Example embodiments generally relate to security technology and, in particular, relate to security devices that can be attached to an item or product to provide, for example, theft security and deterrence.
In retail settings, product security tags and other devices are attached to products or product packaging to deter and intercept theft activities. Such devices operate by notifying retailers that a theft event may be occurring. Theft deterrent equipment and systems, often in the form of electronic article surveillance (EAS) systems, use pedestals or towers that operate as gate (i.e., an EAS gate) located at the exits of a retail establishment. The pedestals or towers include antennas for detecting RF signals emitted by a product security device that is affixed to a product for sale. Such an EAS gate may sound an alarm in response to receipt of the RF signals to indicate that a possible theft is occurring. Other solutions include local, tamper alarming features. Despite the evolution of solutions in this space, there continues to be a need for improvement in the area of product security devices.
According to some example embodiments, a security device may comprise a housing and a wireless signal generator. The housing may comprise an engagement assembly configured to be operably coupled to a curved surface of a product. The wireless signal generator may be disposed within the housing, and the wireless signal generator may be configured to output a wireless signal for detection by theft deterrence equipment. The engagement assembly may comprise a curved base and a plurality of flexible wings. The plurality of flexible wings may be configured to provide an adjustable coupling surface that flexes to conform to surfaces of products having different curvatures.
According to some example embodiments, the security device may comprise a housing, a plunger switch, a sounder, and processing circuitry. The housing may comprise an engagement assembly configured to be operably coupled to a curved surface of a product. The engagement assembly may comprise a curved base and a plurality of flexible wings. The plunger switch may comprise a plunger. The plunger switch may provide an electrical output in response to the plunger being in a depressed position or an extended position. The plunger may be configured to contact the curved surface of the product when the security device is affixed to the product. The sounder may be configured to controllably output an audible alarm sound. The processing circuitry may be configured to cause the sounder to emit the audible alarm sound in response to the electrical output from the plunger switch indicating that the plunger has moved from the depressed position to the extended position. The plurality of flexible wings may be configured to provide an adjustable coupling surface that flexes to conform to surfaces of products having different curvatures.
Having thus described some example embodiments in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Some example embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all example embodiments are shown therein. Indeed, the examples described and pictured herein should not be construed as being limiting as to the scope, applicability, or configuration of the present disclosure. Rather, these embodiments are provided as example implementations so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout. As used herein, operable coupling should be understood to relate to direct or indirect connection that, in either case, enables functional interconnection of components that are operably coupled to each other. The term “or” as provided herein is used in the logical manner such that the truth of one or more elements within an “or” statement renders the statement true. Additionally, it is understood that reference to the surface of a product is inclusive of the surface of product packaging for a product that may be disposed within the product packaging.
Following from the above, one challenge in the retail theft deterrence space is that conventional security devices, sometimes referred to as a security tags, do not support application to products or product packaging that have rounded or curved surfaces. As a result, such products are left unprotected and are therefore more susceptible to theft. In recent years, insulated cups and flasks have become popular, and rather expensive, making such items targets of theft. However, because of their curved exterior surfaces, affixing a security device to such products is problematic. Some conventional solutions may include a corresponding curved surface, but such solutions are limited by only being able to be securely applied to matched concave and convex curved surfaces (e.g., surfaces having a corresponding radius of curvature).
According to some example embodiments, a security device is provided that supports secure application to products that have rounded or curved surfaces, where the engaging surface of the security device is adjustable to support secure application to surfaces of different products that have different curvatures. According to some example embodiments, the security device may comprise an engaging assembly that creates an adjustable coupling surface to support application to a variety of products having differing curved surfaces.
