Gift and phone transaction cards are available for sale at almost every retailer throughout the world. These cards have been successful, in part, because they enable users to purchase goods and services in a manner that does not require cash on hand or establishing a pre-existing account. Security for these cards is achieved through use of a personal identification number (PIN), which is printed on the card surface and concealed beneath a scratch-off label. Users purchase the card, remove a portion of the scratch-off label to reveal the PIN, then activate the card using a control number and the PIN. The control number is also printed on the card surface in a manner readily observable by users.
As transaction cards have increased in popularity, incidents of card misuse have increased as well. One method of misuse involves removing just enough of the scratch-off label to reveal the PIN, then covering the damaged area with an appropriately colored material or ink. With the PIN and control number in hand, the cards value can be extracted without actual physical possession of the card. An unsuspecting purchaser, without careful scrutiny, may buy the card only to discover that the security of the card has been breached. Alternatively, the retailer may observe the damage to the card. By the time the retailer or purchaser discovers the damage, however, the misuse will have likely occurred.
Accordingly, there is a need for a device that can readily indicate whether a transaction card has been subject to misuse.
An aspect of the invention provides a value card comprising a substantially planar substrate with first indicia applied to a surface of the substrate. An obscuring layer formed from an opaque material is disposed over the first indicia so as to prevent at least a portion of the first indicia from being viewed. The obscuring layer is configured so that the opaque material can be removed to reveal the at least a portion of the first indicia but cannot be reapplied over the first indicia. The value card further comprises a security device comprising second indicia comprising a predetermined pattern. At least a portion of the second indicia is formed on the obscuring layer so that removal of the opaque material to reveal the at least a portion of the first indicia also removes the at least a portion of the second indicia.
The accompanying figures depict certain illustrative embodiments and may aid in understanding the following detailed description. The embodiments depicted are to be understood as exemplary and in no way limiting of the overall scope of the invention. The detailed description will make reference to the following figures, in which:
Throughout the drawings, like reference numbers refer to like elements, features, and structures.
The matters exemplified in this description are provided to assist in a comprehensive understanding of various exemplary embodiments disclosed with reference to the accompanying figures. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the exemplary embodiments described herein can be made without departing from the spirit and scope of the claimed invention. Descriptions or well-known functions and constructions are omitted for clarity and conciseness.
With respect to a value card, the value card may comprise any physical shape and configuration, and also may comprise any type of material. In some exemplary embodiments, the value card may be configured in a manner similar to a standard credit or debit card, made of plastic and having the same or similar proportions and features. In some exemplary embodiments, the value card may be card-like, but have proportions different from a standard credit or debit card, for example, a keychain card, a folding paper card, a metal card, and so forth. In addition, the value card may be non-card-like, for example, a key fob, miniature figure, and/or a communication device, etc. In some exemplary embodiments, the value card may be available in multiple configurations allowing a user to select his or her desired configuration. For example, the value card may be available in a standard credit card-sized card and/or a smaller keychain card and/or a key fob.
In exemplary embodiments the value card may include electronic and or magnetic features, for example, a microprocessor, memory, an electronic chip, a magnetic strip, a Universal Serial Bus (USB) flash drive, a wireless communication device, etc. For example, a value card may have the same or similar features to a credit or debit card, such as having a magnetic strip located on the back of the card, and thus may be compatible with standard credit card readers. The value card may also be configured in a manner similar to a “smart card.” Memory on the value card may be configured to store information related to a user, third party, processor, and/or past transactions, as well as other types of information related to the value card. In some exemplary embodiments, the value card may be configured to communicate with a wired device, such as by USB, coaxial cable, etc., and or a wireless device, such as by using Bluetooth® and/or radio frequency identification (RFID) technology, etc.
The value card may have identification indicia, such as, by way of example, alpha characters, numeric characters, alphanumeric characters, images, embossed numbers, a coded magnetic strip, an embedded electronic chip, bar codes, and/or other such identification indicia as known in the art. In some exemplary embodiments, there may be unique identification indicia for each value card. Alternatively, some or all of the value cards may include the same identification indicia, or there may be a group of value cards with the same identification indicia within the group, but with a different indicia from other groups.
