This application relates generally to stored value cards, and more particularly relates to a assembly used for securing activation data within a secure package for stored value cards, the assembly being configured to destroy a portion of the activation barcode should a stored value card be removed from the package for fraudulent purposes.
Stored value cards, which may also be known as gift cards, prepaid cards, shopping cards or fare cards, prepaid Mastercard™ and Visa™ cards (instant issue) among other names, are very popular with both consumers and retailers. The wide appeal of stored value cards, as a result, has attracted the unwelcome attention of criminals seeking to exploit the conveniences and automated processes afforded by such cards. In particular, such criminals misappropriate and manipulate stored value cards and associated account information to perform fraudulent transactions. Stored value card fraud is typically perpetrated in the form of either at the physical point of sale (POS) or “card present” fraud, or for virtual POS purchases or “card not present” (CNP) fraud. The latter includes transactions such as in e-commerce or internet purchases that cannot be authenticated using “standard” processes used at the physical POS.
A stored value card is typically the size and shape of a conventional credit card (CR80 Card) and includes a magnetic stripe, barcode or other similar activation method, account identifying element, or means for using the card. The stripe, code, account identifying element, etc. on the card is encoded with data, which includes a unique account number. The account activation indicia, for example, may be visible while the card is secured in or secured to packaging, such that the account activation indicia may be used during the purchase and activation of the card.
Commonly, stored value cards are displayed by retailers for purchase by customers. The cards may be stored in an active or inactive state. If stored in an inactive state, the card cannot be used to purchase goods or services until the card has been activated. A customer may have a card activated by bringing a card to a cashier and having the cashier then, for example, swipe the card through a point of sale terminal, which may add value to the card in exchange for payment, or activate value already on the card. In this context, the “swipe” action could involve passing a card (or its packaging) though a magnetic strip reader/writer; or passing the card or package over a barcode scanner; or putting the card or package in the vicinity of a proximity reader/writer (such as, for example, an RFID reader/writer), or any other equivalent activation technique. A balance on the card may be maintained within a computer system located at the point of sale or at a remote location. A holder of the stored value card may then use the card to purchase goods and/or services immediately or over time up to the value of the card. These current procedures relating to stored value cards, although providing convenience to consumers, leave the cards vulnerable to criminals.
One particular fraud that is perpetuated by criminals with regard to stored value cards is called “skimming.” Skimming is a serious problem resulting in significant loss to both retailers and consumers, and applies to both card present and CNP fraud. To skim a card having a magnetic stripe holding account information, for example, a criminal will purchase a stored value card from a retailer, thereby causing an account associated with the card to become activated. The criminal will then remove additional cards from the store that have not yet been activated, and will then alter magnetically stored information on the inactivated cards to match that of the activated card. As such, all of the altered, inactivated cards will have the magnetic information that identifies the account of the originally purchased card. The criminal will then return the altered cards to the store shelf where unsuspecting customers seeking to purchase a stored value card will unknowingly place money into the account of the criminal holding the originally purchased card. The unsuspecting customer may attempt to use their card and will be told that it has no associated value or has a smaller value than thought. The retailer may be able to verify that the customer did not use the value associated with the stored value card, and in the interest of customer service, may restore the value to the customer. In that case, the retailer loses the money. However, in some cases, there may be no way to prove fraud and the customer may lose up to the entire value.
Another type of fraud that is perpetrated by criminals with regard to stored value cards is unauthorized activation. Specifically with secure packaging, activation indicia, such as a barcode, is printed on the card and positioned beneath a perforated pull tab. Account information, such as a PIN or account number, is also on the card and sealed within package. Fraud is perpetrated when a criminal takes a stored value package from a retailer without purchasing the card. The criminal will then carefully remove the card from the package, and steal account information from the card and either replace the card within the package or with another card with an activation barcode, and carefully reseal the pack. The criminal rehangs or replaces the package at the retailer location. The criminal then waits until package is sold by visually checking if pack is still on rack or attempts to check balance online. An unsuspecting customer then purchases the package and activates the stored value card, unknowingly placing money into the account of the criminal holding the originally purchased card or with access to the original account information. The unsuspecting customer may attempt to use their card and will be told that it has no associated value or has a smaller value than thought.
