[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20050189427A1 - Coin-discriminator voucher anti-counterfeiting method and apparatus - Google Patents

Coin-discriminator voucher anti-counterfeiting method and apparatus Download PDF

Info

Publication number
US20050189427A1
US20050189427A1 US10/653,699 US65369903A US2005189427A1 US 20050189427 A1 US20050189427 A1 US 20050189427A1 US 65369903 A US65369903 A US 65369903A US 2005189427 A1 US2005189427 A1 US 2005189427A1
Authority
US
United States
Prior art keywords
voucher
indicia
substrate
thermally responsive
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/653,699
Inventor
David Brown
Steven Geiger
Timothy Manion
Scott Scherer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coinstar LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/422,917 external-priority patent/US6349972B1/en
Application filed by Individual filed Critical Individual
Priority to US10/653,699 priority Critical patent/US20050189427A1/en
Priority to US10/894,358 priority patent/US7464868B2/en
Assigned to JPMORGAN CHASE BANK, AS ADMINISTRATIVE AGENT reassignment JPMORGAN CHASE BANK, AS ADMINISTRATIVE AGENT SECURITY AGREEMENT Assignors: COINSTAR, INC.
Publication of US20050189427A1 publication Critical patent/US20050189427A1/en
Assigned to COINSTAR, INC. reassignment COINSTAR, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JPMORGAN CHASE BANK, N.A.
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY AGREEMENT Assignors: COINSTAR, INC.
Priority to US12/235,574 priority patent/US7931304B2/en
Assigned to COINSTAR, LLC reassignment COINSTAR, LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: OUTERWALL INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/14Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using chemical means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D15/00Printed matter of special format or style not otherwise provided for
    • B42D15/0053Forms specially designed for commercial use, e.g. bills, receipts, offer or order sheets, coupons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/343Cards including a counter
    • G06Q20/3437Cards including a counter the counter having non-monetary units, e.g. trips
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/42Coin-freed apparatus for hiring articles; Coin-freed facilities or services for ticket printing or like apparatus, e.g. apparatus for dispensing of printed paper tickets or payment cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/201Accessories of ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G5/00Receipt-giving machines
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S283/00Printed matter
    • Y10S283/901Concealed data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S283/00Printed matter
    • Y10S283/902Anti-photocopy

