The present invention is generally directed to a promotional card assembly, more particularly, to a point-of-sale (POS) transaction card, and further still to a POS security activation card, and its manufacture, characterized by one or more features and/or a construction whereby “skimming” is defeated, more particularly, the instant disclosure is directed to means of/for corrupting a POS activation card owing to tampering or the like.
POS activation cards, e.g., those exemplified but hardly limited to those described/shown in U.S. Pat. No. 7,537,168 (Anderson et al.), are well known and popular mechanisms by which to “claim” a gift, promotion or premium. Various merchant cards (e.g., stored value cards) are commonly displayed in kiosks or the like for purchase and activation at retailers such as Target, Walgreens, CVS, etc. Notionally, in this setting, a purchaser will select a merchant card of designated nominal cash amount, or one capable of designating a purchaser select amount, and will thereafter proceed to “pay” at checkout, with the retailer “activating” the gift/premium which is later used, commonly by a third party who is more often than not a gift recipient of the activated card.
An alternate context for such cards is in connection to “access.” For example and without limitation, subsequent to a card holder revealing a revealable “key,” in the form of a revealable information (i.e., a “hidden” code such as an alpha/numeric stringer of the information field), the information/code may be used by the card holder to redeem or access a loyalty reward, premium, membership, subscription service, etc., or to access software or the like.
Skimming is a criminal activity whereby the access key of the POS activation card is obtained in advance of consumer purchase at the POS. The premium is quickly redeemed, not by the purchaser, but by the “skimmer” or their co-conspirators.
Two general approaches to POS activation fraud prevention are noted, namely, transactional steps to prevent or defeat activation fraud, and POS card adaptations towards that end. The instant disclosure is generally directed to the later approach.
Heretofore, prepaid card carriers and the like have been subject to numerous adaptations, ranging from photocopying prevention (see e.g., EP 2,226,267 (Abel)) to the inclusion of embedded microprocessors for biometric assessment and the like (see e.g., US Pub. No. 2007/0073619 (Smith)). Moreover, tamper evident cards characterized by thin panel package lamina or the like are generally known (see e.g., US Pub. No. 2012/0273576 (Tomczyk et al.) & U.S. Pat. No. 8,931,639 (Payne)). Further still, transaction cards characterized by security labels (i.e., a data field obstruction layer in the form of a hot stamped foil label) are also known (see e.g., U.S. Pat. Nos. 8,720,786 & 9,053,470 (Boge et al.)).
It is contemplated and believed advantageous and desirable to adapt known POS activation cards such that any operations executed upon the card (i.e., manipulation) in an effort to obtain the revealable, premium redemption data will corrupt the card, namely, the adaptation will operatively link or unite the information field of the revealable information to/with machine readable content, e.g., a bar code, magstripe, etc., in such a way that attempts to reveal the revealable information will corrupt the transaction means and thusly render it inoperable. Codes are protected, unauthorized code use eliminated and activation disabled when codes are accessed.
Via contemplated adaptations, the consumer and merchant cannot complete a sale/transaction with regard to a POS activation card of suspect integrity. Thus, while the card is essentially ready for the recycle bin, there has been no financial loss for either or both of the purchaser or/and the merchant.
A point-of-sale transaction/activation card is generally provided. More particularly, a POS security activation card assembly characterized by first and second card panels, a security element selectively interposed between the card panels, and machine readable content carried by either or both of the card panels is provided.
The first card panel has first and second surfaces, the first surface of the first card panel being an outside visible panel surface delimiting a first card face, the second surface of the first card panel being an inside panel surface. The inside panel surface is characterized by an information field comprised of information, the information field being a revealable information field, the information of the information field being revealable information.
The second card panel has first and second surfaces, the first surface of the second card panel being an outside visible panel surface delimiting a second card face, the second surface of the second card panel being an inside panel surface. The second card panel includes a tab, the tab overlying an end portion of the revealable information field of the inside panel surface of the first card panel, the machine readable content proximate the tab.
The security element includes a body and a head extending therefrom. The head underlies the tab of the second card panel, the body overlies a substantial portion of the revealable information field of the inside panel surface of the second surface of the first card panel and intersects the machine readable content. Manipulation of the tab of the second card panel, in furtherance of revealing the revealable information of the revealable information field, results in corruption of the machine readable content by the security element. In-as-much as the security element advantageously overlies a portion of the revealable information of the revealable information field, a portion of the security element may either overlie or underlie a portion of machine readable content, in its many forms/embodiments, in furtherance of corrupting reading of the machine readable content via disintegration of the tab and the operatively linked security element, from the assembly, more particularly, from portions of the assembly characterized by machine readable content. More specific features and advantages obtained in view of those features will become apparent with reference to the drawing figures and DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS.