Another fraud perpetuated by criminals is carried out by the criminal viewing stored value cards in the store. The criminal writes down the code associated with the particular stored value card (such as a credit card type number) while it is still in the store. In such situations the code is in plain view of the criminal or may be easily viewed without altering the card packaging. Once the criminal has recorded the code, the criminal waits for a period of time, assuming that an unsuspecting customer will purchase and have the card activated during that time. The criminal then periodically checks to see if they are able to make purchases, such as online purchases (CNP fraud), by attempting to use the card code. If the card has been activated by the true purchaser, the criminal will be able to purchase goods online using the activated code, thereby stealing the balance on the card from the true purchaser.
Criminals may perpetuate the above-described frauds or other frauds with regard to stored value cards as they sit on store shelves today. Thus, there is a need for a way to protect such cards and insure that they have not been tampered with or duplicated prior to purchase or activation by an innocent consumer.
There have been proposals and attempts to reduce the occurrence of fraud associated with stored value cards. For example, modifications to card readers or other parts of the activation process have been proposed, but changing existing systems in such ways involves significant cost. Additional steps have been added to the activation process for some cards, such as steps involving pin numbers and web access. However, additional steps reduce the level of convenience that such cards provide to consumers.
Other attempts at reducing the occurrence of fraud include packaging of the card such that unauthorized tampering with the packaging or card therein is visually evident. Examples of these types of secure packs can include, for example, sealing the card, sensitive information concerning the card, or combinations thereof within a single or multi-panel carrier such that a breach of the package destroys the carrier. However, these packages have been vulnerable to breach by the use of a sharp instrument, such as a razor blade, to slice open the package at its sealed edge. The card and/or information are then accessed for skimming purposes, and the package is resealed, without evidence that it has been compromised.
Therefore, there remains a need for a way to prevent fraud relating to stored value cards that is effective, and inexpensive to implement, while at the same time not negating the convenience of stored value cards.
Embodiments of the inventions are directed to a stored value card and carrier assembly which includes a carrier formed from one or more panels, at least one inactive or active stored value card sandwiched and sealed within the carrier, and a label removably or permanently adhered or coupled to the card and/or permanently adhered or coupled to an interior of the carrier such that the bond to the carrier is greater than the bond to the card. The label may include a portion or an entirety of activation indicia, such as a barcode, either printed or otherwise applied thereon. In embodiments in which only a portion of the activation indicia is applied to the label, the remaining indicia is applied directly to the card, the carrier, or both.
In the event the card is removed from the carrier, the label remains coupled to the interior of the carrier and releases from the card such that any activation indicia remaining on the card, the carrier, and/or the label by itself is rendered unreadable by the cashier or scanner, such as a barcode scanner, thereby indicating evidence of tampering and a potentially compromised package. In embodiments in which the entirety of the activation indicia is applied to the label, the activation indicia is not scannable without accessing the interior of the carrier, such access indicating tampering. In yet other embodiments, if a portion of the activation indicia is printed on the carrier, the label with the remaining activation indicia remains coupled to the card, such that the incomplete portions of the activation indicia on the carrier and the card are rendered unreadable by themselves.
The above summary is not intended to describe each illustrated embodiment or every implementation of the subject matter hereof. The figures and the detailed description that follow more particularly exemplify various embodiments.
Subject matter hereof may be more completely understood in consideration of the following detailed description of various embodiments in connection with the accompanying figures, in which:
While various embodiments are amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the claimed inventions to the particular embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the subject matter as defined by the claims.
The embodiments described below are not intended to be exhaustive or to limit the invention to the precise forms disclosed in the following detailed description. Rather the embodiments are chosen and described so that others skilled in the art may appreciate and understand the entire disclosure.
In embodiments, a stored value card and carrier assembly employs one or more tamper evident labels and related methods. The label includes a portion or an entirety of the activation indicia, such as a barcode or QR code, either printed or otherwise applied thereon such that the activation indicia is complete and readable, such as by scanning. The label is secured to the card and the carrier, in which the bond to the carrier is stronger than the bond to the card. Upon removal of the card from the carrier, the label releases from the card, rendering the activation indicia unreadable or unscannable, and the card therefore cannot be activated, because the activation indicia or a portion thereof remains on the label secured within the carrier. In embodiments in which only a portion of the activation indicia is applied to the label, the remaining indicia is applied directly to the card, which is rendered incomplete and therefore unreadable when the label is removed.
In an alternative embodiment, a portion of the activation indicia is printed on a surface of the carrier and the remaining portion is printed on the label. When the label is positioned on the carrier, the activation indicia is complete and readable, such as by scanning. In this embodiment, the bond of the label to the card is stronger than to the carrier. Upon removal of the card from the carrier, the label remains coupled to the card, rendering the activation indicia portion printed on the label (and the remaining portion in the carrier) incomplete and unreadable such that the card, via scanning of the activation indicia of the carrier, cannot be activated.