Definitions

  • the present invention relates to the provision of vouchers in connection with a coin-discriminator and/or counter and in particular ways of deterring, reducing, eliminating or detecting unauthorized duplication or counterfeiting of vouchers.
  • At least some types of coin-discriminators are configured to receive a plurality of coins of various denominations, e.g., from untrained users (such as grocery store or other retail location customers), typically including non-coin items and/or foreign or other undesired coins, to discriminate the various denominations of the desired coins (possibly after separating non-coin items and/or undesired coins) to determine the value of the discriminated desired coins, and to output an indication of the value of the total amount of the discriminated, desired coins.
  • untrained users such as grocery store or other retail location customers
  • a voucher including paperless output (such as depositing a value in a user's bank account, e.g., after reading a user's bank card or other identifier)
  • the present invention is particularly directed to devices which include apparatus or procedures for outputting a physical voucher such as a paper voucher with indicia indicating a value related to the total amount of discriminated, desired coins.
  • a physical voucher such as a paper voucher with indicia indicating a value related to the total amount of discriminated, desired coins.
  • a physical or “paper” voucher has value, in the sense that it can be redeemed for, e.g., cash or credit, it is important for the redeemer to have confidence that a voucher which is presented for redemption is genuine, i.e., is not an unauthorized duplicate or counterfeit voucher. Verifying the genuineness of a voucher is especially difficult in the face of sophisticated image production, reproduction or manipulation technologies such as color photocopy technology, color scanning technologies, computer-based printing technologies such as inkjet (including color inkjet) or laser (including color laser) printer, e.g., coupled to personal computers, work stations and the like. Accordingly, it would be useful to provide vouchers whose genuineness can be readily determined, as compared to an unauthorized duplicate or counterfeit voucher, e.g., produced using such image duplication production, reproduction or manipulation technologies.
  • Some approaches to detecting unauthorized duplication or counterfeiting have involved encrypting certain information which is then printed on the voucher as part of the voucher printing procedure such that decryption provides a level of confidence that the voucher is genuine.
  • encryption/decryption procedures can be quite useful (and indeed, can, if desired, be used in combination with some or all features of the present invention), there are circumstances in which it may be desirable to provide for other counterfeit detection measures, in addition to or in place of such encryption/decryption measures.
  • thermal printers can be particularly useful because of the lack of a requirement to replenish ink or toner.
  • Thermal printers typically operate in conjunction with a type of paper specific to thermal printing (“thermal paper”). Thermal paper often has characteristics which limit how the paper may be treated (e.g., limiting the types of ink or other materials that may be used in connection with providing, for example background preprinting, watermarks and the like). Accordingly, it would be useful to provide voucher duplication/counterfeiting detection or prevention which can be reasonably and feasibly used with thermal papers and/or thermal printers (e.g., without incurring relatively high costs).
  • an anti-counterfeiting system which provides for detection of unauthorized duplications or counterfeits (at least in part) using a visual inspection of the voucher
  • a system in which all anti-counterfeiting features are features which are normally visible also means that potential counterfeiters can determine what features need to be copied or duplicated by performing a visual inspection of a valid voucher. Accordingly, it would be useful, in some embodiments, to provide at least some anti-counterfeiting features which are not normally visible, i.e., which are not visible in ordinary ambient light of a redemption location.
  • voucher redemption is performed at a retail location, such as during ordinary retail purchase “check out”, it would be useful to provide anti-counterfeiting procedures or devices which can be performed relatively rapidly so as to avoid checkout line delays.
  • anti-counterfeiting features can be used for verification without the need for special positioning or manipulation of a voucher and/or without the need for manually inputting features or information from the voucher and preferably without the need to provide special equipment for voucher verification at checkout locations.
  • voucher anti-counterfeiting measures which include features that can be provided with little or no modification of coin-discriminator hardware and/or retail location check-out hardware.
  • a coin counter discriminator may be provided which receives and counts a plurality of coins and outputs a voucher, i.e., an output which itself has a value, related to the value of the arbitrary number of multi-denominated counted coins, and which may be redeemed or exchanged for such value.
  • a coin counter/discriminator a number of such discriminators are positioned at retail locations and are configured to facilitate use by untrained users, particularly, ordinary untrained customers (as opposed to, e.g., employees) of the retain locations.
  • Such users typically bring jars or other containers having a plurality of coins to the machine and dump the coins into a coin receiving region or area, in a random, jumbled mass, i.e., in an unoriented fashion, with the coins typically being of a plurality of different denominations, and often including non-coin items (paper items, lint, keys, screws, washers and the like) and/or foreign or other non-acceptable or undesirable coins.
  • the machine is configured to discriminate and/or separate acceptable or desirable coins from other objects and also to discriminate one denomination of coin from another.
  • the acceptable coins are counted, preferably by denomination, and a total of acceptable coins or a total value of acceptable coins is determined in this manner.
  • the acceptable coins are retained, e.g., in a bin or bag within the discriminator and non-coin objects, unacceptable coins or undiscriminable objects are treated as waste and/or returned to the user.
  • a coin discriminator could not be configured to output government-issued paper currency (“cash”) in response to at least some of the counted and retained acceptable coins
  • the value of the voucher is not necessarily equal to the “face value” of the counted acceptable coins. In one embodiment, the value of the voucher will be equal to the value of the counted coins minus a fee charged for the counting service.
  • the fee may be calculated in a number of fashions such as a flat fee, a fee based on the number of coins counted, a fee which takes into consideration the types or denominations of the coins counted, a fee which is a percentage of the value or a weighted percentage based on type or denomination of coins, and the like. It would also be possible to provide a configuration in which the value of the voucher exceeded the face value of the counted coins, e.g., as a promotion to encourage use of the machine for a limited period or to take into account coins which have an actual value exceeding the face value (e.g., recognized rare or otherwise valuable coins) and the like.
  • a voucher is in the form of a paper slip printed with certain information, as described more fully below, the voucher may also take other forms including digital or electronic codes recorded on or transferred to a magnetic card, a smart card, transferred to a bank account or other account, e.g., over a preferably encrypted or otherwise secure telephone or other communication link, transferred to a computer such as a retail location “back room” computer or other computer (e.g., to credit a user's account or provide a credit against purchases and the like).
  • a computer such as a retail location “back room” computer or other computer (e.g., to credit a user's account or provide a credit against purchases and the like).
  • a user will use or obtain the value of the voucher, e.g., by redeeming the voucher.
  • a user such as a retail customer will present the voucher to a retail cashier (e.g., the cashier at a grocery store checkout location), often as part of a purchase transaction, the retail cashier will redeem the voucher by paying the voucher in cash or by providing a credit for the amount of the voucher against purchases made by the customer.
  • a retail cashier e.g., the cashier at a grocery store checkout location
  • the voucher itself is treated as having value and accordingly, there is a potential for unscrupulous individuals to obtain or devise a counterfeit, duplicate or altered voucher in order to obtain value to which they are not entitled.
  • some individuals may attempt to make one or more photocopies, or otherwise duplicate a voucher and present it for redemption.
  • Some individuals may attempt to counterfeit an entire voucher, such as by drafting or composing an image of a voucher.
  • Some individuals may alter a legitimate voucher (or an image of a legitimate voucher), e.g., changing the amount or value indicated or encoded on or in the voucher. Accordingly, it would be useful to provide a system which assists in detecting duplicate, counterfeit or altered vouchers.
  • voucher processing is facilitated with the use of store checkout equipment such as checkout (point-of-sale or “POS”) computers, scanners and the like.
  • POS point-of-sale
  • modifications of such equipment to provide for additional functions can involve additional programming time, can increase execution or processing time, can involve additional programming time, can increase execution or processing time, can impose extra computing burden on processors in such systems and may require linking the POS system to an external system, thus involving additional hardware and requiring extensing programming and/or system configuration. Accordingly, it would be advantageous to provide a system for detecting duplicate, counterfeit, or alternate vouchers which can achieve rapid voucher processing without undue burden on existing computer, scanning or other equipment at retail locations.
  • checkout equipment includes the capability of bar code scanning, e.g., for identifying merchandise.
  • the associated software is configured to recognize bar codes according to a standard bar code system such as a system promulgated by the Uniform Code Council Inc. of Dayton, Ohio. Accordingly, it would be useful to provide a system for detecting counterfeit, duplicate or altered vouchers which was at least partially (preferably, fully) compatible with a standard bar code system.
  • the present invention includes at least one and preferably a plurality of features provided in or on paper (or other substrate) used for printing a voucher.
  • at least some portions of the paper are pre-printed or otherwise pre-provided (i.e., printed or provided prior to the printing or providing of indicia indicating the value of the voucher) in ink which is not readily reproducible by ordinary color photocopiers, such as certain fluorescent inks.
  • the paper (or other substrate) is provided with a plurality of perforations in a pattern which is not readily reproducible such as a pattern including curved or otherwise non-linear patterns of perforation preferably with the perforations being relatively small and closely spaced and the pattern defining relatively tight-radiused but preferably substantially continuous curves.
  • the voucher is provided with printing on both surfaces which are registered relative to one another in such a fashion that the registration may be readily verified (e.g., by holding the voucher up to a light or otherwise backlighting a voucher so as to view at least some portions of printing on the two surfaces simultaneously).
  • portions of the voucher are printed with a material which has relatively low visibility, or is substantially invisible, until such portion is treated or manipulated, e.g., such as by rubbing or scratching with a coin or other object.
  • At least two or more anti-counterfeiting features of a voucher can be verified by viewing only one surface of the voucher, i.e., without the need to flip the voucher over to view the opposite side.
  • some or all features are features which permit voucher verification using only visual inspection of the voucher, i.e., without the need to use any equipment.
  • at least one feature is a feature which is not readily apparent in ordinary or typical light (so as to render it difficult for a potential counterfeiter to even be aware of, much less to duplicate, such feature) such as providing markings which fluoresce or otherwise have detectable properties when viewed in specific types of light such as ultraviolet light.
  • the voucher paper is preprinted or preprovided with indicia which are oriented in different fashions (such as both vertically and horizontally) and/or are positioned near the edge of the paper or are otherwise oriented or positioned in a fashion which may be difficult to duplicate with typical computer-based printers.
  • a voucher includes information usable for ascertaining the validity of a voucher, but which is provided preferably in an altered form such as being permuted, shifted, encrypted or the like.
  • a person who alters a voucher such as by changing the printed or displayed amount, cannot avoid detection of the alteration without also knowing how to permute, shift, encode, etc., the information used for validation.
  • any permutation, shifting, encryption or the like which is used is of a nature that once the procedure for reversing the permutation, shifting or other encryption is known, execution of the reverse processes (e.g., reverse shifting, decryption), can be performed relatively easily (e.g., automatically, by a computer) so as to impose relatively minor computing or time burdens on the validation process.
  • execution of the reverse processes e.g., reverse shifting, decryption
  • encryption refers generally to altering the form or appearance of information (preferably so as to prevent at least the casual viewer/reader from understanding the information) in such a way that it may be manipulated to recover the original information but such that it is not readily apparent, from the altered information, how the altered information is related to the original information.
  • Encryption includes, but is not limited to, permuting digits or characters of a field, adding, subtracting, multiplying or dividing (to or by) key values, performing binary operations on digital fields, performing operations on concatenated fields and the like.
  • a voucher in one embodiment, includes a printed, human-readable indication of an amount, and, preferably includes a transaction number or other identifier number.
  • An encoded version of the amount, transaction number, transaction date, expiration date, retail location, or combination(s) thereof is also printed or encoded, preferably as at least part of a bar code (to facilitate validation and redemption).
  • the bar code or other encoded number is decrypted or otherwise processed to recover the value and transaction number.
  • the value and/or transaction number can then be used as part of a validation process such as by comparing the recovered encoded value to the printed value or transaction number and/or checking the transaction number or the like against a negative checklist (i.e., a list of transaction numbers which have already been redeemed or are otherwise suspect).
  • Vouchers which are not validated can be refused payment or can be more closely inspected or provided with an identification process, such as recording the customer's driver's license number, getting manager approval, and the like.
  • a number of systems can be used for altering or encoding values, transaction numbers or combinations.
  • Two basic (not necessarily exhaustive) classes of encryption include using a not-generally-known algorithm, and a known key, and using a not-generally known key with a known algorithm.
  • one or more tables are used, e.g., to control digi shifting and/or digit or value addition/subtraction. By basing such processes on tables, time and computing burdens are reduced (as compared with, e.g., more computationally burdensome processes such as standard encryption/decryption) and it becomes relatively straightforward to change the alteration system (e.g., by downloading one or more new value tables).
  • Other types of manipulation can be used such as digital/binary conversions and the like. In this way, many types of voucher alterations or fabrications become apparent upon an attempted redemption and monetary losses attributable to such alterations or fabrications are reduced or eliminated.
  • FIG. 1 is a perspective view of a coin-discriminating device, in an opened configuration, of a type which may be used in at least one implementation of the present invention
  • FIG. 2 is a block diagram depicting certain components of a coin discriminator of a type which can be used in accordance with implementation of the present invention
  • FIG. 3A is a front view of a voucher of a type which may be used according to one embodiment of the present invention.
  • FIG. 3B is a view of the back surface of the voucher of FIG. 3A with FIG. 3B being positioned in alignment with FIG. 3A to show relative locations of features on opposite surfaces;
  • FIG. 4 is a partial perspective view of a perforation wheel according to an embodiment of the present invention.
  • FIG. 5 is a front view of a voucher according to one embodiment of the present invention.
  • FIG. 6 is a view of a back surface of a voucher according to one embodiment of the present invention.
  • FIG. 7 depicts the appearance of a voucher of a type which may be used in accordance with an embodiment of the present invention.
  • FIGS. 8 A-C are flowcharts depicting voucher generation validation and redemption according to certain embodiments of the present invention.
  • FIG. 9 is a flowchart depicting a transaction number/value manipulation procedure according to an embodiment of the present invention.
  • FIG. 10 depicts a transaction number/value manipulation procedure according to an embodiment of the present invention.
  • FIG. 11 depicts a store system including a coin discriminator of a type usable in connection with embodiments of the present invention.
  • FIG. 1 is a perspective view of a coin-discriminator of a type which can be used in connection with embodiments of the present invention.
  • the embodiment depicted in FIG. 1 generally includes a coin counting/sorting portion 12 , a voucher dispensing portion 14 a and a coupon dispensing portion 14 b .
  • the coin counting portion 12 includes an input tray 16 , a coin return region 22 , and customer I/O devices, including a keyboard 24 , additional keys 26 , a speaker 28 and a video screen 32 .
  • the apparatus can include various indicia, signs, displays, advertisement and the like on its external surfaces.
  • a power cord 34 provides power to the mechanism.
  • a voucher printer 18 is mounted on the inside of the door 36 a .
  • a number of printers can be used for this purpose.
  • a model KLDS0503 printer available from Axiohm is used.
  • the right-hand portion of the cabinet includes a coupon feeder 42 for dispensing, e.g., pre-printed manufacturer coupon sheets through a chute 44 to a coupon hopper on the outside portion of the door 36 b .
  • a computer 46 in the depicted embodiment, is positioned at the top of the right hand portion of the cabinet in order to provide a relatively clean, location for the computer.
  • An I/O board 48 is positioned adjacent the sheet feeder 42 .
  • the general coin path for the embodiment depicted in FIG. 1 is from the input tray 16 , doves first and second chutes to a trommel 52 , to a coin pickup assembly 54 , along a coin rail 56 and past a sensor 58 . If, based on sensor data, it is determined that the coin can and should be accepted, a controllable deflector door 62 is activated to divert coins from their gravitational path to coin tubes 64 a. b for delivery to coin trolleys 66 a, b . If it has not been determined that a coin can and should be accepted, the door 62 is not activated and coins (or other objects) continue down their gravitational or default path to a reject chute 68 for delivery to a customer-accessible reject or return box 22 .
  • a user is provided with instructions such as on computer screen 32 .
  • the user places a mass of coins, typically of a plurality of denominations (typically accompanied by dirt or other non-coin objects) in the input tray 16 .
  • the user is prompted to push a button to inform the machine that the user wishes to have coins discriminated.
  • the computer causes an input gate (not shown) to open and provides a signal to prompt the user to begin feeding coins
  • a motor is activated to begin rotating the trommel assembly 52 .
  • the user moves coins over the peaked output edge 72 of the input tray 16 , typically by lifting or pivoting the tray by handle 74 , and/or manually feeding coins over the peak 72 .
  • the coins pass the gate (typically set to prevent passage of more than a predetermined number of stacked coins, such as by defining an opening equal to about 3.5 times a typical coin thickness).
  • Instructions on the screen 32 may be used to tell the user to continue or discontinue feeding coins, can relay the status of the machine, the amount counted thus far, provide encouragement or advertising messages and the like.
  • the coin rail 56 functions to receive coins output by the coin pickup assembly 54 , and transports the coins in a singulated (one-at-a-time) fashion past the sensor 58 to the diverting door 62 . Once no more coins are detected and/or in response to user input, the system determines that the transaction is complete and the computer 46 will send instructions to he printer 18 causing the printer to output a voucher of a type which may be exchanged for Hoods, services or cash.
  • FIG. 2 is a block diagram of a coin-discriminator of a type which can be used in accordance with implementations of the present invention. Some of the items in FIG. 2 correspond to components in the device of FIG. 1 .
  • an untrained user such as a grocery store or other retail location customer places a plurality of coins of unknown value and random orientation in a receiving tray or other receiving area 16 .
  • foreign or other undesirable coins and foreign objects such as currency or other paper, paper clips, lint, keys and the like are mixed with the desired coins and placed, such as being poured or dumped, substantially all at once, into the tray 16 .
  • a conveyance device 214 such as a chute, trough, slide or the like, or including positive drive or otherwise moving conveyances such as conveyer belts, Archimedes' screws and the like, are used to provide at least some of the desired coins from the receiving area 16 to a coin-discriminator 218 .
  • a conveyance device 214 such as a chute, trough, slide or the like, or including positive drive or otherwise moving conveyances such as conveyer belts, Archimedes' screws and the like, are used to provide at least some of the desired coins from the receiving area 16 to a coin-discriminator 218 .
  • the discriminator 216 provides a signal to a calculating device, preferably a computer with sufficient information regarding the number of desired coins of various denominations such that the computer 46 can output or store a value equal to or related to (such as being a predetermined amount or portion less than) the value of the desired discriminated coins which are then placed in one or more bins 66 or other receiving regions.
  • the computer 46 at the end of a transaction (as indicated by lack of further input of coins for a predetermined period and/or input from a user) controls a paper voucher printer 18 to print, on paper (or other substrates) obtained from a roll of paper or other paper supply 226 a redeemable voucher for an amount related to the total value of the discriminated desired coins for this transaction.
  • FIGS. 3A and 3B depict a number of features of a voucher useful for avoiding, preventing and/or detecting unauthorized duplication or counterfeiting of vouchers.
  • FIGS. 3A and 3B are presented herein in a fashion which indicates the relative positions of the indicia or marking on the front surface ( FIG. 3A ) and the opposite or rear surface ( FIG. 3B ). I.e., features which are shown as aligned in corresponding locations in FIGS. 3A and 3B are features which would appear at corresponding longitudinal positions on opposite surfaces of the voucher.
  • the rear surface ( FIG. 3B ) of the voucher includes printing 312 generally in the central region 314 of the rear surface.
  • printing 312 is provided using an ink which, if copied using a conventional color photocopier, will result in a photocopy which is altered in appearance with respect to the original printing 312 .
  • the printing 312 is in a fluorescent or metallic ink, preferably a fluorescent orange ink which, when photocopied, appears as a purple or maroon color rather than an orange color.
  • inks which do not readily photocopy, it is which is believed that many such inks cannot readily be applied to thermal paper.
  • examples of inks which can be used, and which have been found to be useful for application to thermal paper include neon pink PMS 805 , neon yellow PMS 803 and neon green PMS 802 . It should be understood that these represent examples of inks which may be used but are not intended to be an exhaustive listing.
  • the rear surface of the voucher also contains printing 316 , positioned on or relatively close (such as within about 1/4 inch, preferably within 1/10th inch of) the voucher edge 318 a , 318 b .
  • the edge printing 316 is also provided in an ink which is not readily photocopied without an alteration in appearance.
  • the edge printing 316 is in a color different from that of the central printing 312 and, in one embodiment, is provided in fluorescent yellow ink.
  • the central printing 312 is in a first (e.g., lateral) orientation
  • the edge printing 316 is in an orientation which is at an angle (e.g., 90°) to the first orientation (e.g., vertical).
  • some or all anti-counterfeiting features described herein can be provided as pre-printing or pre-providing (i.e., can be provided on the paper stock or paper supply 226 before it is fed to the printer 18 ).
  • This is particularly useful in connection with providing the edge printing 316 relatively close to the edges 318 a, b since close-to-edge printing is a feature which is difficult to reproduce with many inkjet, laser or other computer based printers (which often require a minimum space, such as a space no less than about 1/4 inch, between the paper edge and printing provided by such printer).
  • FIGS. 3A and 3B certain visible features on the front and rear surfaces are registered, such that they occur in a predetermined spatial relationship on the front and rear surfaces.
  • printed rectangles 324 a , 324 b on the rear surface are aligned with indicia (in this case, star logos) 326 a,b,c,d on the front surface.
  • the printing of the indicia 326 a,b,c,d on the front surface is of such a nature that it is at least partially visible when viewing the rear surface, such as when the voucher is held up to the light or otherwise backlit in such a fashion that the indicia 326 a , 326 c appear to be registered within the box 324 a when viewing the rear surface.
  • the registration is of a nature (such as providing for relatively close sizing and spacing of the logos 326 as compared to the boxes 324 ) such that even relatively small misregistration (i.e., in which the printing on the front surface is not precisely aligned with corresponding printing on the rear surface) is readily detectable by visual inspection.
  • Such opposite-surface printing provides registration on the front and rear surfaces which are mix-registered in either a longitudinal or vertical direction by no more than about 1/8 inches, preferably no more than about 1/16 inches and more preferably no more than about 1/32 inches.
  • a pattern of perforations 332 is visible on both surfaces of the voucher.
  • perforations are typically in straight lines or a series of straight line segments.
  • perforations are provided in a pattern which includes some portions which having a curved appearance (even though each individual perforation may itself be straight) such as depicted in FIGS. 3A and 3B .
  • Such curved-pattern perforations are believed to be useful since they are readily visibly verified and relatively difficult for a counterfeiter to copy or reproduce.
  • the curved pattern includes portions 334 which have a relatively small radius of curvature such as radius of curvature of less than about 1/2 inch, preferably less than about 1/4 inch.
  • the perforations are micro-perforations, such that each perforation has a length of about 0.4 mm, a width of about 0.01 mm, and an inter-perforation spacing of about 0.2 mm.
  • regions or indicia are preprinted 342 using an ink or other substance which preferably is substantially non-apparent or invisible (such as having a color, reflectivity, texture and the like closely matching that of the unprinted paper), but which, when rubbed or scratched with the edge of a coin, will cause minute amounts of the coin to rub off and adhere only to the printed portion, leaving a visible mark (indicated in FIG. 3 by phantom lines 342 ).
  • such indicia are provided by printing using an ink which includes titanium oxide.
  • the pattern of perforations is provided in conjunction with the process of printing the value of the voucher using the printer 224 .
  • the paper moves from a first exit position 412 and is conveyed, e.g., by pinch rollers 414 a , 414 b across the edge of a perforating roller 416 whose edge has, radially protruding therefrom, a plurality of perforation-producing punches or spikes 418 .
