This invention relates generally to the packaging, display, and security of transaction cards activated at the point of sale.
Within the last three decades there has been a revolution in the use of transaction cards. Transaction cards are used for payment in many retail situations, in retail stores, for telephone services, for on-line purchases, for music downloads, for ATM usage, and the like. Such cards are subject to fraud with the thief removing a valid gift card from a removable element used to activate the card and reconnecting a fraudulent transaction card. By swapping a valid card with an invalid card, the thief will end up with the valid card and the consumer making the purchase will end up with an invalid card.
This invention is related to a package assembly, transaction assembly, tamper detection system or method, and/or manufacturing method and packaging system, including but not limited to, for example, for gift cards, telephone service cards, music download cards, on-line purchase cards, ATM cards or the like.
A transaction card, as described herein may include, for example, a card that may be used in a business transaction with a party willing and able to accept the card, for example, in payment for a purchase. Examples of such cards include, but are not limited to gift cards, debit cards, loyalty cards, ticket cards, prepaid cards, phone cards, membership cards, and others. Typically such cards are wallet sized and made of plastic but other sizes and materials are often used. Transaction cards typically have a unique account number associated with each card.
Some transaction cards are sold by a particular retailer and can only be used at a location of that same retailer.
Many other retail transaction cards are sold to consumers in store locations other than the store location of the retailer issuing the cards. These transaction cards are commonly known as third party activated transaction cards. The transaction cards are issued by issuing retailer and sold by a third part retailer, at one of the third party retailer's locations. Then, at a later date, the transaction card is redeemed or used at the issuing retailer, e.g., store location or web site. An example might be the sale of a gift card issued by a home improvement retailer at a third party grocery retailer. Another example might be the sale of music download card issued by an on-line internet retailer and sold at a third party drug store retailer. These and similar types of cards will be referred to herein as a third party transaction cards.
Often the transaction systems of the card issuer and the third party retailer are incompatible and require that a unique set of activation data be used to accept the transaction into the point of sale computers at the third party retailer while a different unique set of usage data must be used in the point of sale computers at the card issuer.
Each third party transaction card has associated with it unique activation data and unique usage data. These two data elements are stored in a cross reference database that allows a computer at the card issuer, the third party retailer, or a transaction processing service provider to receive the unique activation data and then perform the required action to the account associated with the usage data. For example, for a gift card, the action required upon activation might be transferring funds into that account, for a membership card the action might be recording the activation of the card in a customer database. “Activation” as used herein including with “activation device” “activation element’ and “activation data” includes mechanisms elements or devices that are configured to be read by a reader to thereby activate or valuate an account. In some cases unique activation data may be considered unique valuation date. Where an account is activated and/or value is loaded to it. Usage data by contrast corresponds to the use of the valuation loaded to the account. An account activation element may include for example a unique bar code, an account number or any other readable element configured to be read to activate or valuate a transaction device such as a transaction card.
Many third party activated gift cards have both activation and redemption (usage) transaction data on the same planar surface. For some third party activated transaction cards both the activation and redemption (usage) elements may be written or located on the transaction card in a human readable or machine readable form such as a bar code, and encoded magnetic stripe, an embedded radio frequency device, or printed or embossed numbers or codes or other readable elements. Often this can cause confusion and waste time at the point of sale as the retail associate must determine which data is required for activation or which data is required for usage. Additional problems can arise when the point of sale devices used to read the transaction data cannot determine which data set is the correct data set. Additional problems can arise when the point of sale transaction device, such as bar code reader, reads both activation and usage data at the same time. Additional problems can arise when the limited size of the transaction card does not allow sufficient space for both activation and usage data and terms and conditions or other consumer information that may be required.
Some card issuers solve this problem by placing the activation data on a package and placing the usage data on the transaction card. The transaction card is then attached to the package that carries the correct cross referenced activation data. Thieves can attack this package by swapping a valid transaction card with an invalid transaction card.
Another solution to the problem of having both activation and redemption data on the same planar surface has been to create a transaction card assembly that includes a transaction card and a detachable activation device. The transaction card contains only the data required for usage, reloading and other types of transactions at the card issuing retailer. The detachable activation device contains only the data required by the third party retailer. The assembly has an interface or attachment method where the transaction card and the activation device can be separated from one another. The activation portion is typically identified with instructions to the consumer to detach and discard the activation device after purchase.
