards may be ‘cloned, backed up, or otherwise copied to a separate storage system (eg, a physical storage device, the cloud, ete) t0 ‘ensure that failure, the, loss, or other unavailability ofthe payment module does not threaten access to the virtual eu Fency on any of those veal cards [0044] Referring now (0 FIG. 8, an embodiment of @ method 800 for condueting a payment transection with & modular device payment module is ilustrated. The method 800 begins at black 802 where the payment module is con- nected 10 the modular device. As diseussed above, the pay- ‘ment module 200 may be connected to the modular device fame 102 of the modular device 100 by positioning the ‘modular device connectors 204 on the payment mode 200 ajacent the module connections 102« on the medular device Jame 102 and moving the payment module 200 towards the modular device frame 102 to engage the modular device ‘connectors 204 and the module connections 1022, Engage ‘ent of the modular device connectors 204 and the module ‘connections 102a physically couples the payment module 200 tothe modular device frame 102 and permits communi- ‘ation by the payment module engine 302 with the mosiular ‘device frame 102 and other modules that are eonnceted tothe ‘modular device frame 192, 10045] ‘The method 800 then proceeds to block 804 where ‘modular device identifying information is rtrieved. Price to the method 800, the user may have defined, identified, or ‘lherwise provided information about one or more authorized modular devices as par of the security information 3086 in the payment module database 308. In an embodiment, 2 device identifier, phone number, unique code, user informa tion, identifying information that includes identifiers that are ‘associated with each ofthe modules that are connected to the modular device frase 102, andlor other information that "uniquely identifies a modular device ofthe user may be pro- vided i the payment module 200 for storage inthe payment module database $8.8 part ofthe security information 308, For example, upon eonpecting the payment module 200 (0 2 modular doviee frame as discussed above, and determining that the modular device is not authorized, discussed below, the payment module 200 may provide the wserwith the ability to athorize that modular device forthe payment mole 200 by requesting user authorization credential (eg, auseriden- tfier and passcode, Biometric identifier, ee.) I those user horization credentials are verified with credentials ‘included in the security information 308%, the payment mod- tile 200 may then retrieve the identifying information from the modilar device and associate it with a authorized mosh- Jar device in the sccurity information 308. In addition, addi- tional security may be provided forthe payment module by scading authorized modular device information io a provider ‘ofthe payment module (e.g, payment service provider) and May 26, 2016 Dhaving the authorized modula deviee information stored the security infomation 308 prior to providing the payment module to the user [0046] Inanembodiment, the payment module engine 302 ‘operates al block 804 to communicate with a least one of @ ‘component in the modular device frame 102 andlor another ‘ole that is connected wo the modular device frame 10210 retrieve identifying information trom the modular device 100. For example, identifying information about the modular device may bestored inthe modular device frame 102 (ein storage device included in the modular device lrame 102), in the security module 16 coupled to the madular device frame 102, andlor in other modules dat are coupled tothe modular device frame 102. The identifying infomation retrieved by the payment module engine 302 may include tse deviewiden- tiie, phone number, unique eode, user information, andor other information that was used! uniquely identify the ‘medlular device 100. Insome examples, the identifying infor ‘mation may inelude identifiers that are associated with each ‘ofthe modules hatarecomnected tothe modular device frame 102, [0047] The method 800 then proceeds fo decision block '806 where itis determined whether the modular device is authenticated forthe payment module. Inan embodiment, the ‘payment module engine 302 compares the identitying infor ‘mation retrieved from the modular device 100 at Block 804 ‘with the sccurty information 308) in the payment module whether the identiying informa ‘mxdular device identified by the security information 308% As such, the payment module engine 302 may determine at decision block 806 that the ‘vice identifier, phone number, unique code, use informs tion or ther information that uniquely identifies the modular device 100 matches device identifiers, phone numbers, unique codes, user information or other information that iquely one or more modular devices inthe security infor ‘mation 08H ofthe payment module database 308, Ina spe- eificembostiment, the security information 308 may include plurality of identifiers for modules that deine an authorized ‘molar device 100, and at decision block 806 the payment module cagine 302 may determine whether some subset of ‘dentifers retrieved from each of the modules that ate con- nected to the modular device frame 192 mach some subset oF the plurality of identities for modules that define an autho- ‘zed modular device 100s such, the identifiers formodules connected othe modula device frame 102 that ae retrieved atblock 804 may not all ned to mateh all of the identifiers for ‘modules that define an authorized modular device 1003s long ‘as some minimum subset matches, which allows for aulen- ‘ication of the modular device 100 forthe payment module 200 even if some of the modules on an authorized modular device 100 are replaced, [0048] 1, at decision block 806, it is determined that the ‘moslilar device is not authenticated for the payment module, themethod 800 proceeds to block 808 where security action is pecformed, In an embodiment, the payment module 200 ‘may determine at decision block 806 thatthe modular device 100 o whieh the payment module 200 was connected at block £802 isnot authenticated for he payment module 200 (cits ‘dentifying information is not associated with an authent cated modular device in the security information 