Referring now to
A tamper evident label 114 is removably adhered to the card 104 in activation indicia field 107. Label 114 can be white, clear, foil, or any of a variety of colors and transparencies, and comprise a single or multi-ply poly label. An adhesive, such as a removable adhesive, covers at least a portion of an inner facing surface of label 114, which covers at least a portion of the activation indicia 108 printed thereon, without damaging card 104. In one embodiment, activation indicia 108 is completely printed (such as by drop on demand digital printing) or otherwise disposed on an outer facing surface of label 114. Activation indicia 108 on label 114, when coupled to card 104 is readable, such as by scanning, such that card 104 can be activated by a cashier upon purchase.
In another embodiment, as shown in
At least a portion of outer surface of label 114, with a portion or an entirety of activation indicia 108 applied thereto, also includes an adhesive 116, such as a permanent adhesive including hot glue, epoxy, radiation or moisture curable glue. For example, dots, stripes, coatings, or other patterns of a permanent adhesive are applied after and/or before printing of activation indicia 108. In yet another embodiment, ink used to form activation indicia 108 on label 114 doubles as a permanent adhesive that is activatable once applied to label 114.
As mentioned above, once label 114 and card 104 are assembled, activation indicia 108 is readable, such as by scanning, to activate the card upon purchase.
Referring now to
Carrier 120, as illustrated, can comprise an optional opening or aperture 124 such that a portion of card 104, such as activation indicia 108, can be viewable therethrough, and an aperture 130 completely through the carrier that can be used to hang the carrier in a retail establishment display. The shapes of the apertures shown are exemplary only and other shapes are also contemplated.
As depicted in
In an embodiment, and as depicted in
When card 104 is removed from carrier 120, such as before purchase and activation or after purchase and activation, label 114 remains secured to carrier 120, while releasing from card 104 such that only portion 108b of activation indicia 108 remains on card 104, and is therefore rendered unreadable for activation purposes or methods. Alternatively, if activation indicia 108 is entirely printed on label 114, no activation indicia 108 is accessible on card 104 when removed from carrier 120. In the event that the card has already been purchased and activated, activation indicia 108 is no longer needed. However, before purchase and activation, card 104 cannot be activated fraudulently and/or there is visual evidence that card 104 has been tampered with and may be compromised, thereby reducing the occurrence of fraud.
In another embodiment of the invention, and referring now to
Referring to
In an alternative embodiment of the invention, a release coating is not present and instead a suitable ink, such as a drop on demand ink, is used to form activation indicia 108 and has release properties such that it functions as a release coating and activation 108 remains adhered to label 114 upon removal of label 114 from card 104.
Referring now to
Card 604 with blank removable label 606, i.e. a removable label having no or partial activation indication imaged thereon, is coupled to first panel 602a. Panel 602b can optionally include a perforated or scored pull tab 612 for accessing card 604 in the region of label 606 for activation purposes, which will be described in more detail below.
Referring to
Referring to
However, as depicted in
Referring now to
Card 704 is coupled to inner panel 702c, which is then folded over to sandwich panel 702c and card 704 between panels 702a,b. To activate card 704, pull tab 708 is pulled back to reveal activation indicia 706. In most instances, human readable data, such as an alphanumeric sequence, is imaged under machine readable indicia, such as a bar code, which is related to or is an alternative to the machine readable indicia. For example, if the machine readable indicia is not readable, the alphanumeric code can be entered manually to active. However, in this embodiment, complete activation indicia 706 of card 704 includes only machine-readable indicia, such as a barcode, with partial to no human readable indicia related to or which can otherwise be used to reconstruct activation indicia 706. For example, card 704 may include a human readable tracking number 711 that is unrelated to activation indicia 706. By not including human readable indicia associated with machine readable activation indicia 706, it will be more difficult to reproduce a label with the entire activation indicia and place it on a card to commit fraud.
Referring now to
Referring now to
Card 904 having no activation indicia imaged thereon is coupled to first panel 902a. Panel 902b can optionally include a perforated or scored pull tab 912 for accessing card for activation purposes, which will be described in more detail below.
