Stored-value cards, such as debit cards, gift cards, and telephone cards, and other transaction cards remain a popular means for maintaining and/or gifting monetary or other value. A gift card, for example, is a type of stored-value card includes a pre-loaded or selectively loaded monetary value or balance. The gift card is typically activated at a point-of-sale (POS) terminal, which readies the card for use by the consumer or other associated party. The balance associated with the gift card declines as the gift card is used, encouraging repeat visits to the retailer or other provider issuing the gift card. Additionally, the gift card generally remains in the user's purse or wallet, serving as an advertisement or reminder to revisit the associated retailer. In one example, the gift card or other transaction card can be re-loaded with additional value after the initial activation. Gift cards and other transaction card products provide a number of advantages to both the consumer and the retailer.
Transaction cards are often packaged and/or otherwise placed in a retail environment for sale while in an inactivated state. Transaction cards are brought to a point-of-sale (POS) terminal for processing and activation. Card activation typically includes reading an account identifier, such as a machine-readable code, number, etc., from the transaction card and/or the packaging associated therewith, correlating the account identifier with a remote account or record having a balance of monetary or other funds for the corresponding transaction card, and activating access to the balance of funds using the transaction card.
The sustained popularity of transaction cards and the values associated therewith have made transaction cards a target for tampering and/or other fraud. In one example, third parties modify or otherwise tamper with account identifiers on inactivated transaction cards and leave the tampered transaction cards behind. As a result of the tampering, upon consumer selection of the transaction card and associated POS activation, an unintended record or account is activated and tied to use of the transaction card, which, in turn, allows the third party to wrongfully access the value associated with the transaction card. In another example, third parties photograph and duplicate account identifiers on inactivated cards, and then monitor the account identifiers to determine when the transaction card with the original account identifier is activated. Once the original account identifier is activated, the third party uses the duplicated account identifier to access at least a part of the value balance in the associated account before the rightful party can access the value balance. Other fraudulent third-party interaction and/or tampering with account identifiers also occurs and/or continues to be developed that allow the fraudsters wrongful access to values owed by the consumer and/or associated retail, restaurant, or similar venues. As such, solutions thwarting or at least diminishing the availability of inactivated account identifiers for tampering while still allowing the transaction cards to be display for selection and activation are desired.
A transaction card product comprising a transaction card, an account identifier, a security panel, and an activation code. The account identifier uniquely links the transaction card to a remote account having a balance value available for redemption toward one or more of goods or services. The security panel is coupled to the transaction card and substantially entirely covers the account identifier. The security panel is configured to be at least partially removed from a remainder of the transaction card product to permit access to the account identifier. The activation code has data therein to prompt a point-of-sale terminal to begin a transaction card activation process, the activation code having a first portion directly secured to and extending over the security panel, wherein the activation code is characterized by an absence of any data identifying the remote account.
A multiple-stage method of activating a transaction card linked to a remote account having a balance value available for redemption toward one or more of goods and services where the transaction card is part of a transaction card product includes using a point-of-sale terminal to read an activation code from the transaction card product to automatically prompt the point-of-sale terminal to initiate a card activation process. The activation code is characterized by an absence of any data identifying the remote account. The method further includes at least partially removing a security panel from the transaction card product to substantially simultaneously destroy readability of the activation code and to reveal an account identifier previously hidden from view by the security panel, and using the point-of-sale terminal to read the account identifier from the transaction card product and activating the remote account identified by the account identifier to allow the balance value to be redeemed toward one or more of goods and services, wherein the account identifier identifies the remote account stored in a database and linked to the transaction card. Other transaction card products, assemblies, and associated methods are also described herein.
Embodiments of the invention will be described with respect to the figures, in which like reference numerals denote like elements, and in which:
The following detailed description of the invention provides example embodiments and is not intended to limit the invention or the application and uses of the invention. Furthermore, there is no intention to be bound by any theory presented in the preceding background of the invention or the following detailed description of the invention. Relational terms herein such a first, second, top, bottom, etc. may be used herein solely to distinguish one entity or action from another without necessarily requiring or implying an actual such relationship or order. In addition, as used herein, the terms “about” and “substantially” apply to all numeric values or descriptive terms, respectively, and generally indicate a range of numbers or characteristics that one of skill in the art would consider equivalent to the recited values or terms, that is, having the same function or results.