3085) and, in response may perform a security action at block 808. Security actions may inchude preventing the transmission of any of the funding source information 308a in the paymes US 2016/0148196 AI modular database 308 for ue in conducting a payment rans- sctioa, locking the paysnent module 200 such that further ‘communication through the modular device frame 102 is ‘isubled and/or to prevent a payment transaction from being ‘conducted, erasing the funding source information 308a in, the payment module database 308, wiping all information stored on non-ransitory, computer-readable mediums in the payment medule 200, and/or performing a varity of other Security aetions Known in the art that would prevent any ‘enstive infonmationon the payment module 200 from being accessed 10049] 11, at dovision block 896, itis dotermined that the ‘modular device is authenticated for the payment module, the ttansiissionof the funding souree information 308a from the payment module database 308 is enabled, In an embodimeat, the payment module engine 200 may enable, allow, andor ‘othersisefilitate the transmission of funding source infor- ‘mation 308 from the payment module database 308 in onder tw conduct a payment transaction, discussed in further detail below. Thus, auserofthepayment module 200 may authorize ‘any number of modular devices for use with the payent module 200, and then use the payment module with any of those modular devices while enstring (via blocks 802-808) that loss or theft ofthe payment modale wil not allow its use with a non-authorized modular device. [0080] The method 800 may then proceed to optional deci son block 810 and block B14, wre tis then determined whether a request to access a virual eurreney wallet is received, Optional decision block 810 and lock #14 ilus- tate a situation where the payment module 200 provides « virtual currency wallet manager tht regulates access to mul tiple viral cureney wallets. However, in some embed rons, the payment module 200 may not include the virtual ‘currency wallet manager taught herein, and following deter- ‘mination at decision black 806 that the moda device 100 is authorized forte payment module 200, the method 800 may proceed direely 10 block 812. However, when the payment module 200 include the virtual eureency wallet manager, 2 request fo access a virtual curency wallet included on the payment module 200 may initiateaddiional security layers in the payment module 200. However ifat decision block 810 it js determined that no request to avcess a virtual currency wallet has heen received, the method 800 proceeds to block ‘812 where a payment transaction is conducted. 10051] _Inanembadiment,atblock 812:he payment madule ‘engine 302 may receive request fo conduct payment tans action and, in response retrieve atleast some of the funding ‘ource information 308% to conduct the payment transaction. As discussed above, prior t the method 800, the payment ‘module 200 may provide the user to ability 10 add funding sources tothe payment module database 308 that are then stored inthe funding source information 308a, For example the user may add checking funding source(s) tothe funding source information 30842. by providing checking account information needed to conduct a payment transaction using ‘checking s)account ofthe user, sivings funding source(s) (0 the funding souree information 3084 (ex, by providing sav~ ings account information needed wo eonduct a payment tans ction using savings account(s) ofthe user, credit funding source(s) (0 the funding souree information 3082 (eg. by providing eredit account information nesded to conduct & payment transaction using ereitaccount(s) of the user) and! ‘br any other funding sources known in the at to the funding May 26, 2016 10082] Requests o conduet a payment transsetion may be received ina variety of manner, and wll typically result ina paymeot tansietin conducted with a merchant through a ‘merchant device but willsometime resulta payment ‘eton eonieted with another user through theiruse device. mn an embodiment, the puyment module 300 may’ use the ‘wireless communication system 306 t recive a request 0 conduct a payment transaction. Por example, the usce ofthe ‘modular device 100 may bring the mexiuar device 100 and payment module 200 within range of an NEC or other wie Jess payment system inorder providea request tothe payment module 200 o conduct a paymeat transaction, andthe pay ‘ment module 200 may'then communieate with the payment system to transmit funding souree information tothe payment stem in order to cond the payment tanscetion (via the wireless communication system(s) 306 in the payment ‘modile 300, using a communication modnleconnected tothe ‘modular deve Irame 102, et). In soch embodiments a payment aplication may be provided fr display on the dis play module 104 to the user allow the user 1 selet 8 Tuning soures for conducting the payment transection, othe payment module 200 may default t a particular funding (0083) In another embodiment, the payment module 200 ‘may communicate with another payment module (.e, on nother modular device) to receive a request to condet a payment transaction. For example, the user of the modular Aevice 100 may bring the modular device 100 within ranger {nwo engagement with another modular device (€., Via & “bump” or other touching of the modular devices) i onter provide a request the payment module 200 fo conduet a payment transaction, and the payment module 200 may then ommunieate with the payment mest inte other molar device to transmit funding source information tothe payment system in oer fo conduct the payment transaction. In sch embodiments, a payment application may be provided for Aisplay onthe display module 10410 the user tallow the wser to sclect a funding source for conducting the payment trans seton, or the payment module 200 may default toa particular Tunding source. [0084] In another embodiment, the wer may utilize a pay ‘ment application provided fr display onthe display module 104 10 selet a funding source for conducting the payment transoeton, andthe payment mexiule 200 may prove fand- ing source information for that fanding source to the card sulb-movtle $02 for transmission using the information