Referring to
Referring now to
In yet another embodiment of the invention, the label described in any of embodiments above includes perforations. Upon removal of the card from the carrier, the mode of failure is the perforations rather than or in combination with the adhesive coupling the label to the card. A portion of the label, including some or all of the activation indicia, remains coupled to the card and separates from the remaining label, rendering any remaining activation indicia on the card incomplete and unreadable.
In yet another embodiment of the invention, the label comprises at least a two part label with a release coating or breakaway layer coupling first and second plies of the label. An adhesive couples the base ply of the label to the card. At least a portion of the activation indicia is printed on a surface (such as an inner surface) of the breakaway ply or layer of the label, while permanent adhesive couples the outer surface of the breakaway ply to the carrier. Upon removal of the card from the carrier, the base ply remains coupled to card, while the breakaway layer with at least a portion of activation indicia thereon remains coupled to the carrier, rendering any activation indicia on the card incomplete and unreadable.
In any of the embodiments described herein, a label as described can be additionally or alternatively applied to any other feature of the card, such as, for example, a PIN, card code verification number (CCV), account identifying element, or any of a variety of features or combinations thereof.
Additional tamper evident packaging and/or labeling can be also be combined with embodiments described above including tamper evident labels as described in U.S. patent application Ser. No. 15/439,743, filed Feb. 22, 2017, and entitled “Stored Value Card and Carrier System with Tamper Evident Label,” which is incorporated herein by reference in its entirety, and U.S. Provisional Patent Application Nos. 62/397,907 filed Sep. 21, 2016; 62/406,319 filed Oct. 10, 2016; and 62/491,422 filed Apr. 28, 2017, all of which are entitled “Secure Packs for Transaction Cards,” and all of which are incorporated by reference in their entireties.
The carriers of embodiments described herein can be formed from any of a variety of materials including, for example, paper, paper with a heat sealable or non-rewettable polymer layer mounted to the inside of the panel, polymeric materials such as heat sealable or non-rewettable polymers, other synthetic materials with or without heat sealable or non-rewettable polymer layer(s) mounted to the inside of the panel, or combinations thereof. The non-rewettable polymer or polymer layer(s) can include, for example, can comprise amorphous polyethylene terephthalate, PETG, polycarbonate, polyethylene, or combinations thereof, and can be clear, opaque (color or white), semi-opaque (color or white), or combinations thereof. The inner and/or outer layers or surfaces of the panels can printed, decorated, embellished, or otherwise adorned by any of a variety of means including, but not limited to, conventional and/or digital printing, metallization, foil lamination, foil stamping, embossing, and/or screen printing.
The details regarding the components of these embodiments of the stored value card and carrier assembly of the invention are described in detail below:
In general, stored value cards according to embodiments are forms of transaction instruments associated with transaction accounts, in which the stored value cards provide cash equivalent value that may be used within an existing payment/transaction infrastructure. Stored value cards are frequently referred to as gift, pre-paid or cash cards, in that money is deposited in an account associated with the card before use of the cards is allowed. In general, such an account may be used for transactions between a user and a merchant through any suitable communication means, such as, for example, a telephone network, intranet, the global, public Internet, a point of interaction device, online communications, off-line communications, wireless communications, and the like. They may also be used in person at any point of sale (automated or not) that accepts them. The type of stored value card may be a gift card, loyalty card, credit or debit card, health card, phone card, pre-paid phone card, membership card, identification card, ring tone card, or any other type of card. The stored value card may be any such transaction instrument associated with any such transaction account.
The stored value card is typically the size and shape of a conventional credit card (i.e., CR80), although other sizes and shapes are possible, such as, for example, card and carrier embodiments depicted and described in U.S. Patent Application Publication No. 2016/0031624, incorporated by reference in its entirety above. The stored value card is commonly made of plastic, wood, or paper, however other materials, such as other synthetic or natural materials are also contemplated.
As discussed above, the stored value card includes an account identifying element (e.g. 108), such as a magnetic stripe, radiofrequency identification (RFID), bar code, QR code, text (recognized by Optical Character Recognition (OCR)), and/or smart chip, for example. The account identifying element is encoded with data, which includes a unique account number. If the stored value card includes a magnetic stripe, that magnetic stripe may comprise a plastic film including tiny magnetic particles that can be magnetized in certain directions to record data on the card, which may be read by a card reader. If the stored value card includes a bar code, the bar code may comprise machine-readable data, which may be alpha-numeric. Bar code data includes black and white lines arranged to represent a series of numbers (e.g., a bar code comprising a Universal Product Code (UPC) has twelve digits) to a bar code scanner (printed account identifying elements). Other current or future developed account identifying elements are also possible. Also, more than one account identifying element may be included on the stored value card, and in any location.