This innovation provides a transaction card product presented with a hidden card account identifier to prevent undesired, third-party tampering with inactivated transaction cards. In one example, the transaction card identifier is securely hidden via a panel, such as a sticker or package portion, and an activation code is printed over the security panel. Removal of the security panel simultaneously destroys the activation code. In this manner, if some third-party tampers with the security panel, the security panel and/or at least the readability of activation code thereon is destroyed. In one example, activation of the transaction card is completed in multiple-stages, such as two-stages, using the activation code and another related code. Transaction card activation cannot be performed if the activation code is destroyed, thereby, allowing identification of the tampered transaction card at the point-of-sale (POS) and generally preventing activation of any transaction card that has been tampered with or otherwise compromised.
Turning to the Figures,
As illustrated in
Account identifier 30 links transaction card 10 to a financial or other stored-value account or record, for example, by identifying an account or record of value. The account or record indicates a value balance (e.g., monetary value, points, time value, or other balance) associated with transaction card 10. In one embodiment, the account or record is maintained on a database, other electronic or manual record-keeping system, or, in the case of “smart cards” for example, on a chip or other electronic device on/in transaction card 10 itself. Accordingly, by scanning account identifier 30, the account or record linked to transaction card 10 is identified and can subsequently be activated, have amounts debited therefrom and/or have amounts credited thereto. In this manner, account identifier 30 is useful for activation and/or redemption, according to embodiments of the present invention. Account identifier 30 is one example of on-card means for linking transaction card 10 with an account or record. In one example, each account identifier 30 is unique to a single transaction card or a group of transaction cards linked to the same account or record of value.
Since an exposed account identifier 30 has historically been proven to be susceptible to tampering, in one embodiment of the invention, a security panel 40 is applied over account identifier 30 such that transaction card 10 and security panel 40 collectively define a transaction card product 32. Security panel 40 not only hides account identifier 30 from view, but, in one embodiment, also is configured to provide indication of any tampering with security panel 40. As illustrated in
Security panel 40, in one example, includes one or more slits 46, such as a plurality of slits 46, extending entirely through at least security panel 40, and in one embodiment, through security panel 40 and adhesive layer 42 Slits 46 may be formed in any number of suitable arrangements, but, in one example, does not extend to a perimeter 44 of security panel 40, or at least do not extend through one side edge 48 of security panel 40 forming an undisturbed flange 45 of security panel 40 adjacent side edge 48 and configured to facilitate removal of security panel 40 from transaction card 10. In other embodiments slits 46 extend to perimeter of security panel 40 to further separate security panel 40 upon removal from transaction card 10 as will be further described below. In one embodiment, adhesive layer 42 does not extend entirely to side edge 48 such that flange 45 is easier to grasp when removing security panel 40 from transaction card 10.
Slits 46 are positioned and configured such that, upon pulling security panel 40 away from transaction card 10, security panel 40 pulls apart from itself along slits 46 leaving gaps 50 as shown in
Once security panel 40 is applied to transaction card 10 over account identifier 30 as shown in
In one example, activation code 60 includes a machine-readable instruction prompting a point-of-sale terminal 202 (
For example, as illustrated in
In one embodiment, in addition to printing activation code 60 over security panel 40 and rear surface 22 of transaction card 10, additional security indicia 66 are also printed or otherwise applied to extend at least partially over each of security panel 40 and rear surface 22 of transaction card 10 to provide additional visual cues indicating tampering with transaction card product 32. As illustrated, for example, security indicia 66 include text printed directly over a perimeter edge 68 of security panel 40, such that upon removal of security panel 40 from transaction card 10, the text of security indicia 66 is partially removed as well, for instance, a bottom or top half of the text, provide a visual indication that security panel 40 has been removed, as most clearly illustrated in
As described above, transaction card product 32 provides two machine-readable codes, that is account identifier 30 and activation code 60, used in activating transaction card 10 in a multiple-stage process that will be further described below. In general, during use, activation code 60 is scanned or otherwise entered into POS terminal, in a first stage of activation, prompting the POS terminal to begin a sequence for activating a transaction card. The second code, in this case, account identifier 30 on transaction card 10, cannot be accessed without removing security panel 40, the removal of which simultaneously destroys activation code 60. Account identifier 30 is needed in the second stage of the activation process to identify the account or record associated with the transaction card 10 and to allow that account or record to be activated for use. In this manner, transaction card product 32 provides security by hiding account identifier 30 or any other indication of the account or record associated with transaction card 10 while transaction card product 32 is on display and/or generally accessible to the public including potential fraudsters. Transaction card product 32, more specifically, security panel 40 and the application of security panel 40 to transaction card 10 is specifically configured such that any wrongful attempt to access account identifier 30 will destroy the activation code 60 in a manner designed largely to prevent activation of transaction card 10, namely the associated record or account. In particular, an associate controlling the POS terminal is met with a hard stop to the activation process when activation code 60 is either missing or is otherwise unreadable such that the activation process cannot be initiated based on use of transaction card product 32 itself, as will be further described in the method below.
