This application relates generally to stored value cards, and more particularly relates to a system used for packaging such cards to indicate any tampering with the cards done for fraudulent purposes.
Stored value cards, which may also be known as gift cards, debit cards, loyalty or reward cards, identification cards, prepaid cards, shopping cards or fare cards, prepaid MasterCard™ and Visa™ cards (instant issue) among other names, are very popular with both consumers and retailers. The wide appeal of stored value cards, as a result, has attracted the unwelcome attention of criminals seeking to exploit the conveniences and automated processes afforded by such cards. In particular, such criminals misappropriate and manipulate stored value cards and associated account information to perform fraudulent transactions. Stored value card fraud is typically perpetrated in the form of either at the physical point of sale (POS) or “card present” fraud, or for virtual POS purchases or “card not present” (CNP) fraud. The latter includes transactions, such as in e-commerce or internet purchases, which cannot be authenticated using “standard” processes used at the physical POS.
A stored value card is typically the size and shape of a conventional credit card (CR80 Card), but it may be other shapes and sizes as well, and includes a magnetic stripe, bar code, alpha/numeric, or other similar activation method, account identifying element, or means for using the card. The stripe, code, account identifying element, etc. on the card is encoded with data, which includes a unique account number. The account identifying element, for example, may be visible while the card is secured in or secured to packaging, such that the account identifying element may be used during the purchase and activation of the card.
Commonly, stored value cards are displayed by retailers for purchase by customers. The cards are stored in an active or inactive state. In the inactive state, the card cannot be used to purchase goods or services until the card has been activated. For example, one or more cards may be contained in a carrier, in which the card(s) and/or carrier includes an activation code associated with the card(s). The carrier obscures other card information, such as the card identification number, account identification number, and/or PIN until the carrier is opened and the card is removed.
A customer may have a card activated by bringing a card to a cashier and having the cashier then, for example, swipe the card through a point of sale terminal, which may add value to the card in exchange for payment, or activate value already on the card. In this context, the “swipe” action could involve passing a card (or its packaging) though a magnetic strip reader/writer; or passing the card or package over a barcode scanner; or putting the card or package in the vicinity of a proximity reader/writer (such as, for example, an RFID reader/writer or NFC reader), or any other equivalent activation technique. A balance on the card may be maintained within a computer system located at the point of sale or at a remote location. A holder of the stored value card may then use the card to purchase goods and/or services immediately or over time up to the value of the card. These current procedures relating to stored value cards, although providing convenience to consumers, leave the cards vulnerable to criminals. If the card is stored in an active state, the card does not need to be activated, and is ready for use upon extracting the card from the package. If the card is stored in the active state, however, the card, data, and value on the account may be even more vulnerable.
One particular fraud that is perpetuated by criminals with regard to stored value cards is called “skimming.” Skimming is a serious problem resulting in significant loss to both retailers and consumers, and applies to both card present and CNP fraud. To skim a card having a magnetic stripe holding account information, for example, a criminal will purchase a stored value card from a retailer, thereby causing an account associated with the card to become activated. The criminal will then remove additional cards from the store that have not yet been activated, and will then alter magnetically stored information on the inactivated cards to match that of the activated card. As such, all of the altered, inactivated cards will have the magnetic information that identifies the account of the originally purchased card. The criminal will then return the altered cards to the store shelf where unsuspecting customers seeking to purchase a stored value card will unknowingly place money into the account of the criminal holding the originally purchased card. The unsuspecting customer may attempt to use their card and will be told that it has no associated value or has a smaller value than thought.
Alternatively, a criminal will remove at least two cards from the location or store of a retailer unbeknownst to the retailer. The magnetically stored information of the first card is altered to match the magnetically stored information of the second card. The first card is returned to the store, again unbeknownst to the retailer. When the first card is subsequently purchased and activated, it also activates the second card which is in the possession of the criminal.
