1. Field of the Invention
Embodiments of the invention relate to security devices used to protect merchandise or other objects and, more particularly, to security devices having one or more adjustable cables used to secure objects of various shapes and sizes to the security device.
2. Description of Related Art
Electronic article surveillance (EAS) systems are often used to deter and detect shoplifting. Typically, an EAS security system includes an EAS element, a transmitter, a receiver, and an alarm. The EAS element is attached to an article of merchandise. The transmitter and the receiver are positioned at the exit of a retail establishment and configured to establish a detection zone in which a consumer must pass through as he or she exits the retail establishment. The transmitter is configured to send signals through a detection zone. When an EAS element enters the detection zone, the EAS element responds and creates a signal or a change or disturbance in the original signal transmitted by the transmitter, which is detectable by the receiver. Upon detection of the EAS element, the alarm is triggered in order to notify store personnel that someone is trying to exit the retail establishment with merchandise that has an attached and active EAS element.
In an EAS system, it is the actual EAS element that is being detected and not the merchandise itself. Therefore, an EAS system can be circumvented by removing the EAS element from the merchandise. To prevent the unauthorized removal of the EAS element, security devices have been developed. A typical security device is configured to house the EAS element and attach the EAS element to the merchandise in a manner that limits the likelihood that a consumer or a would-be thief could readily remove the EAS element from the merchandise.
Applicant has identified a number of deficiencies and problems associated with the design and operation of conventional security devices. Through applied effort, ingenuity, and innovation, Applicant has solved many of these identified problems by developing a solution that is embodied by the present invention, which is described in detail below.
Embodiments of the present invention improve the prior art by, among other things, providing a security device structured for attachment to objects (e.g., retail products) such as those having a flanged end and/or an irregular shape. According to one embodiment, the security device includes a housing, a cable having first and second ends that are rigidly anchored within the housing, and a rotatable assembly. The rotatable assembly includes a capture portion that is adapted to engage the cable between the first and second cable ends. The capture portion, thus, defines two cable loops. The first cable loop being defined between the first cable end and the capture portion, and the second cable loop being defined between the second cable end and the capture portion. The security device may also include a locking mechanism that, when engaged in a locked configuration, is configured to prevent rotation of the rotatable assembly in one direction (i.e., a loosening direction) while allowing rotation in an opposite direction (i.e., a tightening direction). When the locking mechanism is disengaged, in an unlocked configuration, the rotatable assembly is free to rotate in either direction.
In other embodiments, the security device may include a housing defining a cavity for receiving at least part of a secured object and a perimeter rim extending at least partly around the cavity. The first and second cable loops may be positioned within or proximate the perimeter rim of the housing to help shield the loops from cutting or tampering by would-be thieves. The security device may include a collar disposed within the cavity for supporting the cable loops in a protected position. In one embodiment, the collar may define flanges that are configured to move inwardly, i.e., towards the center of the cavity, as the first and second cable loops are tightened thereby tightening the flanges against the object to be secured. In other embodiments, such flanges may not be used as the cable loops themselves operate to secure the object.
In one embodiment, the rotatable assembly includes a spool defining the capture portion and the first and second loops are tightened by rotating the rotatable assembly such that portions of the first and second loops are wound onto the spool. In another embodiment, the rotatable assembly defines a plurality of locking teeth that are configured for engagement by a locking surface of the locking mechanism when the security device is disposed in a locked configuration.
In yet another embodiment, the security device may include a housing that is configured to protect an alarm module and at least partially define an audible alarm channel. The alarm channel is disposed in audio communication proximity to the alarm module and may further define an anti-tamper portion at one end and an exit gap at an opposite end. In one embodiment, the anti-tamper portion is structured to reduce tampering with or disabling of the alarm module through the exit gap as discussed in greater detail below.
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Embodiments of the present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout. The terms top, bottom, side, up, down, upwards, downwards, vertical, horizontal, and the like as used below do not imply a required limitation in all embodiments of the present invention, but rather are used herein to help describe relative direction or orientation in exemplary embodiments illustrated in the figures.