To do so, according to some example embodiments, the engaging assembly may include two or more flexible wings. The flexible wings may extend from a curved base of the security device, and, according to some example embodiments, the curved base and the flexible wings may be components of the engaging assembly for the security device. In this regard, according to some example embodiments, the engaging assembly may be, for example, integrated with the housing of the security device. The flexible wings may extend from a base portion or the curved base, and the flexible wings may have different curvature than the curved base. The flexibility of the wings may provide for the adjustability of the engaging assembly to conform to different curvatures. In this regard, the flexible wings may extend away in a curved or arcuate manner from the curved base or a portion of a base with a higher degree of curvature (e.g., a smaller radius of the curvature) than the curvature of the curved base. As such, the engaging assembly may be configured to facilitate affixing the security device to surfaces with a range of curvatures between the curvature of the undeflected or unflexed wings and the curvature of the curved base. Because the wings are flexible, surfaces having curvatures in the middle of this range may also be engaged by deflecting or flexing the wings. According to some example embodiments, a two-sided adhesive pad may be disposed between the wings and the curved surface of the product, and the adhesive properties of the adhesive pad may not only operate to affix the wings to the curved surface of the product, but also maintain the wings in a flexed position when deflection of the wings is necessary to conform to the curved surface of the product.
Additionally, according to some example embodiments, the security device may be affixed to a product to provide a security feature within a retail store environment. The security device may be, for example, a battery-powered device that includes local and remote alarming capabilities to inform store personnel that a theft event may be occurring. In this regard, if an armed security device that is affixed to a product is removed and separated from the product, a local alarm on the security device may be triggered to inform store personnel of a tamper event. Further, if the still-affixed and armed security device is detected by theft deterrence equipment, for example, due to passing through an EAS gate at the ingress or egress of the retail store, then a wireless signal generator, such as a resonator within the security device, may output a signal that causes the theft deterrent equipment to sound a remote alarm (e.g., via a siren or sounder at the ingress or egress) indicating that a possible theft of the affixed product is occurring.
According to some example embodiments, to deactivate the security device in association with a purchase of the affixed product, a device in form of a deactivator (e.g., an EAS desctivator), often located at or near the point of sale (POS), may be used. In this regard, the security device may be configured to detect a deactivation field output by the deactivator and, in response to detecting the deactivator field, the security device may be configured to transition into a disarmed state from an armed state. In the disarmed state, the security device's local alarming features and the remote triggering alarming features may be deactivated and disarmed such that separation of the security device from the product does not cause a local and the security device no longer triggers a remote alarm associated with the theft deterrence equipment. Accordingly, in some example embodiments, a purchasing customer may leave the store and simply remove and dispose of the security device without the security device alarming. Alternatively, in some example embodiments, only the local alarm is disarmed, and the store personnel can remove the security device within the retail store and permit the customer to leave with the product without the security device affixed thereto.
With regard to deactivation, according to some example embodiments, a security device with local alarming tamper detection features and theft deterrence system alarming features may be disarmed at, for example, a POS via an associated deactivator. Such disarming via a deactivator may be performed as described in U.S. Pat. No. 11,250,677 issued Feb. 15, 2022, entitled ALARMING SECURITY DEVICE AND METHOD COMPRISING AN ELECTRONIC ARTICLE SURVEILLANCE TAG AND TAMPER DETECTION CIRCUITRY, which is incorporated by reference herein in its entirety.
According to some example embodiments, a security device may include tamper detection circuitry associated with a plunger switch and a depressable plunger that extends from the security device, and in some example embodiments through the engaging assembly, to be depressed by a product surface when applied to the product. If the plunger is extended, due to removal of the device from the product when the device is in an armed state, the device may cause a local alarm to be sounded in response to detection of the tamper event indicating that an unauthorized removal of the security device from the product has occurred. In other words, according to some example embodiments, the circuitry of the security device may include a plunger switch having a plunger positioned to actuate and trigger an audible tamper alarm, via associated processing circuitry and sounder, if the security device is pulled away from the product to which the security device is affixed while the security device is in the armed state.
