Peel-able, tamper-evident security label for concealing information

ABSTRACT

A visual-information security system that includes an information security label positioned to conceal visual information on a substrate. The information security label may include a spiral-shaped cut (or other complex shape) within the body of the label and a pull-tab, such that when a user pulls on the tab, the label peels off of the substrate in a spiral pattern, revealing the information concealed beneath the label. The complex-shaped cut makes reapplication of the label difficult and evident, thus providing security to consumers. The label may include multiple layers of material, for example, a peel-off layer and an adhesive layer.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional PatentApplication No. 62/922,211, filed Sep. 17, 2018, entitled“PRINTED-INFORMATION SECURITY SYSTEM AND INFORMATION SECURITY LABEL,”which is incorporated herein in its entirety by reference thereto.

BACKGROUND

The described embodiments relate generally to security systems forconcealing information. More particularly, the embodiments relate topeel-able, tamper-evident security labels for concealing visualinformation.

Transaction cards may include visual information (e.g., an accountnumber or authorization code) that is intended to remain hidden untilthe card is in the possession of its end user. Such visual informationmay be covered by a security label that conceals the visual information.The security label may be removed—ideally by the end user—to reveal thepreviously-concealed information.

SUMMARY

Various embodiments are disclosed that relate to visual-informationsecurity systems that may include a tamper-evident information labelconfigured to conceal information disposed on a substrate (e.g., atransaction card). The information security label may be peel-able, andmay be configured to split apart during removal such that reapplicationof the label is difficult once it has been removed, and such that anattempted re-application will be visually evident.

For example, embodiments include an information security label forremovably concealing information, where the security label includes aconcealing layer having a pull-tab. The concealing layer may include acontinuous cut therethrough, where the cut defines a pathway of thelabel. The pathway may originate at the pull-tab and terminate withinthe label at a position spaced away from any outer edge of the label.

Embodiments also include a visual-information security system, where thesystem includes a substrate having visual information thereon and atamper-evident label disposed over and concealing the information. Whena user pulls the label away from the substrate, the label splits apartalong a cut to peel off of the substrate in the form of a continuousstrip to reveal the information.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosure will be readily understood by the following detaileddescription in conjunction with the accompanying drawings, wherein likereference numerals designate like structural elements, and in which:

FIG. 1 shows a visual-information security system having an informationsecurity label.

FIG. 2 shows the visual-information security system of FIG. 1 with theinformation security label partially removed by a user.

FIG. 3 shows a visual-information security system having an informationsecurity label.

FIGS. 4-8, in sequence, show a user removing the information securitylabel of the visual-information security system of FIG. 3.

FIG. 9 shows the information security label of the information securitysystem of FIG. 3.

FIG. 10 shows an exploded view of the information security label of FIG.9.

FIG. 11 shows another embodiment of an information security label.

FIG. 12 shows another embodiment of an information security label.

DETAILED DESCRIPTION

Reference will now be made in detail to representative embodimentsillustrated in the accompanying drawings. It should be understood thatthe following descriptions are not intended to limit the embodiments toone preferred embodiment. To the contrary, it is intended to coveralternatives, modifications, and equivalents as can be included withinthe spirit and scope of the described embodiments as defined by theappended claims.

Transaction cards are commonly used to represent a monetary value thatmay be redeemed for goods, services, discounts, cash or the like. Sometransaction cards may include visual information (e.g., a unique code)disposed on the card that is used to activate the card and to keep trackof the value assigned to the card. For example, a user may purchase atransaction card from a vendor, and during the transaction the uniquecode disposed on the card is used to activate the card so that the usermay redeem the value of the card (e.g., by entering the unique code intoan online system where the value of the card may be used to makepurchases).