Various other objects, features and attendant advantages of the contemplated POS security activation card assembly will become fully appreciated as the same becomes better understood when considered in conjunction with the accompanying drawings, namely
The subject description proceeds in connection to the representative, non-limiting illustrations of
The contemplated security activation/transaction card assemblies 100, 100′ of
Each panel 20, 40 possesses opposing sides (i.e., surfaces), namely, first 22, 42 and second 24, 44 surfaces, the first surface being a visible outside assembly surface (O), the second surface being a non-visible inside assembly surfaces (I). In the semantics of
Advantageously, printed or otherwise applied content X and/or Y is carried by the inside view surface 24 of the front panel 20 (
In connection to the security transaction card assembly of
In relation to the front panel content or information, the back panel 40 includes corresponding portions X′ and/or Y′, one of which may be user manipulated so as to reveal the underlying content X and/or Y of the inside view surface 24 of the front panel 20 (
Moreover, in addition to the inclusion of machine readable content in the form of an optical label on the outside view surface 42 of the back panel 40, the outside view surface 42 advantageously, but not necessarily, may further, or only, include machine readable content 70 in the form of an encoded magnetic strip (
As is best seen and appreciated in connection to
With particular reference to
The dominant body portion 13 of the security element 10 extends away from the head 14 and down towards and to the machine readable content 70 of the second card panel 40 (
The subordinate body portion 15 of the security element 10 extends away from the head 14 up towards the second panel cutout 48 (
In furtherance of revealing revealable content X, the second panel tab, delimited by the “C” shaped die cut, is manipulated by pulling same to the right (
With particular reference to
Functionally, in furtherance of revealing revealable content X, the second panel tab, delimited by the “C” shaped die cut, is manipulated by pulling same to the right (
What has been described and illustrated herein are one or more preferred embodiments of the contemplated POS security transaction/activation card, along with some of its variations. The terms, descriptions and figures used herein are set forth by way of illustration only and are not meant as limitations. Those skilled in the art will recognize that many variations are possible within the spirit and scope of the invention in which all terms are meant in their broadest, reasonable sense unless otherwise indicated. Any headings utilized within the description are for convenience only and have no legal or limiting effect.
This is a United States national patent application filed pursuant to 35 USC § 111(a) claiming priority under 35 USC § 120 of/to U.S. Pat. Appl. Ser. No. 62/331,124 filed May 3, 2016 and entitled ANTI-SKIMMING PROMOTIONAL ASSEMBLY, the disclosure of which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6328341 | Klure | Dec 2001 | B2 |
6636833 | Flitcroft et al. | Oct 2003 | B1 |
6758404 | Ladyansky | Jul 2004 | B2 |
7537168 | Anderson et al. | May 2009 | B2 |
7584896 | Warther | Sep 2009 | B2 |
8033473 | Britt et al. | Oct 2011 | B2 |
8157086 | Gallegos | Apr 2012 | B1 |
8718603 | Wu et al. | May 2014 | B2 |
8720786 | Boge et al. | May 2014 | B2 |
8931639 | Payne | Jan 2015 | B2 |
9053470 | Boge et al. | Jun 2015 | B2 |
20020156683 | Stoutenburg et al. | Oct 2002 | A1 |
20060255125 | Jennings, Jr. et al. | Nov 2006 | A1 |
20070073619 | Smith | Mar 2007 | A1 |
20070251995 | Kingsborough | Nov 2007 | A1 |
20090254480 | Esslinger et al. | Oct 2009 | A1 |
20120145578 | Pazlar | Jun 2012 | A1 |
20120256006 | Schmitt | Oct 2012 | A1 |
20120273576 | Tomczyk et al. | Nov 2012 | A1 |
20150254549 | Newcombe | Sep 2015 | A1 |
20150269564 | Kearns | Sep 2015 | A1 |
Number | Date | Country |
---|---|---|
2226267 | Aug 2012 | EP |
Number | Date | Country | |
---|---|---|---|
62331124 | May 2016 | US |