WO2015154019A2 - Payment device with holographic security element - Google Patents

Payment device with holographic security element Download PDF

Info

Publication number
WO2015154019A2
WO2015154019A2 PCT/US2015/024332 US2015024332W WO2015154019A2 WO 2015154019 A2 WO2015154019 A2 WO 2015154019A2 US 2015024332 W US2015024332 W US 2015024332W WO 2015154019 A2 WO2015154019 A2 WO 2015154019A2
Authority
WO
WIPO (PCT)
Prior art keywords
contacts
security
orifice
reader
hologram
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2015/024332
Other languages
French (fr)
Other versions
WO2015154019A3 (en
Inventor
Dori K SKELDING
Julian SCHMID
Kenneth Sippola
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visa International Service Association
Original Assignee
Visa International Service Association
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa International Service Association filed Critical Visa International Service Association
Priority to KR1020167027387A priority Critical patent/KR102449391B1/en
Priority to CA2944388A priority patent/CA2944388A1/en
Priority to CN201580018412.0A priority patent/CN106575374B/en
Priority to SG11201608112YA priority patent/SG11201608112YA/en
Priority to EP15773543.2A priority patent/EP3127047A4/en
Priority to AU2015240515A priority patent/AU2015240515B2/en
Publication of WO2015154019A2 publication Critical patent/WO2015154019A2/en
Publication of WO2015154019A3 publication Critical patent/WO2015154019A3/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03HHOLOGRAPHIC PROCESSES OR APPARATUS
    • G03H1/00Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
    • G03H1/0005Adaptation of holography to specific applications
    • G03H1/0011Adaptation of holography to specific applications for security or authentication
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03HHOLOGRAPHIC PROCESSES OR APPARATUS
    • G03H1/00Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
    • G03H1/02Details of features involved during the holographic process; Replication of holograms without interference recording
    • G03H1/0252Laminate comprising a hologram layer
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/16Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being a hologram or diffraction grating
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06103Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07743External electrical contacts