The stored value card may include embossed or non-embossed features, such as an account number, card issuer name or logo, card holder's name, expiration date, etc. An account identifying element(s) on the stored value card may be embossed (including at least one raised portion (e.g., letters, designs), or protuberance, etc.), or non-embossed.
An advantage of the embodiments is that currently existing carriers and stored value cards may be used without modification. The tamper evident label may simply be added to current carriers and cards to prevent fraud. Therefore, the cost of implementing such a change to existing systems is low.
Another advantage is that the tamper evident label indicates tampering or fraud by rendering activation indicia on the card and/or label unreadable, while the label does not damage the card when removed. As a result, the card and carrier remain attractive for gift-giving purposes after activation.
Yet another advantage is that the tamper evident label provides adequate adhesion, destructibility and removability. The label is also advantageously able to adhere to both a paper printed surface and a plastic card, the bond with the carrier being stronger than the bond with the card such that upon removal of the card from the package, the label releases from the card while remaining adhered to the package, or vice versa in alternative embodiments.
Generally, in embodiments, a stored value card and carrier assembly can comprise a carrier, a stored value card, and a tamper evident label, a first surface of the label being adhered to the stored value card, and a second opposite surface being adhered to the carrier. The label can include at least a portion of activation indicia, the activation indicia being readable to activate the stored value card, and removal of the stored value card from the carrier causes the label to remain coupled to one of the carrier or the card, rendering any remaining activation indicia on the other of the stored value card or carrier unreadable. An entirety of the activation indicia can be disposed on the label, and removal of the card from the carrier causes the label to release from the card and remain coupled to the carrier such that the activation indicia is not present on the card. Alternatively, a first portion of the activation indicia is disposed on the label, and a second portion of the activation indicia is disposed on the card, and removal of the card from the carrier causes the label to release from the card and remain within the carrier such that the activation indicia on the card is incomplete and unreadable. In yet another alternative embodiment, a first portion of the activation indicia is disposed on the label, and a second portion of the activation indicia is disposed on the carrier, and removal of the card from the carrier causes the label to release from the carrier and remain on the card such that the activation indicia on the carrier is incomplete and unreadable.
In certain non-limiting embodiments, the first surface of the label includes a removable adhesive for adhering the label to the card, and the second surface of the label includes a permanent adhesive for adhering the label to the carrier. A bond between the label and the carrier is stronger than a bond between the label and the card. Preferably, the removable adhesive is removable from the card without damaging the card. In certain non-limiting embodiments, the assembly does not include any complete alphanumeric human readable indicia related to the activation indicia.
In other embodiments, a stored value card and carrier assembly can comprise a carrier, a stored value card sandwiched within the carrier, a label, of which a first surface of the label being adhered to the stored value card, and activation indicia. The label can include a first portion of activation indicia, and the carrier can include a second portion of the activation indicia, the activation indicia in its entirety being machine- and/or human-readable to activate the stored value card, and removal of the stored value card from the carrier causes the first portion of the activation indicia to remain coupled to the card via the label, rendering the second portion on the carrier unreadable to activate the card. In certain non-limiting embodiments, the carrier includes structure defining an aperture, in which the first portion of the activation indicia is viewable through the aperture, and the second portion of the activation indicia is adjacent the aperture such that the first portion and the second portion are aligned and readable to activate the card.
The label can further include a third portion of the activation indicia spaced apart from the first portion, in which the carrier includes structure defining a second aperture spaced apart from the first aperture via a portion of the carrier extending therebetween, the second portion of the activation indicia being printed on the portion of the carrier. The third portion of the activation indicia can be viewable through the second aperture. In certain non-limiting embodiments, the carrier can comprise a first panel, a second panel, and a third panel, the card being coupled to the first panel, and the third panel includes structure defining an aperture. The second portion of the activation indicia is disposed on the third panel adjacent the aperture, and, when assembled, the third panel is sandwiched between the first panel containing the card and the second panel and the first portion of the activation indicia is viewable through the aperture, and the first and second portions of the activation indicia are aligned and readable to activate the card. The label can further include a third portion of the activation indicia spaced apart from the first portion, and the third panel includes structure defining a second aperture spaced apart from the first aperture via a portion of the third panel extending therebetween, the second portion of the activation indicia being printed on the portion of the third panel. The third portion of the activation indicia can be viewable through the second aperture, and is aligned with the first and second portions such that the activation indicia is readable to activate the card.