trans- {er element 804g on the cad information provisioning men ber 504 As such the user may select one ofa plurality of credit cards, checking ears, rewards cards discount cards, ait cars, or other cards to have information for the selected ard provided onthe information transfer element S042 such that when the user moves the ear information provisioning member S04 through a card reader, the information for the selected cars provided tothe card reader for conducting the payment transaction [0085] _ While a few examples have been provided, one of Skill n the art in possession ofthe present disclosure will recognize that the payment module 200 may retrieve funding source information 308a fom the payment module database 308 and conduet the payment transaction at block 812 nsing fny of a variety of methods known inthe art that will all ‘within the seope ofthe preset disclosure I addition, other payment activites may he performed by the payment module engine 302 in the payient module 300, including bill spit US 2016/0148196 AI {ing 2, by touchingpayment modules on different mode ‘devices, dc) sccounl ilormation reread review, a! ‘reser payment activites known inthe art 10086) 1, atdocision block810, request to sccess viet ‘oureney Wales recived, the metho 800 thea process to Bock 814 where a plurality of secur layers ate aubent- ‘ated, Reering now to FIGS. 99, 98, 9e, 9d, and Ye, a ‘example of receiving a request to accesso vial eureney ‘valet and in response, authatcating plurality of security layers i ilustated and described. Hever, 2 variety of sannrs for recciving requests to accors virtual currency wallets and authenticate security layers other than the illo ‘ete ar eovisoned as alin Within the scope the present disclosure 0087] Referring now © FIG. 92, modular device 900 is ‘lustre that may’ be the modular device 100 discussed hove with reference to FIG. 1, However, in some embod ment the functionality describe os performed by the poy= ment module engine 302 in the poyment module 200 coupled tothe modular device 900 may instead be performed hy 8 payment engine located inan intrated user device such asa fonmmodulr phone or other user deve, The modular device ‘900 includes display module 992 that may e, for example, the display module 104 discussed above. Inthe stated embodiment, the display module 902 is dsplaying «home Sereen 904 thit includes a plurality of application icons including a virtl eurency wallet aanagement application ‘con 906 In embodsen, the use ofthe modu device 00 tay select the viol cutrney wallet management appl tion cnn 906 an st decison block 810, the payment module ‘cogine 302 will detect a rogues! to acess a virtual eurency wallet In other embodiments, rater than having @ situa currency wallet manage, the home screen 904 my instead include viral curensy wallet application icns that, when selec by the wre, css the payment modsle engine 3020 detect aroquest to access Vital euency Wallet at decison block 80. 10038) Refering now to 1G. Shand with reference to FIG 7 tne modular device 900 slotted with he display mod- wieG02 displaying ist security layerseroa 908 hat my be provided by the vital machine 700and the payment module ‘gine 402 at block 814 ofthe mcd 800, For example, response 10 the user seleting the virtual cureney wallet ‘anagement application eon 996 (ora viral currency wale Jet aplication icon, the payment module engine 302 may ‘communicate withthe vital machine 704 to access the irtal curren wallets nuded inthe viet cards 706, 708, tn 710 aceesible by the vewal machine 104, andi vial machine 704 may present ist security layer using the ist Security layer screen SOB, The list secur layer screen SUS includes firs suthentcation request section 90K that pro- Vesa iser identifier input 908 and possvord input 908: nl hat quests thatthe wer provide username and pas ‘word to ees the Viral eureney wallets, In order to abcess the vival eureney wallets, the user most povide the comect usemame and password to pass the ist Security lier pre- sented by the vial machine TO, and the payment moxile ‘engine 302 andr the vital machine 704 may receive any ‘semame and password provided in the serie np 508% and a password input 908, compare ito the secity information 30RD inthe peyment module database 308, nd stuthentcate the user forthe ist sour yer in response ‘termining that provided seman and password ae 580 cated with a use that is authorized to access the veal May 26, 2016 currency wallets, While a usemame and password ae ill twated as necessary for authenticating at the fist security Jayer, any authentication technique is envisioned as falling within the seope ofthe present disclosure. [059] Referring now to FIG. 9, in response to determin- ing that a provided usemame and password age associated With a user that is authorized to access the viral currency wallets, the display module 902 on the modular device 900 ‘may display a viual cureney wallet application icon sree 910 that includes plurality of Virtual currency wallet appi- cation icons 9104, 9105, and 910¢: In theilusrated embod- ‘ment, the virtual eureney wallet application icons 9104, 9105, und 910e are associated with different virtual currency wallets holding different types of vital eurency (e.g. & Bitooin wallet, a Litecoia Wallet, and a Dogecoin wallet) However, any” number of viral euereney wallets may’ be included inthe virtual machine 702, and may behold different types of virus currency or the same types of vital eurency (ea, there may be multipleviwal currency application eon ‘on the virtual eureney wallet application icon sree 910 that Dold Bitcoins) In response to being presented the virwal ceureney wallet application icon sereen 910, the user may Select the viral currency wallet application i¢on for the virtual currency wallet that the user wishes to acces in onder to, foe example, conduet a payment transaction. [0060] Referring now to FIG. 9d, and with reference t© FIG.7, the modular device 900i illustrated with the display module 902 displaying aseeond security layer sereen912 that ‘nay be provided by ane ofthe virtual cans 706, 708, or 710 and the payment module engine 302 at block 814 of the ‘method 800, For example, in responscto thewser selecting the Virtual eurreney