In either case, the retailer may be able to verify that the customer did not use the value associated with the stored value card, and in the interest of customer service, may restore the value to the customer. In that case, the retailer loses the money. However, in some cases, there may be no way to prove fraud and the customer may lose up to the entire value.
Another fraud perpetuated by criminals is carried out by the criminal viewing stored value cards in the store. The criminal writes down the code associated with the particular stored value card (such as a credit card type number) while it is still in the store. In such situations the code is in plain view of the criminal or may be easily viewed without altering the card packaging. Once the criminal has recorded the code, the criminal waits for a period of time, assuming that an unsuspecting customer will purchase and have the card activated during that time. The criminal then periodically checks to see if they are able to make purchases, such as online purchases (CNP fraud), by attempting to use the card code. If the card has been activated by the true purchaser, the criminal will be able to purchase goods online using the activated code, thereby stealing the balance on the card from the true purchaser.
Criminals may perpetuate the above-described frauds or other frauds with regard to stored value cards as they sit on store shelves today. Thus, there is a need for a way to protect such cards and insure that they have not been tampered with or duplicated prior to purchase or activation by an innocent consumer.
There have been proposals and attempts to reduce the occurrence of fraud associated with stored value cards. For example, modifications to card readers or other parts of the activation process have been proposed, but changing existing systems in such ways involves significant cost. Additional steps have been added to the activation process for some cards, such as steps involving pin numbers and web access. However, additional steps reduce the level of convenience that such cards provide to consumers. Overall, there is a need for a way to prevent fraud relating to stored value cards that is effective, and inexpensive to implement, while at the same time not negating the convenience of stored value cards.
In one aspect, a stored value card and carrier system comprises a carrier, at least one inactive or active stored value card attached to or otherwise contained within the carrier and a label, in which the label is removable adhered to one or more of a portion of the stored value card, at least a portion of the carrier, or another surface of the system such as an insert or panel sandwiched within the carrier. The label is designed, such that if removed, the label indicates tampering. Specifically, at least partial removal of the label optically indicates tampering with the system.
In a second aspect, a tamper evident label comprises a layer capable of indicating tampering; a layer of removable adhesive proximate the tamper indicating layer; and a lamination layer and/or a printable film or coating layer(s) proximate the tamper indicating layer and opposite the removable adhesive layer. In some embodiments, the lamination layer and/or printable layer(s) are removable from the underling tamper indicating layer via a release layer or breakaway coating layer.
In the embodiments, a tamper evident label is irreversibly destroyed upon removal of the label from the card, carrier, and/or insert to which it is attached. The label cannot be copied or replaced such that tampering or removal of the card prior to activation is evident.
The above summary is not intended to describe each illustrated embodiment or every implementation of the subject matter hereof. The figures and the detailed description that follow more particularly exemplify various embodiments.
Subject matter hereof may be more completely understood in consideration of the following detailed description of various embodiments in connection with the accompanying figures, in which:
While various embodiments are amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the claimed inventions to the particular embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the subject matter as defined by the claims.
The embodiments described below are not intended to be exhaustive or to limit the invention to the precise forms disclosed in the following detailed description. Rather the embodiments are chosen and described so that others skilled in the art may appreciate and understand the entire disclosure.
In one embodiment, a stored value card and carrier system employs one or more tamper evident labels and related methods. Another embodiment is the tamper evident label itself. Before describing in detail the stored value card and carrier system and related methods, and the tamper evident label, it should be observed that the invention is not limited to the particular embodiments depicted in the exemplary figures or described in this application.
An advantage of these embodiments is that currently existing carriers and stored value cards may be used without modification. The tamper evident label may simply be added to current carriers and cards to prevent fraud. Therefore, the cost of implementing such a change to existing systems is low.
Another advantage is that the tamper evident label indicates tampering or fraud by incurring damage upon removal from the card, insert if present, and/or carrier if present, but the label does not damage the card and/or carrier when removed. As a result, the card and carrier remain attractive for gift-giving purposes after activation.