The transaction card may be any tangible card, document, or the likehaving information disposed thereon. The transaction card may be, forexample, a stored-value card, gift card, telephone card, discount card,coupon, lottery ticket, or other card or document with visualinformation disposed thereon. The visual information may include, forexample, any visual human-readable representation of data or any opticalmachine-readable representation of data. Examples include text havingany number of characters or symbols, indicia, a linear barcode (e.g., aUniversal Product Code (“UPC”)), and/or a matrix barcode (e.g., a QuickResponse (“QR”) Code). The transaction card or its visual informationmay have no associated value until the transaction card is activatedusing its visual information.

Since the information disposed on the card may be associated with acertain value, it may be desirable to secure the visual information suchthat only an authorized user (e.g., the purchaser of the card) may viewthe visual information. Some existing visual-information securitysystems may include, for example, a removable label that is disposed toconceal the visual information. The transaction card may also include anactivation barcode or magnetic strip, for example, that corresponds tothe concealed visual information and is used to activate the concealedvisual information during a transaction with the user. In this manner,the concealed visual information may be assigned a value during atransaction without the label being removed. Then, when a user is readyto redeem the value of the card, the user may remove the removable labeland view the visual information.

Some existing information security systems may include a peel-off labelthat is configured to conceal information that is disposed on atransaction card until a user peels off the label. Such peel-off labelsmay be quickly and easily removed, providing users with efficient accessto the concealed visual information. Further, as an alternative to someother security labels—such as scratch-off labels—peel-off labels may notrequire a coin or other hard object to aid in removing the label, andmay not produce small bits of debris during removal.

Some existing peel-off labels may include an opaque portion and anadhesive, where the opaque portion conceals the visual information andthe adhesive secures the label to the transaction card. When a userpulls on an edge of the label, the label may peel off the card in onepiece, revealing the visual information. Since the label may remainsubstantially intact during removal, however, a thief or otherunscrupulous party may remove or partially remove the peel-off labelbefore the card has been sold to a user, obtain the visual information,and then reapply the label, leaving little or no evidence that the labelhas been previously removed. Since it may not be apparent that the labelhas been tampered with, a user may purchase the card without realizingthat the visual information has been compromised. Then, after the cardhas been purchased and activated, the thief may redeem the valueassociated with the card by entering the ill-gotten information into theappropriate online or other system to redeem the value of the cardbefore the rightful purchaser has the opportunity to do so.

Embodiments as described herein provide visual-information securitysystems that include a tamper-evident information security label forconcealing visual information. Such information security labels may bepeel-off labels configured to be easily removed from a transaction cardbut difficult to reapply to the card without it being visually apparentthat the card has been tampered with. Thus, such visual-informationsecurity systems may provide users with both convenience and security.

Some information security labels as described herein may include, forexample, a concealing layer (which may be opaque, for example), anadhesive layer, a pull-tab, and a continuous cut within the concealinglayer that defines a continuous strip of material. The label may beadhered to the surface of a transaction card and positioned to concealthe visual information disposed on the card. A user may remove the labelby pulling on the pull-tab, which causes the concealing layer toseparate along the cut, and which causes the continuous strip ofmaterial to continuously peel away from the card. The visual informationmay be disposed such that a significant portion of the label must bepeeled away from the card before the visual information is revealed.Since the label splits into continuous strips of material when removed,it may be difficult to recreate the original appearance of the labelwithout leaving evidence of tampering, thus providing security to usersand sellers who may avoid purchasing or selling/activating a transactioncard with a visibly compromised label.

In some embodiments, the cut may be in the shape of a spiral, so thatwhen the user pulls on the pull-tab, the label splits and peels awaystarting around the outer edge of the label, and continuing inward alonga spiral path until the concealed visual information is revealed (e.g.,upon full removal of the label). Other shapes and paths are possible, asexplained in more detail below.

These and other embodiments are discussed below with reference to FIGS.1-12. However, those skilled in the art will readily appreciate that thedetailed description given herein with respect to these figures is forexplanatory purposes only and should not be construed as limiting.