wallet applieationieon 910a (ie, the Bitcoin wallet in FIG. 9), the payment module engine 302 may ‘communicate with the vital card 706 (eg, va the viral ‘machine 704) to access te ist viral eurency wallet 706 ‘included in the viewaleard 706, and the virtual card 706 may presenta second security layerusing thesecond security layer ‘Screen 912. The second security layer screen 912 includes a evond authentication raquest section 912« that provides plurality’ of pattern elements, and that request thatthe user ‘se the patter elements in order to access the fist viral currency wallet 7069, In ord to aceess the frst viral eure reney wallet 706u, the user must draw a pattem by connecting the pattem elements to pass the second security layer pre- sented by the virtual card 706, and the payment module engine 302 andlor the vital card 706 may receive any pate tem provided using the pattem elements, compare i to the security information 3086 in the payment module database 308, al authenticate dhe use forthe second security layer ia response to determining that a provided pattem associated ‘with a user that is authorized To access the fst viral cur reney wallet 7061. While a pattern using pater elements is illustrated as necessary for authenticating at the second seeu- rity layer, any authentiation technique is envisioned as all ing within the seope of the present disclosure. [0061] Referring now ta FIG. 9, in response to determin- ‘ng that a provided pattem i associated with user that is authorized to aocess the fist viral eurreney wallet 7064, the ‘splay module 992 on the modular device 900 may display @ ‘ied security layer seron 914 that may be peovided by the first vital wallet application 706a and the payment module ‘engine 302 at block 814 ofthe method 800, For example, ia response to the user providing an authenticated patter, the ‘payment module engine 302 may communicate with the frst US 2016/0148196 AI etal wallet application 7060 (ea. via the veal machine os andthe vinta ear 706) to acess te ist veal cre reney wallet 76 ineluded in the vial ead 706, aad the fit vital eurecy walle 7060 my present a third scurty layer that incest authoniation quest section 9140 that provides rust ha the User provide biometi inpt in ordr to acces tho fist viral eurency wallet 7062. Ia ‘onder to access he fist virtual earency wallet 76a, thewscr must provide a biotic input to a biometric ipot system (Gg a dumb scan on the Biometric input system 402 dae ‘essed shove) to pass the third security aver presente by the fist viualeureacy wallet 7060 and the payment module ‘engine 302 andlor the fist virial coreney wallet 706 may revsive the biometie inp provided, compare itt the secu rity information 208 in the payment moxie database 308, ‘and sutheaicate the user forthe third secrity layer $9 response to detemining that a biometric inpt is associated with user that sauized to access the fst ral ce reney wallet 706. While a biomettic input is illstated as nscesary for auntcating a he third security layer, any tuthentiaton technique is envisioned as falling within the Scope ofthe present disclose {0062}, Following being authenticated to pass the third Security layer the method 800 may procsed to block 812, Aiscussed in dtl above However, nt ition to being ble to condict conventional payment transactions ax discussed above, the user may now also be able to conduet payment teansstion ising the ist viral euerency wallet 16. ‘exanple, transferring vital curreney to ance sey des ignating a pubic sess of tht user, designating Vital ‘eurency amount, and providing a private key for the lst Minna! currency walt 7060 such thatthe ist viral cur reney wallet may trnsfee the designate amount of vital ‘currency to the public adress asneited withthe bir tae. As discussed above, while specific security layer incloding ‘semames and pasword, pater provisioning, and bioesee Fe inputs have heen illstated and described, ny of authen- tiation etnigues maybe ulzed in authenticating the pi rai of authentication level at lock 84. Ithas been fond thatthe three (oF more) security layers provide protclly insurmountable sccurity for the vital curoney wallets Stored onthe payment module 200, 10063} Thus, ystemsand methods for eondvcting payment teansotions thing @ modular device payment movdle have hoon deserined tht provide payment med that may be connected 10a medolardeviee, and that operates to ensre that he modular devices storied foros with he payment module prior to enabling payment transitions with funding Sources avilable to the payasent module. In the event the modular device is not authorized for ose with « payment module to which itis connected, the payment seule moy perform security operations that ineude disabling the aceess {0 or transmission of funding source information, locking access tothe payment module, and even erasing the funding Source information oral the iformation) fom the payment module. Furthermore, systems and methods for managing inuliple virtual euency wallets have been dsenbed that nang mille vinval urreney wallets tt may hold cif ferent types of viral eurreney, while providing multiple curity lnyers that rire authenticated enedentis n ore to acceso any ofthe vital eureney wallet. 10064] Referring now 1 FIG. 10, an embodiment ofa net- -workshase system 1000 fr implementing os oF mone pro cesses desebed Herein i illsirated. As shown, network May 26, 2016 based system 1000 may con servers andor software components that operate to perform various methodologies in accordance with the described ‘embodiments. Fxemplary servers may include, for example, stand-alone and enterprise-class servers operating a server (OS sueh 28 a MICROSOFT OS, a UNIX OS, a LINUX OS, or other suitable server-based OS, It can be appreciated thatthe serversillustated in FIG. 10 may bedeployed inother \ways and that the operations performed andr the services provided by such servers may be combined or separated fora given implementation and may be performed by a greater ‘umber or fewer mimber of servers. One ar more servers my bbe operated and/or maintained by the same or different ent [0065] ‘The embodiment of the networked system 1000 illustrated in FIG. 10 inchudes a plurality of user devices 1002, plurality ofmerchant