Yet another advantage is that the tamper evident label provides adequate adhesion, destructibility and removability. The label is also advantageously able to adhere to both a paper printed surface and a plastic card.
Referring now to
An inactive or active stored value card 110 (shown in outline) is attached to the carrier 120. The card 110 includes at least one account identifying element (not shown). The means for attaching the card 110 to the carrier 120 is not shown, but may be any suitable means, such as a line or dots of adhesive, for example, or a pocket added to (or formed in or by) the carrier 120.
A tamper evident label 140 is adhered to the card 110 and carrier 120 such that the card 110 is completely enclosed in between the label 140 and the carrier 120. In this embodiment, the card 110 is completely enclosed as shown to provide the most protection from fraud for the card 110. However, label 140 may be adhered to only a portion of the card 110 in addition to a portion of the carrier 120. The label 140 is removable adhered to the card 110 and carrier 120 such that removal does not damage the card 110 and carrier 120. However, label 140 is damaged or distorted if removed or tampered with.
The details regarding the components of these embodiments of the stored value card and carrier system of the invention are described in detail below.
In the system 200, a tamper evident label 240 is adhered to the carrier 220 and card 210. The label 240 completely covers the card 210 in the embodiment shown, although label 240 may be adhered to only a portion of the card 210 in addition to a portion of the carrier 220. The label 240 adds further protection to the card 210 from fraud. Even if a fraudulent actor is able to open and re-seal the carrier 220, any tampering would be evident on account of the presence of the tamper evident label 240.
The card 510 is attached to the carrier 520 by any suitable means. The carrier 520 includes an opening or aperture 528 through which a portion of the card 510 shows through. A tamper evident label 540 is adhered to the carrier 520 and card 510 (seen in
In another embodiment, and referring to
In yet another embodiment (not shown), the card and/or label is coupled to an insert or separate panel that is inserted between the panels of the carrier. In this embodiment, the label is viewable from an exterior of the carrier via a window formed in the carrier, such as an aperture with or without a transparent material formed over the aperture. In this embodiment, tampering is evident via distortion or destruction of the label viewable through the opening.
In general, stored value cards are forms of transaction instruments associated with transaction accounts, in which the stored value cards provide cash equivalent value that may be used within an existing payment/transaction infrastructure. Stored value cards are frequently referred to as gift, pre-paid or cash cards, in that money is deposited in an account associated with the card before use of the cards is allowed. In general, such an account may be used for transactions between a user and a merchant through any suitable communication means, such as, for example, a telephone network, intranet, the global, public Internet, a point of interaction device, online communications, off-line communications, wireless communications, and the like. They may also be used in person at any point of sale (automated or not) that accepts them. The type of stored value card may be a gift card, loyalty card, credit or debit card, health or insurance card, phone card, pre-paid phone card, membership card, identification card, ring tone card, or any other type of card. The stored value card may be any such transaction instrument associated with any such transaction account.
The stored value card is typically the size and shape of a conventional credit card (i.e., CR80), although other sizes and shapes are possible, such as, for example, embodiments depicted and described in U.S. Patent Application Publication No. 2016/0031624, entitled “Tamper Evident Secure Pack with Anchored Card Carrier” and incorporated herein by reference in its entirety. The stored value card is commonly made of plastic, wood, bamboo, or paper, however other materials, such as other synthetic or natural materials are also contemplated.
The stored value card includes an account identifying element, such as a magnetic stripe, radiofrequency identification (RFID), bar code, QR code, text (recognized by Optical Character Recognition (OCR)), smart chip, for example. The account identifying element is encoded with data, which includes a unique account number. If the stored value card includes a magnetic stripe, that magnetic stripe may comprise a plastic film including tiny magnetic particles that can be magnetized in certain directions to record data on the card, which may be read by a card reader. If the stored value card includes a bar code or QR code, the bar code may comprise machine-readable data, which may be alpha-numeric. Bar code data includes black and white lines arranged to represent a series of numbers (e.g., a bar code comprising a Universal Product Code (UPC) has twelve digits) to a bar code scanner (printed account identifying elements). Other current or future developed account identifying elements are also possible. Also, more than one account identifying element may be included on the stored value card, and in any location.