  • FIG. 4 in one embodiment as the paper, following the printing, leaves the printer 224 , the paper moves from a first exit position 412 and is conveyed, e.g., by pinch rollers 414 a , 414 b across the edge of a perforating roller 416 whose edge has, radially protruding therefrom, a plurality of perforation-producing punches or spikes 418 .
  • the punches 418 are positioned on the edge of the roller 416 in a manner to produce the desired perforation pattern (in the depicted embodiment, in a sinusoidal or wave-like pattern corresponding to the pattern depicted in FIGS. 3A and 3B ).
  • the paper 412 is thus continuously perforated along its edge as it is conveyed toward a downstream position 422 and, eventually, dispensed to the user.
  • the rate of rotation 424 of the roller 416 can be controlled and coordinated with the rate of paper movement 426 by a gear train, one or more motor controllers or other coordinator 228 in a manner that will be well known to those of skill in the art after understanding the present disclosure.
  • the roller 416 can also be freewheeling, with rotation being driven by the paper movement.
  • the perforation is described as occurring upon exit of the paper from the printer, the perforating wheel could also be positioned to provide perforation to the paper as it enters the printer or at other locations that will be apparent to those of skill in the art upon understanding the present disclosure.
  • some or all of a unit of the paper supply 226 (such as each roll of thermal paper) is associated with one or more serial numbers or other identifying numbers.
  • the paper is preprinted, along the edge of the front surface, with such serial number or serial numbers.
  • a single serial number associated with a roll of thermal paper and this number is printed at spaced intervals in a vertical fashion near an edge of the voucher, preferably within less than 1/4 inch of the edge (similar to the manner described above in connection with the back surface edge printing 316 depicted in connection with FIG. 3B ).
  • the serial number (or serial numbers) associated with the paper supply is also printed by the coin discriminator printer 18 , e.g., substantially at the time the voucher value 514 is printed.
  • the coin discriminator printer 18 e.g., substantially at the time the voucher value 514 is printed.
  • service personnel load a roll of paper into the paper supply unit 226
  • such personnel also enter the serial number associated with the roll into the computer 46 , e.g., using an I-O device such as a keyboard, touch screen, or similar device 232 .
  • the computer 46 has the information needed to control the printer 18 so as to print an identifier number 516 on the face of the voucher which will match the preprinted serial numbers 512 on the paper stock to permit the grocery store clerk or other redeemer to easily visually verify a match between the preprinted serial number 512 and the discriminator-printed serial number 516 .
  • FIG. 5 depicts an embodiment in which a single serial number is associated with a unit of paper stock and is identically printed at intervals 512 a , 512 b , 512 c , it is also possible to provide for identifying numbers which are preprinted on the paper stock, but which change along the length of a voucher or from one voucher to the next, such as incrementing by one or by some other number, or so as to change in some other manner (e.g., which is likely to be substantially unpredictable by a would-be counterfeiter).
  • the computer 46 it will be necessary for the computer 46 to be able to calculate or detect which preprinted serial number will be positioned near the area where the discriminator-printed number 516 will be printed so that the computer 46 can control the printer 18 to print a number 516 which will match the closest (or next preceding or succeeding) pre-printed serial number 512 b .
  • the printer 18 may be configured to inform the computer 46 of the number of inches of thermal paper that has been thus-far dispensed from the roll.
  • the computer 46 will have sufficient information to calculate, in a manner which will be well known to those of skill in the art after understanding the present disclosure, what number to print, using the printer 18 , so as to match the closest or next succeeding or preceding preprinted number.
  • FIG. 6 depicts features of a voucher useful for avoiding, preventing and/or detecting unauthorized duplication or counterfeiting of vouchers in accordance with one embodiment of the invention.
  • a substrate 201 such as a rear surface of a voucher, contains indicia, such as printing 616 , that responds to changes in temperature.
  • the printing 616 includes thermally responsive ink that becomes invisible when heated to or beyond an activation temperature.
  • the activation temperature is the lowest temperature at which the ink responds to heat.
  • the printing 616 is vermillion, thermo-chromic ink with an activation temperature of approximately 85 degrees Fahrenheit.
  • other colors and types of thermally responsive indicia can be used.
  • the thermally responsive ink could be substantially invisible at room temperature and become visible when heated to or beyond an activation temperature.
  • indicia with different activation temperatures can also be used in accordance with the disclosure.
  • thermally responsive indicia that has an activation temperature higher than typical room temperature and cooler than typical body surface temperature is that the indicia is thermally responsive to human touch. Accordingly, a person can breathe or touch the indicia for a few seconds and the indicia will respond, such as by becoming temporarily invisible.
  • thermally responsive indicia can be used on different areas of the voucher.
  • the rear surface of the voucher includes printing 612 generally in the central region 614 that is oriented at an angle of approximately 90 degrees relative to the printing 616 .
  • the printing 612 can include thermally responsive indicia, such as thermally responsive ink.
  • a front surface of the voucher can also include thermally responsive indicia.
  • thermally responsive ink can be placed on top of or proximate to other indicia, to camouflage the other indicia on the voucher.
  • black thermally responsive ink can be placed over text on a voucher.
  • the black thermally responsive ink can be placed so that it renders the text unrecognizable to a viewer, such as a substantially solid block of black thermally responsive ink over the text.
  • the thermally responsive ink when the thermally responsive ink is heated to the activation temperature, the thermally responsive ink disappears and the text becomes discernable to the viewer.
  • Thermally responsive indicia can be printed on a variety of substrates to provide voucher embodiments consistent with this disclosure.
  • the thermally responsive ink is printed on 20-22 pound base paper with a brightness of 88.5% (minimum) and a thermal color of black trace.
  • other types of paper, including thermal paper can be used.
  • the substrate could change color in response to a change in temperature.
  • the substrate could be dark or opaque initially, and then change to white or a lighter color when heat is applied.
  • a voucher incorporating this feature could include a thermally responsive substrate portion that is initially dark and located adjacent to other dark indicia to make the other dark indicia indiscernible. When heat is applied, the thermally responsive substrate portion changes to a lighter color, enabling the dark indicia to become discernable against the lighter background provided by the thermally responsive substrate.
  • the thermally responsive substrate could be light-colored initially, and then change to a darker color when heat is applied.
  • a voucher incorporating this feature could include a thermally responsive substrate portion that is initially light but configured to form the outline of indicia when heat is applied and it turns darker. When heat is applied to this voucher in the vicinity of the substrate, the thermally responsive substrate changes to a darker color, enabling the indicia to become discernable against the darker background provided by the thermally responsive substrate.
  • the thermal indicia provides one of several means to authenticate the voucher.
  • an individual such as a cashier in a store, breathes on or touches the thermally responsive printing 616 for approximately 2-10 seconds. If the printing substantially disappears, the printing 616 on the voucher is authenticated. The individual can then proceed to authenticate the other anticounterfeiting features (discussed above) on the voucher.
  • the present invention provides devices and procedures which facilitate reducing, eliminating, deterring and/or detecting attempts at unauthorized duplication and/or counterfeiting of vouchers.
  • the present invention provides counterfeiting detection features which can be relatively readily implemented such as requiring little or no hardware and/or software modification, and, in some embodiments, requiring only the use of paper or paper stock having one or more of the features as described herein, and, in this manner, at least some features of the present invention can be retrofit, i.e., implemented readily in existing coin discriminators.
  • the present invention provides at least some anti-counterfeiting or counterfeit detection features which use only, or primarily, visual inspection of the voucher and thus at least some features can be implemented without the need for modifying or adding hardware.
  • At least some anti-counterfeiting or counterfeiting detection features can be performed relatively rapidly, such as verifying the correct color of various printing or indicia, correct positioning or registration, correct patterning or configuration of perforations and the like), preferably without requiring the redeemer to flip or rotate the voucher or otherwise manipulate the voucher, or enter data or otherwise handle the voucher (other than, e.g., to hold it up to ordinary light) such that at least some anti-counterfeiting or counterfeit detection features of the present invention can be implemented without substantial delay at a checkout lane.
  • certain features of the invention are not readily apparent upon visual inspection of a valid voucher and thus would-be counterfeiters may find it difficult to reproduce such features.
  • at least some indicia are provided which fluoresce or have other visible characteristics only when exposed to ultraviolet or other special light.
  • at least some indicia are provided which are substantially invisible until rubbed or scraped with a coin or similar object.
  • the voucher is provided with features which are not readily reproduced or counterfeited without using devices or procedures which are typically not available to the general public.
  • perforations which are patterned in a curved, preferably tightly radiused pattern which preferably provides a periodic, smooth and/or repeating pattern and preferably is made using relatively small perforations are typically difficult to provide without special, not-readily-available, equipment.
  • a number of variations and modifications of the invention can also be used. It is possible to use some features of the invention without using others. For example, it is possible to use non-photocopying inks without using micro perforations, or it is possible to use front/back registered marks without using close-to-the-edge printing.
  • the present invention has been described in connection with avoiding, preventing or detecting unauthorized duplication or counterfeiting of a coin-discriminator voucher, the present invention can also be used in connection with avoiding unauthorized duplication or counterfeiting of other items such as coupons, checks, tickets (such as airline, subway or other transportation tickets, game, performance, concert or other event tickets, and the like) negotiable instruments and the like.
  • FIG. 7 shows the appearance of a voucher of a type which may be used in connection with embodiments of the present invention.
  • the present invention can be used with a number of types of paper or non-paper (such as electronic) vouchers.
  • the voucher is a paper voucher with a number of indicia printed thereon. Some of the indicia may be pre-printed (before a transaction occurs) or the entire voucher may be printed after coins are counted.
  • the voucher includes a coin discriminator or system logo or name 712 , the name and address of the retail location where the discriminator is located 714 , a tally of the number of various coin denominations counted 716 , an indication of the total value of coins counted 718 , an indication of the processing fee subtracted 722 , the value of worth of the voucher 724 a, b typically equal to the coin total 718 minus the processing fee 722 , instructional information regarding how to redeem the voucher 726 , a transaction number, a transaction date and time 732 , a store message 734 , a store or retail location logo 736 and a bar code 738 .
  • background printing 742 and/or microprinting and/or watermarking, encoded fibers and the like can be printed or provided as part of the paper or pre-printed, e.g., to assist in distinguishing counterfeit vouchers.
  • the bar code 738 is accompanied by a human readable, digital representation 744 of the number represented by the bar code 738 .
  • the 13-digit bar code 744 includes four fields—a two digit value indicative of the number system and type of item encoded (e.g., 2 equals random weight item, 3 equals National Drug Code, and the like) specified by the Uniform Code Council 746 .
  • a five-digit indication of the transaction number 748 e.g., equal to item 728
  • a five-digit encrypted or encoded item 752 as described more thoroughly below
  • a check digit 754 calculated according to the Uniform Code Council rules (used, e.g., in verifying that the bar code is scanned correctly).
  • the five-digit encrypted number 752 is an encryption of the voucher value 724 a, b .
  • Examples of possible encryption procedures are described below and numerous other types of encryption can be used.
  • a potential counterfeiter knows how to properly encrypt the value, when a voucher with an altered voucher value 724 a, b is presented, it is possible to use a verification procedure at the checkout stand to detect such alternation of the voucher by decrypting the encrypted value 752 and comparing to the value 724 a, b printed on the face of the voucher.
  • FIG. 8A shows the process of using a voucher with an encrypted value for use in detecting voucher alterations.
  • a customer normally inputs coins 812 , and the coin discriminator outputs a voucher 814 , similar to that depicted in FIG. 7 .
  • the customer presents the voucher for redemption 816 .
  • the encrypted number 752 is decrypted preferably by automatic or manual entry of the encrypted number 752 into a computer, such as a retail location checkout computer which, as depicted in FIG.
  • a retail location back room computer 1112 which contains decryption tables or other information or procedures for decrypting. If desired, it is possible to perform the step of validating the voucher 818 on only some presented vouchers, such as performing random or spot-checking of vouchers, checking only vouchers which are for an amount greater than a threshold amount, or which are older than a predetermined time or date.
  • the decrypted voucher value based on the encrypted value 752 is then compared, either automatically (e.g., by comparison in the point-of-purchase or back room computer) or manually (e.g., by displaying the decrypted amount which the clerk can visually compare with the value 724 a, b printed on the voucher) in order to validate the voucher 818 . Whereupon, if the voucher is valid, it is redeemed 822 .
  • a customer number or other identifier
  • the coin discriminator is configured to accept a “frequent-customer card,” credit card, debit card or the like identifying a customer or to receive identification information input by the customer
  • the customer identification preferably altered or encrypted, can be provided as part of the voucher information and used, e.g., to determine whether the person redeeming the voucher was the person who was identified on the voucher.
  • the voucher is configured to include machine-readable information 814 .
  • machine-readable information 814 By providing information in machine-readable form, it is possible to perform some or all steps involved in the voucher verification or redemption in an automatic fashion, e.g., without requiring keyboard or other manual output of voucher information.
  • the machine-readable information is read 824 after the customer presents the voucher for redemption, and preferably, the machine-readable information is used during the validation 818 or redemption 822 .
  • the coin counter 1108 ( FIG. 11 ) to be coupled to the back room computer or cashier's station, i.e., the coin counter 1108 can be a “standalone” device.
  • the coin counter or discriminator 1108 is coupled by communication link to the retail location back room computer 1112 as depicted in FIG. 11 .
  • the coin discriminator sends electronic information to the backroom computer 826 which includes information that can be used during a validation step.
  • the information to be used in a valid step can include many of the types of information depicted in FIG.
  • validation can include comparing information printed or encoded on the voucher with the information that was transmitted to the back room computer. For example, alterations in the unencoded value 724 a, b can be automatically detected by comparing 828 a voucher value indicated by or encrypted in the bar code 738 with the value stored in the back room computer 1112 corresponding to the particular transaction number or time of the voucher.
  • FIG. 9 depicts one method for encrypting a voucher value 724 a, b .
  • the example of FIG. 9 relates to a voucher having a maximum of five decimal digits (i.e., a voucher with a value no greater than $999.99).
  • vouchers having a value greater than the maximum encodable or encryptable value in this example, $1,000 or more
  • a special encryption code e.g., 0
  • first and second tables are provided, giving numerous possible encryption values for use in encrypting.
  • Tables I and II below provide examples of such tables.
  • TABLE I (rearrangement table)
  • Last Digit Key 0 32541 1 51432 2 42153 3 25341 4 14352 5 24513 6 31452 7 14253 8 51423 9 25134
  • the last digit of the transaction number is employed as the table index value.
  • the last digit of the transaction number 728 ( FIG. 7 ) is used as an index to the encrypt rearrangement table (Table I) to obtain a five-digit encrypt rearrangement vector 912 .
  • the last digit of a transaction number 728 is 6, and accordingly, the encrypt rearrangement vector to be used, as shown in Table I, is “31452”.
  • the vector is used to form a first altered five-digit number whose Nth digit is the Mth digit of the five-digit voucher value 724 a where M is the value of the Nth digit of the encrypt rearrangement vector 914 .
  • the first altered five-digit number would thus be 72931.
  • this value is the five digits of the voucher value 724 a with the digits rearranged so that the first digit of the first altered number is the third digit of the voucher value, the second digit of the first altered number is the first digit of the voucher value, the third digit of the altered number is the fourth digit of the voucher value, the fourth digit of the first altered number is the fifth digit of the voucher value, and the fifth digit of the first altered number is the second digit of the voucher value, in accordance with the rearrangement vector 31452 .
  • a second encryption step using Table II is then applied.
  • the last digit of the transaction number (“6” in the present example) is used as an index to the add/subtract value table (Table II) to obtain a five-digit add value, namely 27691.
  • Each digit of the add value is separately added to the corresponding digit of the first altered number (i.e., digit-wise addition) without any carry (i.e., using modulo 10 addition) resulting in a second altered number.
  • digit-wise, modulo 10 addition of 27691 plus 72931 yields the five-digit number 99522, which is then the number printed on the voucher 752 as depicted in FIG. 7 .
  • steps 412 through 918 result in an encryption procedure 908 which may be performed in the coin counter computer 1108 or a coupled computer such as a back room computer 1112 .
  • the bar code 738 is scanned, and the five-digit encoded value 752 is used for validation purposes.
  • the last digit of the transaction number 728 (“6” in the present example) is used as an index to the add/subtract value table (Table II) which is stored in or available to the computer at the cashier station 1104 where the voucher is presented.
  • Table II add/subtract value table
  • a five-digit subtract value in this case 27691.
  • the five-digit subtract value is then subtracted from the second altered number (i.e., in the present example, subtracted from 99522) on a digit-wise basis without borrow (i.e., using modulo 10 arithmetic) to form a third altered number 924 which, in this case, yields the number 72931 .
  • the last digit of the transacting number (“6”) 728 is used as an index to a decrypt table to obtain a five-digit decrypt rearrangement vector (which, in this example, is 25134) 926 .
  • the Mth digit of the decrypt rearrangement vector will be equal to P where P is the ordinal number (counting left to right) of that digit of the corresponding encrypt rearrangement vector which equals M.
  • the decrypt rearrangement vector is used to recover the original vector or voucher value 724 as a number whose Nth digit is the Nth digit of the third altered number, where M is the value of the Nth digit of the decrypt rearrangement vector 928 .
  • FIG. 10 depicts another decryption scheme that can be used to encrypt and decrypt voucher information.
  • binary representations of voucher information in this case, binary representations of a transaction number, store ID number, cyclic redundancy check (CRC) number and voucher value are concatenated to form, in this example, a 33-bit concatenated binary value 1012 .
  • This concatenated binary value is exclusive ORed with an encryption binary value to form a 33-bit altered binary value 1014 .
  • the encryption binary value can be any of a number of binary numbers, provided the encryption binary number is also available during the decryption process.
  • the encryption binary value is based on the store identification number (since this will be available to the store computer upon an attempted redemption).
  • the 33-bit altered binary value is then converted to a decimal altered value using normal binary-to-decimal conversion resulting in, e.g., a ten-digit decimal value which is then printed or encoded on the voucher 1016 .
  • the encryption procedure 1008 can be performed in the coin counter 1108 or the coupled back room computer 1112 .
  • the decimal altered value from the voucher is input (either manually, e.g., using the keyboard, or automatically, e.g., by scanning a bar code) and the decimal value is converted to a binary altered value such as a 33-bit binary altered value 1018 .
  • the binary altered value thus obtained is exclusive ORed by the decryption binary value (such as decryption binary value based on the store identification number in the example described above) to recover the concatenated binary value 1022 .
  • the concatenated binary value contains fields having binary representations of the transaction number, store ID, CRC, and voucher values (e.g.). Accordingly, these binary fields may be segregated 1024 , and the various values may be used for validation and similar purposes such as performing data integrity checks (such as checking the CRC 1026 ) and/or validating the voucher using, e.g., the decoded voucher value in a fashion similar to that described above 1028 .
  • the CRC can be used to verify a successful conversion, thus facilitating the use of multiple conversions, e.g., over a time period. For example, it is possible to use the month-of-issue of the voucher to perform a look-up in the transposition table, or as part of the binary encryption key. It is also possible to use the store number as all or part of the encryption key, e.g., to aid detection of cross-shopper redemption attempts.
  • the format of the voucher and/or format or standards for bar code can impose restraints or limits on the number of digits available for various pieces of information. For example, according to one bar code standard, a total of ten decimal digits may be available for encoding information at the discretion of the voucher designer. For example, in the configuration of FIG. 7 , ten decimal digits ( 748 and 752 ) are free to be provided by the coin discriminator. The manner in which these digits are assigned to various fields will determine the range of values available for those fields. For example, in the configuration of FIG. 7 , five decimal digits are designated for expressing the voucher value so that the maximum voucher value that can be encoded under this system would be $999.99.
  • the binary field sizes should be judiciously selected to provide the desired or necessary ranges for various items.
  • seven bits are used for the transaction number (providing a range of 0-128, decimal) 5 bits provided for the store ID number (providing a range of 0-32, decimal) and 5 bits for a CRC check value.
  • the present invention provides a way to detect at least some forms of voucher counterfeiting, alterations, duplication, fabrication, and the like, e.g., by including encoded or encrypted voucher information which cannot be readily replicated and/or using encryption/decryption schemes which are relatively resistant to being broken.
  • the encryption or encoding can be accomplished without requiring, for their decryption, time or computing resources beyond those available in normal retail transactions or facilities.
  • the present invention is able to provide detection of voucher alterations, duplications and the like in a manner which is partially or fully automated so that time or manpower investments need not be made in manually entering data or validating or redeeming vouchers.
  • Embodiments of the present invention can be implemented in a fashion consistent with standard retail establishment procedures or equipment such as in a fashion consistent with Uniform Code Council bar code or other standards, preferably in a manner such that the same scanning hardware and/or software used for normal retail procedures such as checkout procedures can be used in implementing embodiments of the present invention substantially with little or no modification, e.g., requiring only data needed to recognize particular types of bar codes and to branch to voucher verification, redemption, or other voucher handling routines.
  • the procedures used in the encryption 908 and decryption 932 of the procedure of FIG. 9 involve processes which are, for typical computing devices, relatively rapid in terms of execution time, such as table lookup procedures, add/subtract procedures, and digit shift and rearrangement procedures.
  • the difficulty of breaking an encryption code according to the present invention is especially high in the case of coin counter vouchers since legitimate coin counter vouchers typically tend to have a relatively small range of values (i.e., few legitimate vouchers with values greater than a few tens of dollars would typically be available to a putative counterfeiter).
  • a voucher is a printed voucher (e.g., magnetic cards, electronic transfers and the like)
  • some or all features of the present invention can be used in connection with at least some other types of vouchers (e.g., magnetic cards, electronic transfers and the like), as will be apparent to those of skill in the art after understanding the present disclosure.
  • indexing to encryption value tables was described in connection with using a particular digit of transaction number as an index, it is possible to use different indices for the different tables (Tables I and II), or other indices can be used, including other digits of a transaction number, hashes or other modifications of a transaction number or digits thereof, other information in place of or combined with the transaction number (or digits thereof) such as the transaction date, time, location code, customer identification and the like.
  • a “negative check file” test is performed to identify vouchers which correspond to vouchers which have already been redeemed or may otherwise be suspect.
  • the negative check file may include transaction numbers, date-time information or other voucher identification information for previously redeemed vouchers at a particular store or vouchers redeemed within a certain interval of time, voucher identifiers known to be associated with vouchers previously altered or fabricated, or the like.
  • examples described herein include encoding of all digits of a voucher value
  • voucher validation procedures which provide encoding or encryption of only some digits of the value (or other field), such as a certain number of least significant or most significant digits, odd-numbered digits and the like.
  • encoded selected voucher value digits cannot be used to, by themselves, indicate the value of the voucher, and accordingly, the full voucher value would need to be provided in another form such as being provided in a different field of the bar code, provided in a different region of the voucher, provided to the cashier computer through another route (e.g., by being sent from the coin counter to the back room computer and then to the cashier computer when the voucher is presented for redemption).
  • the present invention in various embodiments, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. Those of skill in the art will understand how to make and use the present invention after understanding the present disclosure.
  • the present invention in various embodiments, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease and/or reducing cost of implementation.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Chemical & Material Sciences (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • General Chemical & Material Sciences (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

