This application relates generally loss prevention for financial cards.
Cash transactions are becoming increasingly rare. Purchases of goods or services are made frequently at a point-of-sale, such as at a checkout counter, with a bank card, such as a credit card or a debit card. A card can be mistakenly left at the terminal by a consumer. As used herein, financial cards includes cards such as credit cards or debit cards, suitably issued by a bank, credit agency, or other financial institution.
In particular situations, such as at locations such as restaurants, a server typically leaves a check at a table for review by a diner. Once approved, the diner typically gives their credit card to their server who takes it to a sales terminal to commence an electronic credit transaction. A credit receipt is returned to the diner's table for finalization and signing. The receipt and credit card are frequently returned to the diner in a jacket. Not infrequently, the diner may sign the check and close the jacket, but forget to retrieve their credit card, leaving the jacketed credit card on the table when they depart. The credit card may not be seeable within the jacket, and it may be some time before the server retrieves it. By the time the card is discovered, the diner may be far removed from the premises, and the restaurant may have no information which would allow them to contact the diner. The diner may not realize the card was left until the next time they reach for it to make a purchase. They may not recall where they left it, forcing them to cancel the card and suffer the inconvenience of ordering a replacement and monitoring for possible, unauthorized charges which they may need to dispute promptly with their credit agency. A restaurant may hold unclaimed credit cards for a period before destroying them or returning them to the issuing agency. There is an opportunity for thieves to steal an inadvertently left credit card and use it for unauthorized purchases. In certain situations, such as with travelers, the diner may be hundreds or thousands of miles away from the restaurant before they realize they left their card.
Various embodiments will become better understood with regard to the following description, appended claims and accompanying drawings wherein:
The systems and methods disclosed herein are described in detail by way of examples and with reference to the figures. It will be appreciated that modifications to disclosed and described examples, arrangements, configurations, components, elements, apparatuses, devices methods, systems, etc. can suitably be made and may be desired for a specific application. In this disclosure, any identification of specific techniques, arrangements, etc. are either related to a specific example presented or are merely a general description of such a technique, arrangement, etc. Identifications of specific details or examples are not intended to be, and should not be, construed as mandatory or limiting unless specifically designated as such.
In situations, such as with restaurants as noted above, a bank card may be taken by a server, who walks some distance to a terminal to run the card for a commercial transaction. In example embodiments described herein, a card may be fitted with a proximity sensor relative to a user's portable data device, such as a smartphone or tablet. Bank cards are formed in standardized dimensions to allow them to be carried in wallets. The standardized dimensions also allow cards to work with credit terminals. Their length and width must work with the terminals for insertion into a card reader slot for reading of an embedded chip. Their thickness must work with the reader slot, and also with a slide slot when the card's magnetic strip is swiped.
Credit card size is governed by the ISO/IEC 7810 standard, and is referred to as ID-1. The ID-1 format specifies dimensions of 85.60 mm (approximately 3.37 inches)×53.98 mm (approximately 2.12 inches), with a thickness of 0.76 mm ( 1/32 of an inch). Any tracking system used with a credit card must not cause an increase in card dimensions so as to render the card incompatible with card readers or swipe readers. In example embodiments herein, proximity detection is accomplished with circuitry that maintains ID-1 dimensions. In other example embodiments, circuitry is thicker than 0.76 mm, but such increased thickens is associated with a card area that does not engage a card swiper or a chip reader slot. Even with such an increased thickness area, thinner is advantageous to allow a card to be stored in a wallet or cardholder.
In example embodiments herein, a mobile application can notify the user when the credit card is out of range from Bluetooth pairing to prevent credit cards from being lost or stolen. This functions to prevent loss, theft or fraud and give a user peace of mind that their credit cards are not lost or stolen. With the use of Bluetooth pairing, with circuitry embedded in a bank card or via a sticker attached on a card that works with a Bluetooth enabled mobile device application that monitors a pairing connection between the card and the mobile device. The application can notifies the user when the connection is broken. This will alert the user that the credit card is out of range and that they should check to see if the credit card has been lost or stolen. The user can take the appropriate action to notify the credit card company that the card has been lost or stolen and prevent loss of money due to fraud, suitably via an agency notification initiated via the application.
