This application relates generally to stored value cards, and more particularly relates to activation indicia systems to indicate any tampering with the cards done for fraudulent purposes.
Stored value cards, which may also be known as gift cards, debit cards, loyalty or reward cards, identification cards, prepaid cards, refund or return cards, shopping cards or fare cards, prepaid MasterCard™ and Visa™ cards (instant issue) among other names, are very popular with both consumers and retailers. The wide appeal of stored value cards, as a result, has attracted the unwelcome attention of criminals seeking to exploit the conveniences and automated processes afforded by such cards. In particular, such criminals misappropriate and manipulate stored value cards and associated account information to perform fraudulent transactions. Stored value card fraud is typically perpetrated in the form of either at the physical point of sale (POS) or “card present” fraud, or for virtual POS purchases or “card not present” (CNP) fraud. The latter includes transactions, such as in e-commerce or internet purchases, which cannot be authenticated using “standard” processes used at the physical POS.
A stored value card is typically the size and shape of a conventional credit card (CR80 Card), but it may be other shapes and sizes as well, and includes a magnetic stripe, bar code, alpha/numeric, or other similar activation method, account identifying element, or means for using the card. The stripe, code, account identifying element, etc. on the card is encoded with data, which includes a unique account number. The account identifying element, for example, may be visible while the card is secured in or secured to packaging, such that the account identifying element may be used during the purchase and activation of the card.
Commonly, stored value cards are displayed by retailers for purchase by customers. Another use of stored value cards is as refund or return cards used to give customers value or store credit when they are returning merchandise without a receipt, after expiration of the return date, or for other reasons. In these circumstances, instead of giving the customer cash, the customer gets a debit card or stored value card with the corresponding value of the return loaded onto the card.
The cards are stored in an active or inactive state. In the inactive state, the card cannot be used to purchase goods or services until the card has been activated. For example, one or more cards may be contained in a carrier, in which the card(s) and/or carrier includes an activation code associated with the card(s). The carrier and/or packaging or other security elements obscures other card information, such as the card identification number, account identification number, and/or PIN until the carrier is opened and the card is removed.
A customer may have a card activated by bringing a card to a cashier and having the cashier then, for example, swipe the card through a point of sale terminal, which may add value to the card in exchange for payment, or activate value already on the card. In this context, the “swipe” action could involve passing a card (or its packaging) though a magnetic strip reader/writer; or passing the card or package over a barcode scanner; or putting the card or package in the vicinity of a proximity reader/writer (such as, for example, an RFID reader/writer or NFC reader), or any other equivalent activation technique. A balance on the card may be maintained within a computer system located at the point of sale or at a remote location. A holder of the stored value card may then use the card to purchase goods and/or services immediately or over time up to the value of the card. These current procedures relating to stored value cards, although providing convenience to consumers, leave the cards vulnerable to criminals. If the card is stored in an active state, the card does not need to be activated, and is ready for use upon extracting the card from the package. If the card is stored in the active state, however, the card, data, and value on the account may be even more vulnerable.
One particular fraud that is perpetuated by criminals with regard to stored value cards is called “skimming.” Skimming is a serious problem resulting in significant loss to both retailers and consumers, and applies to both card present and CNP fraud. To skim a card having a magnetic stripe holding account information, for example, a criminal will purchase or otherwise obtain a stored value card from a retailer, thereby causing an account associated with the card to become activated. The criminal will then remove additional cards from the store that have not yet been activated, and will then alter magnetically stored information on the inactivated cards to match that of the activated card. As such, all of the altered, inactivated cards will have the magnetic information that identifies the account of the originally purchased card. The criminal will then return the altered cards to the store shelf where unsuspecting customers seeking to purchase a stored value card will unknowingly place money into the account of the criminal holding the originally purchased card. The unsuspecting customer may attempt to use their card and will be told that it has no associated value or has a smaller value than thought.
Alternatively, a criminal will remove at least two cards from the location or store of a retailer unbeknownst to the retailer. The magnetically stored information of the first card is altered to match the magnetically stored information of the second card. The first card is returned to the store, again unbeknownst to the retailer. When the first card is subsequently purchased and activated, it also activates the second card which is in the possession of the criminal.
This fraud may also be perpetrated by swapping activation indicia, such as a barcode. For example, the criminal removes two cards from the location or store of a retailer. The activation indicia of the second card is copied and placed on the first card. The first card is then returned to the store. When the first card is subsequently purchased and activated, it also activates the second card which is in the possession of the criminal.