Other embodiments of forming a transaction card product including transaction card 10 in a manner deterring third-party fraudulent interaction with account identifier 30 or other identifier associated with the account are also contemplated.
For example,
Like transaction card 10, transaction card 510 includes account identifier 30 and an activation code 560 secured thereto, for example, embedded in substrate 20 or printed on or otherwise securely applied to at least one of a first surface 590 and second surface 592. Activation code 560 is substantially identical to activation code 60 described above, but, in one embodiment, is printed directly to one of first surface 590 and second surface 592 of transaction card 510, rather than over a security panel 540 (described below). In one example, additional card or card type and/or account information is printed on transaction card 510 as generally indicated at 530 in
Transaction card product 580 additionally includes a security panel 540, which is substantially identical to security panel 40 other than differences specifically described herein. For example, security panel 540 includes one or more slits 546 extending substantially through an entire thickness of security panel 540. Security panel 540 is adhered to transaction card 510 in a selectively secure manner. Security panel 540 is securely adhered to transaction card 510 such that upon peeling security panel 540 from transaction card 510 to remove security panel 540, security panel 540 is separated from itself along each of the one or more slits 546 along a number of linear or non-linear segments of each of one or more slits 546 rendering security panel 540 greatly deformed from its original shape and making it very difficult to reuse security panel 540 in a similar manner or without readily visible and identifiable deformity and visible gaps 550. Like security panel 40, security panel 40 is formed with slits 546 and adhesive to generally allow security panel 40 to be removed from transaction card 510 and separated along slits 546 in a single pull away from transaction card 510.
Security panel 540 is positioned, on the one of first surface 590 and second surface 592 that has account identifier applied thereto, to cover account identifier 30 and is adhesively secured to the one of first surface 590 and second surface 592. For example, as illustrated in
In another example, as illustrated in
Card package 82 is divided into panels or sections via fold lines, for example, via a first fold line 90 and a second fold line 92 transversely extending from one of longitudinal edges 100 to the other and each spaced from each other and each of end edges 102 and 104. A first section 94 of card package 82 is defined between first end edge 102 and first fold line 90, an intermediate or second section 96 of card package 82 is defined between first fold line 90 and second fold line 92, and third section 98 of card package 82 is defined between second fold line 92 and second end edge 104. First section 94 includes a substantially closed perforation 106 extending through both interior and exterior surfaces 86 and 88 defining a removable tab 110 therein. In one example, perforation 106 and removable tab 110 are both positioned in an interior of first section 94 spaced from opposing longitudinal edges 100, first end edge 102, and first fold line 90. In one embodiment, perforation 106 and removable tab 110 are not included on card package 82.
Referring to
Like account identifier 30, package account identifier 116 is unique to the account or record linked to transaction card 10. However, in one example, package account identifier 116 differs from account identifier 30 and is generally usable only for activation and cannot be used for redemption of the value balance. This provides an additional layer of security as compared to transaction card product 32 as the actual on-card account identifier 30 is not used or even revealed during activation. In one embodiment, care is taken in assigning package account identifier 116 using encryption, random assignment, or other suitable methods such that a fraudster is not readily able to determine redemption, on-card account identifier 30 from only seeing package account identifier 116. Accordingly, by scanning account identifier 30, the account or record linked to transaction card 10 is identified and can subsequently be activated, have amounts debited therefrom, and/or have amounts credited thereto. In this manner, account identifier 30 is useful for activation and/or redemption, according to embodiments of the present invention. Account identifier 30 is one example of on-card means for linking transaction card 10 with an account or record.
Third section 98 includes a substantially closed perforation 108 extending through both interior and exterior surfaces 86 and 88 defining a removable tab 112 therein, according to one embodiment of the invention. In one example, perforation 108 and removable tab 112 are both positioned in an interior of third section 98 spaced from opposing longitudinal edges 100, second fold line 92, and second end edge 104. In one embodiment, removable tab 112 is sized larger than removable tab 110, and, as will be further described below, is positioned to fit directly over and cover removable tab 110 upon full assembly of transaction card product 80.