Vouchers and methods for providing vouchers configured to assist in distinguishing unauthorized duplicate or counterfeit vouchers are disclosed herein. In one embodiment, a voucher can include a substrate, a first indicia on the substrate, and a thermally responsive second indicia on the substrate. At least one of the first indicia and the second indicia can indicate a value of the voucher. A system which assists in detecting alteration of value documents or transmissions, such as a coin counter voucher is provided. Voucher information such as the voucher value is included in the voucher in an encrypted or otherwise modified form. When the voucher is presented for redemptions, the encrypted information is decrypted and compared to independently available voucher information. Failure of the information to match indicates that the voucher has been altered or should otherwise be further checked.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • This application is a divisional of U.S. patent application Ser. No. 10/039,181, filed Jan. 5, 2002, which is a continuation-in-part of U.S. patent application Ser. No. 09/422,917, filed Oct. 21, 1999, and currently pending, which claims priority to U.S. Provisional Patent Application No. 60/105,508, filed Oct. 23, 1998. Cross-reference is made to U.S. patent application Ser. No. 09/035,273, filed Mar. 8, 1998, which is a continuing application claiming priority from Ser. No. 08/237,486, filed May 3, 1994 (now U.S. Pat. No. 5,620,079), which is a continuation-in-part of U.S. patent application Ser. No. 07/940,931, filed Sep. 4, 1992, which is the parent of U.S. application Ser. No. 08/255,539, filed Jun. 6, 1994 (now U.S. Pat. No. 5,564,546). Cross-reference is further made to U.S. application Ser. No. 09/178,441 for “Voucher Coding for Self-Service Coin Discriminator,” filed on Oct. 23, 1998 (now U.S. Pat. No. 6,116,402), and to PCT/US97/11174, filed Jun. 27, 1997 for “Coin Discrimination Apparatus and Method,” all of which are incorporated herein by reference.
  • Cross-reference is made to U.S. application Ser. No. 08/883,780, filed Jun. 27, 1997, and to U.S. application Ser. No. 08/689,826, filed Aug. 12, 1996 for “Coin Counter/Sorter and CouponNoucher Dispensing Machine and Method,” which is a continuation of U.S. application Ser. No. 08/255,539, filed Jun. 6, 1994, which is a continuing application of U.S. application Ser. No. 07/940,931, filed Sep. 4, 1992, all of which are incorporated herein by reference.
  • TECHNICAL FIELD
  • The present invention relates to the provision of vouchers in connection with a coin-discriminator and/or counter and in particular ways of deterring, reducing, eliminating or detecting unauthorized duplication or counterfeiting of vouchers.
  • BACKGROUND
  • At least some types of coin-discriminators are configured to receive a plurality of coins of various denominations, e.g., from untrained users (such as grocery store or other retail location customers), typically including non-coin items and/or foreign or other undesired coins, to discriminate the various denominations of the desired coins (possibly after separating non-coin items and/or undesired coins) to determine the value of the discriminated desired coins, and to output an indication of the value of the total amount of the discriminated, desired coins. Although many forms of such value output may be termed a voucher, including paperless output (such as depositing a value in a user's bank account, e.g., after reading a user's bank card or other identifier), the present invention is particularly directed to devices which include apparatus or procedures for outputting a physical voucher such as a paper voucher with indicia indicating a value related to the total amount of discriminated, desired coins. Although such physical vouchers will be discussed as “paper” voucher hereinbelow, its possible to provide physical vouchers in other forms such as with indicia placed on other substrates such as plastic, cardboard, magnetic or other non-visible information-bearing media and the like.
  • Because a physical or “paper” voucher has value, in the sense that it can be redeemed for, e.g., cash or credit, it is important for the redeemer to have confidence that a voucher which is presented for redemption is genuine, i.e., is not an unauthorized duplicate or counterfeit voucher. Verifying the genuineness of a voucher is especially difficult in the face of sophisticated image production, reproduction or manipulation technologies such as color photocopy technology, color scanning technologies, computer-based printing technologies such as inkjet (including color inkjet) or laser (including color laser) printer, e.g., coupled to personal computers, work stations and the like. Accordingly, it would be useful to provide vouchers whose genuineness can be readily determined, as compared to an unauthorized duplicate or counterfeit voucher, e.g., produced using such image duplication production, reproduction or manipulation technologies.
  • Some approaches to detecting unauthorized duplication or counterfeiting have involved encrypting certain information which is then printed on the voucher as part of the voucher printing procedure such that decryption provides a level of confidence that the voucher is genuine. Although such encryption/decryption procedures can be quite useful (and indeed, can, if desired, be used in combination with some or all features of the present invention), there are circumstances in which it may be desirable to provide for other counterfeit detection measures, in addition to or in place of such encryption/decryption measures.
  • In some circumstances, it may be desirable to provide anti-counterfeit measures or devices which are independent of the need for substantial modification of printing, check-out or verification software (of the type that might be used in connection with encryption/decryption). For example, it may be desired to avoid making modifications to printing software and/or to avoid modifying or providing software for decryption. Furthermore, in some circumstances it may be desired to avoid the personnel training or hardware involved in a decryption verification process. For example, in some circumstances it is desirable to permit the voucher redemption (which may typically occur at a grocery store or other retail location check-out stand) to be performed, in whole or in part, based on a visual inspection of the voucher (e.g., without the need to perform a decryption step). In some circumstances it may be desirable to provide for duplicate/counterfeit detection without the need for using a computer or other equipment.
  • Many self-service coin-discriminators of a type with which the present invention may be used employ a thermal printer for outputting a paper voucher. Thermal printers can be particularly useful because of the lack of a requirement to replenish ink or toner. Thermal printers typically operate in conjunction with a type of paper specific to thermal printing (“thermal paper”). Thermal paper often has characteristics which limit how the paper may be treated (e.g., limiting the types of ink or other materials that may be used in connection with providing, for example background preprinting, watermarks and the like). Accordingly, it would be useful to provide voucher duplication/counterfeiting detection or prevention which can be reasonably and feasibly used with thermal papers and/or thermal printers (e.g., without incurring relatively high costs).
  • Although there are benefits to an anti-counterfeiting system which provides for detection of unauthorized duplications or counterfeits (at least in part) using a visual inspection of the voucher, a system in which all anti-counterfeiting features are features which are normally visible also means that potential counterfeiters can determine what features need to be copied or duplicated by performing a visual inspection of a valid voucher. Accordingly, it would be useful, in some embodiments, to provide at least some anti-counterfeiting features which are not normally visible, i.e., which are not visible in ordinary ambient light of a redemption location.
  • Because, in at least some systems, voucher redemption is performed at a retail location, such as during ordinary retail purchase “check out”, it would be useful to provide anti-counterfeiting procedures or devices which can be performed relatively rapidly so as to avoid checkout line delays. For example, it would be useful if some or all anti-counterfeiting features can be used for verification without the need for special positioning or manipulation of a voucher and/or without the need for manually inputting features or information from the voucher and preferably without the need to provide special equipment for voucher verification at checkout locations.
  • In situations where coin-discriminators are already being used, it would be useful to provide for voucher anti-counterfeiting measures which include features that can be provided with little or no modification of coin-discriminator hardware and/or retail location check-out hardware. In some embodiments, it would be useful to provide at least some anti-counterfeiting features which can be implemented by loading paper into already-existing coin-discriminators and substantially without modification of coin-discriminator hardware.
  • As described in U.S. Pat. No. 4,620,079 (incorporated herein by reference) a coin counter discriminator may be provided which receives and counts a plurality of coins and outputs a voucher, i.e., an output which itself has a value, related to the value of the arbitrary number of multi-denominated counted coins, and which may be redeemed or exchanged for such value. In at least one application of a coin counter/discriminator, a number of such discriminators are positioned at retail locations and are configured to facilitate use by untrained users, particularly, ordinary untrained customers (as opposed to, e.g., employees) of the retain locations. Such users typically bring jars or other containers having a plurality of coins to the machine and dump the coins into a coin receiving region or area, in a random, jumbled mass, i.e., in an unoriented fashion, with the coins typically being of a plurality of different denominations, and often including non-coin items (paper items, lint, keys, screws, washers and the like) and/or foreign or other non-acceptable or undesirable coins. The machine is configured to discriminate and/or separate acceptable or desirable coins from other objects and also to discriminate one denomination of coin from another. The acceptable coins are counted, preferably by denomination, and a total of acceptable coins or a total value of acceptable coins is determined in this manner. The acceptable coins are retained, e.g., in a bin or bag within the discriminator and non-coin objects, unacceptable coins or undiscriminable objects are treated as waste and/or returned to the user.
  • Although there is no theoretical reason why such a coin discriminator could not be configured to output government-issued paper currency (“cash”) in response to at least some of the counted and retained acceptable coins, in at least one embodiment it is preferred to output a voucher which includes written and/or encoded indicia which indicates, at least indirectly, information including the value which the voucher has. The value of the voucher is not necessarily equal to the “face value” of the counted acceptable coins. In one embodiment, the value of the voucher will be equal to the value of the counted coins minus a fee charged for the counting service. The fee may be calculated in a number of fashions such as a flat fee, a fee based on the number of coins counted, a fee which takes into consideration the types or denominations of the coins counted, a fee which is a percentage of the value or a weighted percentage based on type or denomination of coins, and the like. It would also be possible to provide a configuration in which the value of the voucher exceeded the face value of the counted coins, e.g., as a promotion to encourage use of the machine for a limited period or to take into account coins which have an actual value exceeding the face value (e.g., recognized rare or otherwise valuable coins) and the like.
  • Although, in at least one configuration, a voucher is in the form of a paper slip printed with certain information, as described more fully below, the voucher may also take other forms including digital or electronic codes recorded on or transferred to a magnetic card, a smart card, transferred to a bank account or other account, e.g., over a preferably encrypted or otherwise secure telephone or other communication link, transferred to a computer such as a retail location “back room” computer or other computer (e.g., to credit a user's account or provide a credit against purchases and the like).
  • After the voucher is output, in at least some systems a user will use or obtain the value of the voucher, e.g., by redeeming the voucher. it is anticipated that, typically, a user such as a retail customer will present the voucher to a retail cashier (e.g., the cashier at a grocery store checkout location), often as part of a purchase transaction, the retail cashier will redeem the voucher by paying the voucher in cash or by providing a credit for the amount of the voucher against purchases made by the customer.
  • In this regard, it can be seen that the voucher itself is treated as having value and accordingly, there is a potential for unscrupulous individuals to obtain or devise a counterfeit, duplicate or altered voucher in order to obtain value to which they are not entitled. For example, some individuals may attempt to make one or more photocopies, or otherwise duplicate a voucher and present it for redemption. Some individuals may attempt to counterfeit an entire voucher, such as by drafting or composing an image of a voucher. Some individuals may alter a legitimate voucher (or an image of a legitimate voucher), e.g., changing the amount or value indicated or encoded on or in the voucher. Accordingly, it would be useful to provide a system which assists in detecting duplicate, counterfeit or altered vouchers.
  • In a number of situations, it is desired to provide for relatively rapid redemption or other processing of presented vouchers, in order to avoid customer ill will or excessive employee time that could be the result of excessively-long voucher processing. In a number of situations, voucher processing is facilitated with the use of store checkout equipment such as checkout (point-of-sale or “POS”) computers, scanners and the like. However, modifications of such equipment to provide for additional functions can involve additional programming time, can increase execution or processing time, can involve additional programming time, can increase execution or processing time, can impose extra computing burden on processors in such systems and may require linking the POS system to an external system, thus involving additional hardware and requiring extensing programming and/or system configuration. Accordingly, it would be advantageous to provide a system for detecting duplicate, counterfeit, or alternate vouchers which can achieve rapid voucher processing without undue burden on existing computer, scanning or other equipment at retail locations.
  • In many retail locations, checkout equipment includes the capability of bar code scanning, e.g., for identifying merchandise. Typically, the associated software is configured to recognize bar codes according to a standard bar code system such as a system promulgated by the Uniform Code Council Inc. of Dayton, Ohio. Accordingly, it would be useful to provide a system for detecting counterfeit, duplicate or altered vouchers which was at least partially (preferably, fully) compatible with a standard bar code system.
  • SUMMARY
  • The present invention includes at least one and preferably a plurality of features provided in or on paper (or other substrate) used for printing a voucher. In one embodiment, at least some portions of the paper are pre-printed or otherwise pre-provided (i.e., printed or provided prior to the printing or providing of indicia indicating the value of the voucher) in ink which is not readily reproducible by ordinary color photocopiers, such as certain fluorescent inks. In one embodiment, the paper (or other substrate) is provided with a plurality of perforations in a pattern which is not readily reproducible such as a pattern including curved or otherwise non-linear patterns of perforation preferably with the perforations being relatively small and closely spaced and the pattern defining relatively tight-radiused but preferably substantially continuous curves.
  • In one embodiment, the voucher is provided with printing on both surfaces which are registered relative to one another in such a fashion that the registration may be readily verified (e.g., by holding the voucher up to a light or otherwise backlighting a voucher so as to view at least some portions of printing on the two surfaces simultaneously). In some embodiments, portions of the voucher are printed with a material which has relatively low visibility, or is substantially invisible, until such portion is treated or manipulated, e.g., such as by rubbing or scratching with a coin or other object.
  • Preferably at least two or more anti-counterfeiting features of a voucher can be verified by viewing only one surface of the voucher, i.e., without the need to flip the voucher over to view the opposite side.
  • In some embodiments, some or all features are features which permit voucher verification using only visual inspection of the voucher, i.e., without the need to use any equipment. In other embodiments, at least one feature is a feature which is not readily apparent in ordinary or typical light (so as to render it difficult for a potential counterfeiter to even be aware of, much less to duplicate, such feature) such as providing markings which fluoresce or otherwise have detectable properties when viewed in specific types of light such as ultraviolet light.
  • In some embodiments, the voucher paper is preprinted or preprovided with indicia which are oriented in different fashions (such as both vertically and horizontally) and/or are positioned near the edge of the paper or are otherwise oriented or positioned in a fashion which may be difficult to duplicate with typical computer-based printers.
  • According to one embodiment, a voucher includes information usable for ascertaining the validity of a voucher, but which is provided preferably in an altered form such as being permuted, shifted, encrypted or the like. In this way, a person who alters a voucher, such as by changing the printed or displayed amount, cannot avoid detection of the alteration without also knowing how to permute, shift, encode, etc., the information used for validation. Preferably, any permutation, shifting, encryption or the like which is used is of a nature that once the procedure for reversing the permutation, shifting or other encryption is known, execution of the reverse processes (e.g., reverse shifting, decryption), can be performed relatively easily (e.g., automatically, by a computer) so as to impose relatively minor computing or time burdens on the validation process.
  • Unless otherwise indicated, encryption refers generally to altering the form or appearance of information (preferably so as to prevent at least the casual viewer/reader from understanding the information) in such a way that it may be manipulated to recover the original information but such that it is not readily apparent, from the altered information, how the altered information is related to the original information. Encryption, in this sense, includes, but is not limited to, permuting digits or characters of a field, adding, subtracting, multiplying or dividing (to or by) key values, performing binary operations on digital fields, performing operations on concatenated fields and the like.
  • In one embodiment, a voucher includes a printed, human-readable indication of an amount, and, preferably includes a transaction number or other identifier number. An encoded version of the amount, transaction number, transaction date, expiration date, retail location, or combination(s) thereof is also printed or encoded, preferably as at least part of a bar code (to facilitate validation and redemption). When the voucher is presented, the bar code or other encoded number is decrypted or otherwise processed to recover the value and transaction number. The value and/or transaction number can then be used as part of a validation process such as by comparing the recovered encoded value to the printed value or transaction number and/or checking the transaction number or the like against a negative checklist (i.e., a list of transaction numbers which have already been redeemed or are otherwise suspect). Vouchers which are not validated can be refused payment or can be more closely inspected or provided with an identification process, such as recording the customer's driver's license number, getting manager approval, and the like.
  • A number of systems can be used for altering or encoding values, transaction numbers or combinations. Two basic (not necessarily exhaustive) classes of encryption include using a not-generally-known algorithm, and a known key, and using a not-generally known key with a known algorithm. In one embodiment, one or more tables are used, e.g., to control digi shifting and/or digit or value addition/subtraction. By basing such processes on tables, time and computing burdens are reduced (as compared with, e.g., more computationally burdensome processes such as standard encryption/decryption) and it becomes relatively straightforward to change the alteration system (e.g., by downloading one or more new value tables). Other types of manipulation can be used such as digital/binary conversions and the like. In this way, many types of voucher alterations or fabrications become apparent upon an attempted redemption and monetary losses attributable to such alterations or fabrications are reduced or eliminated.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a perspective view of a coin-discriminating device, in an opened configuration, of a type which may be used in at least one implementation of the present invention;
  • FIG. 2 is a block diagram depicting certain components of a coin discriminator of a type which can be used in accordance with implementation of the present invention;
  • FIG. 3A is a front view of a voucher of a type which may be used according to one embodiment of the present invention;
  • FIG. 3B is a view of the back surface of the voucher of FIG. 3A with FIG. 3B being positioned in alignment with FIG. 3A to show relative locations of features on opposite surfaces;
  • FIG. 4 is a partial perspective view of a perforation wheel according to an embodiment of the present invention;
  • FIG. 5 is a front view of a voucher according to one embodiment of the present invention;
  • FIG. 6 is a view of a back surface of a voucher according to one embodiment of the present invention;
  • FIG. 7 depicts the appearance of a voucher of a type which may be used in accordance with an embodiment of the present invention;
  • FIGS. 8A-C are flowcharts depicting voucher generation validation and redemption according to certain embodiments of the present invention;
  • FIG. 9 is a flowchart depicting a transaction number/value manipulation procedure according to an embodiment of the present invention;
  • FIG. 10 depicts a transaction number/value manipulation procedure according to an embodiment of the present invention; and
  • FIG. 11 depicts a store system including a coin discriminator of a type usable in connection with embodiments of the present invention.
  • DETAILED DESCRIPTION
  • FIG. 1 is a perspective view of a coin-discriminator of a type which can be used in connection with embodiments of the present invention. The embodiment depicted in FIG. 1 generally includes a coin counting/sorting portion 12, a voucher dispensing portion 14 a and a coupon dispensing portion 14 b. In the depicted embodiment, the coin counting portion 12 includes an input tray 16, a coin return region 22, and customer I/O devices, including a keyboard 24, additional keys 26, a speaker 28 and a video screen 32. The apparatus can include various indicia, signs, displays, advertisement and the like on its external surfaces. A power cord 34 provides power to the mechanism.
  • Preferably, when the doors 36 a, 36 b are in the open position as shown, most or all of the components are accessible for cleaning and/or maintenance. In the depicted embodiment, a voucher printer 18 is mounted on the inside of the door 36 a. A number of printers can be used for this purpose. In one embodiment, a model KLDS0503 printer, available from Axiohm is used. The right-hand portion of the cabinet includes a coupon feeder 42 for dispensing, e.g., pre-printed manufacturer coupon sheets through a chute 44 to a coupon hopper on the outside portion of the door 36 b. A computer 46, in the depicted embodiment, is positioned at the top of the right hand portion of the cabinet in order to provide a relatively clean, location for the computer. An I/O board 48 is positioned adjacent the sheet feeder 42.
  • The general coin path for the embodiment depicted in FIG. 1 is from the input tray 16, doves first and second chutes to a trommel 52, to a coin pickup assembly 54, along a coin rail 56 and past a sensor 58. If, based on sensor data, it is determined that the coin can and should be accepted, a controllable deflector door 62 is activated to divert coins from their gravitational path to coin tubes 64 a. b for delivery to coin trolleys 66 a, b. If it has not been determined that a coin can and should be accepted, the door 62 is not activated and coins (or other objects) continue down their gravitational or default path to a reject chute 68 for delivery to a customer-accessible reject or return box 22.
  • In use, a user is provided with instructions such as on computer screen 32. The user places a mass of coins, typically of a plurality of denominations (typically accompanied by dirt or other non-coin objects) in the input tray 16. The user is prompted to push a button to inform the machine that the user wishes to have coins discriminated. Thereupon, the computer causes an input gate (not shown) to open and provides a signal to prompt the user to begin feeding coins When the gate is open, a motor is activated to begin rotating the trommel assembly 52. The user moves coins over the peaked output edge 72 of the input tray 16, typically by lifting or pivoting the tray by handle 74, and/or manually feeding coins over the peak 72. The coins pass the gate (typically set to prevent passage of more than a predetermined number of stacked coins, such as by defining an opening equal to about 3.5 times a typical coin thickness). Instructions on the screen 32 may be used to tell the user to continue or discontinue feeding coins, can relay the status of the machine, the amount counted thus far, provide encouragement or advertising messages and the like. The coin rail 56 functions to receive coins output by the coin pickup assembly 54, and transports the coins in a singulated (one-at-a-time) fashion past the sensor 58 to the diverting door 62. Once no more coins are detected and/or in response to user input, the system determines that the transaction is complete and the computer 46 will send instructions to he printer 18 causing the printer to output a voucher of a type which may be exchanged for Hoods, services or cash.
  • FIG. 2 is a block diagram of a coin-discriminator of a type which can be used in accordance with implementations of the present invention. Some of the items in FIG. 2 correspond to components in the device of FIG. 1. In operation, an untrained user, such as a grocery store or other retail location customer places a plurality of coins of unknown value and random orientation in a receiving tray or other receiving area 16. Typically, foreign or other undesirable coins and foreign objects such as currency or other paper, paper clips, lint, keys and the like are mixed with the desired coins and placed, such as being poured or dumped, substantially all at once, into the tray 16. A conveyance device 214, such as a chute, trough, slide or the like, or including positive drive or otherwise moving conveyances such as conveyer belts, Archimedes' screws and the like, are used to provide at least some of the desired coins from the receiving area 16 to a coin-discriminator 218. Preferably, prior to entry to the discriminator 218, at least some of the foreign objects or materials are separated such as using airflow, vacuum, gravitational separation, size-based separation (such as through openings of predetermined size or sizes) and the like. The discriminator 216 provides a signal to a calculating device, preferably a computer with sufficient information regarding the number of desired coins of various denominations such that the computer 46 can output or store a value equal to or related to (such as being a predetermined amount or portion less than) the value of the desired discriminated coins which are then placed in one or more bins 66 or other receiving regions. The computer 46, at the end of a transaction (as indicated by lack of further input of coins for a predetermined period and/or input from a user) controls a paper voucher printer 18 to print, on paper (or other substrates) obtained from a roll of paper or other paper supply 226 a redeemable voucher for an amount related to the total value of the discriminated desired coins for this transaction.
  • FIGS. 3A and 3B depict a number of features of a voucher useful for avoiding, preventing and/or detecting unauthorized duplication or counterfeiting of vouchers. FIGS. 3A and 3B are presented herein in a fashion which indicates the relative positions of the indicia or marking on the front surface (FIG. 3A) and the opposite or rear surface (FIG. 3B). I.e., features which are shown as aligned in corresponding locations in FIGS. 3A and 3B are features which would appear at corresponding longitudinal positions on opposite surfaces of the voucher.
  • In the depicted embodiment, the rear surface (FIG. 3B) of the voucher includes printing 312 generally in the central region 314 of the rear surface. According to one embodiment of the invention, printing 312 is provided using an ink which, if copied using a conventional color photocopier, will result in a photocopy which is altered in appearance with respect to the original printing 312. In one embodiment, the printing 312 is in a fluorescent or metallic ink, preferably a fluorescent orange ink which, when photocopied, appears as a purple or maroon color rather than an orange color.
  • Although there may be several types of inks which do not readily photocopy, it is which is believed that many such inks cannot readily be applied to thermal paper. Examples of inks which can be used, and which have been found to be useful for application to thermal paper, include neon pink PMS 805, neon yellow PMS 803 and neon green PMS 802. It should be understood that these represent examples of inks which may be used but are not intended to be an exhaustive listing.
  • In the embodiment of FIG. 3, the rear surface of the voucher also contains printing 316, positioned on or relatively close (such as within about 1/4 inch, preferably within 1/10th inch of) the voucher edge 318 a, 318 b. Preferably, the edge printing 316 is also provided in an ink which is not readily photocopied without an alteration in appearance. In one embodiment, the edge printing 316 is in a color different from that of the central printing 312 and, in one embodiment, is provided in fluorescent yellow ink. In the depicted embodiment the central printing 312 is in a first (e.g., lateral) orientation, and the edge printing 316 is in an orientation which is at an angle (e.g., 90°) to the first orientation (e.g., vertical).
  • As described more fully below, it is preferred that some or all anti-counterfeiting features described herein can be provided as pre-printing or pre-providing (i.e., can be provided on the paper stock or paper supply 226 before it is fed to the printer 18). This is particularly useful in connection with providing the edge printing 316 relatively close to the edges 318 a, b since close-to-edge printing is a feature which is difficult to reproduce with many inkjet, laser or other computer based printers (which often require a minimum space, such as a space no less than about 1/4 inch, between the paper edge and printing provided by such printer).
  • In the embodiment depicted in FIGS. 3A and 3B, certain visible features on the front and rear surfaces are registered, such that they occur in a predetermined spatial relationship on the front and rear surfaces. In the embodiment of FIGS. 3A and 3B, printed rectangles 324 a, 324 b on the rear surface are aligned with indicia (in this case, star logos) 326 a,b,c,d on the front surface. Preferably the printing of the indicia 326 a,b,c,d on the front surface is of such a nature that it is at least partially visible when viewing the rear surface, such as when the voucher is held up to the light or otherwise backlit in such a fashion that the indicia 326 a, 326 c appear to be registered within the box 324 a when viewing the rear surface. Preferably, the registration is of a nature (such as providing for relatively close sizing and spacing of the logos 326 as compared to the boxes 324) such that even relatively small misregistration (i.e., in which the printing on the front surface is not precisely aligned with corresponding printing on the rear surface) is readily detectable by visual inspection. This feature is useful because it is relatively difficult to use photocopying, inkjet or laser printer technology for providing printing on two opposite surfaces of a page or paper such that the printing on the opposite surfaces are closely registered (e.g., within about 1/8 inches). Preferably, according to the present invention, such opposite-surface printing provides registration on the front and rear surfaces which are mix-registered in either a longitudinal or vertical direction by no more than about 1/8 inches, preferably no more than about 1/16 inches and more preferably no more than about 1/32 inches.
  • In the embodiment of FIGS. 3A and 3B, a pattern of perforations 332 is visible on both surfaces of the voucher. When perforations are used for purposes such as facilitating tearing or separation of paper segments, such perforations are typically in straight lines or a series of straight line segments. According to an embodiment of the present invention, perforations are provided in a pattern which includes some portions which having a curved appearance (even though each individual perforation may itself be straight) such as depicted in FIGS. 3A and 3B. Such curved-pattern perforations are believed to be useful since they are readily visibly verified and relatively difficult for a counterfeiter to copy or reproduce. Preferably, the curved pattern includes portions 334 which have a relatively small radius of curvature such as radius of curvature of less than about 1/2 inch, preferably less than about 1/4 inch. In one embodiment, the perforations are micro-perforations, such that each perforation has a length of about 0.4 mm, a width of about 0.01 mm, and an inter-perforation spacing of about 0.2 mm.
  • In one embodiment, regions or indicia are preprinted 342 using an ink or other substance which preferably is substantially non-apparent or invisible (such as having a color, reflectivity, texture and the like closely matching that of the unprinted paper), but which, when rubbed or scratched with the edge of a coin, will cause minute amounts of the coin to rub off and adhere only to the printed portion, leaving a visible mark (indicated in FIG. 3 by phantom lines 342). In one embodiment, such indicia are provided by printing using an ink which includes titanium oxide. Thus, it is typically difficult for a would-be counterfeiter to know which indicia should be printed in such non-visible ink since the indicia which are printed in a valid voucher are not readily apparent. However, the voucher may be relatively easily validated using only a ordinarily-available coin, i.e., without the use of special equipment.
  • Although it is possible to provide perforation of the type described as part of the paper stock 226, in one embodiment, the pattern of perforations is provided in conjunction with the process of printing the value of the voucher using the printer 224. As depicted in FIG. 4, in one embodiment as the paper, following the printing, leaves the printer 224, the paper moves from a first exit position 412 and is conveyed, e.g., by pinch rollers 414 a, 414 b across the edge of a perforating roller 416 whose edge has, radially protruding therefrom, a plurality of perforation-producing punches or spikes 418. As depicted in FIG. 4, the punches 418 are positioned on the edge of the roller 416 in a manner to produce the desired perforation pattern (in the depicted embodiment, in a sinusoidal or wave-like pattern corresponding to the pattern depicted in FIGS. 3A and 3B). The paper 412 is thus continuously perforated along its edge as it is conveyed toward a downstream position 422 and, eventually, dispensed to the user. In order to provide the proper rate of rotation 424 of the roller 416 as the paper is moved 426, the rate of rotation 424 of the roller 416 can be controlled and coordinated with the rate of paper movement 426 by a gear train, one or more motor controllers or other coordinator 228 in a manner that will be well known to those of skill in the art after understanding the present disclosure. The roller 416 can also be freewheeling, with rotation being driven by the paper movement. Although the perforation is described as occurring upon exit of the paper from the printer, the perforating wheel could also be positioned to provide perforation to the paper as it enters the printer or at other locations that will be apparent to those of skill in the art upon understanding the present disclosure.
  • In one embodiment, some or all of a unit of the paper supply 226 (such as each roll of thermal paper) is associated with one or more serial numbers or other identifying numbers. In the embodiment of FIG. 5, the paper is preprinted, along the edge of the front surface, with such serial number or serial numbers. In the depicted embodiment, a single serial number associated with a roll of thermal paper and this number is printed at spaced intervals in a vertical fashion near an edge of the voucher, preferably within less than 1/4 inch of the edge (similar to the manner described above in connection with the back surface edge printing 316 depicted in connection with FIG. 3B). In order to provide for ease of verifying the validity of the serial number, by the voucher redeemer, the serial number (or serial numbers) associated with the paper supply is also printed by the coin discriminator printer 18, e.g., substantially at the time the voucher value 514 is printed. In one embodiment, when service personnel load a roll of paper into the paper supply unit 226, such personnel also enter the serial number associated with the roll into the computer 46, e.g., using an I-O device such as a keyboard, touch screen, or similar device 232. In this way, the computer 46 has the information needed to control the printer 18 so as to print an identifier number 516 on the face of the voucher which will match the preprinted serial numbers 512 on the paper stock to permit the grocery store clerk or other redeemer to easily visually verify a match between the preprinted serial number 512 and the discriminator-printed serial number 516.
