Patent application number | Description | Published |
20080257966 | PACKAGING FOR A PORTABLE CONSUMER DEVICE - A portable consumer device having an information bearing region is packaged with an anti-tampering member. The region includes information pertaining to an account associated with a payment processing system. With a permanent alteration of the anti-tampering member so as to make the region accessible, a merchant's point of service terminal can interact with the region so as to change a state of the account. | 10-23-2008 |
20090198612 | NON-CREDIT ACCOUNT CREDIT RATING - A consumer's credit rating is derived from non-credit transactions on an account. Each transaction was a purchase by the consumer from a merchant using a pre-paid card. The derived consumer's credit rating can use a total of all of the transactions, totals for each merchant and/or for categories thereof. Here, the account is issued by an issuer to the consumer. Each merchant submits each non-credit transaction to an acquirer for processing by a transaction handler who requests the issuer to obtain payment for the transaction from the account. The issuer forwards the payment to the transaction handler who forwards the payment to the acquirer to pay the merchant for the purchase of the transaction. The derived credit rating can also consider prior credit ratings based upon prior credit transactions. | 08-06-2009 |
20110161185 | METHOD AND SYSTEM FOR LOADING AND RELOADING PORTABLE CONSUMER DEVICES - A method is disclosed. The method includes providing tender at a point of service terminal operated by a load agent, the point of service terminal being in operative communication with a payment processing network. The point of service terminal thereafter sends a transaction authorization request to an issuer of a portable consumer device to be used by a user. The issuer then authorizes or does not authorize the transaction authorization request. If the transaction authorization request is approved, the portable consumer device is either initially loaded or reloaded with an amount associated with the tender provided at the point of service terminal. | 06-30-2011 |
20120179599 | Non-Credit Account Credit Rating - A consumer's credit rating is derived from non-credit transactions on an account. Each transaction was a purchase by the consumer from a merchant using a pre-paid card. The derived consumer's credit rating can use a total of all of the transactions, totals for each merchant and/or for categories thereof. Here, the account is issued by an issuer to the consumer. Each merchant submits each non-credit transaction to an acquirer for processing by a transaction handler who requests the issuer to obtain payment for the transaction from the account. The issuer forwards the payment to the transaction handler who forwards the payment to the acquirer to pay the merchant for the purchase of the transaction. The derived credit rating can also consider prior credit ratings based upon prior credit transactions. | 07-12-2012 |
Patent application number | Description | Published |
20130188348 | SECURITY LIGHTING SYSTEMS FOR PERIMETER FENCES - A security lighting system includes security lights mounted atop fence posts. Each security light has a light module including a central housing having outwardly extending support arms. A LED unit is mounted in a depression formed in a top surface of the central housing, and a hat covers the top surface of the central housing for allowing only reflected light to escape from light module. The security light has a junction box containing electrical components, and an extension tube having an upper end secured to the light module and a lower end secured to the junction box. The security light includes a clamp assembly for securing the junction box atop a fence post, and an alignment system for aligning the extension tube with the longitudinal axis of the fence post so that the support arms extend perpendicular to the longitudinal axis of the fence post. | 07-25-2013 |
20140104831 | LOW VOLTAGE SECURITY LIGHTING SYSTEMS FOR PERIMETER FENCES - A security lighting system includes a transformer for transforming high voltage current to low voltage current, and a wiring run having electrically conductive wiring for connecting a plurality of security lights to the transformer. Each security light includes a light module having a low voltage LED light, a hat covering the LED light, and a junction box coupled with the light module. The junction box has an interior compartment containing electrical components including a microprocessor connected with the LED light for controlling operation of the LED light, whereby the electrical components within the junction box are electrically connected with the wiring run. A clamping assembly is coupled with the junction box for securing the security light to a fixed element. Each security light includes a light module having the LED light and the hat overlies the LED light to block the escape of direct light from the light module while allowing reflected light to escape from the light module. | 04-17-2014 |
20140293601 | SECURITY LIGHTING SYSTEMS HAVING OFFSET BRACKETS AND RAPIDLY DEPLOYABLE AND REUSEABLE LOW VOLTAGE SECURITY LIGHTING SYSTEMS - A security light system for a fence includes a security light having a light module with an LED, a hat overlying the LED for reflecting light, a junction box having an interior compartment containing an LED driver for controlling operation of the LED, the junction box including a front end having a front opening and a rear end opposite the front end, and a front cover plate covering the front opening. The security light includes an extension tube having an upper end secured to the light module and a lower end secured to the junction box, a clamp assembly for securing the junction box to a fence post, and an offset bracket positioned between a rear end of the junction box and the fence post for spacing the junction box from the fence post which, in turn, spaces the hat from the fence post. | 10-02-2014 |
20140376228 | SECURITY LIGHTING SYSTEMS FOR PERIMETER FENCES - A security light for a fence includes a light module having an LED unit and a junction box. The junction box contains electrical components for operating the LED unit, and has a rear end with a rear wall and a front end having a front opening that opposes the rear wall. A clamp assembly is coupled with the junction box and opposes the rear end of the junction box to define an opening for a fence post. The front opening of the junction box provides access to the interior of the junction box for conducting electrical wiring operations. A front cover plate is assembled with the junction box for covering the front opening of the junction box. When the junction box is clamped to the fence post, the front cover plate is removable for providing access to the interior of the junction box. | 12-25-2014 |
Patent application number | Description | Published |
20080222730 | Network service monitoring - Network devices, systems, and methods are described that perform network service monitoring. One method includes examining a number of packets received by a first network device to determine whether a protocol of a packet corresponds to a given network service, forwarding an event to a second network device in response to a determination that the protocol of the packet corresponds to the network service, determining whether the network service is an authorized service by comparing the network service to a list of network services, and executing a remedial action in response to a determination that the network service is an unauthorized service. | 09-11-2008 |
20100157839 | NETWORK SERVICE MONITORING - Network devices, systems, and methods are described that perform network service monitoring. One method includes examining a number of packets received by a first network device to determine whether a protocol of a packet corresponds to a given network service, forwarding packet service type information and packet address information to a second network device in response to a determination that the protocol of the packet corresponds to the network service, comparing the packet service type information and an associated service type address to a list of service types and addresses on the second network device, and executing a remedial action if, based on the comparing, it is determined that the network service is an unauthorized service and that a provider of the network service is an unauthorized provider. | 06-24-2010 |