Definitions

  • Payment devices such as credit cards and debit cards have a limited amount of space, or real estate, for relevant information to be displayed.
  • security measures such as a security chip.
  • Security chips have contacts that may be required to be in predetermined places on the card such that when the card is place in a reader, the contacts will be in communication with contacts in the reader.
  • An object that enables electronic commerce is disclosed where the object has a holographic image on security contacts.
  • the contacts may be in communication with a security element that provides security features.
  • the contacts may be placed in predetermined locations but may be extended to create an identifiable image.
  • the object may have an orifice or opening in the shape of an identifiable image.
  • a transaction element may be placed within the orifice.
  • the transaction element may have a plurality of security contacts that together form a shape that complements the orifice.
  • FIG. 1 is an overhead view of a sample object and a reader
  • Fig. 2 is a view of a layers of a sample object
  • FIGs. 3a-3b are views of security contacts with a hologram as seen from different angles;
  • Figs. 4a-4c are views of security contacts with a hologram as seen from different angles;
  • Figs. 5a-5c are views of objects with security contacts with a hologram as seen from different angles;
  • Figs. 6a-6b are views of security contacts with a hologram of letters as seen from different angles;
  • Figs. 7a-7c are layers of an object with an orifice in the shape of an identifiable image
  • Fig. 8 is an illustration of combining an identifiable image and security contacts to form security contacts in an identifiable image
  • Fig. 9 is an illustration of combining an identifiable image and security contacts to form security contacts in an identifiable image
  • Fig. 10a illustrates a rectangular orifice
  • Fig. 10b illustrates an orifices in an identifiable image shape
  • Fig. 1 1 is an illustration of combining an identifiable image and security contacts to form security contacts in an identifiable image
  • Figs. 12a-12b are illustrations of combining an identifiable image and security contacts to form security contacts in an identifiable image with a hologram being visible on the security contacts;
  • Figs. 13a-13c are illustrations of combining an identifiable image and security contacts to form security contacts in an identifiable image with a hologram being visible on the security contacts;
  • Fig. 14 is an illustration of an identifiable image with multiple sets of security contacts.
  • the object 100 may illustrate an object 100 for enabling electronic commerce. Examples and not limitations of the object 100 may include credit cards, debit cards or other cards such as driver's licenses, library cards, etc.
  • the object 100 may be any object that has a transaction element 1 10 which may be a device to provide security.
  • the shape of the object 100 may be many and varied so long as the necessary communication between security contacts 130 and a card reader 120 may be accomplished with a minimum amount of undesired adjustments such that the security contacts 130 on the object 100 and the card reader 120 may communicate promptly to facilitate a transaction.
  • a transaction element 1 10 on transaction objects 100 such as credit cards and debit cards may have security contacts 130 that may have to be in predetermined locations on the object 100 such that when the object 100 is placed in a reader 120, the contacts 130 will be aligned with, and thus may communicate with, contacts in the reader 120. While the location of the transaction element 1 10 may vary, it may be useful to have the transaction element 1 10 and security contacts 130 in a consistent and known place on the object 100 so that communication may be easily established in a consistent and routine manner. Once in contact with a card reader 120, the transaction element 1 10 may communicate with the reader 120 and a security element 230 (Fig. 2) in the object 100 to verify that the object 100 was properly issued and is not a fake.
  • the shape of the object 100 may vary but there may be guidelines that limit the creativity of the shape of the object 100.
  • the object 100 may be configured to fit into traditional card readers 120 that have restrictions on the size and shape of the object 100.
  • many card readers 120 may require at least part of the object 100 to be of a predetermined thickness to fit in or even through a card reader 120.
  • an object 100 may be made up of a plurality of layers 200-220. If the object 100 is too thick, it will not fit into the card reader 120. Similarly, the width and length of the object 100 may be subject to card reader 120 limits which may be based on agreed upon standards. Similarly, if the object 100 is too wide, it may not work with traditional card readers 120 with security card readers.
  • the object 100 may be of a shape such that it may easily and reliably fit into a card reader 120 and the transaction element 1 10 may consistently and reliably be in communication with the card reader 120. Logically, if an object 100 is too small, it may not be a tight fit in the card reader 120 and the security contacts 130 may not consistently and reliably make contact with the card reader 120.
  • the object 100 may be of a size and shape that is convenient for a user to carry. Many wallets, phone cases, purses, etc., have dedicated spaces to hold transaction objects 100 like credit cards. It may be helpful and more acceptable if the object 100 fits in such traditional spaces.
  • innovative shapes may also work. In some embodiments, the innovative shapes may operate with existing card readers 120 with security readers and in other embodiments, the card readers 120 may be modified to accept objects 100 with different shapes and different arrangements of security contacts 130. As an example, an object 100 may be shaped to fit on a keychain and the reader 120 may be designed to accept the keychain object and still make the necessary contact with the security contacts 130.
  • the object 100 may also be of a size such that advertisements and logos may crowded.
  • some credit cards may accumulate points for a particular purpose, such as airline miles. In such a case, a logo for the airline may be on the card.
  • an issuing bank may also desire to have its name on the card.
  • the card processor may also have their name on the card.
  • a name or slogan for the card may be on the card.
  • the card may have the name of the card holder, an expiration date and an account number.
  • the face or first surface of the object 100 may be quite crowded.
  • a transaction element 1 10 may have one of more security contacts 130 that are in communication with a security element 230 that may be contained inside the transaction object 100.
  • the security element 230 may be separate from the transaction element 1 10 so long as the security element 230 is in communication with the security contacts 130.
  • the security contacts 130 may be of a material that is conductive such that the security contacts 130 can communicate signals to a card reader 120.
  • the security contacts 130 for the security element 230 may have a holographic image 300 on the security contacts 130.
  • Holograms are often included on objects like credit cards as holograms are difficult to produce without special equipment. Therefore, it is more difficult to make a fraudulent card as making a hologram without the special equipment is very difficult.
  • the security hologram may be applied to the visible surface of the security contacts 130. While there may be non-conductive spaces between and/or around the security contacts 130, the hologram 300 may still be visible on the security contacts 130. In this way, the security of a hologram image 300 is present, the security of the security element 230 is present, and the hologram image 300 may add to the visual impact of the object 100.
  • the image of a hologram 300 may change depending on the viewing angle.
  • the hologram 300 may be of a side of an airplane when viewed at a first angle and the image in Fig. 3b may be of the front of an airplane when viewed from a second angle.
  • the security contacts 130 may continue to communicate with the security element 230 and the card reader 120 while providing a visually interesting appearance.
  • the hologram 300 may have three images available to be seen as the viewing angle is changed. At a first viewing angle as in Fig. 4a, a first car model may be viewed, at a second angle as in Fig.
  • Figs. 4b an additional car model may be viewed and at a third angle as in Fig. 4c, yet another car model may be viewed.
  • Figs. 5a-5c show the hologram 300 on the security contacts 130 as part of the object 100.
  • Figs. 6a-6b illustrate an example where letters make up the hologram 300 and the letters change as the view of the hologram 300 changes.
  • the hologram 300 may be applied directly to the security contacts 130.