devices 1004, payment service provider device 1006, and a plurality of account holder ‘vices 108 in communication over a network 1010, Any of the user devices 1002 may be the modnlar devices 200, dis cessed above, The merchant devices 1004 may be the mer chant devices diseussed above and may be operated by the merchant discussed above. The paymient service provider device 1006 may be the payment service provider devices iseussed above and may be operated by a payment service provider suchas, for example, PayPal Inc. of San lose, Calif. ‘The account provider devices 1008 may’be the aecount pro- vider devices discussed above and may be operated by the ‘account providers discussed above sich as, for example, credit card account providers, bank account providers, sav~ ings aecount providers, anda variety f other account provid- crs known in the art. [0066] Theuser devices 1002, merchant devices 1004, pay- meat service provider device 1006, and aecount provider eviees 1008 may each include one or more processors ‘memories, and other appropriate components for executing instrctons such as program code andor daa stoned on one ‘oF more computer readable mediums to implement the varie fous applications, data, and steps described herein. For ‘example, such instructions may be stored in one or more ‘computer readable mediums such as memories or data stor ‘ge devices intemal andlor exteral to various components oF the system 1000, andor accessible over the network 1010, [0067]. ‘The network 1010 may be implemented as a single network ora combination of muliplenetworks. For example {in various embodiments, the network 1010 may include the Internet and/or one oF more inranets, landline networks wireless networks, andlor other appropriate types of net. works, [0068] The user device 1002 may be implemented using ny appropriate combination of hardware andlor software ‘configured for wired and/or wireless communication over rework 1010. For example, in one embodiment, the wer device 1002 may'be implemented asa personal computer af & ‘ser in communication with the Intern, In other embodi- ments, the user device 1002 may bea smart phone, personal digital assistant (PDA), laptop computer, and/or other types ‘of computing devices [0069] The user device 1002 may include one oF more ‘browser applications which may be used, for example, 10 provide a convenient interface to permit the user to browse Jformation available aver the network 1010. For example, ia US 2016/0148196 AI ‘one embadiment, the brosiser application mented as a web browser configured tv available over the Inert 10070] | Theuser device 1002 may also include one or more toolbar applications which may be used, for example, to provide user-side processing for performing desired tasks in response fo operations selected by the user. In one embodi- ‘ment, the toolbar application may display a user interface in ‘connection with the browser application, [0071] The user device 1002 may further include other applications as may be desired in particular embodiments to provide desired features tothe user device 1002 In particular. the other applications may include a payment application for payments assisted by a payment service provider trough the payment service provider device 1006. The other applications may also inelude security applications for implementing user-side security features, programmatic user applications for interfacing with appropriate application programming interfaces (APIs) over the network 1010, or other types of spplications, Email andor text applications may also be included, which allow the user 1 send and receive emails andr text messages through the network 1010. The user ‘device 1002 includes one or more user andor device identi fiers which may be implementod, for example, as operating system registry enties, cookies associated with the browser pplication, identifiers associated with hardware ofthe user ‘device 1002, or other appropriate idemifers, such asa phone fimber, ln one embodiment, the user identifier may be wsed by the payment service provider device 1006 andor account provider device 1008 to associate the wser with a particular ‘accounts further deseribad herein, 10072] The merchant device 1004 may be maintained, for ‘example, by aconveational oros-line merchant, conventional ‘or digital goods seller, individual seller, andor application developer offering various products undior services ia ‘exchange for payment to be received conventionally or over the network 1010, Ia this regard, the merchant device 1004 may include a database identifying available products andor services (eg. colletvely refered to as items) which may be made avilable for viewing and purchase by the wee. 10073] |The merchant device 1004 als includes checkout application which may be configured to facilitate the pur ‘chiseby th payer of items. The checkout application may be ‘configured to secept payment information from the user through the user device 1002, the account provider through the account provider device 1088, andor from the payment service provider hough the payment service provider device 1006 over the network 1010. 10074) Referringnow to FIG. 1,an embodiment ofacom- puter system 1100 suitable for implementing, for example, theuser device 1002, the merchant device 104, the payment service provider device 1006, andior the account provider device 1008, is illustrated. It should be appreciated that other ‘devices utilized by users, merchants, payment service provid ers, and account providers in the payment system discussed ‘above may be implemented as the computer system 1100%n3 manner as Fallows 10075] In sovordance with various embodiments of the present disclosure, computer system 1100, such as a com pier and/or a network server, inclxes a bus 1102 or ethee ‘communication mechanism for communicating information, Which interconnects subsystems and components, such as 3 processing component 1104 (e.. processor, micro-contol- Jer, digital signal processor (DSP), ee), a system memory xy be imple information May 26, 2016 component 1106 (ex, RAM), a static storage compones 1108 (eg., ROM). a disk drive component 1110 (ez, mag- patie or optical) «network interface component 1112 (ez. modem or Filemet card), display