In either case, the retailer may be able to verify that the customer did not use the value associated with the stored value card, and in the interest of customer service, may restore the value to the customer. In that case, the retailer loses the money. However, in some cases, there may be no way to prove fraud and the customer may lose up to the entire value.
Another fraud perpetuated by criminals is carried out by the criminal viewing stored value cards in the store. The criminal writes down the code associated with the particular stored value card (such as a credit card type number) while it is still in the store. In such situations the code is in plain view of the criminal or may be easily viewed without altering the card packaging. Once the criminal has recorded the code, the criminal waits for a period of time, assuming that an unsuspecting customer will purchase and have the card activated during that time. The criminal then periodically checks to see if they are able to make purchases, such as online purchases (CNP fraud), by attempting to use the card code. If the card has been activated by the true purchaser, the criminal will be able to purchase goods online using the activated code, thereby stealing the balance on the card from the true purchaser.
Criminals may perpetuate the above-described frauds or other frauds with regard to stored value cards as they sit on store shelves today. Thus, there is a need for a way to protect such cards and insure that they have not been tampered with or duplicated prior to purchase or activation by an innocent consumer.
There have been proposals and attempts to reduce the occurrence of fraud associated with stored value cards. For example, modifications to card readers or other parts of the activation process have been proposed, but changing existing systems and/or activation methods in such ways involves significant cost and inconvenience to the retailer. Additional steps have been added to the activation process for some cards, such as steps involving pin numbers and web access. However, additional steps reduce the level of convenience that such cards provide to consumers. Overall, there is a need for a way to prevent fraud relating to stored value cards that is effective, and inexpensive to implement, while at the same time not negating the convenience of stored value cards.
In one embodiment, a stored value card with two-step tamper evident activation system generally includes an inactive stored value card having first activation indicia, such as a barcode, account number, and/or serial number thereon, and a removable label at least partially covering the activation indicia. A second activation indicia, and optional serial number, is printed or otherwise applied on a reverse side of the label, such that when the label is adhered to the card or card carrier (i.e. packaging), the second activation indicia is not visible. The label includes cut scores or perforations forming a pull tab portion including a pull tab, such that when the pull tab is pulled back, the label breaks at the cut scores or perforations such that only the pull tab portion of the label is removed, revealing the first activation indicia on the card, and the second activation indicia on the reverse side of the label. To activate the card, both the first and second activation indicia are read, such as by scanning or manually keying in the alphanumeric PIN associated with the barcode. The reverse side of the label also includes tamper evident text on a periphery of the label such that in the event the entire label is removed or attempted to be removed, the tamper evident text remains on the card, indicating that the card may be compromised, and activation is not recommended.
In a similar embodiment, the removable label includes patterned cut scores or perforations around the periphery such that in the event the entire label is removed or attempted to be removed, the patterned cut scores or perforations are irreversibly broken or burst, visually indicating that the card may be compromised, and activation is not recommended.
In another embodiment, a stored value card with a two-step tear-away activation system generally includes an inactive stored value card, an optional base label permanently adhered to the card, a first activation indicia, such as a barcode, account number, and/or serial number, printed or otherwise applied to the base label, a removable label adhered over the first activation indicia, and a second activation indicia printed or otherwise applied on the removable label. The removable label includes perforations or cut scores defining a releaseable pull tab portion. The second activation indicia is applied to the removable label such that the activation indicia extends over both the pull tab portion and one or more periphery portions. To activate the card, the second activation indicia is scanned or otherwise read, as described above. The pull tab portion is removed, which destroys the second activation indicia, and reveals the entirety of the first activation indicia, which is then scanned to complete proper two-step activation of the card. In the event the base label is removed, there is no access to the card activation data or means for activation. The base label may also optionally be opaque and/or include tamper slits to further visually indicate tampering and a possible compromised card.
In one embodiment, the base label and top removable label are imaged and then assembled. In another embodiment, the base label is premade with the first activation indicia, and the top removable label is pre-applied over the base label. The top removable label is then imaged with the second activation indicia.
In another similar embodiment, the system does not include a base label. Instead, the first activation indicia is printed or otherwise applied directly on the card. Upon removable of the removable label the second activation indicia is destroyed, as in the previous embodiment.