The stored value card may include embossed or non-embossed features. An account identifying element(s) on the stored value card may be embossed (including at least one raised portion (e.g., letters, designs), or protuberance, etc.), or non-embossed.
The stored value card is generally secured to the carrier such that account identifying elements or information (e.g. card or account identification number, PIN, etc.) is adjacent to the carrier, such that the account identifying elements or information are/is not able to be viewed, and only the activation data that is associated with the card or correlated to the account identifying elements is accessible, while the card is attached to the carrier. The stored value card has two sides and is preferably attached to the carrier such that the side including the account identifying element is facing the carrier. The card is securely attached by a suitable adhesive or attachment means (not shown). The activation indicia, such as a barcode or magnetic strip, can be on the carrier, the card, an optional insert, the label, or any combination thereof.
In an alternative embodiment of the invention, the assembly does not include a stored value card. Rather, sensitive information regarding a stored value or transaction account is secured within a tamper evident carrier with label as described above. Sensitive information related to the account can include, but is not limited to, account indentifying elements, activation indicia, PIN, account number, and/or an account user's information. One or more labels, as described herein, are coupled to the carrier to obscure the sensitive information, or at least a portion thereof. Upon purchase of the carrier, the one or more labels can be removed without destroying the readability (human or machine) of the sensitive information.
The carrier includes one or more panels, as shown in
While not shown in
In order to form the tamper evident label and release liner combination 700, first, a suitable foil is provided. Next, a removable adhesive layer 706 is applied to one side of the foil, such as the composite foil of layers 702-705. The removable adhesive layer 706 preferably comprises an ultra removable hot melt pressure sensitive adhesive. Preferably, the removable adhesive is a fugitive (i.e., removable) adhesive manufactured by Northwest Adhesive, Inc. of Vancouver, Wash., U.S.A. Preferably, the removable adhesive layer 706 can be rubbed off or otherwise removed easily after the clear polyester lamination layer and break-away coating layers (701, 702) break away from the cold foil and adhesive of the tamper evident label. Other adhesives are also possible. Preferably the removable adhesive layer 706 has a thickness of in the range of about 0.0003 to about 0.001 in. (0.0254 mm).
The next step is to apply a release liner 707 to the removable adhesive layer 706 opposite the composite foil layer (702-705). A preferred release liner material is 38367060 gram glassine “easy release” pressure sensitive release liner (available from Wausau Papers in Mosinee, Wis., U.S.A.).
Next, any desired printing or graphics on the construction described above are added to the free side of composite foil layer (702-705).
The next step is to add the lamination layer 701 to the printing or graphics or to the free side of the composite foil layer (702-705), if no printing or graphics are added. The lamination layer 701 is preferably a polypropylene film with pressure sensitive adhesive (self adhesive), but could also be a polystyrene or a polyester, for example. A preferred pressure sensitive polypropylene is manufactured by Sekisui Ta Industries L.L.C. (Garden Grove, Calif., U.S.A.). The lamination layer 701 is provided preferably to give the label some rigidity for desired applications. The preferred rigidity of the lamination layer 701 is higher than the rigidity of the cold foil layer (702-705). Preferably, the lamination layer 701 has a thickness in the range of approximately 48 gauge (approximately 0.0005 inches) to approximately 0.003 inch, most preferably about 0.002 in. (0.0508 mm).
The layers described above are laminated together. The next steps in preparing the label include die-cutting the layered material and removing surrounding waste material.
