摘要 |
The steps of an identification theft proof tag and sticker method are providing a plurality of tags with a telephone number, a PIN, and a plurality of selections corresponding to a phone number, each tag optionally containing a smart chip and a smart card with a microprocessor; activating the tag by the user by following specific instructions and placing a registered tag on a valuable; following the instructions printed on the tag when finding a lost valuable by a person other than the owner; using the tag as a phone card, if needed, and dialing the number on the back of the tag; entering the PIN when prompted to do so, and selecting a contact number; and contacting the owner and ascertaining the best way to return the valuable.
|