In another embodiment, a stored value card with an overlapping two-step activation system generally includes an inactive stored value card, a base label permanently or destructively adhered to the card, a first activation indicia, such as a barcode, account number, and/or serial number, printed or otherwise applied to the base label in which a portion of the first activation indicia extends past the label and onto the card, a removable label removably adhered over the first activation indicia, and a second activation indicia printed or otherwise applied to the removable label in which a portion of the second activation indicia also extends past the removable label and onto the card. To activate the card, the second activation indicia is scanned or otherwise read as described above. After scanning, the removable label is removed to reveal the first activation indicia, and leaving the overlapping portion of the second activation indicia on the card such that the second activation indicia is now unreadable. The first activation indicia is then scanned or otherwise read to complete proper activation. In the event the base label is removed, the overlapping portion of the first activation indicia remains on the card such that the first activation indicia is unreadable. In this embodiment, because the first and second activation indicia extend onto the card, reapplication of the label is difficult to properly realign the activation indicia. Furthermore, if the base label is removed, there is no access to the card data or means for activation.
In another embodiment, a tamper evident system generally includes an inactive stored value card having a first activation indicia, such as a barcode, printed or otherwise applied there on. A destructible label is adhered over the activation indicia. Upon removal of the label, the label distorts or self-destructs such that if reapplied, tampering is evident or card scanner cannot read the activation indicia.
In another embodiment, a stored value card with a two-step, tamper evident activation system generally includes an inactive stored value card having an opaque base label permanently adhered to the card, a first activation indicia, such as a barcode, account number, and/or serial number, printed or otherwise applied to the base label, and a removable pull tab label applied over and at least partially covering the first activation indicia. A second activation indicia and optional serial number are printed or otherwise applied on a reverse side of the label such that when the label is adhered to the card, the second activation indicia is not visible. The label includes cut scores or perforations forming a pull tab portion including a pull tab, such that when the pull tab is pulled back, the label breaks at the cut scores or perforations and only the pull tab portion of the label is removed, revealing the first activation indicia on the card, and the second activation indicia on the reverse side of the label. To activate the card, both the first and second activation indicia are read as described above. The removable label includes patterned cut scores or perforations around the periphery such that in the event the entire label is removed or attempted to be removed, the patterned cut scores or perforations are irreversibly broken or burst, indicating that the card may be compromised, and activation is not recommended. In addition or alternatively, tamper evident text may be included on the periphery of the removable label such that if the removable label is removed, the tamper evident text remains on the card to indicate tampering. In the event the base label is entirely removed, there is no access to the card data or means for activation.
In a similar embodiment, the second activation indicia is printed on the top side of the removable label such that a portion of the second activation indicia extends onto the base label and/or card. To activate the card, the second activation indicia is scanned as described above. The pull tab portion of the removable label is pulled back to expose the first activation indicia, while rendering the second activation indicia unreadable. The first activation indicia is then scanned or read as described above to complete activation. Removal of the removable label prior to activation makes replacement of the removable label difficult to align with the base label. Furthermore, in the event the base label is entirely removed, there is no access to the card data or means for activation.
In yet another embodiment, a stored value card with two-step activation system generally includes an inactive stored value card, a first activation indicia, such as a barcode, account number, and/or serial number, printed or otherwise applied to the card and/or on an opaque label permanently adhered to the card, and a removable pull tab label applied over and at least partially covering the first activation indicia. A second activation indicia and optional serial number formed of an invisible fluorescent material or ink are printed or otherwise applied on the removable label or reverse side of the removable label. To activate, the second activation indicia is scanned or otherwise read as described above. The pull tab portion of the removable label is pulled open to expose the first activation indicia which is then scanned or otherwise read to complete activation. The invisible fluorescent second activation is difficult to copy or reproduce, as it may not be apparent to a thief that it exists. Furthermore, the pull tab removable label indicates evidence of tampering if attempted to be removed to expose the first activation indicia.
In any of the embodiments described herein, the base label and/or removable label are optionally designed such that if copied (e.g. copier machine), the activation indicia would not show.
The above summary is not intended to describe each illustrated embodiment or every implementation of the subject matter hereof. The figures and the detailed description that follow more particularly exemplify various embodiments.
Subject matter hereof may be more completely understood in consideration of the following detailed description of various embodiments in connection with the accompanying figures, in which:
While various embodiments are amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the claimed inventions to the particular embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the subject matter as defined by the claims.