In another embodiment of the invention, and referring to
Adhesive layer 803 comprises a higher tack adhesive than removable adhesive 706 described above. This allows for a sufficient bond of the label 800 to the card and/or carrier, while leaving virtually no or little residue on the card and/or carrier when the label is removed, or residue that is easily rubbed off. Such adhesive is available, for example, from Henkel Adhesives North America. The combination of the stronger tack adhesive layer 803 and the etched foil layer 802 enhances the security and tamper evident characteristics because after the label 800 is applied, when being removed, the security verbiage and/or graphics printed on or etched into the foil layer 802 will stretch, due to the strong bond to the substrate via layer 803, and may even become unreadable. Even if the label is attempted to be reapplied, evidence of tampering will be clear due to the stretched nature of the label.
One of ordinary skill in the art would also recognize that adhesive layer 803 can be used in replace of removable adhesive 706 of the previous embodiments. In addition, holographic engraving layer 704 and/or a holographic metallization layer 705 can also be etched or printed with custom or security features.
In an alternative embodiment of the invention (not shown), the label includes a portion, such as a partial layer, of permanent adhesive that remains on the card after removal of the label. The permanent adhesive can include indicia, such as proprietary text or graphics, thereon or embedded within (printed film encapsulated within adhesive) to provide enhance security and authentication to the card. The label in this instance is placed on the card in an area where the permanent adhesive does not remain on the activation indicia so that the card can be activated when the label is removed. In other embodiments, the permanent adhesive is sufficiently translucent or transparent such that activation indicia, e.g. barcode, remains readable under the permanent adhesive layer.
In another embodiment, and referring to
In yet another embodiment, and referring to
In embodiments, the overall thickness of the label can range from about 0.5 to 30 mils or more, depending on the application.
In embodiments, the label can include a “dead” or flat portion, with no security features and/or adhesive thereon, that extends from an edge of the label. This portion acts as a pull-tab to facilitate removal of the label when purchased.
While the descriptions above refer to the preferred use of holographic materials, materials which embody alternative optical phenomena (e.g., lenticular, fly's eye, or other lens materials) may be used. Similarly, it is possible for only a portion of the label to be tamper evident material while another portion is deliberately chosen to remain on the card or carrier after removal of the label by way of a permanent adhesive associated with that portion of the label only. For example, a star-shaped permanent portion of the label could be designed to remain on the card, the carrier (or multiple portions could remain on both) to indicate brand identity, or serve as additional verification of authenticity of the card.
Now referring to
Upon purchase, a cashier opens pull-tab 1004 to expose label 1006 and activation indicia 1005. In the event label 1006 indicates evidence of tampering (e.g. stretched or distorted label, or removed altogether), the cashier does not activate the card. If there is no evidence of tampering, the cashier removes label 1006, such as by peeling and then rubbing, to expose the entirety of activation indicia 1005, and scans or otherwise reads activation indicia 1005 to activate card 1003 within. Preferably label 1006 comes completely off so as not to affect the readability of indicia 1005. The assembly 1000 can then be opened, such as by tab 1007, after purchase to access card 1003.
Referring to
Upon purchase, a cashier opens pull-tab 1107 to reveal label 1104 and activation indicia 1105. In the event pull-tab 1107 and/or label 1104 indicates evidence of tampering (e.g. stretched or distorted label, or removed altogether), the cashier does not activate card 1103. If there is no evidence of tampering, the cashier removes label 1104, such as by peeling and then rubbing, to expose the entire of activation indicia 1105, and scans or reads activation indicia 1105 to activate card 1103 within. Preferably label 1104 comes completely off so as not to affect the readability of indicia 1105. The assembly 1100 can then be opened after purchase to access card 1103.
Referring to
Upon purchase, if label 1206 indicates evidence of tampering (e.g. stretched or distorted label, or removed altogether), the cashier does not activate card 1203. If there is no evidence of tampering, the cashier removes label 1206, such as by peeling and then rubbing, to expose the entirety of activation indicia 1205, and scans or reads activation indicia 1205 to activate card 1203 within. Preferably label 1206 comes completely off so as not to affect the readability of indicia 1205. The assembly 1200 can then be opened after purchase to access card 1203.