In certain non-limiting embodiments, the second panel includes structure defining a pull tab such that, when assembled, the pull tab obscures the at least one of the first and second portions of the activation indicia, and is configured to be pulled back to reveal the activation indicia in its entirety. In certain non-limiting embodiments, the first, second and third panels each include structure defining a tamper evident tear strip portion, such that, when assembled, the carrier includes a tamper evident tear strip along a single edge of the carrier, the tear strip being configured to be destructively removed to allow access to the card within the carrier. In certain non-limiting embodiments, the assembly does not include any complete alphanumeric human readable indicia related to the activation indicia.
In yet other embodiments, a stored value card and carrier assembly can comprise a multi-panel carrier including a first panel, a second panel, and a third panel extending from an edge of the first panel, a stored value card positioned on the first panel, a label, of which a first portion of the label is coupled to the third panel, and the third panel is foldable onto the first panel and a second portion of the label is coupled the card positioned on the first panel. When assembled, the first and second panels sandwich the third panel and card therebetween. The assembly can further comprise activation indicia, and the label includes a first portion of the activation indicia deposited thereon, and the card includes a second portion of the activation indicia deposited thereon. When the assembly is assembled, the first and second portions are aligned and the activation indicia is readable to activate the stored value card, and removal of the stored value card from the carrier causes the label having the first portion thereon to remain coupled to the third panel, rendering the second portion of the activation indicia on the card unreadable.
In certain non-limiting embodiments, the label comprises a polymeric label, the first portion of the label being adhered via a permanent adhesive to a free end of the third panel, and wherein the second portion of the label is coupled, optionally via a removable adhesive to the card. In certain non-limiting embodiments, the label and the third panel comprises a non-rewettable polymeric material, and the first portion of the label is heat sealed to a free end of the third panel, and the second portion of the label is coupled, optionally via a removable adhesive, to the card. In certain non-limiting embodiments, the first panel and second panel are foldable relative to each other to form front and back panels of the assembly. Alternatively, the first panel and second panel are discrete panels that when assembly, are adhered to each other to form front and back panels of the assembly. In certain non-limiting embodiments, the second panel includes structure defining a pull tab, such that, when assembled, the pull tab is configured to obscure at least one of the first and second portions of the activation indicia, and the pull tab is configured to be pulled back to reveal the first and second portions of the activation indicia. In certain non-limiting embodiments, a third portion of the activation indicia is deposited on the third panel, the third portion being aligned with the first and second portions when the assembly is assembled such that the activation indicia is readable to activate the card.
Various embodiments of assemblies, devices, and methods have been described herein. These embodiments are given only by way of example and are not intended to limit the scope of the claimed inventions. It should be appreciated, moreover, that the various features of the embodiments that have been described may be combined in various ways to produce numerous additional embodiments. Moreover, while various materials, dimensions, shapes, configurations and locations, etc. have been described for use with disclosed embodiments, others besides those disclosed may be utilized without exceeding the scope of the claimed inventions.
Persons of ordinary skill in the relevant arts will recognize that the subject matter hereof may comprise fewer features than illustrated in any individual embodiment described above. The embodiments described herein are not meant to be an exhaustive presentation of the ways in which the various features of the subject matter hereof may be combined. Accordingly, the embodiments are not mutually exclusive combinations of features; rather, the various embodiments can comprise a combination of different individual features selected from different individual embodiments, as understood by persons of ordinary skill in the art. Moreover, elements described with respect to one embodiment can be implemented in other embodiments even when not described in such embodiments unless otherwise noted.
Although a dependent claim may refer in the claims to a specific combination with one or more other claims, other embodiments can also include a combination of the dependent claim with the subject matter of each other dependent claim or a combination of one or more features with other dependent or independent claims. Such combinations are proposed herein unless it is stated that a specific combination is not intended.
Any incorporation by reference of documents above is limited such that no subject matter is incorporated that is contrary to the explicit disclosure herein. Any incorporation by reference of documents above is further limited such that no claims included in the documents are incorporated by reference herein. Any incorporation by reference of documents above is yet further limited such that any definitions provided in the documents are not incorporated by reference herein unless expressly included herein.
For purposes of interpreting the claims, it is expressly intended that the provisions of 35 U.S.C. § 112(f) are not to be invoked unless the specific terms “means for” or “step for” are recited in a claim.