  • Although FIG. 5 depicts an embodiment in which a single serial number is associated with a unit of paper stock and is identically printed at intervals 512 a, 512 b, 512 c, it is also possible to provide for identifying numbers which are preprinted on the paper stock, but which change along the length of a voucher or from one voucher to the next, such as incrementing by one or by some other number, or so as to change in some other manner (e.g., which is likely to be substantially unpredictable by a would-be counterfeiter). In this embodiment, it will be necessary for the computer 46 to be able to calculate or detect which preprinted serial number will be positioned near the area where the discriminator-printed number 516 will be printed so that the computer 46 can control the printer 18 to print a number 516 which will match the closest (or next preceding or succeeding) pre-printed serial number 512 b. For example, the printer 18 may be configured to inform the computer 46 of the number of inches of thermal paper that has been thus-far dispensed from the roll. If it is known how the preprinted numbers 512 change along the length of the roll (such as incrementing by one for every inch of thermal paper dispensed) the computer 46 will have sufficient information to calculate, in a manner which will be well known to those of skill in the art after understanding the present disclosure, what number to print, using the printer 18, so as to match the closest or next succeeding or preceding preprinted number.
  • FIG. 6 depicts features of a voucher useful for avoiding, preventing and/or detecting unauthorized duplication or counterfeiting of vouchers in accordance with one embodiment of the invention. In the depicted embodiment, a substrate 201, such as a rear surface of a voucher, contains indicia, such as printing 616, that responds to changes in temperature. The printing 616 includes thermally responsive ink that becomes invisible when heated to or beyond an activation temperature. As used herein, the activation temperature is the lowest temperature at which the ink responds to heat. In one aspect of this embodiment, the printing 616 is vermillion, thermo-chromic ink with an activation temperature of approximately 85 degrees Fahrenheit. In other embodiments, other colors and types of thermally responsive indicia can be used. In another embodiment, the thermally responsive ink could be substantially invisible at room temperature and become visible when heated to or beyond an activation temperature. Furthermore, those of ordinary skill in the relevant art will appreciate that indicia with different activation temperatures can also be used in accordance with the disclosure.
  • One advantage of using thermally responsive indicia that has an activation temperature higher than typical room temperature and cooler than typical body surface temperature is that the indicia is thermally responsive to human touch. Accordingly, a person can breathe or touch the indicia for a few seconds and the indicia will respond, such as by becoming temporarily invisible.
  • In addition to using the thermally responsive printing 616, other thermally responsive indicia can be used on different areas of the voucher. For example, in the depicted embodiment the rear surface of the voucher includes printing 612 generally in the central region 614 that is oriented at an angle of approximately 90 degrees relative to the printing 616. Either some or all of the printing 612 can include thermally responsive indicia, such as thermally responsive ink. In addition, in other embodiments, a front surface of the voucher can also include thermally responsive indicia.
  • In another embodiment, thermally responsive ink can be placed on top of or proximate to other indicia, to camouflage the other indicia on the voucher. For example, in one embodiment black thermally responsive ink can be placed over text on a voucher. The black thermally responsive ink can be placed so that it renders the text unrecognizable to a viewer, such as a substantially solid block of black thermally responsive ink over the text. In this embodiment, when the thermally responsive ink is heated to the activation temperature, the thermally responsive ink disappears and the text becomes discernable to the viewer.
  • Thermally responsive indicia can be printed on a variety of substrates to provide voucher embodiments consistent with this disclosure. In one embodiment, for example, the thermally responsive ink is printed on 20-22 pound base paper with a brightness of 88.5% (minimum) and a thermal color of black trace. In other embodiments, other types of paper, including thermal paper, can be used.
  • In another embodiment, the substrate could change color in response to a change in temperature. For example, the substrate could be dark or opaque initially, and then change to white or a lighter color when heat is applied. A voucher incorporating this feature could include a thermally responsive substrate portion that is initially dark and located adjacent to other dark indicia to make the other dark indicia indiscernible. When heat is applied, the thermally responsive substrate portion changes to a lighter color, enabling the dark indicia to become discernable against the lighter background provided by the thermally responsive substrate. In an alternate embodiment, the thermally responsive substrate could be light-colored initially, and then change to a darker color when heat is applied. A voucher incorporating this feature could include a thermally responsive substrate portion that is initially light but configured to form the outline of indicia when heat is applied and it turns darker. When heat is applied to this voucher in the vicinity of the substrate, the thermally responsive substrate changes to a darker color, enabling the indicia to become discernable against the darker background provided by the thermally responsive substrate.
  • In the embodiment depicted in FIG. 6, the thermal indicia provides one of several means to authenticate the voucher. To authenticate the voucher, an individual, such as a cashier in a store, breathes on or touches the thermally responsive printing 616 for approximately 2-10 seconds. If the printing substantially disappears, the printing 616 on the voucher is authenticated. The individual can then proceed to authenticate the other anticounterfeiting features (discussed above) on the voucher.
  • In light of the above description, a number of advantages of the present invention can be seen. The present invention provides devices and procedures which facilitate reducing, eliminating, deterring and/or detecting attempts at unauthorized duplication and/or counterfeiting of vouchers. The present invention provides counterfeiting detection features which can be relatively readily implemented such as requiring little or no hardware and/or software modification, and, in some embodiments, requiring only the use of paper or paper stock having one or more of the features as described herein, and, in this manner, at least some features of the present invention can be retrofit, i.e., implemented readily in existing coin discriminators. The present invention provides at least some anti-counterfeiting or counterfeit detection features which use only, or primarily, visual inspection of the voucher and thus at least some features can be implemented without the need for modifying or adding hardware. At least some anti-counterfeiting or counterfeiting detection features can be performed relatively rapidly, such as verifying the correct color of various printing or indicia, correct positioning or registration, correct patterning or configuration of perforations and the like), preferably without requiring the redeemer to flip or rotate the voucher or otherwise manipulate the voucher, or enter data or otherwise handle the voucher (other than, e.g., to hold it up to ordinary light) such that at least some anti-counterfeiting or counterfeit detection features of the present invention can be implemented without substantial delay at a checkout lane. In some embodiments, certain features of the invention are not readily apparent upon visual inspection of a valid voucher and thus would-be counterfeiters may find it difficult to reproduce such features. For example, in one embodiment, at least some indicia are provided which fluoresce or have other visible characteristics only when exposed to ultraviolet or other special light. According to one embodiment, at least some indicia are provided which are substantially invisible until rubbed or scraped with a coin or similar object. Preferably in some embodiments the voucher is provided with features which are not readily reproduced or counterfeited without using devices or procedures which are typically not available to the general public. For example, perforations which are patterned in a curved, preferably tightly radiused pattern which preferably provides a periodic, smooth and/or repeating pattern and preferably is made using relatively small perforations are typically difficult to provide without special, not-readily-available, equipment.
  • A number of variations and modifications of the invention can also be used. It is possible to use some features of the invention without using others. For example, it is possible to use non-photocopying inks without using micro perforations, or it is possible to use front/back registered marks without using close-to-the-edge printing. Although the present invention has been described in connection with avoiding, preventing or detecting unauthorized duplication or counterfeiting of a coin-discriminator voucher, the present invention can also be used in connection with avoiding unauthorized duplication or counterfeiting of other items such as coupons, checks, tickets (such as airline, subway or other transportation tickets, game, performance, concert or other event tickets, and the like) negotiable instruments and the like. Although some features of the invention have been described as capable of implementation using a computer, it is possible to use other devices in place of a computer such as one or more application specific integrated circuits (ASIC's) hardwired Indoor discrete circuitry, and the like. Although embodiments relating to paper stock serial numbers were described as involving manual entry of serial numbers into the computer, it is also possible to provide for serial number entry by partially or fully automatic scanning or detection, such as using bar code scanners, magnetic ink detectors and the like. Although it is believed many other coin discriminators may involve the use of thermal printers, the present invention can be used in connection with many types of printers including laser printers, inkjet printers, dot matrix printers, line (impact) printers and the like. Although front/back surface registration of a pair of logos and a box was depicted, many shapes or symbols can be used for verifying registration. Although embodiments have been described which involve pre-printing or pre-providing certain items, it is also possible to use one or more printers housed in the coin discriminator device to print anti-counterfeiting items, such as printing in a fashion and/or with an ink which produces an altered appearance in a photocopy made therefrom.
  • FIG. 7 shows the appearance of a voucher of a type which may be used in connection with embodiments of the present invention. The present invention can be used with a number of types of paper or non-paper (such as electronic) vouchers. In the example of FIG. 7, the voucher is a paper voucher with a number of indicia printed thereon. Some of the indicia may be pre-printed (before a transaction occurs) or the entire voucher may be printed after coins are counted. In the depicted example, the voucher includes a coin discriminator or system logo or name 712, the name and address of the retail location where the discriminator is located 714, a tally of the number of various coin denominations counted 716, an indication of the total value of coins counted 718, an indication of the processing fee subtracted 722, the value of worth of the voucher 724 a, b typically equal to the coin total 718 minus the processing fee 722, instructional information regarding how to redeem the voucher 726, a transaction number, a transaction date and time 732, a store message 734, a store or retail location logo 736 and a bar code 738. If desired, background printing 742 and/or microprinting and/or watermarking, encoded fibers and the like can be printed or provided as part of the paper or pre-printed, e.g., to assist in distinguishing counterfeit vouchers.
  • As is typical with bar codes, the bar code 738 is accompanied by a human readable, digital representation 744 of the number represented by the bar code 738. In the depicted embodiment, the 13-digit bar code 744 includes four fields—a two digit value indicative of the number system and type of item encoded (e.g., 2 equals random weight item, 3 equals National Drug Code, and the like) specified by the Uniform Code Council 746. A five-digit indication of the transaction number 748 (e.g., equal to item 728), a five-digit encrypted or encoded item 752 as described more thoroughly below and a check digit 754, calculated according to the Uniform Code Council rules (used, e.g., in verifying that the bar code is scanned correctly).
  • In one embodiment, the five-digit encrypted number 752 is an encryption of the voucher value 724 a, b. Examples of possible encryption procedures are described below and numerous other types of encryption can be used. In any case, unless a potential counterfeiter knows how to properly encrypt the value, when a voucher with an altered voucher value 724 a, b is presented, it is possible to use a verification procedure at the checkout stand to detect such alternation of the voucher by decrypting the encrypted value 752 and comparing to the value 724 a, b printed on the face of the voucher. If only the value printed on the face of the voucher 724 a, b is altered, without changing the encrypted value portion of the bar code 738 and/or the corresponding printed encrypted value 752, such alteration of the voucher value 724 a, b can be detected. Similarly, if both the voucher value (unencrypted) 724 a, b is altered and the encrypted value 752 is altered, but the alteration of the encrypted value does not provide, upon the decryption, a value equal to the unencrypted voucher 724 a, b, again the attempted alteration can be detected.
  • FIG. 8A shows the process of using a voucher with an encrypted value for use in detecting voucher alterations. In the embodiment of FIG. 8A, a customer normally inputs coins 812, and the coin discriminator outputs a voucher 814, similar to that depicted in FIG. 7. At some point, the customer presents the voucher for redemption 816. In the embodiment of FIG. 8A, it is possible to validate the voucher 818 by using the encrypted voucher value 752 (FIG. 7). In this embodiment, in order to achieve a voucher validation, the encrypted number 752, is decrypted preferably by automatic or manual entry of the encrypted number 752 into a computer, such as a retail location checkout computer which, as depicted in FIG. 11, is preferably coupled to a retail location back room computer 1112 which contains decryption tables or other information or procedures for decrypting. If desired, it is possible to perform the step of validating the voucher 818 on only some presented vouchers, such as performing random or spot-checking of vouchers, checking only vouchers which are for an amount greater than a threshold amount, or which are older than a predetermined time or date.
  • The decrypted voucher value based on the encrypted value 752 is then compared, either automatically (e.g., by comparison in the point-of-purchase or back room computer) or manually (e.g., by displaying the decrypted amount which the clerk can visually compare with the value 724 a, b printed on the voucher) in order to validate the voucher 818. Whereupon, if the voucher is valid, it is redeemed 822.
  • It is believed useful to base the altered or encrypted validation information at least partially on the voucher value, particularly since it is likely a voucher that has been altered will involve alteration of the value. However, it is also possible, in addition to or in place of using the voucher value, to use other numbers or information associated with the voucher such as a transaction number, date and time, store number or other identifier, a computer-generated unique (or pseudo-unique) key value, and the like. In configurations in which a customer number (or other identifier) is associated with a voucher (such as when the coin discriminator is configured to accept a “frequent-customer card,” credit card, debit card or the like identifying a customer or to receive identification information input by the customer) the customer identification, preferably altered or encrypted, can be provided as part of the voucher information and used, e.g., to determine whether the person redeeming the voucher was the person who was identified on the voucher.
  • In the embodiment of FIG. 8B, the voucher is configured to include machine-readable information 814. By providing information in machine-readable form, it is possible to perform some or all steps involved in the voucher verification or redemption in an automatic fashion, e.g., without requiring keyboard or other manual output of voucher information. In the embodiment of FIG. 8B, the machine-readable information is read 824 after the customer presents the voucher for redemption, and preferably, the machine-readable information is used during the validation 818 or redemption 822.
  • In procedures 8A and 8B, there is no need for the coin counter 1108 (FIG. 11) to be coupled to the back room computer or cashier's station, i.e., the coin counter 1108 can be a “standalone” device. In the embodiment of FIG. 8C, the coin counter or discriminator 1108 is coupled by communication link to the retail location back room computer 1112 as depicted in FIG. 11. The coin discriminator sends electronic information to the backroom computer 826 which includes information that can be used during a validation step. The information to be used in a valid step can include many of the types of information depicted in FIG. 7 including the unencrypted value 724 a, b, the encrypted value 752, the transaction number 728, the time and date 732, the store identification information 714 and the like. In the embodiment of FIG. 8C, validation can include comparing information printed or encoded on the voucher with the information that was transmitted to the back room computer. For example, alterations in the unencoded value 724 a, b can be automatically detected by comparing 828 a voucher value indicated by or encrypted in the bar code 738 with the value stored in the back room computer 1112 corresponding to the particular transaction number or time of the voucher.
  • FIG. 9 depicts one method for encrypting a voucher value 724 a, b. The example of FIG. 9 relates to a voucher having a maximum of five decimal digits (i.e., a voucher with a value no greater than $999.99). In some configurations, vouchers having a value greater than the maximum encodable or encryptable value (in this example, $1,000 or more) can be provided with a special encryption code (e.g., 0) requiring, e.g., manual verification or validation of a voucher.
  • In the example of FIG. 9, first and second tables are provided, giving numerous possible encryption values for use in encrypting. Tables I and II below provide examples of such tables.
    TABLE I
    (rearrangement table)
    Last Digit Key
    0 32541
    1 51432
    2 42153
    3 25341
    4 14352
    5 24513
    6 31452
    7 14253
    8 51423
    9 25134
  • TABLE II
    (encryption key)
    Last Digit Key
    0 95175
    1 36987
    2 24789
    3 12547
    4 63257
    5 58214
    6 27691
    7 35896
    8 12345
    9 85214
  • In these examples, there are 10 possible values that may be used, and accordingly, a table index having 10 possible values is appropriate. In the example of FIG. 9, the last digit of the transaction number is employed as the table index value. Accordingly, the last digit of the transaction number 728 (FIG. 7) is used as an index to the encrypt rearrangement table (Table I) to obtain a five-digit encrypt rearrangement vector 912. In the example of FIG. 7, the last digit of a transaction number 728 is 6, and accordingly, the encrypt rearrangement vector to be used, as shown in Table I, is “31452”. The vector is used to form a first altered five-digit number whose Nth digit is the Mth digit of the five-digit voucher value 724 a where M is the value of the Nth digit of the encrypt rearrangement vector 914. In the present example, the first altered five-digit number would thus be 72931. Note that this value is the five digits of the voucher value 724 a with the digits rearranged so that the first digit of the first altered number is the third digit of the voucher value, the second digit of the first altered number is the first digit of the voucher value, the third digit of the altered number is the fourth digit of the voucher value, the fourth digit of the first altered number is the fifth digit of the voucher value, and the fifth digit of the first altered number is the second digit of the voucher value, in accordance with the rearrangement vector 31452.
  • According to the procedure of FIG. 9, a second encryption step, using Table II is then applied. Again, the last digit of the transaction number (“6” in the present example) is used as an index to the add/subtract value table (Table II) to obtain a five-digit add value, namely 27691. Each digit of the add value is separately added to the corresponding digit of the first altered number (i.e., digit-wise addition) without any carry (i.e., using modulo 10 addition) resulting in a second altered number. In the present example, digit-wise, modulo 10 addition of 27691 plus 72931 yields the five-digit number 99522, which is then the number printed on the voucher 752 as depicted in FIG. 7. Accordingly, steps 412 through 918 result in an encryption procedure 908 which may be performed in the coin counter computer 1108 or a coupled computer such as a back room computer 1112.
  • When the voucher of FIG. 7 is presented for redemption, preferably the bar code 738 is scanned, and the five-digit encoded value 752 is used for validation purposes. To perform the validation 932, the last digit of the transaction number 728 (“6” in the present example) is used as an index to the add/subtract value table (Table II) which is stored in or available to the computer at the cashier station 1104 where the voucher is presented. Because the decryption process involves reversing the addition step (i.e., subtracting the same number that was previously added) the add/subtract value table used for decryption purposes can be identical to that used (Table II) for encryption. In this case, using the last digit of the transaction number (“6”) as an index to the add/subtract value table yields 922 a five-digit subtract value, in this case 27691. The five-digit subtract value is then subtracted from the second altered number (i.e., in the present example, subtracted from 99522) on a digit-wise basis without borrow (i.e., using modulo 10 arithmetic) to form a third altered number 924 which, in this case, yields the number 72931. Again, the last digit of the transacting number (“6”) 728 is used as an index to a decrypt table to obtain a five-digit decrypt rearrangement vector (which, in this example, is 25134) 926. Although, to provide for relatively rapid computational speed, it is preferred to store a decrypt table, it is also possible to derive or compute the proper decrypt rearrangement vector from the corresponding encrypt rearrangement vector. In the present example, the Mth digit of the decrypt rearrangement vector will be equal to P where P is the ordinal number (counting left to right) of that digit of the corresponding encrypt rearrangement vector which equals M. The decrypt rearrangement vector is used to recover the original vector or voucher value 724 as a number whose Nth digit is the Nth digit of the third altered number, where M is the value of the Nth digit of the decrypt rearrangement vector 928.
  • FIG. 10 depicts another decryption scheme that can be used to encrypt and decrypt voucher information. In the example of FIG. 10, binary representations of voucher information, in this case, binary representations of a transaction number, store ID number, cyclic redundancy check (CRC) number and voucher value are concatenated to form, in this example, a 33-bit concatenated binary value 1012. This concatenated binary value is exclusive ORed with an encryption binary value to form a 33-bit altered binary value 1014. The encryption binary value can be any of a number of binary numbers, provided the encryption binary number is also available during the decryption process. In one embodiment, the encryption binary value is based on the store identification number (since this will be available to the store computer upon an attempted redemption). The 33-bit altered binary value is then converted to a decimal altered value using normal binary-to-decimal conversion resulting in, e.g., a ten-digit decimal value which is then printed or encoded on the voucher 1016. The encryption procedure 1008 can be performed in the coin counter 1108 or the coupled back room computer 1112. When the voucher is presented for redemption, the decimal altered value from the voucher is input (either manually, e.g., using the keyboard, or automatically, e.g., by scanning a bar code) and the decimal value is converted to a binary altered value such as a 33-bit binary altered value 1018.
  • The binary altered value thus obtained is exclusive ORed by the decryption binary value (such as decryption binary value based on the store identification number in the example described above) to recover the concatenated binary value 1022. As noted above, the concatenated binary value contains fields having binary representations of the transaction number, store ID, CRC, and voucher values (e.g.). Accordingly, these binary fields may be segregated 1024, and the various values may be used for validation and similar purposes such as performing data integrity checks (such as checking the CRC 1026) and/or validating the voucher using, e.g., the decoded voucher value in a fashion similar to that described above 1028. If desired, the CRC can be used to verify a successful conversion, thus facilitating the use of multiple conversions, e.g., over a time period. For example, it is possible to use the month-of-issue of the voucher to perform a look-up in the transposition table, or as part of the binary encryption key. It is also possible to use the store number as all or part of the encryption key, e.g., to aid detection of cross-shopper redemption attempts.
  • The format of the voucher and/or format or standards for bar code can impose restraints or limits on the number of digits available for various pieces of information. For example, according to one bar code standard, a total of ten decimal digits may be available for encoding information at the discretion of the voucher designer. For example, in the configuration of FIG. 7, ten decimal digits (748 and 752) are free to be provided by the coin discriminator. The manner in which these digits are assigned to various fields will determine the range of values available for those fields. For example, in the configuration of FIG. 7, five decimal digits are designated for expressing the voucher value so that the maximum voucher value that can be encoded under this system would be $999.99.
  • In the embodiment of FIG. 10, if it is assumed that ten decimal digits are available for conveying the encrypted binary value, this essentially means that the maximum number of binary bits available to hold the various (concatenated) binary fields will be 33 (since the maximum number encoded by 34 bits (234) would require at least 11 digits (log 2 (999,999,999)=32)). In this case, the manner in which the 33 available binary digits are distributed among the various fields determines the maximum value or range for that field. For example, if 16 of the 33 bits are used for holding the binary equivalent of the voucher value, the maximum voucher value that can be indicated will be $655.35 (216−1=65,535). Accordingly, if the scheme of FIG. 10 is to be used in connection with a bar-coded value provided in accordance with Uniform Code Council standards, the binary field sizes should be judiciously selected to provide the desired or necessary ranges for various items. In one embodiment, in addition to the bits provided for the voucher value, seven bits are used for the transaction number (providing a range of 0-128, decimal) 5 bits provided for the store ID number (providing a range of 0-32, decimal) and 5 bits for a CRC check value. Although this scheme provides a smaller range for the transaction number than the range of the configuration of FIG. 7 (which provides five decimal digits for the transaction number) it is believed that in some situations, a relatively smaller transaction value range will be acceptable, particularly if the transaction number can be combined with other information such as store location and/or date/time. By using binary fields for encoding voucher information as described in connection with FIG. 10 regardless of their correspondence to various decimal digits, it can become possible to encode a relatively large number of different types of fields or information.
  • In light of the above description, a number of advantages of the present invention can be seen. The present invention provides a way to detect at least some forms of voucher counterfeiting, alterations, duplication, fabrication, and the like, e.g., by including encoded or encrypted voucher information which cannot be readily replicated and/or using encryption/decryption schemes which are relatively resistant to being broken. Preferably the encryption or encoding can be accomplished without requiring, for their decryption, time or computing resources beyond those available in normal retail transactions or facilities. The present invention is able to provide detection of voucher alterations, duplications and the like in a manner which is partially or fully automated so that time or manpower investments need not be made in manually entering data or validating or redeeming vouchers. Embodiments of the present invention can be implemented in a fashion consistent with standard retail establishment procedures or equipment such as in a fashion consistent with Uniform Code Council bar code or other standards, preferably in a manner such that the same scanning hardware and/or software used for normal retail procedures such as checkout procedures can be used in implementing embodiments of the present invention substantially with little or no modification, e.g., requiring only data needed to recognize particular types of bar codes and to branch to voucher verification, redemption, or other voucher handling routines. The procedures used in the encryption 908 and decryption 932 of the procedure of FIG. 9 involve processes which are, for typical computing devices, relatively rapid in terms of execution time, such as table lookup procedures, add/subtract procedures, and digit shift and rearrangement procedures. Accordingly, it is believed that one of the potential advantages of a procedure similar to that depicted in FIG. 9 is that it can be implemented on cashier station computers 1004 in existing configurations which may have relatively low-powered computers such as those based on 80286 processors. In this way, it is believed feasible to implement the present invention without imposing significant additional wait or processing time to achieve voucher validation or redemption.
  • It is believed that the difficulty of breaking an encryption code according to the present invention is especially high in the case of coin counter vouchers since legitimate coin counter vouchers typically tend to have a relatively small range of values (i.e., few legitimate vouchers with values greater than a few tens of dollars would typically be available to a putative counterfeiter). In general, the smaller the range of encrypted data available to a code-breaker, the more difficult it is to break the code. A number of variations and modifications of the invention can be used. Although features of the present invention are described in connection with an example in which a voucher is a printed voucher (e.g., magnetic cards, electronic transfers and the like), some or all features of the present invention can be used in connection with at least some other types of vouchers (e.g., magnetic cards, electronic transfers and the like), as will be apparent to those of skill in the art after understanding the present disclosure.
  • Although particular encryption or alteration schemes have been described and are believed to be particularly useful especially in those situations in which computational time or power available for decryption and/or validation are limited, other encryption/decryption schemes can be used, including those generally known for data encryption such as RAS, DES, public/private key systems, and the like. Although an encryption system has been described which involves the step of adding and a step of rearranging, numerous alterations and variations are possible such as performing the steps in a different order, interchanging addition and subtraction, using normal rather than modulo addition or subtraction (where sufficient digits are available), 1's complement and multiple keys. Although indexing to encryption value tables was described in connection with using a particular digit of transaction number as an index, it is possible to use different indices for the different tables (Tables I and II), or other indices can be used, including other digits of a transaction number, hashes or other modifications of a transaction number or digits thereof, other information in place of or combined with the transaction number (or digits thereof) such as the transaction date, time, location code, customer identification and the like.
  • Preferably, in addition to or in place of, validating by comparing a decrypted voucher value with a printed (unencrypted) voucher value, a “negative check file” test is performed to identify vouchers which correspond to vouchers which have already been redeemed or may otherwise be suspect. For example, the negative check file may include transaction numbers, date-time information or other voucher identification information for previously redeemed vouchers at a particular store or vouchers redeemed within a certain interval of time, voucher identifiers known to be associated with vouchers previously altered or fabricated, or the like.
  • Although examples described herein include encoding of all digits of a voucher value, it is possible to configure voucher validation procedures which provide encoding or encryption of only some digits of the value (or other field), such as a certain number of least significant or most significant digits, odd-numbered digits and the like. In these configurations, encoded selected voucher value digits cannot be used to, by themselves, indicate the value of the voucher, and accordingly, the full voucher value would need to be provided in another form such as being provided in a different field of the bar code, provided in a different region of the voucher, provided to the cashier computer through another route (e.g., by being sent from the coin counter to the back room computer and then to the cashier computer when the voucher is presented for redemption).
  • In one embodiment, rather than performing a specific voucher validation step, it is possible to achieve many of the same benefits by always encoding or encrypting the voucher value and always redeeming a voucher in an amount equal to the value indicated by the decrypted voucher value, on the assumption that those attempting to alter the unencrypted value indicator 724 a, b will fail to realize that the redemption will be based on decryption of an encrypted value (and thus will fail to alter the encryption value) and/or will fail to understand how to alter the encrypted value (will fail to understand the encryption procedure) in such a way as to consistently achieve a goal of increasing a voucher value in a manner likely to escape notice. Although it is preferred to use a programmable computer for encrypting, decrypting and/or validating, it is possible to use other devices such as hand-wired logic devices, programmable logic arrays, application-specific integrated circuits and the like.
  • Although the present invention has been described in connection with a coin discriminator, it can be used in other contexts such as providing encoded, encrypted or other altered information on printed or electronic coupons, tickets, gaming items or tokens, passes, checks, product or service bar codes, or other documents or communications, including electronic communications. Those of skill in the art will, after understanding the present disclosure, know how to provide hardware and software for implementing, making and using the invention. It is intended the appended claims be construed to include alternative embodiments to the extent permitted.
  • The present invention, in various embodiments, includes components, methods, processes, systems and/or apparatus substantially as depicted and described herein, including various embodiments, subcombinations, and subsets thereof. Those of skill in the art will understand how to make and use the present invention after understanding the present disclosure. The present invention, in various embodiments, includes providing devices and processes in the absence of items not depicted and/or described herein or in various embodiments hereof, including in the absence of such items as may have been used in previous devices or processes, e.g., for improving performance, achieving ease and/or reducing cost of implementation.
  • The foregoing discussion of the invention has been presented for purposes of illustration and description. The foregoing is not intended to limit the invention to the form or forms disclosed herein. Although the description of the invention has included description of one or more embodiments and certain variations and modifications, other variations and modifications are within the scope of the invention, e.g., as may be within the skill and knowledge of those in the art, after understanding the present disclosure. It is intended to obtain rights which include alternative embodiments to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges or steps to those claimed, whether or not such alternate, interchangeable and/or equivalent structures, functions, ranges or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.