FIGS. 1 and 2 show a visual-information security system 10, which mayinclude a substrate 12 having information 14 disposed thereon and aninformation security label 100. Substrate 12 may be, for example, anytangible card, document, or the like that includes visual information.Visual information 14 may be any visual human-readable representation ofdata or any optical machine-readable representation of data, including,for example, text having any number of characters or symbols, indicia, alinear barcode (e.g., a UPC), and/or a matrix barcode (e.g., a QR Code).In some examples where visual information 14 is printed on substrate 12,the information may be printed on substrate 12 using any printing methodsuch as, for example, ink printing, laser printing, or the like. In someembodiments, substrate 12 may be, for example, a transaction card.Substrate 12 may include other visual information that is unconcealed,such as unconcealed visual information 15, which may includeidentification information, account information, value indications, usedescriptions or instructions, visual representations of data (e.g.,barcodes), etc.

Information security label 100 may be disposed to cover and concealvisual information 14, and may be adhered to substrate 12 using anadhesive. As shown in FIG. 2, a user 500 may remove information securitylabel 100 by pulling on a first end 102 of information security label100. As the user 500 continues to pull first end 102 away from substrate12, information security label 100 remains substantially intact andvisual information 14 becomes visible to the user 500.

As described above, since information security label 100 remainssubstantially intact as it is removed, information security label 100may be peeled off and reapplied to substrate 12 with little or noevidence that information security label 100 has been compromised. Assuch, a bad actor may remove label 100, obtain visual information 14,and reapply label 100 with little or no evidence of the act. This can bedetrimental, since information security label 100 is intended to keepinformation 14 confidential until it has been removed by the rightfuluser (e.g., the purchaser or rightful recipient of card 10), who mayhave no knowledge that a bad actor has previously viewed information 14.

FIGS. 3-8 show a visual-information security system 20, which mayinclude a substrate 22 having information 24 disposed thereon (e.g., ona surface thereof) and an information security label 200. Informationsecurity label 200 may be a tamper-evident label. Substrate 22 may be,for example, any tangible card, document, or the like that includesvisual information. Visual information 24 may be any visualhuman-readable representation of data or any optical machine-readablerepresentation of data, including, for example, text having any numberof characters or symbols, indicia, a linear barcode (e.g., a UPC),and/or a matrix barcode (e.g., a QR Code). In some embodiments visualinformation 24 is confidential information. In some examples wherevisual information 24 is printed on substrate 22, the information may beprinted on substrate 22 using any printing method such as, for example,ink printing, laser printing, or the like. In some embodiments, visualinformation 24 may be textured. In some embodiments, substrate 22 maybe, for example, a transaction card. Substrate 22 may include othervisual information that is unconcealed, such as unconcealed visualinformation 25, which may include identification information, accountinformation, value indications, use descriptions or instructions, visualrepresentations of data (e.g., barcodes), etc.

Information security label 200 may be disposed to cover and concealvisual information 24, and may be adhered to substrate 22 (e.g., usingan adhesive). Information security label 200 may include a cut 240within information security label 200. As shown in FIGS. 4-8, a user 500may remove information security label 200 by pulling on a pull-tab 212disposed at a first end 202 of information security label 200. As theuser 500 continues to pull pull-tab 212 away from substrate 22,information security label 200 splits apart along cut 240 into narrow,continuous strips of material 214, which may peel away from substrate 22in an inward spiral manner following cut 240 (e.g., in the case wherecut 240 is spiral shaped, as shown). In other words, informationsecurity label 200 may peel away in different directions as it is pulledby a user (e.g., back-and-forth along the length of security label 200,as shown in FIGS. 4-8). Visual information 24 may be disposed beneaththe center of information security label 200 and, thus, visualinformation may be revealed or shown to user 500 only after asignificant portion of label 200 has been peeled away from substrate 22.