This is application is a continuation of U.S. application Ser. No. 15/585,953 filed May 3, 2017, which claims the benefit of U.S. Provisional Application No. 62/331,016 filed May 3, 2016, each of which is hereby incorporated herein in its entirety by reference.
Number | Name | Date | Kind |
---|---|---|---|
2130488 | Funk | Sep 1938 | A |
2496856 | Cook, Jr. et al. | Feb 1950 | A |
3288281 | Sparks | Nov 1966 | A |
3773251 | Hadick | Nov 1973 | A |
4939992 | Bird | Jul 1990 | A |
5038936 | Borst | Aug 1991 | A |
5275285 | Clegg | Jan 1994 | A |
5400722 | Moses | Mar 1995 | A |
5419433 | Harrer et al. | May 1995 | A |
5489123 | Roshkoff | Feb 1996 | A |
5493801 | James | Feb 1996 | A |
5544741 | Fantone et al. | Aug 1996 | A |
5588526 | Fantone et al. | Dec 1996 | A |
5609253 | Goade, Sr. | Mar 1997 | A |
5650209 | Ramsburg et al. | Jul 1997 | A |
5660925 | Cooley et al. | Aug 1997 | A |
5760381 | Stich et al. | Jun 1998 | A |
5782347 | Fantone et al. | Jul 1998 | A |
5791474 | Hansen | Aug 1998 | A |
5833068 | Fantone | Nov 1998 | A |
5850913 | Fantone et al. | Dec 1998 | A |
5851630 | Davis, II | Dec 1998 | A |
5918909 | Fiala et al. | Jul 1999 | A |
5941382 | Fantone et al. | Aug 1999 | A |
5975302 | Young | Nov 1999 | A |
6109439 | Goade, Sr. | Aug 2000 | A |
6145665 | Krahn | Nov 2000 | A |
6178426 | Klein et al. | Jan 2001 | B1 |
6179119 | Manoogian | Jan 2001 | B1 |
6224108 | Klure | May 2001 | B1 |
6245382 | Shvartsman et al. | Jun 2001 | B1 |
6253820 | Landan et al. | Jul 2001 | B1 |
6286999 | Cappel et al. | Sep 2001 | B1 |
6328341 | Klure | Dec 2001 | B2 |
6349928 | Ko | Feb 2002 | B1 |
6439613 | Klure | Aug 2002 | B2 |
6454165 | Dawson | Sep 2002 | B1 |
6481994 | McCannel et al. | Nov 2002 | B1 |
6520329 | Fuchs et al. | Feb 2003 | B1 |
6543809 | Kistner et al. | Apr 2003 | B1 |
6588591 | Schabert et al. | Jul 2003 | B1 |
6601415 | Takinami | Aug 2003 | B2 |
6640974 | Malone | Nov 2003 | B2 |
6715795 | Klure | Apr 2004 | B2 |
6957737 | Frederickson et al. | Oct 2005 | B1 |
6964810 | McCannel et al. | Nov 2005 | B2 |
7117512 | Cahill | Oct 2006 | B1 |
7219829 | Treat | May 2007 | B2 |
7222797 | Davila et al. | May 2007 | B2 |
7300535 | McCannel et al. | Nov 2007 | B2 |
7441776 | Ustarbowski et al. | Oct 2008 | B2 |
7537168 | Anderson et al. | May 2009 | B2 |
7658282 | Costel | Feb 2010 | B2 |
7681732 | Moehlenbrock et al. | Mar 2010 | B2 |
7726477 | Gaither | Jun 2010 | B1 |
8292072 | Corey et al. | Oct 2012 | B2 |
8419889 | Smith | Apr 2013 | B2 |
8617673 | Desai et al. | Dec 2013 | B1 |
8807332 | Pascua et al. | Aug 2014 | B1 |
8833553 | Corey et al. | Sep 2014 | B2 |
8944470 | Mayrhofer et al. | Feb 2015 | B2 |
10275698 | Pascua et al. | Apr 2019 | B2 |
10276070 | Pascua et al. | Apr 2019 | B2 |
10565486 | Pascua et al. | Feb 2020 | B2 |
20020088855 | Hodes | Jul 2002 | A1 |
20020157973 | Preisler | Oct 2002 | A1 |
20030004889 | Fiala et al. | Jan 2003 | A1 |
20030018586 | Krahn | Jan 2003 | A1 |
20030028439 | Cox et al. | Feb 2003 | A1 |
20030080013 | Smith | May 2003 | A1 |
20030150762 | Biller | Aug 2003 | A1 |
20030234191 | Belden, Jr. et al. | Dec 2003 | A1 |