Claims (29)

1-7. (canceled)
8. A voucher configured to assist in distinguishing unauthorized duplicate or counterfeit vouchers, the voucher comprising:
a substrate configured to be dispensed from a coin-counting machine;
a first indicia on the substrate; and
a thermally responsive second indicia on the substrate, at least one of the first indicia and the second indicia indicating a value of the voucher, wherein the second indicia is configured to change appearance in response to a change in ambient temperature.
9. The voucher of claim 8 wherein the thermally responsive second indicia includes thermo-chromic ink.
10. The voucher of claim 8 wherein the thermally responsive second indicia has an activation temperature of at least 75 degrees Fahrenheit.
11. The voucher of claim 8, further comprising a third indicia on the substrate, the third indicia being at least partially obscured by the thermally responsive second indicia.
12. The voucher of claim 8 further comprising a substantially non-visible mark on the substrate, wherein rubbing adjacent to the mark with an object will render the mark visible.
13-21. (canceled)
22. A voucher configured to assist in distinguishing unauthorized duplicate or counterfeit vouchers, the voucher comprising:
a substrate;
a first indicia on the substrate, the first indicia indicating a value of the voucher;
a thermally responsive second indicia on the substrate configured to chance appearance in response to a change in ambient temperature, the second indicia being responsive at a temperature between 75 and 98 degrees Fahrenheit;
a plurality of perforations in the substrate defining a pattern; and
a substantially non-visible third indicia on the substrate, wherein rubbing adjacent to the third indicia with an object will render the third indicia visible.
23. The voucher of claim 22 wherein the thermally responsive second indicia includes thermo-chromic ink.
24. The voucher of claim 22 wherein the substrate includes thermal paper.
25. A voucher configured to assist in distinguishing unauthorized duplicate or counterfeit vouchers, the voucher comprising:
a substrate configured to be dispensed from a coin-counting machine, the substrate including at least a thermally responsive substrate portion configured to change appearance in response to a change in ambient temperature, the thermally responsive substrate portion having a first visual appearance at a first ambient temperature and a second visual appearance at a second ambient temperature; and
an indicia on the substrate.
26. The voucher of claim 25 wherein the first visual appearance of the thermally responsive substrate portion is lighter than the second visual appearance of the thermally responsive substrate portion, and wherein the second temperature is higher than the first temperature.
27. The voucher of claim 25 wherein the first visual appearance of the thermally responsive substrate portion is darker than the second visual appearance of the thermally responsive substrate portion, and wherein the second temperature is higher than the first temperature.
28. The voucher of claim 25 wherein the indicia is positioned adjacent to the thermally responsive substrate portion.
29. A voucher configured to assist in distinguishing unauthorized duplicate or counterfeit vouchers, the voucher comprising:
a substrate configured to be dispensed from a coin-counting machine;
a first indicia on the substrate; and
a second indicia on the substrate, the second indicia having a first visual appearance at a first ambient temperature and a second visual appearance at a second ambient temperature, wherein one of the first visual appearance or the second visual appearance is a visible appearance and the other visual appearance is a non-visible appearance.
30. An article of manufacture configured to assist in distinguishing unauthorized duplicate or counterfeit articles, the article comprising:
a flexible and elongate substrate usable in connection with a coin-counting machine and configured to receive a first indicia from a printer operatively connected to the coin-counting machine; and
a thermally responsive second indicia on the substrate, wherein the thermally responsive second indicia is configured to change appearance in response to a chance in ambient temperature.
31. The article of claim 30, wherein the coin-counting machine is usable to provide a total value related to a plurality of randomly received coins, and wherein the first indicia is a value related to the total value.
32-44. (canceled)
45. The voucher of claim 8 wherein the substrate includes a first surface opposite a second surface, and wherein the first indicia is on the first surface and the second indicia is on the second surface.
46. The voucher of claim 8 wherein the thermally responsive second indicia is configured to respond to human touch.
47. The voucher of claim 8 wherein the thermally responsive second indicia is configured to respond to human breath.
48. The voucher of claim 22 wherein the thermally responsive second indicia is configured to respond to human touch.
49. The voucher of claim 22 wherein the thermally responsive second indicia is configured to respond to human breath.
50. The voucher of claim 25 wherein the thermally responsive substrate portion is configured to respond to human touch.
51. The voucher of claim 25 wherein the thermally responsive substrate portion is configured to respond to human breath.
52. The voucher of claim 29 wherein the thermally responsive second indicia is configured to respond to human touch.
53. The voucher of claim 29 wherein the thermally responsive second indicia is configured to respond to human breath.
54. The article of claim 30 wherein the thermally responsive second indicia is configured to respond to human touch.
55. The article of claim 30 wherein the thermally responsive second indicia is configured to respond to human breath.
US10/653,699 1998-10-23 2003-09-02 Coin-discriminator voucher anti-counterfeiting method and apparatus Abandoned US20050189427A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/653,699 US20050189427A1 (en) 1998-10-23 2003-09-02 Coin-discriminator voucher anti-counterfeiting method and apparatus
US10/894,358 US7464868B2 (en) 1998-10-23 2004-07-19 Coin-discriminator voucher anti-counterfeiting method and apparatus
US12/235,574 US7931304B2 (en) 1998-10-23 2008-09-22 Coin-discriminator voucher anti-counterfeiting method and apparatus