As shown in FIGS. 4-8 and described above, by pulling pull-tab 212, theentirety of information security label 200 may be pulled away in asingle continuous piece that no longer has the same outer shape as itdid when it was originally adhered to substrate 22. Since informationsecurity label 200 splits apart during removal, it may be difficult torecreate the original appearance of information security label 200without leaving visible evidence of tampering, thus providing securityto users and sellers who may avoid purchasing or selling/activating atransaction card with a visibly compromised label. In this manner,information security label 200 may maintain the convenience and ease ofuse of existing peel-off labels, but may also provide consumers andsellers with added security.

As shown in FIG. 9, information security label 200 includes a second end204 disposed opposite first end 202. The distance between first andsecond ends 202, 204 may define an intact length 205 of informationsecurity label 200. In some embodiments, intact length 205 ofinformation security label 200 may be between approximately 20-80millimeters. A perimeter 206 may define the shape of informationsecurity label 200. Information security label 200 is shown to have agenerally rounded rectangular shape, however, it may take other shapesas well, including, for example, a square (see FIG. 11, for example),circular, elliptical, polygonal or non-polygonal shape and may or maynot be symmetrical about any axis. In some embodiments, informationsecurity label 200 is flat.

FIG. 10 shows an exploded view of information security label 200. Asshown, information security label 200 includes a peel-off layer 210, anadhesive layer 220, and a deadening layer 230. Peel-off layer 210 may bea concealing layer configured to conceal visual information 24 untilpeel-off layer 210 is removed by a user. In some embodiments, peel-offlayer 210 may be sufficiently opaque such that a user may not see visualinformation 24 through peel-off layer 210. In some embodiments, peel-offlayer 210 may be formed of a scratch-off ink, such that a user mayeither peel off or scratch off layer 210 in order to reveal visualinformation 24. Peel-off layer 210 may be formed of, for example,varnish, scratch-off ink, release lacquer, polyester, and/or dry peelcoating. In some embodiments where visual information 24 is textured,peel-off layer 210 may be sufficiently thick or rigid such that visualinformation 24 may not be seen or felt through peel-off layer 210.

Adhesive layer 220 may be disposed between peel-off layer 210 andsubstrate 22 to temporarily adhere information security label 200 tosubstrate 22. In some embodiments, adhesive layer 220 may have the samesize and shape as intact peel-off layer 210. Adhesive layer 220 mayinclude an adhesive such as, for example, glue, cement, paste, or othersubstance capable of adhering peel-off layer 210 to substrate 22. Insome embodiments, adhesive layer 220 may directly adhere peel-off layer210 to substrate 22. In other embodiments, information security label200 may include intervening layers disposed between adhesive layer 220and/or peel-off layer 210 such that adhesive layer 220 indirectlyadheres peel-off layer 210 to substrate 22.

In some embodiments, when a user removes peel-off layer 210, adhesivelayer 220 may remain on substrate 22 after peel-off layer 210 has beenremoved from substrate 22. Adhesive layer 220 may be sufficientlytransparent such that a user may see visual information 24 thoughadhesive layer 220. Adhesive layer 220 may be more strongly adhered tosubstrate 22 than to peel-off layer 210 such that adhesive layer 220remains on substrate 22 while and after peel-off layer 210 is peeledoff. Adhesive layer 220 may have insufficient strength to resist a peelforce applied by a user to information security label 200, therebyallowing the user to manually remove peel-off layer 210 in a singlecontinuous strip of material 214, leaving adhesive layer 220 behind.Adhesive layer 220 may have sufficient strength to resist a shear forceapplied by a user to information security label 200 such that peel-offlayer 210 may not be sheared off of substrate 22, leaving adhesive layer220 behind, without disturbing the original appearance of peel-off layer210.

In some embodiments, pull-tab 212 may be formed as a part of peel-offlayer 210, and may help a user remove peel-off layer 210 by providing asurface whereby the user may begin to remove peel-off layer 210.Pull-tab 212 is shown to be disposed at first end 202 of informationsecurity label 200, however, in other embodiments it may disposedelsewhere along perimeter 206 of information security label 200.Pull-tab 212 may include a graphic 211 to indicate to a user that it ismeant to be pulled (e.g., an arrow as shown).