  • the hologram 300 may be applied to a conductive foil and the conduction foil may be applied with a conductive adhesive to the security contacts 130.
  • the hologram 300 may be produced with more familiar machinery and the entire security element 230 may not need to be handled to apply the hologram 300.
  • equipment could be easily modified to apply the hologram 300 directly to the security contacts 130.
  • Holograms made using lasers, chemicals, etchings, embossing, films, masks or any appropriate manner are appropriate and are contemplated.
  • the object 100 may have an orifice 720 in a shape of an identifiable image 700.
  • the identifiable image 700 may be in the shape of a logo for a corporation.
  • the identifiable image may be in the shape of a soft drink bottle for a soft drink company.
  • the identifiable image may be in the shape of a recognizable object like a car for an auto manufacturer or as an airplane for an airline.
  • the orifice 720 may be in the shape of one or more letters where the letters may be a recognizable, identifiable image 700.
  • Figs. 7a-7c may illustrate a sample layered view of the object.
  • the orifice 720 may only proceed partially through the object 100 and in other embodiments, the orifice 720 may proceed through the entire object 100.
  • a first orifice 720 may partially proceed through the object 100 and on the other side, a mirror image of the orifice 720 may proceed partially through the object 100 such that the object 100 may be inserted with either side up and the security contacts 130 will be able to be read by the card reader 120.
  • the orifices 720 may be created in a variety of ways.
  • a router type device may be used to route the orifice 720 from the object 100.
  • the object 100 may be made up of a variety of layers and the orifice 720 may be punched, cut, burned of otherwise be removed from the appropriate layers of the object 100.
  • a transaction element 1 10 may be placed such as illustrated in Fig. 7b.
  • the transaction element 1 10 may have a plurality of security contacts 130 that together form a shape that complements the orifice 720.
  • the security contacts 130 may be in communication with a security element 230 that provides security features.
  • the security contacts 130 may be placed in predetermined locations but may be extended to create the complementary identifiable image.
  • the transaction element 1 10 may have a lower layer that is larger than the security contacts 130 which may encompass the security element 230.
  • the lower layer including the security element 230 may be hidden under an exterior layer of the object and the lower layer may assist in holding the transaction element 1 10 in place.
  • the transaction element 1 10 may be placed in the intermediate layer of the object 100 such as in Fig. 7b and an additional layer such as in Fig. 7a may be placed over the inner layer to cover part of the transaction element 1 10 and hold the transaction element 1 10 in place.
  • an adhesive may be used to assist in holding the transaction element 1 10 in place.
  • the transaction element 1 10 may be of a similar size to the orifice 720. In such an example, the transaction element 1 10 may be placed in the orifice 720 and may be held in place using an adhesive or any other appropriate manner.
  • a shape plus the security contact 130 may result in an orifice 720 in the object 100 that can accept security contacts 130 of the complementary shape.
  • Fig. 9 illustrates how the security contacts 130 may be created to create an image of an identifiable image 900.
  • Fig. 10a may illustrate an object 100 with a traditional rectangular orifice 720 for the security contacts 130 and Fig. 10b may illustrate an orifice 720 in the shape of an identifiable image 900 of a bird head for the security contacts 130.
  • Fig. 1 1 may be another example of creating the security contacts 130 in the shape of an identifiable image 900 of a car.
  • a hologram 300 may still be applied to some or all of the security contacts 130 when the contacts are in an identifiable image 900.
  • an eye of the bird may a hologram and the eye may open and close based on the viewing angle.
  • Figs. 12a-12b may illustrate an airplane hologram 300 in an oval shape from a first view and from a second view with the security contacts 130 being part of the identifiable image 900.
  • Figs. 13a-13c may illustrate a series of automobiles as holograms 300 in a round shape on the identifiable image 900 shaped from the security contacts 130.
  • the security contact or contacts 130 may together form a
  • the security contacts 130 may communicate to the security element 230 and may allow communication between the card reader 120 and the security element 230 to ensure the object 100 or card has been issued from a non-fraudulent source.
  • the security contacts 130 may be at a level such that the card reader 120 may be capable of communicating with the security contacts 130. At the same time, the security contacts 130 may not protrude to such a point that that security contacts 130 would snag in everyday usage or interfere with traditional card readers 120. In some embodiments, the security contacts 130 may be virtually level with the face of the object 100. In other embodiments, the security contacts 130 may protrude slightly to make communication with the card reader 120 easier. In yet an additional embodiment, the security contacts 130 may be slightly below the level of the face of the object 100. Logically, the various card readers 120 may need to be considered to ensure that effective, reliable and repeatable communication may be enabled between the security contacts 130 and the card reader 120. For example, if common card readers 120 expect slightly raised security contacts 130 and the security contacts 130 are slightly embedded, communication may be unreliable and ineffective.
  • the security element 230 may have a given thickness and users may desire a thin object 100 which may result in the security contacts 130 protruding from the object 100. Logically, if the object 100 is especially thick, the security contacts 130 may be slightly below the surface of the face of the object 100.
  • the security element 230 may be a variety of technologies. In some embodiments, the security element 230 may be a simple resistor which may return a desired voltage when a known voltage is applied to the resistor. In a more complex embodiment, the security element 230 may include a processor that may operate when power from the card reader 120 is applied to the contacts 130. The processor may then execute a virtually limitless number of operations based on the inputs from the card reader 120.
  • the object 100 may have a mirror image of the security contacts 130 on the second side of the object 100.
  • the second set of contacts 130 may also be in communication with the security element 230. In this way, the object 100 may be placed into the card reader 120 with either a first side toward the card reader 120 or with a second side toward the card reader 120.
  • a plurality of security elements 230 in the object 100 may have its own set of security contacts 130.
  • a first set of contacts 130 may be in communication with a first security element 230 and a second set of contacts 130 may be in communication with a second security element 230.
  • the first security contacts 130 and second security contacts 130 may form a single set of security contacts 130 or the first set of security contacts 130 may be physically separate from the second set of security contacts 130.
  • a first set of contacts 130 may be on the front of the object 100 and a second set of contacts 130 may be on the back of the object 100.
  • the second (or even more) security elements 230 may have different purposes.
  • a first security element 230 may be for computing security and a second security element 230 may be for transactional security such as making purchases.
  • one or more of the security elements 230 may be programmable by an administrator or person with authority to access the security elements 230. For example, a first security element 230 may be locked and
  • a second security element 230 may be programmable by an authority.
  • the security element 230 includes a processor
  • numerous security schemes may be included on a single security element 230.
  • the security element 230 may have an initial interface which may include an application programming interface. Based on the received input, different branches or security may be accessed. In this way a single processor may provide security for a variety of uses.
  • the second side of the object 100 may be smooth.
  • a magnetic stripe may be embedded in the second side of the object 100 and the surface may be substantially flat.
  • the magnetic stripe may cause a slight increase in the surface.
  • the second surface may be substantially smooth but may have an orifice 720 with security contacts 130 which may be at a variety of levels as previously explained.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Credit Cards Or The Like (AREA)
  • Holo Graphy (AREA)