The embodiments described below are not intended to be exhaustive or to limit the invention to the precise forms disclosed in the following detailed description. Rather the embodiments are chosen and described so that others skilled in the art may appreciate and understand the entire disclosure.
Referring to
To activate the card 102, both the first and second activation indicia 104, 108 are read, such as by scanning or manually keying in the alphanumeric PIN associated with the barcode. The reverse side 106a of the label 106 also includes tamper evident text 118 on a periphery 120 of the label such that in the event the entire label 106 is removed or attempted to be removed, the tamper evident text 118 remains on the card 102, indicating that the card 102 may be compromised, and activation is not recommended.
Referring now to
Referring now to
Referring now to
To activate the card 202, the second activation indicia 210 is scanned or otherwise read, as described above. The pull tab portion 214 is removed, which destroys the second activation indicia 210, and reveals the entirety of the first activation indicia 206, which is then scanned to complete proper activation of the card 202. In the event the base label 204 is removed, there is no access to the card data or means for activation. The base label 204 may also optionally include tamper slits or patterns 218 to further indicate tampering and a possible compromised card. In some embodiments, the base label 204 is optionally removable to expose additional card data underneath.
Referring to
Referring to
To activate the card 402, the second activation indicia 410 is scanned or otherwise read as described above. After scanning, the removable label 408 is removed to reveal the first activation indicia 406, and leaving the overlapping portion 410a of the second activation indicia 410 on the card 402 such that the second activation indicia 410 is now unreadable. The first activation indicia 406 is then scanned or otherwise read to complete proper activation. In the event the base label 404 is removed, the overlapping portion 406a of the first activation indicia 406 remains on the card 402 such that the first activation indicia 406 is unreadable. In this embodiment, because the first and second activation indicia 406, 410 extend onto the card, reapplication of the labels 404, 408 is difficult to properly realign the activation indicia 406, 410. Furthermore, if the base label 404 is removed, there is no access to the card data or means for activation, even if label 404 is separated as data is missing and remains on card 402.
Referring to
Referring to
The removable label 608 includes patterned cut scores or perforations 620 around the periphery such that in the event the entire label 608 is removed or attempted to be removed, the patterned cut scores or perforations 620 are irreversible broken or burst, indicating that the card 602 may be compromised, and activation is not recommended. In addition or alternatively, tamper evident text (not shown) may be included on the periphery of the removable label 608 such that if the removable label 608 is removed, the tamper evident text remains on the card 602 to indicate tampering, as described with respect to
In a similar embodiment, and referring to
Referring to
Referring to
Alternatively, some stored value cards are pack activated, meaning first and second activation indicia (or more) is printed on the carrier, and the card is enclosed in the carrier. Any of the embodiments described above can be applied to the carrier or pack as activation indicia instead of it being applied to the card.
In general, and referring to the embodiments above, stored value cards are forms of transaction instruments associated with transaction accounts, in which the stored value cards provide cash equivalent value that may be used within an existing payment/transaction infrastructure. Stored value cards are frequently referred to as gift, pre-paid or cash cards, in that money is deposited in an account associated with the card before use of the cards is allowed. In general, such an account may be used for transactions between a user and a merchant through any suitable communication means, such as, for example, a telephone network, intranet, the global, public Internet, a point of interaction device, online communications, off-line communications, wireless communications, and the like. They may also be used in person at any point of sale (automated or not) that accepts them. The type of stored value card may be a gift card, loyalty card, credit or debit card, health or insurance card, phone card, pre-paid phone card, membership card, identification card, ring tone card, or any other type of card. The stored value card may be any such transaction instrument associated with any such transaction account.
The stored value card is typically the size and shape of a conventional credit card (i.e., CR80), although other sizes and shapes are possible, such as, for example, embodiments depicted and described in U.S. Patent Application Publication No. 2016/0031624, entitled “Tamper Evident Secure Pack with Anchored Card Carrier” and incorporated herein by reference in its entirety. The stored value card is commonly made of plastic, wood, bamboo, or paper, however other materials, such as other synthetic or natural materials are also contemplated.