According to some example embodiments, the circuitry of the security device may be disarmed to allow authorized removal of the security product from the product by a purchasing customer or store personnel. As mentioned above, to disarm the alarming features of the circuitry of the security device, the circuitry may be configured to, for example, detect a deactivator (e.g., an EAS deactivator) and, more specifically, the electromagnetic fields generated by the deactivator. The deactivator may be a device that can be used to deactivate certain EAS tags (e.g., labels) by altering or destroying the resonant characteristics of the tags using the electromagnetic field of the deactivator so that the EAS tag no longer resonates when exposed to a field within a given frequency band. As a result, the tag does not provide a resonant response signal when passing through, for example, EAS gates, and the therefore the EAS gates are not triggered to alarm.
In this regard, EAS tags, which may be an example of a wireless signal generator, may be of two types, i.e., deactivatable and non-deactivatable. Deactivatable EAS tags may be formed such that when a deactivatable EAS tag is subjected to an electromagnetic field having select characteristics (i.e., at a certain frequency and at certain power levels), the EAS tag may be deactivated. On the other hand, a non-deactivatable EAS tag may not be deactivated, and will continue to resonant, even after being exposed to an electromagnetic field that is attempting to deactivate that EAS tag. Accordingly, as referred to herein, a generic reference to an “EAS tag” may be referring to either a deactivatable or non-deactivatable EAS tag, unless the context deems otherwise. An example security device may include a wireless signal generator (e.g., deactivatable tag or non-deactivatable tag) that is detectable by the deactivator and an EAS gate of an EAS system. An EAS gate is typically installed at the ingress and egress of a retail store. The EAS tag may be an RF tag (e.g., resonant at 8.2 or 4.8 MHz) or an AM tag (e.g., resonant at 58 kHz). The EAS tag may be configured to resonate and return a signal to, for example, an EAS gate when exposed to an electromagnetic field at the resonant frequency of the EAS tag. Upon detecting the EAS tag's return signal, the EAS gate may trigger a gate alarm to indicate that a possible theft may be occurring.
Having generally described some aspects of various example embodiments, reference will now be made to the figures to describe additional and alternative example embodiments. In this regard,
On a side of the housing 110 that is opposite the outward facing side (i.e., a product-facing side, according to some example embodiments, the security device 100 may comprise an engaging assembly 150, as further described in more detail below and may comprise a curved base 152, as shown in
According to some example embodiments, the clip 200 may include a collar 210 that may conform to and wrap around the engaging assembly 150 or housing 110 of the security device 100. As such, the collar 210 may slide onto the security device 100 such that at least a portion of the collar 210 is either disposed between the engaging assembly 150 and the curved surface of the product to which the security device 100 is affixed. Alternatively, the collar 210 may otherwise be incapable of being removed from the security device 100 (e.g., due to an expanding shape of the housing 110 or a lip within the collar 210) without removing the security device 100 from the product. Further, according to some example embodiments, the collar 210 may conform to the housing 110 such that the collar 210 does not inhibit the ability of the engaging assembly 150 to operably couple to a product.
With reference to
With reference to
Now referring to
The wireless signal generator 410 may be a device that outputs a wireless signal in response to a detection of a field generated by theft deterrence equipment such as an EAS gate or the like. In this regard, according to some example embodiments, the wireless signal generator 410 may include a field detector configured to detect a field of a target frequency for theft deterrence equipment (e.g., 8.2 or 4.8 MHz for radio frequency (RF) theft deterrence systems or 58 kHz for acuosto-magnetic (AM) theft deterrence systems). In some example embodiments, the wireless signal generator 410 may comprise an antenna that is driven by the processing circuitry 450 to output a desired signal responsive to the detection of a field. However, according to some example embodiments, the wireless signal generator 410 may comprise a resonant circuit that emits a responsive signal in the presence of a field at resonant frequency of the circuit. Further, the wireless signal generator 410 may be, for example, an RF EAS tag or an AM EAS tag.