Abstract

An object that enables electronic commerce is disclosed where the object has a holographic image on security contacts. The security contacts may be in communication with a security element that provides security features. The contacts may be placed in predetermined locations but may be extended to create a complementary identifiable image.

Description

PAYMENT DEVICE WITH HOLOGRAPHIC SECURITY ELEMENT
Cross Reference to Related Applications
[0001] This application claims priority to, and the benefit of, U.S. Provisional Patent App. Serial No. 61/975,106, titled "Payment Device with Holographic Security Element," filed April 4, 2014, the entire content of which is hereby incorporated by reference.
Background
[0002] Payment devices such as credit cards and debit cards have a limited amount of space, or real estate, for relevant information to be displayed. At the same time, there is a need for some space on the card to be dedicated to security measures, such as a security chip. Security chips have contacts that may be required to be in predetermined places on the card such that when the card is place in a reader, the contacts will be in communication with contacts in the reader. These security measures are becoming more and more important over time as fraud continues to be a problem. Thus, it would be useful for some of the space on a card to serve dual purposes, such as security and for brand awareness.
Summary
[0003] The following presents a simplified summary of the present disclosure in order to provide a basic understanding of some aspects of the disclosure. This summary is not an extensive overview of the disclosure. It is not intended to identify key or critical elements of the disclosure or to delineate the scope of the disclosure. The following summary merely presents some concepts of the disclosure in a simplified form as a prelude to the more detailed description provided below. [0004] An object that enables electronic commerce is disclosed where the object has a holographic image on security contacts. The contacts may be in communication with a security element that provides security features. The contacts may be placed in predetermined locations but may be extended to create an identifiable image. In addition, in some embodiments, the object may have an orifice or opening in the shape of an identifiable image. A transaction element may be placed within the orifice. The transaction element may have a plurality of security contacts that together form a shape that complements the orifice.
Brief Description of the Drawings
[0005] The invention may be better understood by reference to the detailed description when considered in connection with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. In the figures, like reference numerals designate corresponding parts throughout the different views.
[0006] Fig. 1 is an overhead view of a sample object and a reader;
[0007] Fig. 2 is a view of a layers of a sample object;
[0008] Figs. 3a-3b are views of security contacts with a hologram as seen from different angles;
[0009] Figs. 4a-4c are views of security contacts with a hologram as seen from different angles;
[0010] Figs. 5a-5c are views of objects with security contacts with a hologram as seen from different angles; [0011] Figs. 6a-6b are views of security contacts with a hologram of letters as seen from different angles;
[0012] Figs. 7a-7c are layers of an object with an orifice in the shape of an identifiable image;
[0013] Fig. 8 is an illustration of combining an identifiable image and security contacts to form security contacts in an identifiable image;
[0014] Fig. 9 is an illustration of combining an identifiable image and security contacts to form security contacts in an identifiable image;
[0015] Fig. 10a illustrates a rectangular orifice;
[0016] Fig. 10b illustrates an orifices in an identifiable image shape;
[0017] Fig. 1 1 is an illustration of combining an identifiable image and security contacts to form security contacts in an identifiable image;
[0018] Figs. 12a-12b are illustrations of combining an identifiable image and security contacts to form security contacts in an identifiable image with a hologram being visible on the security contacts;
[0019] Figs. 13a-13c are illustrations of combining an identifiable image and security contacts to form security contacts in an identifiable image with a hologram being visible on the security contacts; and
[0020] Fig. 14 is an illustration of an identifiable image with multiple sets of security contacts.
[0021] Persons of ordinary skill in the art will appreciate that elements in the figures are illustrated for simplicity and clarity so not all connections and options have been shown to avoid obscuring the inventive aspects. For example, common but well- understood elements that are useful or necessary in a commercially feasible embodiment are not often depicted in order to facilitate a less obstructed view of these various embodiments of the present disclosure. It will be further appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein are to be defined with respect to their
corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
SPECIFICATION
[0022] The present invention now will be described more fully with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific exemplary embodiments by which the invention may be practiced. These illustrations and exemplary embodiments are presented with the understanding that the present disclosure is an exemplification of the principles of one or more inventions and is not intended to limit any one of the inventions to the embodiments illustrated. The invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. The following detailed description is, therefore, not to be taken in a limiting sense. [0023] Fig. 1 may illustrate an object 100 for enabling electronic commerce. Examples and not limitations of the object 100 may include credit cards, debit cards or other cards such as driver's licenses, library cards, etc. The object 100 may be any object that has a transaction element 1 10 which may be a device to provide security. At a high level, the shape of the object 100 may be many and varied so long as the necessary communication between security contacts 130 and a card reader 120 may be accomplished with a minimum amount of undesired adjustments such that the security contacts 130 on the object 100 and the card reader 120 may communicate promptly to facilitate a transaction.
[0024] Security measures are becoming more and more important over time as fraud continues to be a problem. A transaction element 1 10 on transaction objects 100 such as credit cards and debit cards may have security contacts 130 that may have to be in predetermined locations on the object 100 such that when the object 100 is placed in a reader 120, the contacts 130 will be aligned with, and thus may communicate with, contacts in the reader 120. While the location of the transaction element 1 10 may vary, it may be useful to have the transaction element 1 10 and security contacts 130 in a consistent and known place on the object 100 so that communication may be easily established in a consistent and routine manner. Once in contact with a card reader 120, the transaction element 1 10 may communicate with the reader 120 and a security element 230 (Fig. 2) in the object 100 to verify that the object 100 was properly issued and is not a fake.
[0025] The shape of the object 100 may vary but there may be guidelines that limit the creativity of the shape of the object 100. As an example, the object 100 may be configured to fit into traditional card readers 120 that have restrictions on the size and shape of the object 100. For example, many card readers 120 may require at least part of the object 100 to be of a predetermined thickness to fit in or even through a card reader 120.