The stored value card includes an account identifying element, such as a magnetic stripe, radiofrequency identification (RFID), bar code, QR code, text (recognized by Optical Character Recognition (OCR)), smart chip, for example. The account identifying element is encoded with data, which includes a unique account number. If the stored value card includes a magnetic stripe, that magnetic stripe may comprise a plastic film including tiny magnetic particles that can be magnetized in certain directions to record data on the card, which may be read by a card reader. If the stored value card includes a bar code or QR code, the bar code may comprise machine-readable data, which may be alpha-numeric. Bar code data includes black and white lines arranged to represent a series of numbers (e.g., a bar code comprising a Universal Product Code (UPC) has twelve digits) to a bar code scanner (printed account identifying elements). Other current or future developed account identifying elements are also possible. Also, more than one account identifying element may be included on the stored value card, and in any location.
The stored value card may include embossed or non-embossed features. An account identifying element(s) on the stored value card may be embossed (including at least one raised portion (e.g., letters, designs), or protuberance, etc.), or non-embossed.
The stored value card can be secured to or within a carrier such that account identifying elements or information (e.g. card or account identification number, PIN, etc.) is adjacent to the carrier, such that the account identifying elements or information are/is not able to be viewed, and only the activation data that is associated with the card or correlated to the account identifying elements is accessible, while the card is attached to the carrier.
As mentioned above, the stored value card can be made of plastic, paper, wood, bamboo, and other materials. The cards can be made of various types of plastic such as, but not limited to polyester, polypropylene, polyethylene, polycarbonate, polyvinyl acetate, PETG, APET, plastic laminated paper, or combinations thereof. The plastics can be of any size and thickness, including a preferred thickness of 30 mils, but may also be 24 to 34 mils thick. The pull tabs and/or labels referenced herein may be made of plastics such as polypropylene, polyester, APET, plastic laminated papers, paper, or combinations thereof. The labels can optionally include metalized materials such as silver, metallic foil, or a metallized hologram for added opacity and/or tamper evidence. The pull tab/label thickness can be in the range of 0.5 mil to 20 mil, or more particularly 1 mil to 10 mil. Adhesives used to adhere labels to the cards can include acrylic adhesive and/or solvent based adhesives known to those of ordinary skill in the art.
The barcodes/activation indicia may be created by printing inks, toners, or other materials onto the stored value cards and/or labels/pull tabs by means of ink jet, drop on demand, flexography, lithography, thermal printing, or any of a variety of printing methodologies known to one of ordinary skill in the art. The activation indicia can be printed in advance or inline during production such as printing after the label has been applied to the card. The label and card can include serial numbers such that the label indicia can be matched to the card during various manufacturing steps. For example, the reading of data, such as account numbers, indicia, PIN, serial numbers, and the like on the various pieces of the card and/or packaging allows matching and/or associating taking place through look-up tables contained within the printing systems during manufacturing and assembly.
Various tamper evident labels and carrier systems are also described U.S. patent application Ser. No. 15/439,743 entitled “Stored Value Card and Carrier System with Tamper Evident Label”, and Ser. No. 15/585,953 entitled “Stored Value Card and Carrier Assembly with Tamper Evident Label”, both of which are incorporated herein by reference in its entirety, and can be combined with any of the embodiments described herein.
Various embodiments of systems, devices, and methods have been described herein. These embodiments are given only by way of example and are not intended to limit the scope of the claimed inventions. It should be appreciated, moreover, that the various features of the embodiments that have been described may be combined in various ways to produce numerous additional embodiments. Moreover, while various materials, dimensions, shapes, configurations and locations, etc. have been described for use with disclosed embodiments, others besides those disclosed may be utilized without exceeding the scope of the claimed inventions.
Persons of ordinary skill in the relevant arts will recognize that the subject matter hereof may comprise fewer features than illustrated in any individual embodiment described above. The embodiments described herein are not meant to be an exhaustive presentation of the ways in which the various features of the subject matter hereof may be combined. Accordingly, the embodiments are not mutually exclusive combinations of features; rather, the various embodiments can comprise a combination of different individual features selected from different individual embodiments, as understood by persons of ordinary skill in the art. Moreover, elements described with respect to one embodiment can be implemented in other embodiments even when not described in such embodiments unless otherwise noted.
Although a dependent claim may refer in the claims to a specific combination with one or more other claims, other embodiments can also include a combination of the dependent claim with the subject matter of each other dependent claim or a combination of one or more features with other dependent or independent claims. Such combinations are proposed herein unless it is stated that a specific combination is not intended.