The identification indicia may be configured to associate the value card with a user, a third party, a processor, a retailer, and/or some other entity. The association may be accomplished by memory located remote of the value card or may be located on the value card itself. For example, information about the value card and/or the user may be stored in a remote database and/or may be embedded in a magnetic stripe on the value card. In addition, the value card may be associated with a particular third party using indicia that is visible on the card, such as, by way of example, a biller-specific telephone number and/or trademark.
As seen in
The obscuring layer 112 may be applied directly to the indicia area 109 of the substrate 101 over the top of the first indicia. In embodiments where the first indicia 106 is applied to a carrier layer, the obscuring layer may be applied to the carrier layer over the top of the first indicia.
The card 100 also includes a security device 110 that is configured to reveal attempts to remove some or all of the obscuring layer 112. The security device 110 may include a second set of indicia 114 formed on, overprinted on, or in the obscuring layer 112 and, in some embodiments, on or in the surface of the back side 100b surrounding the obscuring layer 112. The second indicia 114 may be any uniform or non-uniform pattern of characters or figures that would be difficult to replicate. This may include, for example, alphanumeric text positioned periodically or randomly across the obscuring layer 112. Alternatively, the second indicia 114 can comprise an image, graphic symbol or geometric figure. In an exemplary embodiment, the pattern of the second indicia 114 may be varied from card to card or between groups of cards.
The second indicia 114 may be applied in a visible or non-visible print medium such as ink or varnish. The print medium may be selected for compatibility with the material of the obscuring layer 112 and/or desired bleed-through characteristics. In exemplary embodiments the print medium may be or include an ultraviolet or infrared ink. In exemplary embodiments the print medium may comprise a solvent coating, which includes ink with solvents such as water or other materials. The print medium may be applied to the obscuring layer 112 at the time of or after the obscuring layer 112 has been applied to the substrate 101. In embodiments where the first indicia 106 and the obscuring layer 114 are applied to a carrier layer, the print medium may be applied before or after the carrier layer is adhered to the substrate 101.
As an alternative to printing, the second indicia 114 may be formed by surface contour variations such as may be produced by mechanical embossing or debossing or laser removal of material. This may be accomplished after the obscuring layer 112 has been applied to the substrate 101. In embodiments where the first indicia 106 and the obscuring aver 114 are applied to a carrier layer, the surface contour variations may be established before or after the carrier layer is adhered to the substrate 101.
The security device 110 may include an appliqué that is placed atop the obscuring layer 112, the appliqué carrying the second indicia 114. Such an appliqué can be applied to the obscuring layer 112 via an adhesive material so that the appliqué cannot be removed without at least partial destruction.
In particular embodiments, the second indicia 114 may be configured so that it extends beyond the boundary of the obscuring layer 112 and onto or into the surface of the substrate 101. In such embodiments, the form or medium of the second indicia may be such as to make removal of the second indicia 114 from the substrate 101 difficult or impossible. This serves to make replication of the security more difficult because attempt to replace or replicate the obscuring layer 112 and the security device 110 would require that the pattern of the replicated second indica 114 match up with the permanent second indicia 114 printed on the substrate 101. Any discrepancy will be highlighted by the fact that the second indicia are formed on two distinct surfaces that may have two distinct backgrounds and textures.
As shown in
As discussed above, the second indicia may be formed in a printing media, in which case the action of forming the second indicia includes printing, overprinting, or otherwise applying the printing media to form the second indicia. The second indicia may alternatively be formed by establishing surface contour variations in the obscuring layer and, in some cases, the substrate. In these instances, the action of forming the second indicia may include embossing, debossing or removing material such as by laser vaporization.
It will be understood that the actions described above need not be carried out in the order described. For example, the first indicia may be formed in initially on a carrier layer to which the obscuring layer and the security device are applied before the carrier layer is adhered to the substrate.
After the first indicia is printed or deposited onto the surface of the substrate by the first indicia station 405, the substrate is advanced in a path of travel where, in one exemplary embodiment, a release coating is applied over the first indicia. The release of liquid or material coating is typically less than about 2 mil thickness and preferably about 0.0002 to about 0.0005 inches thick and could range up to about 0.002 inches. The release coating is preferably transparent, but does not have to be clear as it could be color tinted for aesthetic purposes. Typically, the release coating (if used) should be of a thickness and color such that the first indicia can be seen through the release coating.