The transaction card with activation device assembly presents advantages for manufacture as well in that the encoding of both the activation data and the usage data can take place in a single step and do not require the careful matching of a unique transaction card to a package containing the cross referenced unique activation data. However, these cards are susceptible to tampering as well.
In an effort to make the purchase of gift cards, telephone service cards, music download cards, on-line purchase cards, ATM cards or the like easier, many retailers display the transaction card assembly in an inactive state in an unsecured location in the store. In this unsecured location, the card assembly is subject to predations of thieves who will detach the activation device from a valid transaction card and reattach the activation device to an invalid transaction card. When the consumer purchases the altered assembly they will have the invalid transaction card and the thief will have, the valid transaction card.
To prevent this from occurring, some gift card issuers package the assembly in a paper package formed by folding paper around the assembly and gluing it closed. In such packages, the entire assembly is susceptible to tampering as the package may be opened and re-glued shut without readily visible evidence of tampering. While the assembly may be attached to the package with a fugitive glue, such glue is easily separated from the package or assembly without readily visible damage or change to the packaging. Fugitive glue is used in such situations for the purpose of making the assembly removable without damaging it. At the point of sale, the consumer or the store clerk must manipulate or open the package to access the activation device and an activation element for activation.
Another way used to prevent the thieves from swapping the activation device is to place a security code across the interface between the transaction card and the activation device. This security code is typically a code number, an image, or a bar code. The consumer or store clerk is instructed to examine the security code before purchasing the package to determine if it has been altered. Most consumers and store clerks do not understand the instructions or take the time to examine the security code so this is not a very effective theft prevention solution. The alterations made by the thief are not easy to detect.
Many existing packages are used to protect prepaid debit cards such as prepaid Visa, MasterCard, or American Express cards. These packages typically are secured using a heat sealed adhesive around the perimeter of the package. However, in all cases, they provide a package for a transaction card while activation data or elements are positioned is exterior to the packaging. Thus tampering by removing a card and replacing it with a different card is still a potential problem that may go undetected. In addition such a configuration requires additional manufacturing steps to match a bar-coded or encoded carrier to the transaction card on the inside of the package.
Another method for preventing the fraudulent swapping of the activation device is to place a matching security code on both the transaction card and activation device. The consumer and store clerk are instructed to compare the two codes prior to purchase. While it is easier to instruct a consumer or store clerk to match two codes than it is to instruct them to look for alterations to a single code it is still an extra step that many consumers and store clerks do not take prior to purchase. Thus the swapping actions of the thief may not be detected.
Many food, beverage, medicines, and other consumer packaged goods are protected by tamper evident packaging such as, safety seals and enclosures. While permanent glues and the like have been used to seal such packages, they do not typically require access to a product at point of sale.
It is hypothesized herein that a consumer who has been typically shown to be more likely to look at a consumer good packed to see if there has been tampering, is therefore likely notice the tampering than they would be to notice that code numbers have been altered.
Many existing packages used for packaging transaction card assemblies are formed by folding and gluing paper around the transaction card in various configurations. All of these packages inconveniently require the consumer to remove glue from the transaction card and while this glue is often hot melt fugitive glue, in many cases the glue does not remove cleanly. In addition, without a continuous seal of the front carrier to the back carrier around the entire perimeter of the package, a thief can open and reclose the package and swap valid and invalid cards without detection.
Variations of the assembly and methods described herein may provide for more readily detectable tampering of transaction cards by thieves.
Variations of the assembly and methods described herein may provide a more secure transaction card package at least in part, by sealing a transaction card assembly between two carrier panels.
Variations of the assembly and methods described herein may provide a more secure transaction card package at least in part by sealing a transaction assembly and/or transaction card completely about its perimeter.
Variations of the assembly and methods herein may provide a bond formed about the perimeter of a transaction card in such a way as to allow the consumer to remove the transaction card from the activation device by detaching at the attachment element while leaving the transaction card free of any adhesive residue and easy to remove. According to a variation, the bond may be formed by a permanent adhesive as set forth herein. A permanent adhesive as used herein is selected or designed to not fully or readily release from surface, i.e., to create visible surface damages such as, e.g., cracking, fiber tear, splitting, flaking, delaminating, significant loss of print image, or irreversible damage. Fugitive glue on the other hand, has a lower peel strength than shear strength so that it can readily peel (even if left as residue) while otherwise sticking to a surface.