Any incorporation by reference of documents above is limited such that no subject matter is incorporated that is contrary to the explicit disclosure herein. Any incorporation by reference of documents above is further limited such that no claims included in the documents are incorporated by reference herein. Any incorporation by reference of documents above is yet further limited such that any definitions provided in the documents are not incorporated by reference herein unless expressly included herein.
For purposes of interpreting the claims, it is expressly intended that the provisions of 35 U.S.C. § 112(f) are not to be invoked unless the specific terms “means for” or “step for” are recited in a claim.
The present application claims the benefit of U.S. Provisional Application No. 62/528,704 filed Jul. 5, 2017, which is hereby incorporated herein in its entirety by reference.
Number | Name | Date | Kind |
---|---|---|---|
3288281 | Sparks | Nov 1966 | A |
3773251 | Hadick | Jan 1973 | A |
4939992 | Bird | Jul 1990 | A |
5275285 | Clegg | Jan 1994 | A |
5419433 | Harrer et al. | May 1995 | A |
5489123 | Roshkoff | Feb 1996 | A |
5493801 | James | Feb 1996 | A |
5544741 | Fantone et al. | Aug 1996 | A |
5588526 | Fantone et al. | Dec 1996 | A |
5609253 | Goade, Sr. | Mar 1997 | A |
5650209 | Ramsburg et al. | Jul 1997 | A |
5660925 | Cooley et al. | Aug 1997 | A |
5760381 | Stitch et al. | Jun 1998 | A |
5782347 | Fantone et al. | Jul 1998 | A |
5791474 | Hansen | Aug 1998 | A |
5833068 | Fantone | Nov 1998 | A |
5850913 | Fantone et al. | Dec 1998 | A |
5851630 | Davis, II | Dec 1998 | A |
5918909 | Fiala et al. | Jul 1999 | A |
5941382 | Fantone et al. | Aug 1999 | A |
5975302 | Young | Nov 1999 | A |
6109439 | Goade | Aug 2000 | A |
6178426 | Klein et al. | Jan 2001 | B1 |
6179119 | Manoogian | Jan 2001 | B1 |
6224108 | Klure | May 2001 | B1 |
6245382 | Shvartsman et al. | Jun 2001 | B1 |
6253820 | Landan et al. | Jul 2001 | B1 |
6286999 | Cappel et al. | Sep 2001 | B1 |
6315206 | Hansen et al. | Nov 2001 | B1 |
6328341 | Klure | Dec 2001 | B2 |
6349928 | Matheis et al. | Feb 2002 | B1 |
6439613 | Klure | Aug 2002 | B2 |
6454165 | Dawson | Sep 2002 | B1 |
6481994 | McCannel et al. | Nov 2002 | B1 |
6520329 | Fuchs | Feb 2003 | B1 |
6543809 | Kistner et al. | Apr 2003 | B1 |
6588591 | Schabert et al. | Jul 2003 | B1 |
6588658 | Blank | Jul 2003 | B1 |
6601415 | Takinami | Aug 2003 | B2 |
6640974 | Malone | Nov 2003 | B2 |
6715795 | Klure | Apr 2004 | B2 |
6957737 | Frederickson et al. | Oct 2005 | B1 |
6964810 | McCannel et al. | Nov 2005 | B2 |
7117512 | Cahill | Oct 2006 | B1 |
7219829 | Treat | May 2007 | B2 |
7222797 | Davilla et al. | May 2007 | B2 |
7300535 | McCannel et al. | Nov 2007 | B2 |
7494056 | Sturm | Feb 2009 | B2 |
7537168 | Anderson et al. | May 2009 | B2 |
7607574 | Kingsborough et al. | Oct 2009 | B2 |
7607575 | Kingsborough | Oct 2009 | B2 |
7658282 | Costel | Feb 2010 | B2 |
7681732 | Moehlenbrock et al. | Mar 2010 | B2 |
7726477 | Gaither | Jun 2010 | B1 |
8181789 | Casella et al. | May 2012 | B1 |
8292072 | Corey et al. | Oct 2012 | B2 |
8419889 | Smith | Apr 2013 | B2 |
8523078 | Biskupski | Sep 2013 | B2 |