component 1114 (e CRT of LCD), an input component 1118 (ez, keyboard, keypad, or virtual keyboard). a cursor control component 1120 (¢, mouse, pointer, oF trackball), and/or a location determination component 1122 (e.g, a Global Positioning System (GPS) devie as illustrated, cell ower triangulation device, andlor a variety of other location determination devices known in the a) In ene implementation, the disk rive component 1110 may comprise « database having one ‘or more disk drive components, 0076] Inaccordance with embodiments of the present di ‘closure, the computer system 1100 performs specific oper tions by the processor 1104 executing one or more sequences of instructions contained in the memory component 1106, suchas described herein with respect tthe user dovice 1002, the merchant device 1004, the payment service provider device 1006, and/or the account provider device 1008, Such ‘structions may he ead into the system memory component 1106 from another computer readable medium, sich as the state storage component 1108 ofthe disk drive component 1110. In other embodiments, hard-wired circuitry may be ‘used in place of or in combination with software insteetions to implement the present disclosure [0077] Logie may be encoded in computer readable medium, whieh may eler to any medium that participates in providing insirutions to the processor 1104 for execution. Such a medium may take many forms, including but not Timited w, non-volatile media, volatile media, and tenses sion media, In one embodiment, the eompter readable ‘medium is non-transtory. In various implementations, non- volatile media includes optical or magnetic disks, such asthe disk drive component 1110, volatile media includes dynamic memory, such asthe system memory componeat 1106, and ‘eansmnission media incIndes coaxial cables, copper wire and liber optics including wires that comprise the ue 1102. la ‘one example, transmission media may tke the fonn of acous- ticorlight waves, such us thoxe generated during radio wave ‘and inared data communications, 0078] Some common forms of computer readable media includes, for example, floppy disk, flexible disk, harddisk, ‘magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, puneh cards, paper tape, any other physical medium with pattems of holes, RAM, PROM, EPROM, FLASH-EPROM, anyother memory chip or car ‘ridge, carsier wave, or any other medium from which acom- puter is adapted 10 read, In one embodiment, the computer ‘eatdable media is non-transitor. [0079] In various embodiments of the present disclosure, ‘execution of instruction sequences to practice the present sisclosure may be performed by the computer system 1100. In various other embodiments of the present disclosure, plurality ofthe computer systems 1100 coupledby commu fication ink 1124 to the network 1010 (e.g. such asa LAN, WLAN, PISN, andior various other wired or wireless net ‘works, including telecommunicatons, mobile, and eellular ‘hone networks) may perform instruction sequences to prac- tice the present disclosure in coordination with one another [080] ‘The computer system 1100 may transmit and receive messages, data, information and instructions, includ- Jag one or more programs (.<, application cade) argh the communication link 1124 and the network interface compo- US 2016/0148196 AI nent 1112, The network interface component 112 may include an anteana, ether separate or integrated, to enable ‘tansmission and reception via the communication link 1124 Reoeived program cole may he executed by processor 1104 ‘a received andlor stored in disk drive component 1110 oF some other non-volatile storage component for execution, 10081} _ Referring now wo FIGS. 12, anembodiment of a user ‘device 1200s ilustrated. Inn embodiment, the device 1200 may be the user devices, modular deviess, andor merchant ‘devices discussed aave, The device 1200 includes 8 com= ‘nication modile 1202 that i coupled to the network 1010 ‘and to any or all ofa payment module 1204, storage module 1206, andlor any of the other modules discussed above. a ‘adkition, the payment module 1204 includes 4 communica tion sub-module 1204 anda storage sub-module 1204 and! ‘or any of the other payment module sub-modules discussed above. Any all ofthe modules 1202-1206 snd sub-modules 12042-1204 may be implemented as a subsystem ofthe user device including for example, a circuit, «hardware compo- nent, a hardware subcomponent, and/or a variety of other subsystems knowa in the art. Furthennore any oral of the ‘madlles 1202-1206 and sub-mocles 12049-1204 may be precontigured to perfomm their disclosed functionality, oF may be conigured by a processing system “on-the-l” or as needod to perform their disclosed functionality. As such, any ‘or all of the modules 1202-1206 and subsmodules 12044- 1204) may include pre-configured and dedicated circuits andor hardware components ofthe wser device 1200, or may be circuits andlor bardware components that are configured as needed 10082] For example, any oral ofthe modules 1202-1206 and sub-modules 12044-1204 may be provided via one of more circuits that include resistors, inductors, capacitors, voltage sources, current sources, witches, loge gates, rgis- ters, andlor a virety of other circuit elements known in the at. One or more ofthe eireuit elements in a circuit may be ‘configured to provide the eircui(s) that eause the modules 1202-1206 and sub-modles 12040-12045 to perform the Janetions described above. As such, in some embodiments preconfigured and dedicated eirevits may be implemented to Perform the Tunetions of the modules 1202-1206 and sub- modules 1204-1204. In other embodiments, a processing system may’ execute instructions on 8 now-transtery, cone puterreadable medium to configure one or more circuits as needed fo perform the functions of the modules 1202-1206 and suib-modiles 12040-1204, 10083] The communication module 1202 may be included ‘asa separate module provided in the device 1200, or may be provided using instrctions stored on a compurer-readable ‘medium that, when executed by a processing system in the ‘device 1200, configure the coninminication module 1202 t0 send and receive information over the network 1010, a5 well 8 provide any’ of the other functionality