An opaque obscuring coating is provided via an obscuring station 410 comprising a plate cylinder having impression plates in the form of print pads mounted thereon that engage a metering roll and transfers the release of obscuring material from the plate (pads) onto the surface of the substrate.
The release coating can be applied in a manner similar to that as any ink coating is applied in printing techniques, including flexographic techniques or ink. The release coating can, thus, be referred to as a printed ink coating that is applied onto the surface of the substrate over the first indicia and, in one exemplary embodiment, radiation/ultraviolet cured by an ultraviolet curing lamp. Although ultraviolet curing is a preferred method of curing, it is possible in some cases to use other types of radiation curing, including use of electron beam, blue light, laser and other radiation curing methods known to those of ordinary skill in the art.
A release coating need not always be employed depending on the type of substrate used. The amount of surface tension created by the substrate surface has an impact on the removability of the opaque obscuring coating layer. In an exemplary embodiment, the obscuring coating is formed as a silver ink, known to those of ordinary skill in the art, such that the obscuring layer could be removed without damaging the first indicia even without a release coating, in some instances. While in exemplary embodiments the obscuring coating can comprise a silver ink, the coating can be formed of any type of opaque ink known to those of ordinary skill in the art.
A second indicia station 415 can be used for applying a second coat of ink, obscuring coating material, or other printed indicia over the first obscuring coating. Naturally, the location of the second indicia station 415 could vary if it is employed to print a layer over the first indicia before application of the obscuring coating. In one exemplary implementation, the second indicia station 415 could comprise an ink jet print station and apply a fingerprint pattern or similar pattern that is opaque over (or under depending on position of the print station) the obscuring coating. The second indicia could be created by a plate cylinder or drum having impressions mounted thereon that engage a metering roll and transfers the release or obscuring material from the plate (pads) onto the surface of the substrate, or via a spray pattern of ink. In one exemplary embodiment, the obscuring coating comprises scratch-off material. The impression plates (print pads) can be formed of any type of material commonly known to those of ordinary skill in the art, including rubber print pads or photopolymer plates and/or other flexible plate or pad material, typically known and used by those of ordinary skill in the art. The second indicia station 415 could apply security indicia on the opaque obscuring coating that comprises a second indicia. Thus, if the obscuring coating and second indicia were removed, at least in part, and a label applied in its place, a purchaser would know that tampering has occurred because there would be no second indicia visible. That is, the second indicia would be damaged. The second indicia could be used for further security and correspond to control codes printed on the substrate. During application of a layer, coating, or indicia following application of the obscuring coating, a typical black ink can be provided, although other ink could be provided as known to those skilled in the art.
In exemplary implementations solvent coatings can be employed to convey indicia. Solvent coatings can comprise ink with solvents, such as water or other materials, which could be thermally dried. It is also possible to use coatings that comprise a two-part system for curing similar to epoxy. Other coatings could be used as known by those of ordinary skill in the art. Also, the substrate conveying mechanism could be any conveying mechanism, including drum, roller, plate, or other belt mechanism. A fingerprint pattern could be applied under or over the obscuring coating as noted above.
In exemplary embodiments a controller 420 is employed that could comprise a personal computer or other controller system known to those of ordinary skill in the art. The first indicia station, obscuring station 410, second indicia station 415, laser sensors, DC motor drives, servodrives (motors) encoders, shutter controls for the UV station, and any other motors and encoders used for a belt conveyor and other components of the system are all operatively coupled to the controller 420. The coupling could be through the network, such as the Internet, including a wired or wireless network.
In operation, a sensor senses the leading edge of an advancing substrate and registers this edge position to the controller 420. Throughout the substrate advancing process, the drive motors and encoder of the conveyor belt drive maintain accurate positional control over the substrate. The servodrive (motor) is operatively connected to each of the plate cylinders or drums and maintains rotational control to apply the release and obscuring coatings and indicia at a timed moment such that any coatings are applied at a specific location on the surface of the substrate.
While the present invention has been particularly shown and described with reference to certain exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the present invention as defined by the appended claims and equivalents thereof.