Patent classifications
B42D25/30
Protecting private information provided on a transaction card and/or a document with a reflective element
A transaction card includes a card body, where the card body includes a surface with a first surface area. The surface of the card body includes private information that encompasses a second surface area of the surface, and the second surface area is less than the first surface area. The transaction card includes a reflective element that is applied to the surface of the card body, and includes a third surface area. The third surface area is based on the first surface area or the second surface area, and the third surface area enables the reflective element to reflect light away from the private information.
Protecting private information provided on a transaction card and/or a document with a reflective element
A transaction card includes a card body, where the card body includes a surface with a first surface area. The surface of the card body includes private information that encompasses a second surface area of the surface, and the second surface area is less than the first surface area. The transaction card includes a reflective element that is applied to the surface of the card body, and includes a third surface area. The third surface area is based on the first surface area or the second surface area, and the third surface area enables the reflective element to reflect light away from the private information.
Systems and methods for interrupting traditional counterfeiting workflows
This application relates generally systems and methods for interrupting counterfeiting workflows, and more specifically to methods for adequately concealing aspects of printer configuration, such as number of plates used to print a document or a setup of inks and split fountains. It is therefore possible to obscure the individual plate images and application of ink to those plate images, thereby impeding accurate redrawing of security artwork.
Systems and methods for interrupting traditional counterfeiting workflows
This application relates generally systems and methods for interrupting counterfeiting workflows, and more specifically to methods for adequately concealing aspects of printer configuration, such as number of plates used to print a document or a setup of inks and split fountains. It is therefore possible to obscure the individual plate images and application of ink to those plate images, thereby impeding accurate redrawing of security artwork.
Secure substrate
A secure substrate may include a base layer and an opacity layer disposed above the base layer. An optional background layer may be disposed above the opacity layer. The secure substrate may further include an inkjet receptive layer. A first inkjet receptive layer may be disposed above the background layer, and a second inkjet layer may be disposed below the base layer. The opacity layer may include copper such as metallic copper flakes or other particles. The opacity layer may also include a binder material such as polyvinyl alcohol, and in some cases also carbon black, process black, or the like.
Secure substrate
A secure substrate may include a base layer and an opacity layer disposed above the base layer. An optional background layer may be disposed above the opacity layer. The secure substrate may further include an inkjet receptive layer. A first inkjet receptive layer may be disposed above the background layer, and a second inkjet layer may be disposed below the base layer. The opacity layer may include copper such as metallic copper flakes or other particles. The opacity layer may also include a binder material such as polyvinyl alcohol, and in some cases also carbon black, process black, or the like.
Peel-able, tamper-evident security label for concealing information
A visual-information security system that includes an information security label positioned to conceal visual information on a substrate. The information security label may include a spiral-shaped cut (or other complex shape) within the body of the label and a pull-tab, such that when a user pulls on the tab, the label peels off of the substrate in a spiral pattern, revealing the information concealed beneath the label. The complex-shaped cut makes reapplication of the label difficult and evident, thus providing security to consumers. The label may include multiple layers of material, for example, a peel-off layer and an adhesive layer.
Peel-able, tamper-evident security label for concealing information
A visual-information security system that includes an information security label positioned to conceal visual information on a substrate. The information security label may include a spiral-shaped cut (or other complex shape) within the body of the label and a pull-tab, such that when a user pulls on the tab, the label peels off of the substrate in a spiral pattern, revealing the information concealed beneath the label. The complex-shaped cut makes reapplication of the label difficult and evident, thus providing security to consumers. The label may include multiple layers of material, for example, a peel-off layer and an adhesive layer.
Schemes to validate and protect secure documents
Aspects described herein may provide detection of a feature of an authorization code image (ACI) incorporated onto a document, thereby allowing for validation of the document. According to some aspects, these and other benefits may be achieved by an instance of a variable protocol that may specify how to generate the ACI to have a particular feature as well as how to detect the particular feature of the ACI. A recipient of the document incorporating the ACI may detect the particular feature of the ACI. If the detected feature matches an expected feature, then the ACI and the document may be determined to be authentic.
Schemes to validate and protect secure documents
Aspects described herein may provide detection of a feature of an authorization code image (ACI) incorporated onto a document, thereby allowing for validation of the document. According to some aspects, these and other benefits may be achieved by an instance of a variable protocol that may specify how to generate the ACI to have a particular feature as well as how to detect the particular feature of the ACI. A recipient of the document incorporating the ACI may detect the particular feature of the ACI. If the detected feature matches an expected feature, then the ACI and the document may be determined to be authentic.