B42D25/20

Layered Structure and Method For Producing 3D Cards
20250360746 · 2025-11-27 ·

The present invention is a layered structure and method for the printing of 3D cards through the application of ultra violet curable material. While this method is particularly useful in the printing of sports and trading cards, it could be used for other types of cards that includes both business and playing cards. There are potentially five different layers, or more depending on the desired effect, that will be printed atop a base substrate. The 3D effects will be due to the print settings for two different layers of clear UV ink. The first layer of UV ink will provide the majority of thickness to ensure the image or text for a card protrudes from the surface, while the second layer of UV ink will be applied so that a textured appearance is given to the card.

SECURITY ARTICLE AUTHENTICATION

A user device may cause light to be emitted at a security article by one or more light emission devices of the user device. The user device may obtain from a first set of one or more optical sensor devices of the user device first sensor data associated with the security article, and may obtain from a second set of one or more optical sensor devices of the user device second sensor data associated with the security article. The user device may determine, based on the first sensor data and the second sensor data, one or more characteristics of a security feature of the security article. The user device may determine, based on the one or more characteristics of the security feature, whether the security article is authentic. The user device may cause, based on determining whether the security article is authentic, one or more actions to be performed.

SECURITY ARTICLE AUTHENTICATION

A user device may cause light to be emitted at a security article by one or more light emission devices of the user device. The user device may obtain from a first set of one or more optical sensor devices of the user device first sensor data associated with the security article, and may obtain from a second set of one or more optical sensor devices of the user device second sensor data associated with the security article. The user device may determine, based on the first sensor data and the second sensor data, one or more characteristics of a security feature of the security article. The user device may determine, based on the one or more characteristics of the security feature, whether the security article is authentic. The user device may cause, based on determining whether the security article is authentic, one or more actions to be performed.

SMART CARD
20260044703 · 2026-02-12 · ·

Provided is a smart card that can improve the adhesive strength of the IC chip module even under low pressure, and can prevent deformation of the card by increasing the flowability of the conductive adhesive. The smart card includes a card body 2 with an antenna coil 3 built in, and an IC chip module 4 provided with an antenna connection terminal 5 for conductive connection with the antenna coil 3, the IC chip module 4 being housed in an accommodating recess 6 in the card body 2, wherein the antenna coil 3 and the antenna connection terminal 5 are conductively connected via a conductive adhesive 9 in which conductive particles 8 are blended with binder resin 7, and the antenna connection terminal 5 has an opening 10 with a width larger than the average particle diameter of the conductive particles 8.

SMART CARD
20260044703 · 2026-02-12 · ·

Provided is a smart card that can improve the adhesive strength of the IC chip module even under low pressure, and can prevent deformation of the card by increasing the flowability of the conductive adhesive. The smart card includes a card body 2 with an antenna coil 3 built in, and an IC chip module 4 provided with an antenna connection terminal 5 for conductive connection with the antenna coil 3, the IC chip module 4 being housed in an accommodating recess 6 in the card body 2, wherein the antenna coil 3 and the antenna connection terminal 5 are conductively connected via a conductive adhesive 9 in which conductive particles 8 are blended with binder resin 7, and the antenna connection terminal 5 has an opening 10 with a width larger than the average particle diameter of the conductive particles 8.

Layer structure for producing a hinge, in particular for producing multi-layered book covers

The present invention relates to a layer structure, preferably a hinge, particularly preferably a book cover, very particularly preferably a book cover for identification and security documents, comprising at least one outer layer a) containing at least one thermoplastic elastomer, preferably a thermoplastic polyurethane, and at least one layer b) containing at least one material selected from the group consisting of a polymer, a metal, a textile, a paper and a synthetic paper, or a combination of at least two of these, and also relates to a laminate comprising the above layer structure and to the method for producing same. The invention further relates to the use of the layer structure and/or laminate for the production of a hinge, preferably a multilayer book cover, especially for security and identification documents.

Layer structure for producing a hinge, in particular for producing multi-layered book covers

The present invention relates to a layer structure, preferably a hinge, particularly preferably a book cover, very particularly preferably a book cover for identification and security documents, comprising at least one outer layer a) containing at least one thermoplastic elastomer, preferably a thermoplastic polyurethane, and at least one layer b) containing at least one material selected from the group consisting of a polymer, a metal, a textile, a paper and a synthetic paper, or a combination of at least two of these, and also relates to a laminate comprising the above layer structure and to the method for producing same. The invention further relates to the use of the layer structure and/or laminate for the production of a hinge, preferably a multilayer book cover, especially for security and identification documents.

SECURE TRANSACTION OR STORED-VALUE CARD ASSEMBLIES
20260077613 · 2026-03-19 ·

Card assemblies for concealing and protecting activation indicia on the card assembly. Two panels, either discrete or foldable, form the card itself, such as a CR80 card or an M6 card assembly, with or without a CR80 snap-off portion. Activation indicia, such as a barcode, can be printed or otherwise applied to an exterior portion of the card assembly, or printed or otherwise applied to an interior of the assembly which is accessed by a tamper evident pull tab. Redemption indicia, such as an alpha-numeric code, can be applied to an interior surface of the card, which is accessed by a tamper evident pull tab or other tab.

SYSTEMS AND METHODS FOR IDENTIFYING DUPLICATE DOCUMENTS AND DETECTING MISREPRESENTATION

Systems, methods, and non-transitory computer readable media configured for identifying duplicate and misrepresented documents are provided. At least one processor may retrieve, from a first source, a first document, and may retrieve, from a second source, a second document. The processor may process each document. The processor may determine a cosine similarity between a first set of numbers and second set of numbers, and whether the cosine similarity exceeds a first threshold. The processor may determine a number of words in common between the two documents, and whether the number of words in common exceeds a second threshold. The processor may determine a number of sentences in common between the two documents, and whether that number exceeds a third threshold. Responsive to a determination that the first threshold, second threshold, or third threshold are exceeded, the processor may set a flag indicating that the second document is a duplicate.

SYSTEMS AND METHODS FOR IDENTIFYING DUPLICATE DOCUMENTS AND DETECTING MISREPRESENTATION

Systems, methods, and non-transitory computer readable media configured for identifying duplicate and misrepresented documents are provided. At least one processor may retrieve, from a first source, a first document, and may retrieve, from a second source, a second document. The processor may process each document. The processor may determine a cosine similarity between a first set of numbers and second set of numbers, and whether the cosine similarity exceeds a first threshold. The processor may determine a number of words in common between the two documents, and whether the number of words in common exceeds a second threshold. The processor may determine a number of sentences in common between the two documents, and whether that number exceeds a third threshold. Responsive to a determination that the first threshold, second threshold, or third threshold are exceeded, the processor may set a flag indicating that the second document is a duplicate.