8720786 | Boge | May 2014 | B2 |
8833553 | Corey et al. | Sep 2014 | B2 |
8944470 | Mayrhofer et al. | Feb 2015 | B2 |
20020088855 | Hodes | Jul 2002 | A1 |
20020157973 | Preisler | Oct 2002 | A1 |
20030004889 | Fiala et al. | Jan 2003 | A1 |
20030018586 | Krahn | Jan 2003 | A1 |
20030028439 | Cox | Feb 2003 | A1 |
20030080013 | Smith | May 2003 | A1 |
20030150762 | Biller | Aug 2003 | A1 |
20030234191 | Belden, Jr. et al. | Dec 2003 | A1 |
20040008613 | Beckwith et al. | Jan 2004 | A1 |
20040139318 | Fiala | Jul 2004 | A1 |
20040151880 | Nakamura et al. | Aug 2004 | A1 |
20050045503 | Wong et al. | Mar 2005 | A1 |
20050045732 | Whitaker | Mar 2005 | A1 |
20050199516 | Laarman | Sep 2005 | A1 |
20050205442 | Spagna | Sep 2005 | A1 |
20050279143 | Belden, Jr. et al. | Dec 2005 | A1 |
20050279825 | Ashby et al. | Dec 2005 | A1 |
20060207896 | Shiga | Sep 2006 | A1 |
20060246984 | Walker et al. | Nov 2006 | A1 |
20060256413 | Kitamura | Nov 2006 | A1 |
20070144044 | Kershner et al. | Jun 2007 | A1 |
20070278114 | Kane et al. | Dec 2007 | A1 |
20080030864 | Gougeon et al. | Feb 2008 | A1 |
20080088126 | Hoffman | Apr 2008 | A1 |
20080088931 | Hoffman | Apr 2008 | A1 |
20080116089 | Roberts | May 2008 | A1 |
20080150174 | Raymond et al. | Jun 2008 | A1 |
20080213528 | Hoffman | Sep 2008 | A1 |
20080237317 | Rosendall | Oct 2008 | A1 |
20090078590 | Smith | Mar 2009 | A1 |
20090091123 | Conley et al. | Apr 2009 | A1 |
20090107862 | Pascua et al. | Apr 2009 | A1 |
20090277808 | Payne | Nov 2009 | A1 |
20100193583 | Tartavull et al. | Aug 2010 | A1 |
20100213092 | Swain | Aug 2010 | A1 |
20100224516 | Abell | Sep 2010 | A1 |
20110031148 | Rosendall et al. | Feb 2011 | A1 |
20110132783 | Williams et al. | Jun 2011 | A1 |
20110203722 | Smith | Aug 2011 | A1 |
20120145578 | Pazlar et al. | Jun 2012 | A1 |
20120256006 | Schmitt | Oct 2012 | A1 |
20120273576 | Tomczyk et al. | Nov 2012 | A1 |
20130068642 | Corey et al. | Mar 2013 | A1 |
20130248406 | Glinert | Sep 2013 | A1 |
20130294602 | Huxham et al. | Nov 2013 | A1 |
20140076978 | Smith | Mar 2014 | A1 |
20140116908 | Beyer et al. | May 2014 | A1 |
20160005031 | O-Regan et al. | Jan 2016 | A1 |
20160031624 | Pascua et al. | Feb 2016 | A1 |
20160332789 | Yerecic | Nov 2016 | A1 |
20170243098 | Pascua et al. | Aug 2017 | A1 |
20170323191 | Pascua et al. | Nov 2017 | A1 |
20180079248 | Pascua et al. | Mar 2018 | A1 |
Entry |
---|
SlingShot CD Package, 2 pages, c. 2000. |
Introducing RiverBorne™ Communications, 17 pages, c. 2000. |
Printout of various lenticular packaging options, 3 pages, at least as of Nov. 13, 2009. |
Application and File history for U.S. Appl. No. 15/439,743, filed Feb. 22, 2017. Inventors: Pascua et al. |
Application and File history for U.S. Appl. No. 15/711,766, filed Sep. 21, 2017. Inventors: Pascua et al. |
Application and File history for U.S. Appl. No. 15/585,953, filed May 3, 2017. Inventors: Pascua et al. |
Application and File history for U.S. Appl. No. 14/813,940, filed Jul. 30, 2015. Inventors: Pascua et al. |
Number | Date | Country | |
---|---|---|---|
20190073577 A1 | Mar 2019 | US |
Number | Date | Country | |
---|---|---|---|
62528704 | Jul 2017 | US |