[0026] As illustrated in Fig. 2, in an exaggerated view, an object 100 may be made up of a plurality of layers 200-220. If the object 100 is too thick, it will not fit into the card reader 120. Similarly, the width and length of the object 100 may be subject to card reader 120 limits which may be based on agreed upon standards. Similarly, if the object 100 is too wide, it may not work with traditional card readers 120 with security card readers. The object 100 may be of a shape such that it may easily and reliably fit into a card reader 120 and the transaction element 1 10 may consistently and reliably be in communication with the card reader 120. Logically, if an object 100 is too small, it may not be a tight fit in the card reader 120 and the security contacts 130 may not consistently and reliably make contact with the card reader 120.
[0027] Further, the object 100 may be of a size and shape that is convenient for a user to carry. Many wallets, phone cases, purses, etc., have dedicated spaces to hold transaction objects 100 like credit cards. It may be helpful and more acceptable if the object 100 fits in such traditional spaces. At the same time, innovative shapes may also work. In some embodiments, the innovative shapes may operate with existing card readers 120 with security readers and in other embodiments, the card readers 120 may be modified to accept objects 100 with different shapes and different arrangements of security contacts 130. As an example, an object 100 may be shaped to fit on a keychain and the reader 120 may be designed to accept the keychain object and still make the necessary contact with the security contacts 130.
[0028] The object 100 may also be of a size such that advertisements and logos may crowded. For example, some credit cards may accumulate points for a particular purpose, such as airline miles. In such a case, a logo for the airline may be on the card. Similarly, an issuing bank may also desire to have its name on the card. Logically, the card processor may also have their name on the card. Finally, a name or slogan for the card may be on the card. Of course, the card may have the name of the card holder, an expiration date and an account number. There may be a hologram that may be used to verify the object 100 is properly issued. Finally, there may be a transaction element 1 10 with security contacts 130 in a predetermined location which may be in communication with a security element 230. As a result, the face or first surface of the object 100 may be quite crowded. Thus, it would be useful for some of the space on the object 100 to serve dual purposes, such as security and for brand awareness.
[0029] A transaction element 1 10 may have one of more security contacts 130 that are in communication with a security element 230 that may be contained inside the transaction object 100. Of course, the security element 230 may be separate from the transaction element 1 10 so long as the security element 230 is in communication with the security contacts 130. The security contacts 130 may be of a material that is conductive such that the security contacts 130 can communicate signals to a card reader 120.
[0030] In some embodiments, the security contacts 130 for the security element 230 may have a holographic image 300 on the security contacts 130. Holograms are often included on objects like credit cards as holograms are difficult to produce without special equipment. Therefore, it is more difficult to make a fraudulent card as making a hologram without the special equipment is very difficult. In these embodiments, the security hologram may be applied to the visible surface of the security contacts 130. While there may be non-conductive spaces between and/or around the security contacts 130, the hologram 300 may still be visible on the security contacts 130. In this way, the security of a hologram image 300 is present, the security of the security element 230 is present, and the hologram image 300 may add to the visual impact of the object 100.
[0031] As is known, the image of a hologram 300 may change depending on the viewing angle. For example, in Fig. 3a, the hologram 300 may be of a side of an airplane when viewed at a first angle and the image in Fig. 3b may be of the front of an airplane when viewed from a second angle. At the same time, the security contacts 130 may continue to communicate with the security element 230 and the card reader 120 while providing a visually interesting appearance. In another embodiment as illustrated in Figs. 4a-4c, the hologram 300 may have three images available to be seen as the viewing angle is changed. At a first viewing angle as in Fig. 4a, a first car model may be viewed, at a second angle as in Fig. 4b, an additional car model may be viewed and at a third angle as in Fig. 4c, yet another car model may be viewed. Figs. 5a-5c show the hologram 300 on the security contacts 130 as part of the object 100. Figs. 6a-6b illustrate an example where letters make up the hologram 300 and the letters change as the view of the hologram 300 changes. [0032] In one embodiment, the hologram 300 may be applied directly to the security contacts 130. In other embodiment, the hologram 300 may be applied to a conductive foil and the conduction foil may be applied with a conductive adhesive to the security contacts 130. In this way, the hologram 300 may be produced with more familiar machinery and the entire security element 230 may not need to be handled to apply the hologram 300. Of course, equipment could be easily modified to apply the hologram 300 directly to the security contacts 130. Holograms made using lasers, chemicals, etchings, embossing, films, masks or any appropriate manner are appropriate and are contemplated.
[0033] In an additional embodiment as illustrated in Figs. 7a-7b, the object 100 may have an orifice 720 in a shape of an identifiable image 700. In some embodiments, the identifiable image 700 may be in the shape of a logo for a corporation. As an example, the identifiable image may be in the shape of a soft drink bottle for a soft drink company. In another embodiment, the identifiable image may be in the shape of a recognizable object like a car for an auto manufacturer or as an airplane for an airline. In other embodiments, the orifice 720 may be in the shape of one or more letters where the letters may be a recognizable, identifiable image 700.
[0034] Figs. 7a-7c may illustrate a sample layered view of the object. In addition, in some embodiments, the orifice 720 may only proceed partially through the object 100 and in other embodiments, the orifice 720 may proceed through the entire object 100. In some embodiments, a first orifice 720 may partially proceed through the object 100 and on the other side, a mirror image of the orifice 720 may proceed partially through the object 100 such that the object 100 may be inserted with either side up and the security contacts 130 will be able to be read by the card reader 120.
[0035] The orifices 720 may be created in a variety of ways. In one embodiment, a router type device may be used to route the orifice 720 from the object 100. In another embodiment, the object 100 may be made up of a variety of layers and the orifice 720 may be punched, cut, burned of otherwise be removed from the appropriate layers of the object 100.
[0036] In the orifice 720, a transaction element 1 10 may be placed such as illustrated in Fig. 7b. The transaction element 1 10 may have a plurality of security contacts 130 that together form a shape that complements the orifice 720. The security contacts 130 may be in communication with a security element 230 that provides security features. The security contacts 130 may be placed in predetermined locations but may be extended to create the complementary identifiable image.