Referring to
In one embodiment, activation code 114 is printed on or otherwise applied or fixedly connected to exterior surface 86 in a manner extending over perforation 108 such that activation code 114 is partially included on removable tab 112 and partially included on a remainder of third section 98. More specifically, activation code 114 includes a first activation code portion 114A on removable tab 112 and at least one second activation code portion 114A on a remainder of third section 98. With this configuration, removal of removable tab 112 cuts activation code 114 in two or more parts, removing activation code portion(s) 114A from transaction card product 80.
Each code portion 114A and 114B of activation code 114 alone is insufficient to provide all the data of activation code 114 required to prompt POS terminal 202 (
Once card package 82 is formed and printed with or otherwise coupled with package account identifier 116 and activation code 114, assembly of transaction card product 80 continues by securing transaction card 10 to an interior of second section 96 of card package 82. For example, transaction card 10 is secured to card package 82 in a position substantially centered on second section 96 between opposing longitudinal edges 100 and/or first fold line 90 and second fold line 92. In one example, transaction card 10 is positioned such that account identifier 30 faces away from second section 96, however, other configurations are also contemplated.
Once transaction card 10 is secured to card package 82, first section 94 is folded about first fold line 90 to cover at least a portion of, if not a substantial entirety of, second section 96 of card package 82 and transaction card 10. In one example, second section 96 is adhered to first section 94 via a substantially permanent or other strong adhesive 120 (
In one embodiment, third section 98 of card package 82 is folded about second fold line 92 to cover first section 94 of card package 82, transaction card 10, and second section 96 of card package 82. For example, interior surface 86 of third section 98 of card package 82 is secured to exterior surface 88 of first section 94 of card package 82 via a substantially permanent adhesive 122 or another suitable adhesive. When third section 98 is folded into place, removable tab 112 of third section 98 extends directly over package account identifier 116. Removal of removable tab 112 reveals package account identifier 116 through a hole 108A (see
Additionally, referring to
If activation code 114 is determined to be non-intact, the at 186, the invalidity of the activation code 114 triggers the consumer or operator of POS terminal 202 that transaction card product 32 is deficient and may have been tampered with. In one example, upon discovery of a deficient transaction card product 32, that transaction card product 32 will be destroyed or otherwise accounted for, and the consumer will be asked to select another transaction card product 32 for activation of the transaction card 10 included therein at 186 before starting transaction card product activation process 180 again.
If activation code 114 is determined to be intact at 184, activation code 114 is entered at POS terminal 202, for example, via a scanner 210 or another machine-readable device of POS terminal 202. In one example, operations 188 and 184 are completed substantially simultaneously such as where activation code 114 is determined to be intact via scanning and automatic execution of an activation instructional code sequence.
When activation code 114 is entered at 188, POS terminal 202 initiates transaction card activation by executing instruction code, stored locally or at a remote database 206 (
At 192, the second code, for example, account identifier 30 on transaction card 10 (
Remote database 206, in one embodiment, contains various instructional code to run processes on POS terminal 202 such as general item processing or specialty processes, like transaction card activation. In one example, remote database 206 includes financial transaction instrument records 208, which link various account identifiers to specific records or accounts of the value balance associated with each individual transaction card 10 or group of transaction cards 10, if all transaction cards 10 in a group are able to load value to and/or redeem value from the same account or record. In one embodiment, financial transaction instrument records 208 link each account identifier 30 to a corresponding record or account. In one embodiment, the same record links a package account identifier 116 that is part of the same transaction card product 80 with account identifier 30 to that same corresponding record or account. In another embodiment, separate records in financial transaction instrument records 208 link package account identifier 116 to an account or record and link account identifier 30 to the same account or record for added security.
At 194, POS terminal 202 activates the account or record readying the value balance associated with transaction card 10 for redemption toward purchases and/or use of associated services at least in part as informed by access to financial transaction instrument records 208, as described above. In one embodiment, activation of a financial account tied to transaction card 10 includes changing a stored status identifier for the financial account such as where a predefined value balance for the transaction card 10 has already been determined and associated with transaction card 10. In one embodiment, activation of a financial account tied to transaction card 10 includes changing a stored status identifier for the financial account and/or providing a consumer-specified amount to be added to an initial zero value balance for the transaction card 10, where that amount will be the new value balance of the account that is available for use toward the purchase and/or use of goods and/or services. Once activated, transaction card 10 is ready for use as a typical transaction card 10.