In some embodiments, a deadening layer 230 may be used to reduce orweaken the adhesiveness of certain portions of adhesive layer 220.Deadening layer 230 may be used, for example, to reduce or weaken theadhesiveness of the portion of adhesive layer 220 beneath pull-tab 212,thereby making it easier for a user to grasp pull-tab 212 and beginpeeling peel-off layer 210. In some embodiments, deadening layer 230 maysufficiently reduce the adhesiveness of adhesive layer 220 such thatpull-tab 212 is unattached to substrate 22. In some embodiments,deadening layer 230 may sufficiently reduce the adhesiveness of adhesivelayer 220 such that pull-tab 212 is only partially adhered to substrate22. In some embodiments, deadening layer 230 may sufficiently reduce theadhesiveness of adhesive layer 220 such that pull-tab 212 is more weaklyadhered to substrate 22 than other portions of peel-off layer 210. Insome embodiments, no adhesive may be disposed beneath pull-tab 212, andno deadening layer 230 may be included in information security label200.

Although shown in FIG. 10 as having only three layers, informationsecurity label 200 may include any number of layers that includematerials and/or properties not described above.

Cut 240 may be disposed in information security label 200 and may beused to control the manner in which peel-off layer 210 splits apart andpeels away from substrate 22 when being removed by a user. Cut 240 mayinclude a first end 242 and a second end 244 defining a length of cut240. The length of cut 240 is the distance that cut traverses within theouter perimeter 206 of information security label 200. In someembodiments, cut 240 may be at least two times as long as the maximumintact length 205 of information security label 200. In someembodiments, cut 240 may be between two and four times as long as themaximum intact length 205 of information security label 200. In someembodiments, the length of cut 240 may be between approximately 40-320millimeters.

Cut 240 may be configured such that first end 242 of cut 240 intersectsperimeter 206, and second end 244 of cut 240 may be disposed withinperimeter 206 and spaced away from perimeter 206. Pull-tab 212 may bedisposed immediately adjacent to first end 242 of cut 240 such that whenpull-tab 212 is pulled, peel-off layer 210 first splits apart atperimeter 206, and then continues to split apart along the path of cut240 (see FIGS. 4-8).

Cut 240 may be continuous, which is to say that it follows a continuouspath with no breaks and does not intersect with itself. Cut 240 mayfollow a variety of complexly shaped paths within perimeter 206. In someembodiments, cut 240 may follow a continuously curving path. In someembodiments, cut 240 may follow a curved path that includes bothstraight and curved segments. In some embodiments, cut 240 may be formedsolely of straight segments (e.g., connected at angles, such as in arectilinear spiral or serpentine shape). In some embodiments, cut 240may follow a path that defines more than one shape. In some embodiments,information security label may include more than one continuous, butseparate, cut 240.

Cut 240 may be a score. Cut 240 may be deep enough to sufficientlyweaken peel-off layer 210 such that it splits apart along the path ofcut 240 when a user pulls on pull-tab 212. In some embodiments, cut 240may extend only partially through information security label 200. Forexample, cut 240 may extend through peel-off layer 210 but not adhesivelayer 220. As described above, adhesive layer 220 may be transparent andmay be more strongly adhered to substrate 22 than to peel-off layer 210,thereby allowing adhesive layer 220 to remain attached to substrate 22while and after peel-off layer 210 is peeled off by a user, andpreventing information security label 200 from separating from substrate22 without splitting apart.

In some embodiments, cut 240 may extend completely through informationsecurity label 200. Adhesive layer 220 may be more strongly adhered topeel-off layer 210 than to substrate 22 such that adhesive layer 220remains attached to peel-off layer 210 while and after peel-off layer210 is peeled off. Adhesive layer 220 may have insufficient strength toresist a peel force applied by a user to information security label 200,thereby allowing the user to manually remove peel-off layer 210 in asingle continuous strip of material 214, taking adhesive layer 220 withpeel-off layer 210. Adhesive layer 220 may have sufficient strength toresist a shear force applied by a user to information security label 200such that peel-off layer 210 may not be sheared off of substrate 22,along with adhesive layer 220, without disturbing the originalappearance of peel-off layer 210.