[0037] In some embodiments, the transaction element 1 10 may have a lower layer that is larger than the security contacts 130 which may encompass the security element 230. In this embodiment, the lower layer including the security element 230 may be hidden under an exterior layer of the object and the lower layer may assist in holding the transaction element 1 10 in place. The transaction element 1 10 may be placed in the intermediate layer of the object 100 such as in Fig. 7b and an additional layer such as in Fig. 7a may be placed over the inner layer to cover part of the transaction element 1 10 and hold the transaction element 1 10 in place. In addition, an adhesive may be used to assist in holding the transaction element 1 10 in place. [0038] In some other embodiments, the transaction element 1 10 may be of a similar size to the orifice 720. In such an example, the transaction element 1 10 may be placed in the orifice 720 and may be held in place using an adhesive or any other appropriate manner.
[0039] As illustrated in Fig. 8, a shape plus the security contact 130 may result in an orifice 720 in the object 100 that can accept security contacts 130 of the complementary shape. Fig. 9 illustrates how the security contacts 130 may be created to create an image of an identifiable image 900. Fig. 10a may illustrate an object 100 with a traditional rectangular orifice 720 for the security contacts 130 and Fig. 10b may illustrate an orifice 720 in the shape of an identifiable image 900 of a bird head for the security contacts 130. Fig. 1 1 may be another example of creating the security contacts 130 in the shape of an identifiable image 900 of a car.
[0040] Of course, a hologram 300 may still be applied to some or all of the security contacts 130 when the contacts are in an identifiable image 900. For example, in Fig. 9, an eye of the bird may a hologram and the eye may open and close based on the viewing angle. Figs. 12a-12b may illustrate an airplane hologram 300 in an oval shape from a first view and from a second view with the security contacts 130 being part of the identifiable image 900. Figs. 13a-13c may illustrate a series of automobiles as holograms 300 in a round shape on the identifiable image 900 shaped from the security contacts 130.
[0041] In shape, the security contact or contacts 130 may together form a
complementary shape to the orifice 720. While there may be non-conductive spaces between and/or around the security contacts 130, the overall shape of the contacts 130 may take a shape that is complementary to the orifice 720. The security contacts 130 may communicate to the security element 230 and may allow communication between the card reader 120 and the security element 230 to ensure the object 100 or card has been issued from a non-fraudulent source.
[0042] In all the embodiments, the security contacts 130 may be at a level such that the card reader 120 may be capable of communicating with the security contacts 130. At the same time, the security contacts 130 may not protrude to such a point that that security contacts 130 would snag in everyday usage or interfere with traditional card readers 120. In some embodiments, the security contacts 130 may be virtually level with the face of the object 100. In other embodiments, the security contacts 130 may protrude slightly to make communication with the card reader 120 easier. In yet an additional embodiment, the security contacts 130 may be slightly below the level of the face of the object 100. Logically, the various card readers 120 may need to be considered to ensure that effective, reliable and repeatable communication may be enabled between the security contacts 130 and the card reader 120. For example, if common card readers 120 expect slightly raised security contacts 130 and the security contacts 130 are slightly embedded, communication may be unreliable and ineffective.
[0043] In addition, physical limitations may have an effect on the height of the security contacts 130. For example, the security element 230 may have a given thickness and users may desire a thin object 100 which may result in the security contacts 130 protruding from the object 100. Logically, if the object 100 is especially thick, the security contacts 130 may be slightly below the surface of the face of the object 100. [0044] The security element 230 may be a variety of technologies. In some embodiments, the security element 230 may be a simple resistor which may return a desired voltage when a known voltage is applied to the resistor. In a more complex embodiment, the security element 230 may include a processor that may operate when power from the card reader 120 is applied to the contacts 130. The processor may then execute a virtually limitless number of operations based on the inputs from the card reader 120.
[0045] In addition, in some embodiments, the object 100 may have a mirror image of the security contacts 130 on the second side of the object 100. Logically, the second set of contacts 130 may also be in communication with the security element 230. In this way, the object 100 may be placed into the card reader 120 with either a first side toward the card reader 120 or with a second side toward the card reader 120.
[0046] In another embodiment, for enhanced security, there may be a plurality of security elements 230 in the object 100 and each may have its own set of security contacts 130. For example, as illustrated in Fig. 14, a first set of contacts 130 may be in communication with a first security element 230 and a second set of contacts 130 may be in communication with a second security element 230. The first security contacts 130 and second security contacts 130 may form a single set of security contacts 130 or the first set of security contacts 130 may be physically separate from the second set of security contacts 130. For example, a first set of contacts 130 may be on the front of the object 100 and a second set of contacts 130 may be on the back of the object 100.
[0047] In addition, the second (or even more) security elements 230 may have different purposes. For example, a first security element 230 may be for computing security and a second security element 230 may be for transactional security such as making purchases.
[0048] In some embodiments, one or more of the security elements 230 may be programmable by an administrator or person with authority to access the security elements 230. For example, a first security element 230 may be locked and
unmodifiable while a second security element 230 may be programmable by an authority.
[0049] In embodiments wherein the security element 230 includes a processor, numerous security schemes may be included on a single security element 230. For example, the security element 230 may have an initial interface which may include an application programming interface. Based on the received input, different branches or security may be accessed. In this way a single processor may provide security for a variety of uses.
[0050] In some embodiments, the second side of the object 100 (opposite the first security element 230) may be smooth. In some embodiments, a magnetic stripe may be embedded in the second side of the object 100 and the surface may be substantially flat. In other embodiments, the magnetic stripe may cause a slight increase in the surface. Of course, if there are multiple security elements 230 and one is on the second side, the second surface may be substantially smooth but may have an orifice 720 with security contacts 130 which may be at a variety of levels as previously explained.
[0051] Of course, the examples and descriptions are to provide guidance to the reader and are not meant to be limiting or exclusive. There are many manners of creating such an object, all of which are contemplated and included.