Various embodiments of the present invention provide a security device configured to be adjustable for engaging various sizes and configuration of goods, retail products, or other objects. The security device may be configured to be secured to merchandise or other objects and configured with other systems (e.g., EAS systems, RFID systems, etc.) to detect unauthorized removal of, or tampering with, a secured object. The security device may further include a security element (e.g., EAS element, RFID transponder, etc.) and one or more alarm features.
As explained in detail below, embodiments of the present invention provide a security device comprising a rotatable assembly, a locking assembly, and a cable. The rotatable assembly is configured to either wind or unwind the cable, thus, tightening or loosening the cable around a secured object. In some embodiments, the rotatable assembly defines a spool having a capture portion (e.g., aperture, slot, etc.) that receives a portion of the cable. Rotation of the rotatable assembly and spool in a tightening direction causes the cable to be engaged proximate the capture portion and wound onto the spool. The locking assembly is configured to selectively lock the rotatable assembly, such that the cable cannot be loosened from the secured object without first disengaging the locking assembly.
In some embodiments, such as those depicted in
Turning to the embodiment illustrated in
Housings 100 structured according to various embodiments may be made of durable plastic material that resists breakage such as high density polyethylene (HDPE), acrylonitrile butadiene styrene (ABS), polycarbonate, or other strong and lightweight materials. In one embodiment, the housing 100 may be constructed of a material that is at least strong enough to withstand an impact having a force sufficient to break a bottle (e.g., a plastic or glass bottle) to which the security device is attached. In this way, the security device may be configured to provide a benefit denial type of functionality.
In the depicted embodiment, the cable 200 is fixed within the housing at the first and second cable terminals 210, 211, but is freely movable through the capture portion 311 of the spool 310 when the rotatable assembly 300 is disposed in an unwound position as shown. The first securing loop 205 of the cable 200 is defined between the first cable terminal 210 and the capture portion 311 of the spool 310 while the second cable loop 206 is defined between the second cable terminal 211 and the capture portion 311 of the spool 310. Said differently, the capture portion 311 of the spool 310 defines the transition between the first and second securing loops 205, 206 of the cable 200. It is important to note, however, that portions of the cable 200 may be allocated to either the first securing loop 205 or the second securing loop 206 by sliding the cable 200 through the capture portion 311 of the spool 310 in order to adjust the respective sizes of the first and second securing loops 205, 206.
In various embodiments, the spool 310 may be rotated about an axis A for winding a portion of the cable 200 onto the spool to tighten the first and second securing loops 205, 206. In the depicted embodiment, the first and second cable terminals 210, 211 are oriented in a vertical manner to facilitate routing of the cable 200 (i.e., orientation of the first and second securing loops 205, 206) along a desired path. Other embodiments of the present invention may comprise a first and second cable terminals oriented in a substantially horizontal position to assist routing the cable along a different desired path. As will be apparent to one of ordinary skill in the art in view of this disclosure, the first and second cable terminals 210, 211 are firmly affixed to the cable and are anchored within the housing to ensure that the cable ends are not easily removed from the housing by a would-be thief. In some embodiments, the first and second terminals 210, 211 may define an electrically conductive shoe or sleeve such that removal of the cable from one of the sleeves could be sensed by the device thereby provoking an alarm event.
In the depicted embodiment, the engagement portion 330 comprises a flip-up handle that allows a user to easily rotate the rotatable assembly. However, in alternate embodiments, the engagement portion 330 of the rotatable assembly 300 may be differently configured so long as a user remains able to grasp and rotate the rotatable assembly 300 via the engagement portion 330. For instance, in some embodiments, the engagement portion 330 may be the top body of the rotatable assembly 300 simply contoured to define a few perimeter ribs, finger-hold cavities, or the like.
As will be apparent to one of ordinary skill in the art, the locking surface 420 of the sliding element 410 and the locking teeth 320 of the rotatable assembly 300 are reciprocally configured to allow only one way rotation (i.e., in a cable tightening direction) of the rotatable assembly 300 when the locking assembly 400 is disposed in the locked position. Therefore, when the locking assembly 400 is in the locked position, the security device 10 is configured to allow user-tightening of the cable loops 205, 206 (i.e., by rotating the rotatable assembly) while preventing loosening of the cable loops 205, 206, thus, reducing the likelihood that a would-be thief could remove the security device from the object.