Bluetooth is particularly advantageous over systems, such as near-field communication (NFC) or radio frequency identification RFID, due to its range. NFC range may be limited to centimeters. RFID range may extend for meters. In the restaurant example, a server may be well outside of either range to run a credit card. A system continuously monitoring a relative card position would trigger an alarm, warning or other notification during such an operation. Bluetooth range can be substantially longer. An alarm for card circuitry paired with a smartphone is suitably generated when pairing is broken due to distancing.
Bluetooth currently has versions 1 through 5. Bluetooth 1.x and 2.x are considered classic Bluetooth. Bluetooth 3 adds a high speed mode with uses Wi-Fi for a data connection, using Bluetooth for device discovery. Bluetooth 4.x and 5.x are referred to as Bluetooth Low Energy (BLE or BTLE). BTLE includes a system for advertising device presence. BTLE can have an outdoor range around 100 m (approximately 328 feet). Even with reduced range due to indoor obstructions, the range is sufficiently large that no alarm should be triggered while a server leaves to swipe a card. Conversely, the range is sufficiently small that an alarm can be generated while a user is still close enough to a card location to easily return to retrieve it.
NFC and RFID tags are passive devices. That is, they require no power source. Power is supplied to them via radio frequency energy emanating from powered readers. Conversely, Bluetooth requires active, powered circuitry. As noted above, it is critical that card thickness be maintained so as to be compatible with card readers and chip readers. Embedded circuitry or circuitry applied via a sticker must be powered, and the circuitry must include a power source, such as a battery. Batteries, even hearing aid size batteries, can render a card unusable. Credit cards are issued with expiration dates several years later, which could be much longer than the life of an embedded power cell. In embodiments herein, additional power for is obtained by radio frequency waves, employing available sources such as NFC or RFID waves. Additional power may be derived from Wi-Fi. Such power is captured via what may be referred to as a “rectenna.” By way of further example, Massachusetts institute of Technology (MIT) researchers developed a flexible and inexpensive two-dimensional semiconductor that eliminates need for a thick and inflexible rectifier A super thin and malleable material known as molybdenum disulfide (MoS2), one of the thinnest semiconductors in the world, functionally surpasses this limitation. While NFC and RFID waves may be distance limited, Wi-Fi is ubiquitous. As used herein, any suitable radio wave may be used to capture energy, alone or in combination with other suitable radio wave sources.
A compact power storage associated with the card can capture and store sufficient power from NFC or RFID waves to keep the card operable over its lifetime. In the example embodiment, electronics and/or power storage may be located in area 128 of card 108.
Area 128 is selected so as to not to contact a card reader during either a chip read during insertion or a magnetic strip read while swiping. Such area is advantageous in embodiments wherein Bluetooth circuitry is added to a card via application of a sticker.
When pairing is found to be inactive at block 416, a user warning is generated at block 428. A test is made as to whether pairing has been restored at block 432, which restoration may be attributed to the card coming once again in range and/or the card battery having sufficient charge to maintain pairing. If pairing is restored, the user is notified at block 436 and the process returns to block 416.
Mobile app 512 activities, once commenced by user 504 at arrow 530, include establishing a Bluetooth pairing connection with credit card sticker 516 at arrow 538 and arrow 550, polling an established pairing session at block 542 and notifying user 504 of a lost connection and arrow 546. Credit card sticker activity includes establishing a Bluetooth paring connection with mobile app 512 at arrow 538 and arrow 550.
Additional activities include user directed notification of credit card company 520 at arrow 554 in the event that a card is lost or stolen. Such notification is also suitably initiated by mobile app 512 responsive to a response to a generated user prompt requesting whether notification should be made after an alarm has been generated.
While certain embodiments have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel embodiments described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the embodiments described herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the spirit and scope of the inventions.