Claims

Claims
1 . An object for enabling electronic commerce comprising: a first surface defining an orifice, wherein a transaction element is contained within the orifice, wherein the transaction element comprises: a plurality of contacts in communication with a security element wherein the contacts are in predetermined locations and wherein a holographic image is visible on a visible section of the plurality of contacts; and a second surface opposite the first surface.
2. The object of claim 1 , wherein the transaction element comprises an identifiable shape complementary to the orifice independent from the predetermined locations.
3. The object of claim 2, wherein the plurality of contacts together are
complementary to the orifice and form the identifiable shape.
4. The object of claim 3, wherein the security element is configured to provide a signal that the object is valid.
5. The object of claim 1 , wherein the plurality of contacts are adapted to communicate with a reader.
6. The object of claim 2, wherein the identifiable shape comprises a logo or a brand.
7. The object of claim 2, wherein the identifiable shape comprises a letter or a good.
8. The object of claim 1 , wherein a thickness of the object allows the object to be accessed and read by a reader.
9. The object of claim 1 , wherein the second surface is continuous.
10. The object of claim 1 , wherein the second surface comprises a magnetic information stripe.
1 1 . The object of claim 1 , wherein a width and length of the object allows the object to be accessed and read by a reader.
12. An object for enabling electronic commerce comprising: a first surface defining an orifice, wherein a transaction element is situated within the orifice, wherein the transaction element comprises: a plurality of contacts which together are complementary to the orifice and are in communication with a security element, the plurality of contacts: being at a level adapted to communicate with a reader; being positioned at predetermined locations; and comprising a visible hologram on a visible surface of the contacts; and a second surface opposite the first surface.
13. The object of claim 12, wherein the transaction element forms an identifiable shape independent from the predetermined locations of the plurality of contacts.
14. The object of claim 13, wherein the transaction element comprises a visible hologram on the first surface of the object.
15. The object of claim 13, wherein the identifiable shape comprises at least one of a logo, a brand, and a letter.
16. The object of claim 12, wherein a thickness of the object allows the object to be accessed and read by a reader.
17. The object of claim 12, wherein the second surface is continuous.
18. The object of claim 12, wherein the second surface comprises a magnetic information stripe.
19. The object of claim 12, wherein a width and length of the object allows the object to be accessed and read by a reader.
20. The object of claim 12, wherein the security element is configured to provide a signal that the object is valid.
PCT/US2015/024332 2014-04-04 2015-04-03 Payment device with holographic security element Ceased WO2015154019A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
KR1020167027387A KR102449391B1 (en) 2014-04-04 2015-04-03 Payment device with holographic secure element
CA2944388A CA2944388A1 (en) 2014-04-04 2015-04-03 Payment device with holographic security element
CN201580018412.0A CN106575374B (en) 2014-04-04 2015-04-03 Payment device with holographic security element
SG11201608112YA SG11201608112YA (en) 2014-04-04 2015-04-03 Payment device with holographic security element
EP15773543.2A EP3127047A4 (en) 2014-04-04 2015-04-03 Payment device with holographic security element
AU2015240515A AU2015240515B2 (en) 2014-04-04 2015-04-03 Payment device with holographic security element

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201461975106P 2014-04-04 2014-04-04
US61/975,106 2014-04-04

Publications (2)

Publication Number Publication Date
WO2015154019A2 true WO2015154019A2 (en) 2015-10-08
WO2015154019A3 WO2015154019A3 (en) 2015-12-03

Family

ID=54210105

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/024332 Ceased WO2015154019A2 (en) 2014-04-04 2015-04-03 Payment device with holographic security element

Country Status (8)

Country Link
US (1) US9916580B2 (en)
EP (1) EP3127047A4 (en)
KR (1) KR102449391B1 (en)
CN (1) CN106575374B (en)
AU (1) AU2015240515B2 (en)
CA (1) CA2944388A1 (en)
SG (1) SG11201608112YA (en)
WO (1) WO2015154019A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3726432B1 (en) 2019-04-18 2023-06-07 MK Smart JSC Patterned smart card module
EP3889839A1 (en) * 2020-03-31 2021-10-06 Thales Dis France Sa Method for optimised graphic customisation of smart card modules and module obtained

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259035B1 (en) 1995-06-27 2001-07-10 Orga Kartensysteme Gmbh Chip card
EP2339511A1 (en) 2009-12-17 2011-06-29 Gemalto SA Communicating object securing a communication interface by contact