In one example, activation is still further verified, by removal of removable tab 110 to create a hole 106A and POS terminal 202 reading account identifier 30 through hole 106A and subsequently cross-checking that account identifier 30 is associated with the same account identified using package account identifier 116, while in other embodiments, this step is eliminated. The consumer is then free to take transaction card 10 for use and may destroy any associated package 82 or security panel 40. Once transaction card 10 is activated, responsibility for maintaining the security of transaction card 10 shifts from the retailer or card provider to the end consumer.
At 196, a consumer is able to redeem transaction card 10 toward purchase of product or services at POS terminal 202 or other terminals having access to the account or records 208 stored in remote database 206. As used throughout this application, POS terminal 202 is intended to be given a broad reading to include retail point-of-sale terminals as well as any kiosk, workstation, home computer, mobile computing device, etc. that is configured to activate and/or redeem transaction cards, etc.
As described for the methods and products above, transaction card products as described herein are configured to provide for added security prior to activation by hiding any account identifier linked to the actual account or record tracking the balance value of a transaction card from view and only providing access to any such account identifier via destruction of associated packaging and, more preferably, via destruction of a machine-readable code to begin the transaction card activation process. Due to this arrangement, associated cards are processed in a two-stage manner (see operations 188 and 192 in
Various other packaging and/or auxiliary panel designs are also contemplated for use in a similar. For example,
Activation code 114 is printed or otherwise secured to package 82 such that it extends over perforation 408 to be partially included on second portion 422 of second removable tab 412 and partially included on a remainder (i.e., a portion other than second removable tab 412) of third section 398 of package 82. Transaction card product 380 functions and facilitates security via two-stage card activation in a similar manner as described above for transaction card product 80, with the primary difference being the enlarged second removable tab 412 and the positional offset of activation code 114 as compared to package account identifier 116, or, if package account identifier 116 is removed, as compared to account identifier 30 on transaction card 10. In other embodiments, removable tabs 110, 410, 112, and/or 412 may be attached to a remainder of the associated package 82 or 482 via a fold line (not shown) such that the removable tabs 110, 410, 112, and/or 412 are folded away from the underlying account identifier 30 or 116 rather than removed completely from a remainder of the packaging. Other variations of a transaction product in accordance with the present invention are also contemplated and will be apparent to those of skill in the art after reading the present application.
In one embodiment, where account identifier 730 is machine readable, a human-readable account identifier 731 is also included and readable by a bearer of transaction card 710 such that transaction card 710 can be used when a machine configured to read transaction card 710 is not present (e.g., when using transaction card 710 to make a purchase on a website). For example, human-readable account identifier 731 includes a predetermined account number including a character string, referencing a specific monetary account or record of value tracked in remote database 206 (
Account identifier 730 is coded to be readable via a machine, e.g., a point-of-sale scanning device, and includes a coded version of all or at least a portion of human-readable account identifier 731. In one example, as schematically illustrated in
In one example, transaction card 710 additionally includes a human-readable access code 733, which acts a personal identification number (PIN) for the card or other check access number and/or letter sequence checked against the account identifier 731 before allowing activation of transaction card 710, as will be apparent to those of skill in the art upon reading the present application.
Security panel 740 is applied to transaction card 710 over account identifier 730, such that transaction card 710 and security panel 740 collectively define a transaction card product 732. Security panel 740 not only hides account identifier 730 from view, but, in one embodiment, takes any one of a variety of forms configured to provide visual indication of any tampering with security panel 740, such as that described above for security panel 40. As illustrated, in one example, security panel 740 is detachably adhered to transaction card 710, such that security panel 740 is adhered directly to rear surface 722 over account identifier 730 (see
In the embodiment illustrated in
In one embodiment, an activation code 760, for example, similar to activation code 60 (
In one embodiment, activation code 760 is not linked to the specific account or record in remote database 206 (
In one embodiment, remote database 206 includes a link, such as a listing or other record, association RID number with the account number. In this manner, during processing matching activation code 760 or 762 to the account number of account identifier 730 or 731 can serve as a cross-check to prevent tampering, while still not having the actual account number visible on any portion of transaction product 732 before removal of security panel 740 from transaction card 710.