In some embodiments, cut 240 may be a groove cut, meaning the materialalong the path of cut 240 is continuously separated. In someembodiments, cut 240 may be a perforated cut, meaning the material alongthe path of cut 240 includes perforations that sufficiently weaken thematerial such that the material splits apart along the path of cut 240when peeled away from substrate 22 by a user.

As shown in FIG. 9, first end 242 of cut 240 may intersect withperimeter 206 and may define a side 213 of pull-tab 212, and second end244 of cut 240 may be disposed immediately in front of pull-tab 212.Beginning at first end 242, cut 240 may follow an inwardly spiralingpath toward the center of information security label 200 that thencontinuously transitions to an outwardly spiraling path away from thecenter of information security label 200 that terminates at second end244. Between first and second ends 242, 244, cut 240 may includestraight sections 248 that are parallel to each other, and that arecontinuously connected to each other by arcuate sections 246. Theinwardly and outwardly spiraling paths of cut 240 may be substantiallyconcentric, which is to say that they wind around the same, generalcentral portion of information security label 200.

Cut 240 may define two continuous pathways of material 214 that beginimmediately in front of pull-tab 212 and terminate at termination points216 within perimeter 206 of information security label 200. Pathways 214may be continuous with each other, such that pathways 214 define asingle continuous spine, which may be oriented in different directions.Pathways 214 (e.g., connected together at pull-tab 212 to form a single,continuous spine) may come together to cover visual information 24 whenadhered to substrate 22 (e.g., a surface of a transaction card), and maycome apart (e.g., upon removal of pathways 214 from substrate 22) toshow visual information 24. Pathways 214 may be spirally shaped and mayinclude both straight and curved segments that correspond to the pathdefined by cut 240. The distance between the area immediately in frontpull-tab 212 and termination points 216, as measured along pathway 214,defines the length of each pathway 214. In some embodiments, the lengthof each pathway 214 may be at least two times as long as the intactlength 205 of information security label 200. In some embodiments, thecombined length of the two spiral pathways may be at least four times aslong as the intact length 205 of information security label 200. In someembodiments, each of the two pathways is of a different length. In someembodiments, cut 240 defines more or fewer than two continuous pathways.For example, cut 240 may define a single continuous pathway, or maydefine 3, 4, 5, or more continuous pathways. In some embodimentsmultiple cuts 240 may be used to form such multiple pathways.

As illustrated in FIGS. 4-8, when a user 500 pulls on pull-tab 212,pathways 214 may peel off of substrate 22 simultaneously, beginningaround perimeter 206 of information security label 200 and ending withinperimeter 206 at termination points 216. In some embodiments, onepathway 214 may terminate and detach from substrate 22 while the otherpathway 214 remains attached to substrate 22 and continues to peel awayfrom substrate 22.

Cut 240 may follow a variety of complexly shaped paths and may includeany number of curves and/or straight sections. Cut 240 is shown in FIG.9 to follow a path defined by two substantially concentric spirals,however, cut 240 may follow a variety of differently shaped paths thatmay define a variety differently shaped pathways 214. As shown in FIG.11, for example, cut 240 may follow a single spiral-shaped path, and maydefine a spiral-shaped pathway 214, such that when a user pulls onpull-tab 212, peel-off layer 210 may peel off of substrate 22 beginningaround perimeter 206 and ending at the center of the label 200. As shownin FIG. 12, for example, cut 240 may follow a wave-shaped path (e.g.,following a serpentine or sinusoidal path). In such an example, cut 240may define a substantially horizontal pathway 214, such that when a userpulls on pull-tab 212, peel-off layer 210 may peel off of substrate 22beginning at first end 202, then toward second end 204, then back towardfirst end 202. In some embodiments, cut 240 may follow a path thatcombines features of a spiral path and a wave-shaped path, whethercurved, rectilinear, or both.