The depicted sliding element 410 is configured to be biased towards the locked or engaged position by biasing elements 440. The biasing elements 440 may be made from coil springs, as shown, or other similar biasing structures that are adapted to drive the sliding element 410 toward the rotatable assembly 300. In the depicted embodiment, although not shown, the biasing elements 440 are supported by the housing so as to apply a biasing force to the sliding element 410.
The depicted magnetically attractive elements 450 are positioned proximate each biasing element 440 to aid in overcoming the biasing force applied by the biasing elements 440. In one embodiment, the magnetically attractive elements 450 may be fixed within the sliding element, for example, using an adhesive or a friction fit arrangement, such that as the magnetically attractive elements are magnetically attracted away from the rotatable assembly (perhaps by an externally applied magnetic key), the sliding element 410 moves to an unlocked position as shown in
In one embodiment, the magnetically attractive elements are configured such that the sliding element 410 is only movable by an applied magnetic force when that magnetic force has a certain strength or particular orientation relative to the sliding element 410 or magnetically attractive elements 450. For example, the sliding element 410 may be movable to the unlocked, or disengaged, position by a specifically configured magnetic key (not shown) that is selectively placed next to the key locating indentations 110 shown in
In another embodiment, the magnetically attractive elements 450 are positioned on opposite ends of the sliding element 410 and the sliding element 410 is loosely supported within the housing such that both magnetically attractive elements 450 must be attracted towards the unlocked position in order to disengage the locking assembly 400. Should a single magnet be used in an attempt to move only one end of the sliding element 410 towards the unlocked position (e.g., forcing the sliding element into a jack knife-type position), the locking surface 420 located near the other (i.e., unattracted) end of the sliding element 410 would remain engaged with the locking teeth 320, thus, maintaining the locking assembly 410 in the engaged position and preventing unwinding of the cable 200. Additionally, in another embodiment, the biasing elements 440 may be selected to have a sufficiently high compression strength such that a relatively high magnetic force is required for attracting each of the two magnetically attractive elements 450. Accordingly, given the relatively close positioning of the magnetically attractive elements, it may be difficult for a would-be thief to reproduce a counterfeit key that supports two magnets of sufficient strength in close enough proximity to one another due to the strong repulsive force that the magnets would have on each other. In other words, a would-be-thief would not be able to hold two high-powered magnets close enough to each other to be able to disengage the locking assembly 400. In this way, the requirement of a specifically configured key minimizes the likelihood that a consumer or would-be thief would able to move the sliding element 410 using one or more conventional or common magnets.
As shown in
In one embodiment, as shown in
The depicted rotatable assembly 1300 comprises a spool 1310, a plurality of locking teeth 1320, and an engagement portion 1330. In one embodiment, the cable 1200 is routed from a first cable terminal 1210, around one side of the collar 1121 proximate the flanges 1122, through a capture portion 1311 defined by the spool 1310, around the other side of the collar 1121 proximate the flanges 1122, and to a second cable terminal (not shown). In this regard, two cable loops 1205, 1206 (shown in
As will be apparent to one of ordinary skill in the art, in the depicted embodiment, the cable 1200 is routed in a particular manner around the collar 1121. The depicted cable 1200 defines perimeter cable portions 1222, terminal cable portions 1212, and winding cable portions 1232. The perimeter cable portions 1222 are configured to extend at least partly around the base of the collar 1121 proximate the flanges 1122 and the perimeter rim 1130 of the housing 1100 (shown in
Although the collar 1121 shown in
Returning to
Once the top portion of the pill bottle 6 or other object is inserted, the rotatable assembly 1300 may be rotated in a tightening direction from the unwound or first position to the tightened position. Rotation of the rotatable assembly 1300 causes rotation of the spool 1310 such that the capture portion 1311 of the spool 1310 engages the cable 1200 and the cable 1200 is wound onto the spool 1310. Such winding of the cable 1200 causes the perimeter portions 1222 of the cable to retract thereby imparting a tightening force to the flanges 1122 such that the flanges 1122 move inwardly towards the secured object. In one embodiment, for example, such action forces the flanges 1122 to retract to a degree that inner tabs 1125 of the flanges 1122 enclose and secure the neck portion of depicted pill bottle 6. Said differently, the flanges 1122, which originally defined a first object engagement diameter (i.e., the largest object diameter around which the flanges might be secured based on a given wound level for the rotatable assembly), may be tightened to define a tightened object engagement diameter, which is smaller than the first object diameter. In various embodiments, as discussed in detail below, the security device includes a locking assembly that prevents loosening of the cable and outward movement of the flanges when disposed in a locked configuration.