Where activation code 760 is machine readable, in one example, a human-readable activation code 761 is also included and readable by a bearer of transaction card 710 such that transaction card 710 can be used when a machine configured to read transaction card 710 is not present (e.g., when using transaction card 710 to make a purchase on a website). For example, human-readable account identifier 761 includes the RID number. In one example, as schematically illustrated in
As described above, transaction card product 732 provides two machine-readable codes, that is account identifier 730 and activation code 760, used in activating transaction card 710 in a multiple-stage process similar to that described in detail above for transaction card 10. In general, during use, activation code 760 is scanned or otherwise entered into POS terminal, in a first stage of activation, with a prompt or automatically prompting the POS terminal to begin a sequence for activating a transaction card 710. After activation code 760 is entered into POS terminal, security panel 740 is peeled from transaction card 710 to reveal the second code, in this case, account identifier 730 on transaction card.
As illustrated in
In one embodiment, transaction card 710 is activated in an activation process similar to activation process 180 of
In one embodiment, each of the plurality of transaction cards 810 includes account identifier 730 secured thereto in a manner similar to how account identifier 30 is secured to transaction card 10, as described above with respect to
In one example, backer panel 812 defines a front surface 813 and an opposing back surface 815 and includes an aperture 818 for exposing therethrough the back of the one of the plurality of transaction cards 810 closest to backer panel 812 to expose account identifier 731, human-readable account identifier 731, and/or human-readable access code 733 therethrough. In one example, backer panel 812 or other portion of transaction product 832, such as one of the plurality of transaction cards 810, includes instructional indicia 870 providing team members with instructions for how to process transaction product 832 to activate all of the plurality of transaction cards 810 included therein. In another embodiment, aperture 818 is replaced by a label (not shown) adhered to backer panel 812 and including a reproduction of account identifier 731, human-readable account identifier 731, and/or human-readable access code 733 of one of the plurality of transaction cards 810.
In one example, transaction product 832 includes, such as, includes on one of the plurality of transaction cards 810, backer panel 812, or the label (not shown) thereon, a multipack code 860 for scanning at the POS terminal during card activation. Multipack code 860 is machine readable including one or more of a one-dimensional bar code, a two-dimensional bar code, a QR code, a magnetic strip, a smart chip or other electronic device, a radio frequency identification (RFID) device, or another suitable identifier readily machine readable by a POS terminal. In one embodiment, multipack code 860 includes information informing the POS terminal that it is going to be activating a plurality of transaction cards 810 included in transaction product 832 at one time such that POS terminal runs a slightly different activation process as compared to activating one transaction card at a time, as will be apparent to those of skill in the art.
Security panel 840 is applied over account identifier 730, to hide account identifier 730 from view and to provide visual indication of any tampering with security panel 840, such as that described above for security panel 740. As illustrated, in one example, security panel 840 is detachably adhered to the back one of the plurality of transaction cards 810, such that security panel 840 is adhered directly over account identifier 730 (see
In the embodiment illustrated in
In one embodiment, an activation code 760, is printed or otherwise fixedly secured, e.g., embossing, etc., on exterior surface 746 of security panel 840. Where activation code 760 is machine readable, in one example, a human-readable activation code 761 is also included and readable by a bearer of transaction card 810, and can be used when a machine configured to read transaction card 810 is not present (e.g., when using transaction card 810 to make a purchase on a web site).
Transaction card product 810 is processed for sale in a similar manner as transaction card product 710 other than the addition of multipack code 860 being scanned before activation code 760 and the activation of the plurality of transaction cards 810 rather than just one transaction card 710, as will be apparent to those of skill in the art upon reading the current application. During processing security panel 840 functions similarly to security panel 740 to first present activation code 740, but to destroy readability of activation code 740 when pulled from transaction product 832 to reveal account identifier 730.
Other embodiments of forming a transaction card product including transaction card 10 in a manner deterring third-party fraudulent interaction with account identifier 30 or other identifier associated with the account are also contemplated. In addition, features and portions of transaction products 32, 580, 80, 150, 380, 732, and 832 can be interchanged with each other in manners that will be apparent to those of skill in the art upon reading the present application.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium and, in one example, is a non-transitory computer readable storage medium or database. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wired, optical fiber cable, infrared, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object-oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made through an external computer (for example, through the Internet using an Internet Service Provider).
The flowchart and block diagram in the above figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowcharts and block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Although the invention has been described with respect to particular embodiments, such embodiments are meant for illustrative purposes only and should not be considered to limit the invention. Various alternatives and changes will be apparent to those of ordinary skill in the art upon reading this application. Other modifications within the scope of the invention and its various embodiments will be apparent to those of ordinary skill.
This application is a non-provisional application of and claims priority under 35 U.S.C. § 119 to U.S. Provisional Patent Application No. 62/702,745, filed Jul. 24, 2018, which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
62702745 | Jul 2018 | US |