The sounder 420 may be any type of device that may be driven to produce an audible sound for an alarm. In this regard, the sounder 420 may be embodied as a speaker, piezoelectric sounder, or the like. The sounder 420 may be driven by the processing circuitry 450 to cause an alarm to sound when triggered by the processing circuitry 450 (e.g., due to extension of the plunger 462, severing of the tether 310, removal of the remote sensor 320 from a surface, or the like). The battery 440 may be one example of a power source that operates to provide electrical power to the various electrical components of the security device 100, including the processing circuitry 450.
The plunger switch 460 may operate with the plunger 462 to form a tamper sensor that can detect when the security device 100 is being removed from a product to which the security device 100 is affixed. In this regard, the plunger switch 460 may be operably coupled to the plunger 462 such that, based on the state of the plunger 462, the plunger switch 460 will provide an associated electrical output (e.g., a closed circuit, an open circuit, etc.). In this regard, when the plunger 462 moves, for example, between a depressed position and an extended position, the plunger switch 460 transitions from a first switch state (e.g., closed) to a second switch state (e.g., open) and provides associated electrical output to the processing circuitry 450 indicative of the position of the plunger 462. According to some example embodiments, the plunger 462 may be biased towards an extended position (e.g., extending downward) by, for example, a spring.
The deactivator sensor 430 may be electrically connected to the processing circuitry 450. The deactivator sensor 430 may be configured to detect an electromagnetic field, for example, generated by an EAS deactivator. In this regard, the deactivator sensor 430 may be an antenna that is implemented in the form of an inductor, a resonant circuit, a reed switch, or the like. In this regard, the deactivator sensor 430 may have an output in the form of a deactivation signal that is provided to the processing circuitry 450 for evaluation. According to some example embodiments, the wireless signal generator 410 may operate with or as the deactivator sensor 430, and a separate deactivator sensor 430 need not be included. The processing circuitry 450 may be connected to the wireless signal generator 410 or the deactivation sensor 430 and the processing circuitry 450 may be configured to detect a field of theft deterrent equipment due to the presence of an EAS gate or deactivator field. According to some example embodiments, the deactivator sensor 430 may be configured to detect a field generated by an EAS tag operating as an example of the wireless signal generator 410.
According to some example embodiments, to detect a deactivator signal from an EAS deactivator, the processing circuitry 450 of the security device 100 may be configured to detect characteristics of the deactivation field. These characteristics may be different from those of a field, for example, generated by an EAS gate at an exit of a retail store, and therefore the processing circuitry 450 may be configured to differentiate between a deactivation field and a gate field. In this regard, the processing circuitry 450 may be able to trigger functionality based on the detection of a deactivation field, such as disarming the tamper detection functionality to prevent alarming. According to some example embodiments, the processing circuitry 450 may be configured to leverage the deactivator sensor 430 to detect relatively high power pulses, at a given rate and at one or more given frequencies that would indicate the presence of an EAS deactivator attempting to deactivate, for example, an RF EAS tag. Alternatively, the security device circuitry 400 may be configured to leverage the deactivator sensor 430 to detect a deactivation field in the form of a degaussing field that oscillates at a given frequency (e.g., 800 Hz) and then decays in power over time (e.g., 25% decay rate), which would indicate the presence of an EAS deactivator attempting to deactivate, for example, an AM EAS tag. Further, according to some example embodiments, the deactivator sensor 430 may be configured and positioned within the security device 100 to detect changes in the deactivator field caused by presence of the EAS tag as the wireless signal generator 410 to determine the presence of an EAS deactivator. Further, the deactivator sensor 430 may be configured to detect a field generated by magnetism of the wireless signal generator 410 embodied as a deactivatable AM EAS tag housed within the security device 100. In this regard, when such a deactivatable AM EAS tag is subjected to a deactivation field, the deactivatable AM EAS tag may become demagnetized. As such, the deactivator sensor 430 may no longer detect the field of the deactivatable AM EAS tag, which may be indicative of the presence of an EAS deactivator.