While the descriptions above specifically illustrate tamper evident labels used to attach the card to the carrier, such labels could also be used to indicate tampering of the carrier itself, particularly in embodiments of the carrier that are folded or otherwise joined together such that it is desirable to indicate whether the carrier package has been the subject of attempts to open or otherwise tamper with it. Thus, the tamper evident label material could be used to adhere panels together. Yet another option is to use both a conventional adhesive and the tamper proof label to join the panels together, the latter for additional security.
In a similar manner, it should be understood that the tamper evident label serves not only to indicate attempted tampering in embodiments in which a card is attached to a carrier by separate adhesive, but also to affix or otherwise attach the card to the carrier itself without the use of a separate adhesive. In particular, the card could be is attached to the carrier within the folded-up package, although this might prevent someone from seeing the label prior to opening the package and thus minimize the value of a tamper evident label.
In the context of the embodiments described above, tampering may be detected by one or more of stretching or other physical distortion of the label; or by changes in the appearance of the optical pattern incorporated into the label; or both, as the case may be. In this regard, tampering may be detected by visually comparing a known sample of unaltered label material with a sample suspected of tampering, and noting the nature and degree of differences in accordance with the understanding of one skilled in the art. For example, in the case of holograms, it is common in the art to use relatively small, finely detailed and highly repetitive patterns or security-related messages (e.g., “Genuine” or “Original”), or can include indicia such as graphics, logos, and/or text identifying the issuer of the card or servicers of the account. Distortion to such patterns and messages are quickly identifiable as evidence of tampering. In addition, optical phenomena such as lenticularity and holography are carefully designed to exhibit distinctive optical effects such as changing images or iridescence (change in observed hue with change in viewing angle). Such effects are substantially altered, if not destroyed, when the tamper evident label is even slightly stretched, wrinkled, or otherwise distorted.
Various embodiments of systems, devices, and methods have been described herein. These embodiments are given only by way of example and are not intended to limit the scope of the claimed inventions. It should be appreciated, moreover, that the various features of the embodiments that have been described may be combined in various ways to produce numerous additional embodiments. Moreover, while various materials, dimensions, shapes, configurations and locations, etc. have been described for use with disclosed embodiments, others besides those disclosed may be utilized without exceeding the scope of the claimed inventions.
Persons of ordinary skill in the relevant arts will recognize that the subject matter hereof may comprise fewer features than illustrated in any individual embodiment described above. The embodiments described herein are not meant to be an exhaustive presentation of the ways in which the various features of the subject matter hereof may be combined. Accordingly, the embodiments are not mutually exclusive combinations of features; rather, the various embodiments can comprise a combination of different individual features selected from different individual embodiments, as understood by persons of ordinary skill in the art. Moreover, elements described with respect to one embodiment can be implemented in other embodiments even when not described in such embodiments unless otherwise noted.
Although a dependent claim may refer in the claims to a specific combination with one or more other claims, other embodiments can also include a combination of the dependent claim with the subject matter of each other dependent claim or a combination of one or more features with other dependent or independent claims. Such combinations are proposed herein unless it is stated that a specific combination is not intended.
Any incorporation by reference of documents above is limited such that no subject matter is incorporated that is contrary to the explicit disclosure herein. Any incorporation by reference of documents above is further limited such that no claims included in the documents are incorporated by reference herein. Any incorporation by reference of documents above is yet further limited such that any definitions provided in the documents are not incorporated by reference herein unless expressly included herein.
For purposes of interpreting the claims, it is expressly intended that the provisions of 35 U.S.C. §112(f) are not to be invoked unless the specific terms “means for” or “step for” are recited in a claim.
The present application claims the benefit of U.S. Provisional Application No. 62/298,278 filed Feb. 22, 2016, which is hereby incorporated herein in its entirety by reference.
Number | Date | Country | |
---|---|---|---|
62298278 | Feb 2016 | US |