In some embodiments, pathways 214 may have a width 215 (see FIG. 9) ofat least 1 millimeter. In some embodiments, pathways 214 may have awidth 215 of between 1 and 5 millimeters. In some embodiments, pathways214 may have sufficient shear and tensile strength to resist breaking ortearing when pathways 214 are peeled away from substrate 22. In someembodiments, the width 215 of pathways 214 may vary along the lengths ofpathways 214.

Cut 240 may follow a continuous, smooth path with no sharp corners orabrupt transitions. Sharp corners or abrupt transition may increase thestress concentration in pathways 214 at the corners or transitions,which may promote breaking or tearing of pathways 214. Accordingly,arcuate sections 246 of cut 240 may have a sufficiently large radius toreduce the stress concentrations in pathways 214, such that as pathways214 are peeled away from substrate 22, pathways 214 do not tear or breakapart as they change direction. In some embodiments, the radius ofarcuate sections 246 may be at least 0.5 millimeters. In someembodiments, the radius of arcuate sections 246 may be between 1 and 5millimeters.

Once removed from substrate 22, continuous pathways 214 may be connectedonly at their origin near pull-tab 212. Although continuous pathways 214may be connected at pull-tab 212 and removed from substrate 22 as onecontinuous piece, peel-off layer 210 is no longer intact, which is tosay it is no longer in its original shape and configuration.

In some embodiments, visual information 24 may be located centrallybeneath the security label such that a user may peel away a portion ofthe information security label 200 without revealing visual information24. In some embodiments, a user must peel off greater than 40-60% of thepeel-off layer before any portion of visual information 24 is revealed.In some embodiments, a user 500 must peel off between 60 and 80% of thepeel-off layer before any portion of visual information 24 (e.g., a fulltext character) is revealed. In some embodiments, a user 500 must peeloff greater than 80-95% of the peel-off layer before all of visualinformation 24 is revealed.

The splitting apart of peel-off layer 210 as it is removed fromsubstrate 22, makes it difficult to recreate the original appearance ofinformation security label 200 after a portion of the peel-off layer 210has been removed. In some embodiments, visual information 24 is notvisible until after a sufficient portion of peel-off layer 210 has beenremoved such that the original appearance of information security label200 cannot be recreated. In some embodiments, the original appearance ofinformation security label 200 cannot be recreated after between 50 and80% of peel-off layer 210 has been removed. In some embodiments, theoriginal appearance of information security label 200 cannot berecreated after 75% of peel-off layer 210 has been removed. In someembodiments, pathways 214 may retain some adhesive after removal fromsubstrate 22, which may cause pathways 214 to stick to one another or tobecome entangled with one another, thereby making it difficult torecreate the original appearance of information security label 200.

It is well understood that the use of personally identifiableinformation should follow privacy policies and practices that aregenerally recognized as meeting or exceeding industry or governmentalrequirements for maintaining the privacy of users. In particular,personally identifiable information data should be managed and handledso as to minimize risks of unintentional or unauthorized access or use,and the nature of authorized use should be clearly indicated to users.

The foregoing description, for purposes of explanation, used specificnomenclature to provide a thorough understanding of the describedembodiments. However, it will be apparent to one skilled in the art thatthe specific details are not required in order to practice the describedembodiments. Thus, the foregoing descriptions of the specificembodiments described herein are presented for purposes of illustrationand description. They are not target to be exhaustive or to limit theembodiments to the precise forms disclosed. It will be apparent to oneof ordinary skill in the art that many modifications and variations arepossible in view of the above teachings.