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US10550898P 1998-10-23 1998-10-23
US09/422,917 US6349972B1 (en) 1992-09-04 1999-10-21 Coin-discriminator voucher anti-counterfeiting method and apparatus
US10/039,181 US6644696B2 (en) 1998-10-23 2002-01-05 Coin-discriminator voucher anti-counterfeiting method and apparatus
US10/653,699 US20050189427A1 (en) 1998-10-23 2003-09-02 Coin-discriminator voucher anti-counterfeiting method and apparatus

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/039,181 Division US6644696B2 (en) 1998-10-23 2002-01-05 Coin-discriminator voucher anti-counterfeiting method and apparatus

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/894,358 Continuation US7464868B2 (en) 1998-10-23 2004-07-19 Coin-discriminator voucher anti-counterfeiting method and apparatus

Publications (1)

Publication Number Publication Date
US20050189427A1 true US20050189427A1 (en) 2005-09-01

Family

ID=27732126

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/039,181 Expired - Lifetime US6644696B2 (en) 1998-10-23 2002-01-05 Coin-discriminator voucher anti-counterfeiting method and apparatus
US10/653,699 Abandoned US20050189427A1 (en) 1998-10-23 2003-09-02 Coin-discriminator voucher anti-counterfeiting method and apparatus
US10/894,358 Expired - Fee Related US7464868B2 (en) 1998-10-23 2004-07-19 Coin-discriminator voucher anti-counterfeiting method and apparatus
US12/235,574 Expired - Fee Related US7931304B2 (en) 1998-10-23 2008-09-22 Coin-discriminator voucher anti-counterfeiting method and apparatus

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/039,181 Expired - Lifetime US6644696B2 (en) 1998-10-23 2002-01-05 Coin-discriminator voucher anti-counterfeiting method and apparatus

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/894,358 Expired - Fee Related US7464868B2 (en) 1998-10-23 2004-07-19 Coin-discriminator voucher anti-counterfeiting method and apparatus
US12/235,574 Expired - Fee Related US7931304B2 (en) 1998-10-23 2008-09-22 Coin-discriminator voucher anti-counterfeiting method and apparatus

Country Status (5)

Country Link
US (4) US6644696B2 (en)
EP (1) EP1472098B1 (en)
AU (1) AU2002324730B2 (en)
CA (1) CA2472487C (en)
WO (1) WO2003068527A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070181674A1 (en) * 2006-02-08 2007-08-09 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US20070208622A1 (en) * 2006-02-21 2007-09-06 Karen Nixon Lane Promotional methods involving the use of tokens
US7753259B1 (en) 2006-04-13 2010-07-13 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US7766244B1 (en) 2007-12-31 2010-08-03 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US7801799B1 (en) 1998-11-17 2010-09-21 Jpmorgan Chase Bank, N.A. Customer activated multi-value (CAM) card
US7801816B2 (en) 2001-05-23 2010-09-21 Jp Morgan Chase Bank, N.A. System and method for currency selectable stored value instrument
US7801814B2 (en) 2000-11-06 2010-09-21 Jpmorgan Chase Bank, N.A. System and method for selectable funding of electronic transactions
US7805368B2 (en) 1998-06-22 2010-09-28 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US7809595B2 (en) 2002-09-17 2010-10-05 Jpmorgan Chase Bank, Na System and method for managing risks associated with outside service providers
US7809642B1 (en) 1998-06-22 2010-10-05 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US7822682B2 (en) 2005-06-08 2010-10-26 Jpmorgan Chase Bank, N.A. System and method for enhancing supply chain transactions
US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
US7860789B2 (en) 2001-07-24 2010-12-28 Jpmorgan Chase Bank, N.A. Multiple account advanced payment card and method of routing card transactions
US7899753B1 (en) 2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication
US7945492B1 (en) 1998-12-23 2011-05-17 Jpmorgan Chase Bank, N.A. System and method for integrating trading operations including the generation, processing and tracking of and trade documents
US8020754B2 (en) 2001-08-13 2011-09-20 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
US8145549B2 (en) 2003-05-30 2012-03-27 Jpmorgan Chase Bank, N.A. System and method for offering risk-based interest rates in a credit instutment
US8408455B1 (en) 2006-02-08 2013-04-02 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US8447672B2 (en) 2005-05-27 2013-05-21 Jp Morgan Chase Bank, N.A. Universal payment protection
US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US8751391B2 (en) 2002-03-29 2014-06-10 Jpmorgan Chase Bank, N.A. System and process for performing purchase transactions using tokens
US8781904B2 (en) 2000-08-01 2014-07-15 Jpmorgan Chase Bank, N.A. System and method for transponder-enabled account transactions
US8793160B2 (en) 1999-12-07 2014-07-29 Steve Sorem System and method for processing transactions
US8805739B2 (en) 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
US9990642B2 (en) 2002-10-11 2018-06-05 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to credit account holders
US10282536B1 (en) 2002-03-29 2019-05-07 Jpmorgan Chase Bank, N.A. Method and system for performing purchase and other transactions using tokens with multiple chips

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6748101B1 (en) 1995-05-02 2004-06-08 Cummins-Allison Corp. Automatic currency processing system
US6363164B1 (en) 1996-05-13 2002-03-26 Cummins-Allison Corp. Automated document processing system using full image scanning
US8950566B2 (en) * 1996-05-13 2015-02-10 Cummins Allison Corp. Apparatus, system and method for coin exchange
US7818423B1 (en) * 1998-09-11 2010-10-19 RPX-LV Acquisition, LLC Retrieving personal account information from a web site by reading a credit card
AU1226000A (en) * 1998-10-23 2000-05-15 Coinstar, Inc. Coin-discriminator voucher anti-counterfeiting method and apparatus
US6644696B2 (en) * 1998-10-23 2003-11-11 Coinstar, Inc. Coin-discriminator voucher anti-counterfeiting method and apparatus
US8701857B2 (en) 2000-02-11 2014-04-22 Cummins-Allison Corp. System and method for processing currency bills and tickets
US7978899B2 (en) 2005-10-05 2011-07-12 Cummins-Allison Corp. Currency processing system with fitness detection
US6896118B2 (en) 2002-01-10 2005-05-24 Cummins-Allison Corp. Coin redemption system
US7743902B2 (en) 2002-03-11 2010-06-29 Cummins-Allison Corp. Optical coin discrimination sensor and coin processing system using the same
US8065236B2 (en) * 2002-04-09 2011-11-22 The Western Union Company Coin currency conversion systems and methods
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US8393455B2 (en) 2003-03-12 2013-03-12 Cummins-Allison Corp. Coin processing device having a moveable coin receptacle station
US20050052015A1 (en) * 2003-04-22 2005-03-10 Paul Hynek Waterproof, tear-resistant accordion book with magnetic covers and method of making same
US20070218981A1 (en) * 2004-04-16 2007-09-20 Cyberview Technology, Inc. Casino no-ticket in cashless methods allowing the redemption of large prizes
SE528945C8 (en) * 2004-07-06 2007-10-09 Scan Coin Ind Ab Cash reuse system comprising a cash reception unit and a cash distribution unit
US8523641B2 (en) 2004-09-15 2013-09-03 Cummins-Allison Corp. System, method and apparatus for automatically filling a coin cassette
US9934640B2 (en) 2004-09-15 2018-04-03 Cummins-Allison Corp. System, method and apparatus for repurposing currency
US8602200B2 (en) 2005-02-10 2013-12-10 Cummins-Allison Corp. Method and apparatus for varying coin-processing machine receptacle limits
SE529716C8 (en) 2006-03-08 2007-12-04 Scan Coin Ind Ab Cash deposit device and procedure
US7980378B2 (en) 2006-03-23 2011-07-19 Cummins-Allison Corporation Systems, apparatus, and methods for currency processing control and redemption
US20070235523A1 (en) * 2006-04-05 2007-10-11 Compuflex Corporation System and method for cash deposit/issuance
SE531959C2 (en) * 2006-08-25 2009-09-15 Scan Coin Ind Ab A coin dispensing device and a coin deposition and dispensing device
WO2008045965A2 (en) * 2006-10-10 2008-04-17 Stumpel Lambert J Surgical guide for dental implant and methods therefor
US8195510B2 (en) * 2007-11-01 2012-06-05 Weinblatt Lee S Technique for eliminating fraudulent use of printed coupons
US20090120760A1 (en) * 2007-11-12 2009-05-14 Anders Sjostrom Dual use coin deposit and dispensing apparatus
US7821453B2 (en) * 2007-12-20 2010-10-26 Sarnoff Corporation Distributed iterative multimodal sensor fusion method for improved collaborative localization and navigation
US20090239459A1 (en) * 2008-03-19 2009-09-24 Cummins-Allison Corp. Self Service Coin Processing Machines With EPOS Terminal And Method For Automated Payout Utilizing Same
US20090242626A1 (en) * 2008-03-21 2009-10-01 Cummins-Allison Corp. Apparatus, system and method for coin exchange
US8042732B2 (en) 2008-03-25 2011-10-25 Cummins-Allison Corp. Self service coin redemption card printer-dispenser
US20100029374A1 (en) * 2008-08-04 2010-02-04 Glory Ltd., A Corporation Of Japan Automatic dealing machine and automatic dealing system
US8028897B2 (en) * 2009-01-07 2011-10-04 Bank Of America Corporation Deposit of coins into a financial account
CN102473261A (en) * 2009-07-06 2012-05-23 瑞典爱立信有限公司 Voucher access code creation and management
WO2011087794A1 (en) * 2009-12-22 2011-07-21 Stumpel Lambert J Surgical guide and method
WO2011106391A2 (en) * 2010-02-23 2011-09-01 Valassis Communications, Inc. Online offer distribution system and method
US8545295B2 (en) 2010-12-17 2013-10-01 Cummins-Allison Corp. Coin processing systems, methods and devices
US9398833B2 (en) * 2012-04-25 2016-07-26 Sca Hygiene Products Ab Paper product dispensing system and related methods
US9092924B1 (en) 2012-08-31 2015-07-28 Cummins-Allison Corp. Disk-type coin processing unit with angled sorting head
US9059188B1 (en) 2014-05-01 2015-06-16 International Business Machines Corporation Graphene resistor based tamper resistant identifier with contactless reading
US10685523B1 (en) 2014-07-09 2020-06-16 Cummins-Allison Corp. Systems, methods and devices for processing batches of coins utilizing coin imaging sensor assemblies
US9916713B1 (en) 2014-07-09 2018-03-13 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing normal or near-normal and/or high-angle of incidence lighting
US9501885B1 (en) 2014-07-09 2016-11-22 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing near-normal and high-angle of incidence lighting
US9508208B1 (en) 2014-07-25 2016-11-29 Cummins Allison Corp. Systems, methods and devices for processing coins with linear array of coin imaging sensors
US9430893B1 (en) 2014-08-06 2016-08-30 Cummins-Allison Corp. Systems, methods and devices for managing rejected coins during coin processing
US10089812B1 (en) 2014-11-11 2018-10-02 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing a multi-material coin sorting disk
US9875593B1 (en) 2015-08-07 2018-01-23 Cummins-Allison Corp. Systems, methods and devices for coin processing and coin recycling
US10181234B2 (en) 2016-10-18 2019-01-15 Cummins-Allison Corp. Coin sorting head and coin processing system using the same
US10679449B2 (en) 2016-10-18 2020-06-09 Cummins-Allison Corp. Coin sorting head and coin processing system using the same
US11443581B2 (en) 2019-01-04 2022-09-13 Cummins-Allison Corp. Coin pad for coin processing system
US11887500B2 (en) * 2019-06-05 2024-01-30 Dovid Lesser Educational aid
CN113334948B (en) * 2021-05-12 2022-12-13 广州证卡科技有限公司 Printer and using method thereof

Citations (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4425161A (en) * 1980-11-27 1984-01-10 Yutaka Shibahashi Thermochromic materials
US4436103A (en) * 1980-11-19 1984-03-13 4-D Electronics Company, Inc. Coin collecting and counting systems
US4854332A (en) * 1986-07-03 1989-08-08 Sakura Color Products Corp. Cigarette having thermochromogenic portions thereon
US4880964A (en) * 1984-06-14 1989-11-14 Beatrice Foods Co. Scannable fraud preventing coupon
US4977502A (en) * 1985-06-28 1990-12-11 Baker Joseph R Transit vehicle farebox for conducting multi-media transit fare transactions
US5001753A (en) * 1987-03-06 1991-03-19 U.S. Philips Corporation Crytographic system and process and its application
US5002313A (en) * 1988-08-19 1991-03-26 Carmine Salvatore Promotional coupons
US5003597A (en) * 1989-12-21 1991-03-26 Xerox Corporation Method and apparatus for data encryption
US5055657A (en) * 1988-12-05 1991-10-08 Scheidt & Bachmann Gesellschaft Mit Beschrankter Haftung Vending type machine dispensing a redeemable credit voucher upon payment interrupt
US5083815A (en) * 1990-04-27 1992-01-28 Pollard Banknote Limited Heat actuated game
US5137304A (en) * 1989-10-31 1992-08-11 Webcraft Technologies, Inc. End and encoded mass distributable response piece and method of making the same
US5259906A (en) * 1992-04-20 1993-11-09 Wallace Computer Services, Inc. Method of making and using a combined shipping label product information device
US5282651A (en) * 1991-04-15 1994-02-01 Frank Alonso Trading cards and method of concealing and revealing information thereon
US5344191A (en) * 1992-12-09 1994-09-06 Wallace Computer Services, Inc. Hidden entry system and use thereof
US5375271A (en) * 1993-09-30 1994-12-27 Kel-Gar, Inc. Bath mat having temperature related indicia
US5413384A (en) * 1993-03-08 1995-05-09 Monarch Marking Systems, Inc. Composite label for use in couponing
US5466012A (en) * 1993-01-07 1995-11-14 Ncr Corporation Facsimile security system
US5479507A (en) * 1994-01-19 1995-12-26 Thomas De La Rue Limited Copy indicating security device
US5509692A (en) * 1993-01-26 1996-04-23 Be'eri Printers Monetary instrument
US5564546A (en) * 1992-09-04 1996-10-15 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US5570123A (en) * 1995-06-30 1996-10-29 Comtec Information Systems, Inc. Thermal print head with auxiliary printer head guard
US5598477A (en) * 1994-11-22 1997-01-28 Pitney Bowes Inc. Apparatus and method for issuing and validating tickets
US5618063A (en) * 1992-12-09 1997-04-08 Wallace Computer Services, Inc. Multicolor heat-sensitive verification and highlighting system
US5620079A (en) * 1992-09-04 1997-04-15 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US5765141A (en) * 1995-10-06 1998-06-09 Spector; Donald Computerized merchandising system
US5785171A (en) * 1997-07-02 1998-07-28 Howes; James P. Prize delivery system
US5789050A (en) * 1996-11-12 1998-08-04 Xynatech, Inc. Perforating and slitting die sheet, methods of constructing same and paper product produced therefrom
US5810397A (en) * 1993-05-03 1998-09-22 The Standard Register Company Thermally imagable business record and method of desensitizing a thermally imagable surface
US5826915A (en) * 1995-02-17 1998-10-27 Wallace Computer Services, Inc. Method of using thermochromic material on security documents and product
US5835689A (en) * 1995-12-19 1998-11-10 Pitney Bowes Inc. Transaction evidencing system and method including post printing and batch processing
US5868432A (en) * 1995-07-26 1999-02-09 Mantegazza Antonio Arti Grafiche S.R.L. Document with anti-counterfeiting means to prevent reproducibility by photocopying
US5909793A (en) * 1998-08-04 1999-06-08 Coinstar, Inc. Coin counter prize-awarding method and apparatus using promotional coins
US5917996A (en) * 1996-10-19 1999-06-29 Xerox Corporation System for printing tamper-resistant electronic form characters
US5936541A (en) * 1992-11-17 1999-08-10 Stambler; Leon Method for securing information relevant to a transaction
US5943423A (en) * 1995-12-15 1999-08-24 Entegrity Solutions Corporation Smart token system for secure electronic transactions and identification
US5970875A (en) * 1997-09-29 1999-10-26 Wallace Computer Services, Inc. Pressure-sensitive tamper evident system
US5995942A (en) * 1996-03-13 1999-11-30 Tactical Retailing Solutions Store-level marketing system
US6056289A (en) * 1992-05-06 2000-05-02 Clapper, Jr.; Ronald C. Voucher and game ticket combination and apparatus and method used therewith
US6080056A (en) * 1997-12-22 2000-06-27 Scan Coin Industries Ab Coin handling apparatus and a coin deposit machine incorporating such an apparatus
US6110044A (en) * 1997-07-15 2000-08-29 Stern; Richard H. Method and apparatus for issuing and automatically validating gaming machine payout tickets
US6116402A (en) * 1998-10-23 2000-09-12 Coinstar, Inc. Voucher coding for self-service coin discriminator
US6138106A (en) * 1997-05-19 2000-10-24 Walker Asset Management Limited Partnership Dynamically changing system for fulfilling concealed value gift certificate obligations
US6193155B1 (en) * 1996-12-09 2001-02-27 Walker Digital, Llc Method and apparatus for issuing and managing gift certificates
US6233340B1 (en) * 1996-03-01 2001-05-15 Calin A. Sandru Apparatus and method for enhancing the security of negotiable documents
US6269349B1 (en) * 1999-09-21 2001-07-31 A6B2, Inc. Systems and methods for protecting private information
US6318536B1 (en) * 1997-10-23 2001-11-20 Cash Technologies, Inc. Multi-transaction coin machine
US6349972B1 (en) * 1992-09-04 2002-02-26 Coinstar, Inc. Coin-discriminator voucher anti-counterfeiting method and apparatus
US6375080B1 (en) * 1997-02-26 2002-04-23 Hank Cremonese Multiple purpose telephone card
US6413305B1 (en) * 2000-02-07 2002-07-02 The Standard Register Company Thermochromic ink composition
US20020112162A1 (en) * 2001-02-13 2002-08-15 Cocotis Thomas Andrew Authentication and verification of Web page content
US6494776B1 (en) * 1992-09-04 2002-12-17 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US6644696B2 (en) * 1998-10-23 2003-11-11 Coinstar, Inc. Coin-discriminator voucher anti-counterfeiting method and apparatus
US6736725B2 (en) * 1993-01-22 2004-05-18 Mgm Grand, Inc. Gaming method and host computer with ticket-in/ticket-out capability