that is discussed above, The storage module 1206 may be included asa sepa ‘ate module provided in the device 1200, or may be provided Using insimietions stored on a compuler-readable medium that, when executed by a processing system in the device 1200, configure the storage module: 1206 to store security information andlor any of the other information discussed above as being stored on the madular device, [0084] The payment module 1204 may be incladed as @ Separate module provided in the device 1200, or may be provided using instrictions stored on a compiter-eadable medium that, when executed by a processing system in the May 26, 2016 ‘device 1200, configure the payment module 1204 wo detect connection toa modular device, etieve identifying informa- ‘ion ftom a modula device, determine whether a identitying information fora modular device is associated with an atho- rized modular device in the storage sub-madule 12046, con- ‘duct payment transootion Using The communication sub-0d- ‘ule 1204, and/or performany ofthe other functionality ofthe payment modules discussed above. Furthermore, ather mod- es discussed above but not iluseated in FIG. 12 may be provided as separate modules on the device 1200, or using Insirctions sored on s computer-readable medium similarly as discussed above, While the storage system 1206 has boca ilhustratedas located inthe device 1200, one of skill inthe art will recognize that it may include multiple storage devices and may be connected to the modules 1202-1206 and sub- modules 12040-1204 through the network 1010 without ‘departing from the scope of the present disclosure. 0085} "Where applicable, various embodiments provided by the present disclosure may be implemeated using bard- ‘Ware, software, oF combinations of hardware and software Also, where applicable, the various hardware components andor software components set forth herein may Be com- bined into composite components comprising software, hard- ‘ware, andior both without departing from the scope of the present disclosure. Where applicable, the various hardware ‘components andr software components et forth herein may be separated info subcomponents comprising. software, hardware, or both without departing from the seope of the present disclosure. In addition, where applicable, itis eon- femplated that software components may be implemented as hardware components and vice-versa [0086] Softare, inaecordance with the present disclosure such as program code and/or data, may be stored on one or ‘ore computer readable mediums, Ic is also contemplated tha software identified herein may be implemented using one ‘ormore general purpose or specie purpose computers andor computersystems,neeworked and/or olherwise. Where appli- cable, the ordering of various steps described herein may be hanged, combined inlo composite steps, and/or separated ato subssteps to provide features described herein. [087] The foregoing disclosure is not intended to limit the present disclosure to the precise forms or particular fields of use disclosed. As such, iis contemplated that various alter nateembodiments andor modifications tothe present dsclo- sure, whether explicitly described or implied herein, ae pos- sible in light of the disclosure. For example, the above ‘embodiments have focused on merchants and users; however, ‘payer or consumer ean pay, or otherwise interact with any ‘ype of recipient, including charities and individuals. The payment does not have to involve a purchase, but may be @ Joana charitable contribution, agi, ete. Thus, payee us used herein can also include charities, individuals, and any other elty oF person receiving a payment from a payer. Having thus described embodiments of the present disclosure, per soas of ordinary skill inthe art will recognize that changes ‘may be made in form and detail without departing frm the scope the present diselosure, Thus, the presen disclose is Timed only by the claims, ‘Wiha is claimed is 1A virtual curency wallet system, comprising: ‘card that includes a virtual currency wallets ‘a non-transitory memory inchding instructions o provide ' vista machine that is configured t provide aecess the vital eureney wallet; and US 2016/0148196 AI ‘one or more hardware processors that are coupled to the ‘card and the aontransitory memory, wherein the onc ot more hardware processors are configured 10 read instructions from the non-iunsitory memory to ease the system to perform operations comprising receiving a request o acces the Virtual cuerency wallet ‘provided on the can! and, in response, providing the viral machine to presenta ist secutty layer pro- ‘ding aeeess tothe card to presen a second security layer in response to an authentication ofthe first secu rity layer, and providing aceess to the vital curreney ‘wallet to present a third sceurity layer in response to ‘an authentication ofthe secoad security layer and enabling the tansmission of virual currency from the Virtual curency wallet in response to the authentic tion of the fist security layer, the second security layer and the third security layer. 2. The virtual currency wallet system of elaim 1, wherein the card isu physical card. ‘3. The virtual currency wallet system of elaim 1, where the card isa virtual ear 4. The virtual currency wallet system of claim 1, wherein the cards first card that inelides the virtual cureney wallet that isa fist virtual camency wallet, and wherein the system farther comprises: ‘second ead that inches a sscond virtual currency al Tet, wherein tho viet machine is configured to provide access tothe second virtual currency wallet, and wherein the one or more hardware processors are configured to read instructions from the non-nnsitory memory ‘0 ceause the system to perform operations comprising receiving request aeces te second virmal currency ‘wallet provided on the second card nd, in response, providing the vinual machine fo presen the fist seeu- rity layer, providing access to the second card (© present 2 second security layer in response to an Anbenticaton ofthe first security layer, and provid- ing access to the second viewal currency wallet 10 present third security layer in response wo anauthen- fication ofthe second security layer: and cabling the transmission of virtual currency from the ‘second viral eurreney wallet in response 10 the aubeatication of the fist security layer, the second security layer, and the tied security layer. 