The processing circuitry 450 may comprise a processor 452 and a memory 454. In this regard, the processor 452 may be any type of processing device that is either hardware configured to perform defined functionalities (e.g., an field programmable gate array (FPGA) or an application specific integrated circuit (ASIC)) or the processor 452 may be configured via execution of instructions (e.g., compiled software or firmware instructions), possibly stored in the memory 454. The security device circuitry 400 and, more specifically the processing circuitry 450, may be configured to perform various functionalities.
As such, the processing circuitry 450 may be configured control the sounder 420 to cause the sounder 420 to emit the audible alarm sound in response to various inputs. For example, the processing circuitry 450 may be configured to cause the sounder 420 to emit the audible alarm sound in response to an electrical output from the plunger switch indicating that the plunger has moved from the depressed position (i.e., the security device 100 attached to a product) to the extended position (i.e., the security device 100 has been removed from the product, for example, without first being deactivated or disarmed). Additionally or alternatively, the processing circuitry 450 may be configured to cause the sounder 420 to emit the audible alarm sound in response to detection of the tether 310 being severed (e.g., a break in a sense loop including the tether 310) or a triggering from the remote sensor 320 due to a sensor plunger being actuated due to removal of the remote sensor 320 from the product surface.
Referring now to
The plurality of flexible wings may comprise any number of flexible wings, however, according to some example embodiments, the engaging assembly 150 may comprise two flexible wings comprising flexible wing 154a and flexible wings 154b. Each of the flexible wings 154 may extend from a central plane 570 and may be attached to the housing 110 adjacent the central plane 570 that, according to some example embodiments, symmetrically bisects the engaging assembly 150 of the security device 100. According to some example embodiments, each wing 154 may be generally shaped as a rectangular element that may, but need not be, curved. One edge of the wing 154 may be attached to a base portion of the housing 110, while the other three edges may be unconnected and separated from the curved base 152 and the housing 110 to permit the wing 154 to flex about the attached edge of the wing 154. Accordingly, the attached edge of the wing 154 may operate as a pivot for the wing 154 to permit the wing 154 to flex inwards when the engaging assembly 150 is applied to a curved surface of a product.
As shown in
Referring to
As shown in
According to some example embodiments,
Referring to
Now referring to
Referring to
As described briefly above, the security device 100 may be operably coupled to a clip 200 as shown in
Referring now to
The sensor device 300b may be a pressure sensor device that includes the remote sensor 320 which can be affixed, for example, via an adhesive pad, to a product and the security device 100 may be affixed to the same or another product. As described above, the security device 100 may sound an alarm in response to, for example, the remote sensor 320 being removed from a surface or tether 310 being severed. In each instance, according to some example embodiments, an open circuit may occur in a sense loop of the sensor device 300b, which may be detected by the security device 100 to cause an alarm to sound, as described above.
The embodiments presented herein are provided as examples and therefore the associated inventions are not to be limited to the specific embodiments disclosed. Modifications and other embodiments are intended to be included within the scope of the appended claims. Moreover, although the foregoing descriptions and the associated drawings describe example embodiments in the context of certain example combinations of elements and/or functions, different combinations of elements and/or functions may be used to form alternative embodiments. In this regard, for example, different combinations of elements and/or functions other than those explicitly described above are also contemplated. In cases where advantages, benefits or solutions to problems are described herein, it should be appreciated that such advantages, benefits and/or solutions may be applicable to some example embodiments, but not necessarily all example embodiments. Thus, any advantages, benefits or solutions described herein should not be thought of as being critical, required or essential to all embodiments.
This application claims the benefit of U.S. Provisional Application No. 63/402,982, filed Sep. 1, 2022 and 63/446,389 filed Feb. 17, 2023, the contents of both being incorporated by reference herein in their entirety.
Number | Date | Country | |
---|---|---|---|
63402982 | Sep 2022 | US | |
63446389 | Feb 2023 | US |