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3048251A (en) 1962-08-07 Coin collector including clearance means
US2925288A (en) * 1953-05-14 1960-02-16 Richard I N Weingart Tickets and method of preparing the same
US3112019A (en) * 1961-01-06 1963-11-26 Universal Match Corp Depository apparatus
DE1424966B1 (en) * 1961-10-20 1969-12-18 Anker Werke Ag Coin sorting device
US3709145A (en) * 1969-08-06 1973-01-09 Williamson A Ltd Ticket issuing and like machines
US4059122A (en) 1973-02-10 1977-11-22 Glory Kogyo Kabushiki Kaisha Coin classifying and counting machine
US4398708A (en) * 1977-01-28 1983-08-16 Max Goldman Method of fabricating and securing playing cards for instant lotteries and games
US4210346A (en) 1977-06-23 1980-07-01 Burroughs Corporation Protected document bearing watermark and method of making
SE8104036L (en) 1981-06-29 1982-12-30 Leif Lundblad AUTOMATIC FOR SECURITIES AND OTHER DOCUMENTS LIKE banknotes, checks, receipts, notes etc.
GB2123591A (en) 1982-07-13 1984-02-01 Norton And Wright Limited Parking cards
IL66445A (en) * 1982-08-02 1985-07-31 Teletoken 2000 Ltd Optically-readable cards
JPS61143896A (en) 1984-12-18 1986-07-01 株式会社日本コンラックス Coin selector
US4757537A (en) 1985-04-17 1988-07-12 Pitney Bowes Inc. System for detecting unaccounted for printing in a value printing system
GB8708555D0 (en) 1987-04-09 1987-05-13 Scan Coin Ab Coin sorters
GB8816786D0 (en) 1988-07-14 1988-08-17 Scan Coin Ab Coin acceptance apparatus
FR2647524B1 (en) * 1989-05-23 1991-10-31 Inst Francais Du Petrole FLEXIBLE PIPE COMPRISING A COMPOSITE MATERIAL WITH AN ALUMINUM ALLOY MATRIX AND METHOD FOR MANUFACTURING SAID MATERIAL
US5003596A (en) 1989-08-17 1991-03-26 Cryptech, Inc. Method of cryptographically transforming electronic digital data from one form to another
GB9019784D0 (en) 1990-09-10 1990-10-24 Amblehurst Ltd Security device
JP3176941B2 (en) 1990-12-17 2001-06-18 株式会社リコー Thermal recording material
CA2109080A1 (en) 1991-04-29 1992-10-30 Ken R. Powell Multiple use commodity collection and storage system
US5252811A (en) 1991-08-09 1993-10-12 U.S.A. Save Corporation Device, system and method for increasing saving account participation and investment by small investors
US6736251B2 (en) 1992-09-04 2004-05-18 Coinstar, Inc. Coin counter and voucher dispensing machine and method
US7028827B1 (en) 1992-09-04 2006-04-18 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
GB9220998D0 (en) 1992-10-06 1992-11-18 Europ Design Consortium Limite Counterfeit indentification apparatus
DE9315294U1 (en) * 1993-10-09 1994-02-17 Hölscher, Kurt, 32257 Bünde Special perforation in banknotes to protect against counterfeiting
NL9400498A (en) * 1994-03-29 1995-11-01 Iai Bv Patterned value carrier provided with a laser beam.
US5984364A (en) * 1994-05-12 1999-11-16 Diamond Security, Inc. Negotiable document having enhanced security for deterring generation of copies by use of thermochromatic ink
US5475205A (en) * 1994-06-22 1995-12-12 Scientific Games Inc. Document verification system
JP3438083B2 (en) 1994-10-28 2003-08-18 株式会社日本コンラックス Coin payout device
US5489096A (en) * 1995-04-27 1996-02-06 Double Win, Ltd. Ticket systems for wagering on sports events
US5704651A (en) 1995-05-25 1998-01-06 Verify First Technologies, Inc. Counterfeit resistant documents and methods
US5873604A (en) * 1995-05-25 1999-02-23 Verify First Technologies, Inc. Document security system having thermo-activated pantograph and validation mark
US5751811A (en) * 1995-08-30 1998-05-12 Magnotti; Joseph C. 32N +D bit key encryption-decryption system using chaos
GB9519275D0 (en) 1995-09-21 1995-11-22 Univ Dundee Substances and their therapeutic use
US5742685A (en) 1995-10-11 1998-04-21 Pitney Bowes Inc. Method for verifying an identification card and recording verification of same
US6080059A (en) * 1995-10-24 2000-06-27 Kim; Sinil Motor-vehicle passenger-compartment air-cleaner
DE69707218T2 (en) 1996-02-15 2002-06-27 Catalina Marketing International, Inc. METHOD AND DEVICE FOR GENERATING PERSONAL IDENTIFICATION NUMBERS FOR USE IN INCREASING CONSUMER SALES
GB9612496D0 (en) * 1996-06-14 1996-08-14 De La Rue Thomas & Co Ltd Security device
SE9602829D0 (en) * 1996-07-19 1996-07-19 Yngve Johnsson Procedure and apparatus for payment processing and means of payment
DE19652256A1 (en) 1996-12-16 1998-06-18 Bosch Gmbh Robert Procedure for securing data transmission
DE19705380C1 (en) * 1997-02-12 1998-06-10 Schreiner Etiketten Security label used to safeguard e.g. lottery numbers or personal identification number
JPH10236046A (en) 1997-02-27 1998-09-08 Toppan Forms Co Ltd Scratch sheet
BR9815463A (en) 1997-03-21 2001-11-06 Walker Asset Man Ltd Partnersh System, processes for conducting a lottery transaction and lottery ticket transactions and merchandise transactions, for processing a request for lottery ticket information and for lottery ticket transactions, for acquiring and authenticating a lottery ticket, device transaction processing, receipt and processes and devices to determine a complementary sale of a purchase and a second product depending on a purchase, to offer a complementary sale of a purchase, to facilitate the purchase of fractions of lottery tickets to provide a sale of a supplementary product at a point of sale terminal, to control the performance of a supplementary process at a point of sale terminal, to process a sale of supplementary product at a point of sale terminal and to control offers that are provided at a point-of-sale terminal
US6030000A (en) * 1997-09-12 2000-02-29 Diamond Security, Inc. Negotiable document having enhanced security for deterring fraud by use of a thermochromatic fingerprint image
GB2326866B (en) 1998-02-16 1999-06-23 Nicholas Charles Richar Holmes Advertising label
US6969549B1 (en) * 1999-11-19 2005-11-29 Hewlett-Packard Development Company, L.P. Techniques to prevent leakage of fluorescing signals through print media or indicia tape
NL1014440C2 (en) 2000-02-21 2001-01-19 Hulleman Jacob Voucher, in particular a gift voucher, as well as a method for issuing and collecting a physical or virtual coupon.

Patent Citations (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4436103A (en) * 1980-11-19 1984-03-13 4-D Electronics Company, Inc. Coin collecting and counting systems
US4425161A (en) * 1980-11-27 1984-01-10 Yutaka Shibahashi Thermochromic materials
US4880964A (en) * 1984-06-14 1989-11-14 Beatrice Foods Co. Scannable fraud preventing coupon
US4977502A (en) * 1985-06-28 1990-12-11 Baker Joseph R Transit vehicle farebox for conducting multi-media transit fare transactions
US4854332A (en) * 1986-07-03 1989-08-08 Sakura Color Products Corp. Cigarette having thermochromogenic portions thereon
US5001753A (en) * 1987-03-06 1991-03-19 U.S. Philips Corporation Crytographic system and process and its application
US5002313A (en) * 1988-08-19 1991-03-26 Carmine Salvatore Promotional coupons
US5055657A (en) * 1988-12-05 1991-10-08 Scheidt & Bachmann Gesellschaft Mit Beschrankter Haftung Vending type machine dispensing a redeemable credit voucher upon payment interrupt
US5137304A (en) * 1989-10-31 1992-08-11 Webcraft Technologies, Inc. End and encoded mass distributable response piece and method of making the same
US5003597A (en) * 1989-12-21 1991-03-26 Xerox Corporation Method and apparatus for data encryption
US5083815A (en) * 1990-04-27 1992-01-28 Pollard Banknote Limited Heat actuated game
US5282651A (en) * 1991-04-15 1994-02-01 Frank Alonso Trading cards and method of concealing and revealing information thereon
US5259906A (en) * 1992-04-20 1993-11-09 Wallace Computer Services, Inc. Method of making and using a combined shipping label product information device
US6056289A (en) * 1992-05-06 2000-05-02 Clapper, Jr.; Ronald C. Voucher and game ticket combination and apparatus and method used therewith
US5799767A (en) * 1992-09-04 1998-09-01 Coinstar, Inc. Cleaning apparatus and method for a coin counter and voucher dispenser
US5620079A (en) * 1992-09-04 1997-04-15 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US6494776B1 (en) * 1992-09-04 2002-12-17 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US6349972B1 (en) * 1992-09-04 2002-02-26 Coinstar, Inc. Coin-discriminator voucher anti-counterfeiting method and apparatus
US5564546A (en) * 1992-09-04 1996-10-15 Coinstar, Inc. Coin counter/sorter and coupon/voucher dispensing machine and method
US5936541A (en) * 1992-11-17 1999-08-10 Stambler; Leon Method for securing information relevant to a transaction
US5618063A (en) * 1992-12-09 1997-04-08 Wallace Computer Services, Inc. Multicolor heat-sensitive verification and highlighting system
US5344191A (en) * 1992-12-09 1994-09-06 Wallace Computer Services, Inc. Hidden entry system and use thereof
US5466012A (en) * 1993-01-07 1995-11-14 Ncr Corporation Facsimile security system
US6736725B2 (en) * 1993-01-22 2004-05-18 Mgm Grand, Inc. Gaming method and host computer with ticket-in/ticket-out capability
US5509692A (en) * 1993-01-26 1996-04-23 Be'eri Printers Monetary instrument
US5413384A (en) * 1993-03-08 1995-05-09 Monarch Marking Systems, Inc. Composite label for use in couponing
US5810397A (en) * 1993-05-03 1998-09-22 The Standard Register Company Thermally imagable business record and method of desensitizing a thermally imagable surface
US5375271A (en) * 1993-09-30 1994-12-27 Kel-Gar, Inc. Bath mat having temperature related indicia
US5479507A (en) * 1994-01-19 1995-12-26 Thomas De La Rue Limited Copy indicating security device
US5598477A (en) * 1994-11-22 1997-01-28 Pitney Bowes Inc. Apparatus and method for issuing and validating tickets
US5826915A (en) * 1995-02-17 1998-10-27 Wallace Computer Services, Inc. Method of using thermochromic material on security documents and product
US5570123A (en) * 1995-06-30 1996-10-29 Comtec Information Systems, Inc. Thermal print head with auxiliary printer head guard
US5868432A (en) * 1995-07-26 1999-02-09 Mantegazza Antonio Arti Grafiche S.R.L. Document with anti-counterfeiting means to prevent reproducibility by photocopying
US5765141A (en) * 1995-10-06 1998-06-09 Spector; Donald Computerized merchandising system
US5943423A (en) * 1995-12-15 1999-08-24 Entegrity Solutions Corporation Smart token system for secure electronic transactions and identification
US5835689A (en) * 1995-12-19 1998-11-10 Pitney Bowes Inc. Transaction evidencing system and method including post printing and batch processing
US6233340B1 (en) * 1996-03-01 2001-05-15 Calin A. Sandru Apparatus and method for enhancing the security of negotiable documents
US5995942A (en) * 1996-03-13 1999-11-30 Tactical Retailing Solutions Store-level marketing system
US5917996A (en) * 1996-10-19 1999-06-29 Xerox Corporation System for printing tamper-resistant electronic form characters
US5789050A (en) * 1996-11-12 1998-08-04 Xynatech, Inc. Perforating and slitting die sheet, methods of constructing same and paper product produced therefrom
US6193155B1 (en) * 1996-12-09 2001-02-27 Walker Digital, Llc Method and apparatus for issuing and managing gift certificates
US6375080B1 (en) * 1997-02-26 2002-04-23 Hank Cremonese Multiple purpose telephone card
US6138106A (en) * 1997-05-19 2000-10-24 Walker Asset Management Limited Partnership Dynamically changing system for fulfilling concealed value gift certificate obligations
US5785171A (en) * 1997-07-02 1998-07-28 Howes; James P. Prize delivery system
US6110044A (en) * 1997-07-15 2000-08-29 Stern; Richard H. Method and apparatus for issuing and automatically validating gaming machine payout tickets
US5970875A (en) * 1997-09-29 1999-10-26 Wallace Computer Services, Inc. Pressure-sensitive tamper evident system
US6318536B1 (en) * 1997-10-23 2001-11-20 Cash Technologies, Inc. Multi-transaction coin machine
US6080056A (en) * 1997-12-22 2000-06-27 Scan Coin Industries Ab Coin handling apparatus and a coin deposit machine incorporating such an apparatus
US5909793A (en) * 1998-08-04 1999-06-08 Coinstar, Inc. Coin counter prize-awarding method and apparatus using promotional coins
US6644696B2 (en) * 1998-10-23 2003-11-11 Coinstar, Inc. Coin-discriminator voucher anti-counterfeiting method and apparatus
US6116402A (en) * 1998-10-23 2000-09-12 Coinstar, Inc. Voucher coding for self-service coin discriminator
US6269349B1 (en) * 1999-09-21 2001-07-31 A6B2, Inc. Systems and methods for protecting private information
US6413305B1 (en) * 2000-02-07 2002-07-02 The Standard Register Company Thermochromic ink composition
US20020112162A1 (en) * 2001-02-13 2002-08-15 Cocotis Thomas Andrew Authentication and verification of Web page content

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7809642B1 (en) 1998-06-22 2010-10-05 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US8005756B2 (en) 1998-06-22 2011-08-23 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US7805368B2 (en) 1998-06-22 2010-09-28 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US7809643B2 (en) 1998-06-22 2010-10-05 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US7818253B2 (en) 1998-06-22 2010-10-19 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US7801799B1 (en) 1998-11-17 2010-09-21 Jpmorgan Chase Bank, N.A. Customer activated multi-value (CAM) card
US7945492B1 (en) 1998-12-23 2011-05-17 Jpmorgan Chase Bank, N.A. System and method for integrating trading operations including the generation, processing and tracking of and trade documents
US8793160B2 (en) 1999-12-07 2014-07-29 Steve Sorem System and method for processing transactions
US8924289B1 (en) 2000-02-15 2014-12-30 Jpmorgan Chase Bank, N.A. International banking system and method
US8380597B2 (en) 2000-02-15 2013-02-19 Jpmorgan Chase Bank, N.A. International banking system and method
US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
US8781904B2 (en) 2000-08-01 2014-07-15 Jpmorgan Chase Bank, N.A. System and method for transponder-enabled account transactions
US8781905B2 (en) 2000-08-01 2014-07-15 Jpmorgan Chase Bank, N.A. System and method for transponder-enabled account transactions
US7801814B2 (en) 2000-11-06 2010-09-21 Jpmorgan Chase Bank, N.A. System and method for selectable funding of electronic transactions
US8805739B2 (en) 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
US7801816B2 (en) 2001-05-23 2010-09-21 Jp Morgan Chase Bank, N.A. System and method for currency selectable stored value instrument
US8515868B2 (en) 2001-07-24 2013-08-20 Jpmorgan Chase Bank, N.A. Multiple account advanced payment card and method of routing card transactions
US7860789B2 (en) 2001-07-24 2010-12-28 Jpmorgan Chase Bank, N.A. Multiple account advanced payment card and method of routing card transactions
US7890422B1 (en) 2001-07-24 2011-02-15 Jpmorgan Chase Bank, N.A. Multiple account advanced payment card and method of routing card transactions
US8751383B2 (en) 2001-07-24 2014-06-10 Jpmorgan Chase Bank, N.A. Multiple account advanced payment card and method of routing card transactions
US8020754B2 (en) 2001-08-13 2011-09-20 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
US9240089B2 (en) 2002-03-25 2016-01-19 Jpmorgan Chase Bank, N.A. Systems and methods for time variable financial authentication
US7899753B1 (en) 2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication
US8751391B2 (en) 2002-03-29 2014-06-10 Jpmorgan Chase Bank, N.A. System and process for performing purchase transactions using tokens
US10282536B1 (en) 2002-03-29 2019-05-07 Jpmorgan Chase Bank, N.A. Method and system for performing purchase and other transactions using tokens with multiple chips
US7809595B2 (en) 2002-09-17 2010-10-05 Jpmorgan Chase Bank, Na System and method for managing risks associated with outside service providers
US10007923B1 (en) 2002-10-11 2018-06-26 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to credit account holders
US9990642B2 (en) 2002-10-11 2018-06-05 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to credit account holders
US8306907B2 (en) 2003-05-30 2012-11-06 Jpmorgan Chase Bank N.A. System and method for offering risk-based interest rates in a credit instrument
US8145549B2 (en) 2003-05-30 2012-03-27 Jpmorgan Chase Bank, N.A. System and method for offering risk-based interest rates in a credit instutment
US8447670B1 (en) 2005-05-27 2013-05-21 Jp Morgan Chase Bank, N.A. Universal payment protection
US8447672B2 (en) 2005-05-27 2013-05-21 Jp Morgan Chase Bank, N.A. Universal payment protection
US8473395B1 (en) 2005-05-27 2013-06-25 Jpmorgan Chase Bank, Na Universal payment protection
US7822682B2 (en) 2005-06-08 2010-10-26 Jpmorgan Chase Bank, N.A. System and method for enhancing supply chain transactions
US7784682B2 (en) 2006-02-08 2010-08-31 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US20070181674A1 (en) * 2006-02-08 2007-08-09 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US8408455B1 (en) 2006-02-08 2013-04-02 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US20070208622A1 (en) * 2006-02-21 2007-09-06 Karen Nixon Lane Promotional methods involving the use of tokens
US7753259B1 (en) 2006-04-13 2010-07-13 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US8459562B1 (en) 2007-12-31 2013-06-11 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US7766244B1 (en) 2007-12-31 2010-08-03 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
US9460469B1 (en) 2013-11-13 2016-10-04 Jpmorgan Chase Bank, N.A. System and method for financial services device usage

Also Published As

Publication number Publication date
US6644696B2 (en) 2003-11-11
AU2002324730A1 (en) 2003-09-04
US20090096205A1 (en) 2009-04-16
CA2472487A1 (en) 2003-08-21
AU2002324730B2 (en) 2008-03-13
EP1472098B1 (en) 2015-01-28
US20050121507A1 (en) 2005-06-09
WO2003068527A1 (en) 2003-08-21
US7464868B2 (en) 2008-12-16
US20020175515A1 (en) 2002-11-28
EP1472098A4 (en) 2011-07-27
CA2472487C (en) 2009-11-03
EP1472098A1 (en) 2004-11-03
US7931304B2 (en) 2011-04-26

Similar Documents

Publication Publication Date Title
US7464868B2 (en) Coin-discriminator voucher anti-counterfeiting method and apparatus
US7344160B2 (en) Coin-discriminator voucher anti-counterfeiting method and apparatus
US6116402A (en) Voucher coding for self-service coin discriminator
US7433844B2 (en) Automated banking machine currency tracking method
US8684263B1 (en) Automated banking machine that operates responsive to data bearing records
JP3606507B2 (en) Counterfeit ticket discrimination device and counterfeit ticket discrimination method
JPH0764148B2 (en) Securities reader
JP2005316527A (en) Authenticity determining terminal device for securities
JP2006072402A (en) Authenticity of securities decision terminal equipment
JPS63136299A (en) Premium exchange processing method and apparatus
JPH0373418A (en) Card and card issuing device
JPH0399387A (en) Card processor

Legal Events

Date Code Title Description
AS Assignment

Owner name: JPMORGAN CHASE BANK, AS ADMINISTRATIVE AGENT, TEXA

Free format text: SECURITY AGREEMENT;ASSIGNOR:COINSTAR, INC.;REEL/FRAME:015215/0912

Effective date: 20040707

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: COINSTAR, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:020174/0730

Effective date: 20071120

AS Assignment

Owner name: BANK OF AMERICA, N.A., ILLINOIS

Free format text: SECURITY AGREEMENT;ASSIGNOR:COINSTAR, INC.;REEL/FRAME:020196/0811

Effective date: 20071115

AS Assignment

Owner name: COINSTAR, LLC, DELAWARE

Free format text: CHANGE OF NAME;ASSIGNOR:OUTERWALL INC.;REEL/FRAME:041034/0757

Effective date: 20160929