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19530608A1 (en) * 1995-08-21 1997-02-27 Orga Kartensysteme Gmbh Security smart card with first use indication
DE19606782C1 (en) * 1996-02-23 1998-01-08 Orga Kartensysteme Gmbh Method for producing a chip card and chip card produced therewith
DE19626702C1 (en) * 1996-07-03 1997-12-18 Orga Kartensysteme Gmbh Chip card with contacts
EP0912962B1 (en) * 1996-07-15 2000-04-05 Austria Card Plastikkarten und Ausweissysteme Gesellschaft MBH Data carrier with a module and a hologram
US5837153A (en) * 1997-01-15 1998-11-17 Kawan; Joseph C. Method and system for creating and using a logotype contact module with a smart card
GB2331727A (en) * 1997-12-01 1999-06-02 Allan Walter Sills Contact smart card with security device fixed to surface avoiding electrical contact areas
FR2772494B1 (en) * 1997-12-15 2001-02-23 Gemplus Card Int CHIP CARD WITH GUARANTEE LABEL
US6193163B1 (en) * 1998-08-31 2001-02-27 The Standard Register Company Smart card with replaceable chip
HUP9802755A3 (en) * 1998-11-27 2002-05-28 Optilink Ab Holographic chip and optical system for the holographic chip
US7837116B2 (en) * 1999-09-07 2010-11-23 American Express Travel Related Services Company, Inc. Transaction card
US6641049B2 (en) * 2000-08-31 2003-11-04 Pacusma Company, Ltd. Integrated circuit card with multiple integral electronic modules
US6601771B2 (en) * 2001-04-09 2003-08-05 Smart Card Integrators, Inc. Combined smartcard and magnetic-stripe card and reader and associated method
KR20030075498A (en) * 2002-03-19 2003-09-26 (주)맥스소프트 Method and apparatus for assuring an integrity of a smart card using holography technologies
EP1842124A4 (en) * 2004-10-19 2008-04-16 Veritec Inc SECURED CARDS AND ASSOCIATED METHODS
FR2877462B1 (en) 2004-10-29 2007-01-26 Arjowiggins Security Soc Par A STRUCTURE COMPRISING AN ELECTRONIC DEVICE FOR THE MANUFACTURE OF A SAFETY DOCUMENT.
CN101213484A (en) * 2005-07-05 2008-07-02 皇家飞利浦电子股份有限公司 Security Display Components
CN101395619A (en) * 2005-12-19 2009-03-25 国际先端技术综合研究所株式会社 Card capable of authentication
FR2932910B1 (en) * 2008-06-20 2011-02-11 Smart Packaging Solutions Sps CARD WITHOUT CONTACT WITH SECURITY LOGO
DE102012014604A1 (en) * 2012-07-24 2014-05-15 Giesecke & Devrient Gmbh Method for producing a chip module
FR2996662B1 (en) * 2012-10-05 2014-10-17 Ask Sa METHOD FOR MANUFACTURING CONTACTLESS CHIP CARD WITH TRANSPARENT LOGO
EP3083264A4 (en) * 2013-12-19 2017-08-23 Black Card LLC Transaction cards and associated methods
US9299020B2 (en) * 2014-03-19 2016-03-29 TheCARD LLC Financial transaction card with cutout pattern representing symbolic information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259035B1 (en) 1995-06-27 2001-07-10 Orga Kartensysteme Gmbh Chip card
EP2339511A1 (en) 2009-12-17 2011-06-29 Gemalto SA Communicating object securing a communication interface by contact

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3127047A4

Also Published As

Publication number Publication date
CA2944388A1 (en) 2015-10-08
AU2015240515A1 (en) 2016-10-13
AU2015240515B2 (en) 2019-08-15
EP3127047A2 (en) 2017-02-08
WO2015154019A3 (en) 2015-12-03
KR102449391B1 (en) 2022-09-29
EP3127047A4 (en) 2017-11-08
SG11201608112YA (en) 2016-10-28
US20150287027A1 (en) 2015-10-08
CN106575374A (en) 2017-04-19
KR20160141741A (en) 2016-12-09
CN106575374B (en) 2020-06-09
US9916580B2 (en) 2018-03-13

Similar Documents

Publication Publication Date Title
US10276070B2 (en) Stored value card and carrier system with tamper evident label
WO2008021428A3 (en) Portable magnetic stripe reader for criminality security applications
US10896365B2 (en) Multi-layered body, and security document
US10147031B2 (en) Transaction card having internal magnetic stripe
AU2015240515B2 (en) Payment device with holographic security element
US20170202327A1 (en) Protective credit card cover
US11790071B2 (en) Embedded trace capacitive signet stamp
US9743733B2 (en) Card identity concealment device
CN105124889A (en) Novel contactless metal shielding information data card and production method thereof
Council RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
GB2571310A (en) Security of contactless cards
Dahli Gray CHIP CARDS Are Consumers Ready?
GRAY CHIP CARDS.
Winkworth An Approach to Near Field Data Selection in Radio Frequency Identification
Jordovic Pavlovic Advantages and disadvantages in implementation of smart cards in payment system
CN104239932A (en) Double-storage-medium campus smart card

Legal Events

Date Code Title Description
REEP Request for entry into the european phase

Ref document number: 2015773543

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015773543

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2944388

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 20167027387

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2015240515

Country of ref document: AU

Date of ref document: 20150403

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15773543

Country of ref document: EP

Kind code of ref document: A2