5. The viral currency wallet system of elaim 4, wherein the frst virtual currency wallet and the second virial eure rency wallet are associated with the same type of virtual ‘currency, 6, The vital currency wallet system of claim 4, wherein the frst virtual currency wallet ad the second virtual eur roney wallet are associated with differen types of virtual ‘currency, 7.A method for transmitting vimual currency froma vital ‘currency wallet, comprising: receiving, by a virwal cureney wallet system, virtual ‘currency wallet on a card, coupling, by the vitwal currency wallet system, a virtual ‘machine to the cards receiving by the virual eureney wallet system, a request to access ihe virtual eurency wallet provided on thecand and, in response: presenting by the view machine inthe viral currency ‘wallet system, frst security layer; May 26, 2016 ul presenting, by the card in the vieual curreney wallet system, a second security layer in response to an ‘suthenticaton ofthe fist security layer, ad presenting, by the virtual eureney wallet inthe ead, third security layer in esponsetoansuheatication af the second security layer; and ‘enabling, by the virtual currency wallet system, the trans mission of viral cureney from the viral currency ‘wallet in response to the authentication ofthe fist seet- rity layer, the second security layer, and the third socu- nity layer 8, The method of eaim 7, wherein the cand is a physical card 9.-The method of claim 7, wherein thecard is avira card 10, The method of elaim 7, wherein tho card is. first card inchides the vital currency wallet that sa first vil ceureney wallet, and wherein the system further comprises: receiving, by the vital currency wallet system, a second Virtual currency wallet on a second card coupling, by the virual currency wallet system, machine tothe second can receiving, by the virtual currency wallet system, a request to acces ihe second virtual currency wallet provided on the second ead and, in esponse ‘presenting, bythe virtual machine inthe virtual currency ‘wallet system, a first security layer; presenting, by the second card in the virwal currency wallet system, a sesond security layer in response 10 sn authentication ofthe first security layer and presenting, by the second virtua eurtency walt in the second card, third security layer in response fo an authentication ofthe second security layer and enabling, by the viual currency wallet system, the trans- mission of viral currency from the second vietal eu rency wallet in response (0 te authentieation ofthe fist security layer, the second security layer, and the third security layer 11, The method of claim 10, wherein the frst viral eur rency wallet and the second viral curency wallet are a8s0- ciated with the same type of vietual eureney. 12, The method of claim 10, wherein the first viral ur reney wallet and the second virtual curreney wallet are a8s0- ciated with different types of vital currency. 13. The method of claim 10, wherein the frst card is @ physial card and the secon ear is a viral card 14, A non-transitory computer-readable medium having stored thereon machine-readable insirvtions executable to ‘cause # machine to perform operations comprising configuring a card o tore a vietal eurency wallet: ‘configuring a Virtual machine to manage the card; configuring a virtua eurrency system to access the virtual ‘eurency wallet on the card through the virtual machine: ‘configuring the virtual currency system to receive a request toaeeess the virtual eurreney walle provided onthe card and, in response, provide sesso the virtual machine 0 presenta first security layer, provide ceess to the card to Present a second security layer in response to an auter lication ofthe ist security layer, and provide access to the viral eureney wallet 10 present a third security layer in response to an authentication of the second security layer, and ‘canfguring the virtual currency system to enable the trans ‘mission of virwal currency from the virtual currency US 2016/0148196 AI 12 ‘allen response tothe authentication ofthe first seeu- sity layer, the second security layer, andthe third scu- rity Layer, 18. The nos-runsitory machine readable medium ofelim 14, wherein the ead is @ physical car 16. The nos-runsitory machine readable medium ofelaim 14, wherein the ear is a viral eard 17. The non-trnsitory machine-readable medium of cls 14, wherein the card is a first card that includes the virtual ‘currency wallet that isa first viral currency wallet, and ‘wherein the operations further comprise: ‘configuring asecondcardto sie second viral eurency ‘wallet, configuring the vital machine o manage the second cand configuring the viral eurreney system to acces the see ‘ond vital currency wallet on the second eardthmoigh the virtual machine configuring the Virtual eurency system to receivea request to aceess the second virtual curency wallet providedion the second card and, in response, provide access (0 the vynual machine to presenta fist security layer, provide acess to the second carl to present a second security May 26, 2016 layerin response to an authentication ofthe frst security layer. and provide accesso the second virtual currency ‘wallet to presenta third security layer in response to an aueatcaton ofthe second security layer. and configuring the virtual currency system toenable the trans ‘mission of virtual cureney from the second virtual cur- reney wallet in response to the authentication ofthe frst security layer, the second secuty layer, and the third security layer 18, Thenon-transitory machine-readable medium of claim 17, whorwin th first virwal currency wallet and the second Viral curency wallet are associated with the same type of virtual eurency. 19, Thenon-tansitory machine-readable medium of ean 17, wherein the first virwal currency wallet and the second Virtual eurency wallet are associated with differen ypes of Vienual currency. 20. The non-transitory machine-readable medium ofelaim 17, wher the first card isa physical eard and the second card sa virtual card

You might also like