Variations of the assembly and methods herein may provide a bond formed about the transaction card allowing removal of the transaction card while the activation device remains behind and/or is bonded or attached to the packaging.
Variations of the assembly and methods herein may provide for the use of a permanent adhesive to attach an activation device or tamper detection element to a packaging assembly wherein the activation device or tampering element is removably coupled to the transaction card. The transaction card may them be removed from the packaging assembly free from damage from permanent glue. Tampering indication elements herein may or may not comprise activation devices. Tamper indication elements and activation elements may be configured to be visibly disturbed or damaged upon attempted separation from one or more packaging elements bonded thereto.
Variations herein describe particular packaging, account and transaction elements having particular functions where the elements are positioned with respect to other elements and or are assembled, attached, connected or bonded in a particular manner that provides evidence of tampering and may prevent a thief from stealing as described herein.
Similarly in
Transaction cards typically used are rectangular in shape and 2.125″ by 3.375″. However, the present invention accommodates most shapes or sizes of transaction card and activation devices that may be desired. An attachment element coupling the transaction card to the activation device may be formed, for example, by a adding a score, break, perforation, weak area to a single piece of substrate thus defining the separation of the substrate into a transaction card portion and an activation portion. Other attachment elements or mechanisms may be used as well. The activation device may be directly or indirectly coupled to the transaction card. Non-limiting attachment elements may be used and may include, for example, adhesive, rivets, fasteners, or tamper evident adhesive tape.
Tampering to detach and swap a valid transaction card with an invalid transaction card may, for example be evident by creases or tears in the front carrier 110 or the back carrier 160, tearing of fibers of the packaging and/or other visually apparent damage to the surfaces of the packaging. This may occur due to sealing or bonding with a permanent adhesive.
Additionally, according to one variation, when the front carrier 110 and the back carrier 160 are sealed together, a seal or bond 199 may also be formed between the activation device 130 and the front carrier 110 and/or back carrier 160 that will result in the apparent tearing of fibers and/or other visually apparent damage to the surface (which may included printed matter) or substrate of the activation device when that bond is broken.
According to variations, the bond 199 may be formed with an adhesive such as a permanent adhesive, or by an energy formed seal e.g., by heat-sealing an adhesive, by ultrasonic, radiofrequency or other energy welding of materials or films from which the assembly may be constructed in whole or in part, or and/or by UV curing a UV curable material or film, or in any such manner that will make removal of the activation device 130 or its separation from the transaction card 120, evident to one who inspects the package assembly 100. The bond 199 may or may not also form a portion of the continuous seal 185.
Neither the seal 185 nor bond 199 impinges on the transaction card 120, leaving the transaction card 120 free to be removed from the package 100 when it is detached from the activation device 130. Thus, the transaction card 120 is removable from the activation device 130 by detaching at the attachment element 125, and free of any adhesive residue and easy to remove while the activation device 130 remains bonded to the packaging.
The front carrier 110 may have a die cut or other window 112 to show a portion of the transaction assembly 140 which may include for example, at least a portion of the transaction card 120. The back carrier 160 may have an die cut window 162 to reveal one or more activations elements, e.g., bar codes 180 and/or activation account numbers 190, for example, similar to activation bar codes, activation account numbers, and/or other activation elements, shown in
Referring to
Referring to
Referring to
Referring to
Referring to
The second portion 169 of the back carrier 160 is positioned so that the transaction card 120 is directly impinged upon it in the finished package assembly 100. In this manner the transaction card 120 may be easily removed without adhesive residue from the finished package 100 adhering to it. In some variations, and with some manufacturing methods, it may be desirable to apply a removable fugitive glue (for example, HB Fuller HM 2703) to the transaction card 120 to hold the card assembly 140 in place when sealing the front carrier 110 and back carrier 160 to each other and to the activation device 130. Such fugitive glue is selected to prevent damage to the transaction card 120 or its surface, and is easily removed from the surface of the transaction card 120.
Referring to
As shown in
Referring to
Referring to
While the examples herein have been illustrated and described, it should be understood that various changes, adaptations, and modifications may be made therein without departing from the spirit of the invention and the scope of any claims hereto.
Number | Date | Country | |
---|---|---|---|
61516797 | Apr 2011 | US |