20040008613 | Beckwith et al. | Jan 2004 | A1 |
20040151880 | Nakamura et al. | Aug 2004 | A1 |
20050001422 | O'Keefe | Jan 2005 | A1 |
20050045503 | Wong et al. | Mar 2005 | A1 |
20050045732 | Whitaker | Mar 2005 | A1 |
20050061759 | Doucette | Mar 2005 | A1 |
20050199516 | Laarman | Sep 2005 | A1 |
20050205442 | Spagna | Sep 2005 | A1 |
20050279143 | Belden, Jr. et al. | Dec 2005 | A1 |
20050279825 | Ashby et al. | Dec 2005 | A1 |
20060207896 | Shiga | Sep 2006 | A1 |
20060243794 | Whitaker | Nov 2006 | A1 |
20060246984 | Walker et al. | Nov 2006 | A1 |
20060256413 | Kitamura | Nov 2006 | A1 |
20070098900 | Abe | May 2007 | A1 |
20070144044 | Kershner et al. | Jun 2007 | A1 |
20070246527 | Tang | Oct 2007 | A1 |
20070278114 | Kane et al. | Dec 2007 | A1 |
20080030864 | Gougeon et al. | Feb 2008 | A1 |
20080088126 | Hoffman et al. | Apr 2008 | A1 |
20080088931 | Hoffman | Apr 2008 | A1 |
20080116089 | Roberts | May 2008 | A1 |
20080150174 | Raymond et al. | Jun 2008 | A1 |
20080213528 | Hoffman | Sep 2008 | A1 |
20090078590 | Smith | Mar 2009 | A1 |
20090107862 | Pascua et al. | Apr 2009 | A1 |
20090277808 | Payne | Nov 2009 | A1 |
20100156087 | Raming | Jun 2010 | A1 |
20100193583 | Tartavull et al. | Aug 2010 | A1 |
20100213092 | Swain | Aug 2010 | A1 |
20100224516 | Abell | Sep 2010 | A1 |
20100326011 | Norling et al. | Dec 2010 | A1 |
20110031148 | Rosendall et al. | Feb 2011 | A1 |
20110132783 | Williams et al. | Jun 2011 | A1 |
20120145578 | Pazlar et al. | Jun 2012 | A1 |
20120256006 | Schmitt | Oct 2012 | A1 |
20120273576 | Tomczyk et al. | Nov 2012 | A1 |
20120280043 | Roseman | Nov 2012 | A1 |
20130068642 | Corey et al. | Mar 2013 | A1 |
20130294602 | Huxham et al. | Nov 2013 | A1 |
20140262872 | Helm | Sep 2014 | A1 |
20150353237 | Haedt et al. | Dec 2015 | A1 |
20160005031 | O'Regan et al. | Jan 2016 | A1 |
20160031624 | Pascua et al. | Feb 2016 | A1 |
20160332789 | Yerecic | Nov 2016 | A1 |
20170103294 | Smith | Apr 2017 | A1 |
20170243098 | Pascua et al. | Aug 2017 | A1 |
20170323191 | Pascua | Nov 2017 | A1 |
20180079248 | Pascua et al. | Mar 2018 | A1 |
20190251872 | Pascua et al. | Aug 2019 | A1 |
Entry |
---|
Application and File History for U.S. Appl. No. 15/439,743, filed Feb. 22, 2017, inventors Shelle B. Pascua et al. |
Application and File History for U.S. Appl. No. 15/711,766, filed Sep. 21, 2017, inventors Shelle B. Pascua et al. |
Application and File History for U.S. Appl. No. 16/397,372, filed Apr. 29, 2019, inventors Shelle B. Pascua et al. |
Application and File History for U.S. Appl. No. 15/585,953, filed May 3, 2017, inventors Shelle B. Pascua et al. |
Bloomberg M., “Introducing RiverBorne™ Communications,” Copyright 2000, 17 pages. |
“SlingShot CD Package,” 2000, 2 pages. |
Printout of Various Lenticular Packaging Options, at least as of Nov. 13, 2009, 3 pages. |
Number | Date | Country | |
---|---|---|---|
20190251413 A1 | Aug 2019 | US |
Number | Date | Country | |
---|---|---|---|
62331016 | May 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15585953 | May 2017 | US |
Child | 16397465 | US |