What is claimed is:
 1. A visual-information security system, comprising:a substrate having visual information thereon; and a tamper-evidentlabel disposed over and concealing the information, the label comprisinga peel-off layer comprising a pull-tab and having a cut extendingthrough the peel-off layer, wherein the peel-off layer is adhered to thesubstrate, wherein the cut of the peel-off layer is at least three timesas long as a maximum in-tact length of the label, wherein when thepull-tab is pulled away from the substrate, the peel-off layer separatesalong the cut to peel off of the substrate in a single continuous stripto reveal the information, and wherein the peel-off layer is formed of ascratch-off ink, and can be scratched off by a user instead of beingpeeled off.
 2. The visual-information security system of claim 1,wherein the cut of the peel-off layer is defined by straight sectionscontinuously connected by arcuate sections.
 3. The visual-informationsecurity system of claim 2, wherein the straight sections are parallelto each other.
 4. The visual-information security system of claim 1,wherein the cut through the peel-off layer is only cut through thepeel-off layer.
 5. The visual-information security system of claim 4,wherein the cut forms a pair of concentric spirals.
 6. Thevisual-information security system of claim 1, wherein the informationis located centrally beneath the label, and wherein when the pull-tab ispulled away from the substrate, greater than 50% of the peel-off layeris peeled off before a full text character of the information isrevealed.
 7. The visual-information security system of claim 1, whereinthe visual information is printed on the substrate.
 8. Thevisual-information security system of claim 1, further comprising anadhesive layer disposed between the peel-off layer and the substrate,the adhesive layer adhering the peel-off layer to the substrate.
 9. Thevisual-information security system of claim 8, wherein the peel-offlayer is opaque and wherein the adhesive layer is transparent.
 10. Thevisual-information security system of claim 1, wherein when the pull-tabis pulled away from the substrate, greater than 90% of the peel-offlayer is peeled off before the information is fully revealed.
 11. Thevisual-information security system of claim 8, further comprising adeadening layer disposed between the pull-tab and the substrate, whereinthe deadening layer reduces the adhesion of the pull-tab to thesubstrate.
 12. An information security label for removably concealinginformation, the label comprising: a concealing layer comprising apull-tab and having a single, continuous, smooth cut extending throughthe concealing layer, an adhesive layer disposed beneath the concealinglayer, and a deadening layer disposed beneath the pull-tab of theconcealing layer, wherein the cut defines a spiral pathway of the label,the spiral pathway originating at the pull-tab and terminating withinthe label at a position spaced away from any outer edge of the label,wherein the cut goes through the concealing layer, but does not gothrough the adhesive layer, and wherein the deadening layer reducesadhesive properties of the adhesive layer beneath the pull-tab.
 13. Theinformation security label of claim 12, wherein the spiral pathway is atleast three times as long as a maximum linear length of the label. 14.The information security label of claim 12, wherein the spiral pathwayof the label comprises a first spiral pathway and a second spiralpathway defined by the cut, the second spiral pathway originating at thepull-tab and terminating within the label at a position spaced away fromany outer edge of the label.
 15. The information security label of claim14, wherein a combined length of the first spiral pathway and the secondspiral pathway is at least six times as long as a maximum linear lengthof the label.
 16. The information security label of claim 12, whereinthe cut begins within the label immediately in front of the pull-tab,and wherein the cut ends at an outer edge of the label and defines aside of the pull-tab.
 17. A transaction card, comprising: confidentialinformation disposed on a surface of the transaction card; and atamper-evident label disposed over the confidential information andtemporarily adhered to the surface of the card, the label concealing theconfidential information when adhered to the surface of the card, thelabel being configured to be removed from the surface of the card toshow the confidential information disposed below the label, the labelhaving a single continuous spine including portions oriented indifferent directions, the portions together cover the confidentialinformation when adhered to the surface of the card and come apart toshow the confidential information when removed.
 18. The transaction cardof claim 17, wherein the portions of the single continuous spine includetwo continuous pathways of material connected together at a pull tab.19. The transaction card of claim 17, wherein the single continuousspine forms a spiral.