The depicted first and second sliding elements 1411, 1412 are configured to move towards and away from the rotatable assembly 1300 along axis D. As the first and second sliding elements 1411, 1412 move towards the rotatable assembly 1400, perhaps in response to a biasing force applied by a corresponding biasing element, the first and second locking surfaces 1421, 1422 engage the plurality of locking teeth 1320. The first and second locking surfaces 1421, 1422 and locking teeth 1320 are configured such that when either of the first or second locking surfaces 1421, 1422 engage the locking teeth 1320, this engagement prevents relative rotational movement between the locking surfaces and the locking teeth in one direction while allowing relative rotational movement between the locking surfaces and the locking teeth in the other direction.
In various embodiments, the first and second sliding elements 1411, 1412 are biased towards the locked or engaged position shown in
As illustrated by the partially sectioned view of
In addition, the collar 2121 may define anchor structures 2115 (e.g., pockets or similar structures) for anchoring a first cable terminal 2210 and a second cable terminal (not shown), thus, fixing the location of the cable terminals relative to the collar 2121 of the security device 2010. Alternatively, in other embodiments, the cable terminals may be retained by a portion of the housing of the security device, thus, fixing the location of the terminals within the housing. Finally, as illustrated in prior embodiments with respect to
The depicted collar 2121 defines a plurality of shoulders 2170. The shoulders 2170 define curved channels as shown to limit stress on the cable (i.e., avoid kinks or sharp turns) and ease movement of the cable 2200 when the cable 2200 is wound onto or removed from the spool 2310. The collar 2121 and the shoulders 2170 may collectively operate to reduce the likelihood of the cable binding, wearing prematurely, or being tampered with as will be apparent to one of ordinary skill in the art in view of this disclosure.
In one embodiment, as shown from the opposite side of the security device depicted in
Once the top portion of the pill bottle or other object is inserted, the rotatable assembly 2300 may be rotated in a tightening direction from the unwound or first position to the tightened position. Rotation of the rotatable assembly 2300 causes rotation of the spool 2310 such that the capture portion 2311 of the spool 2310 engages the cable 2200 and the cable 2200 is wound onto the spool 2310. Such winding of the cable 2200 causes the perimeter portions 2222 of the cable to retract and move inwardly towards the secured object to such a degree to enclose and secure the neck portion of the pill bottle. For example, in some embodiments, the cable 2200 may be tightened such that it moves inwardly, at least partly away from the perimeter rim 2130 of the housing 2100, to an object capture position 2205′, 2206′ illustrated by dashed lines in
In one embodiment, once the security device has been unlocked and the user wishes to remove the security device from an object, the cable 2200 may be returned to its original position proximate the perimeter rim 2130 of the housing 2100. As will be apparent to one of ordinary skill in the art in view of this disclosure, such a return may be accomplished by selecting a cable having a sufficient rigidity and elastic bias so as to conform to the generally circular shape of the perimeter rim in its rest (i.e., non-tightened position). In some embodiments, a slight tightening bias may be provided to the rotatable assembly (i.e., through a torsion spring or other similar means) to remove slack from the cable in an unlocked configuration; however, in one embodiment, such tightening bias may be selected so as to be slightly less than the elastic bias of the cable to ensure that the cable is not prematurely pulled from the perimeter rim of the housing in its rest position (i.e., non-tightened position).
The security device of the various embodiments of the present invention may further comprise a security element 600, 1600, 2600 (as shown in
Various embodiments of the security device may further be configured with other security or alarm features. For instance, some embodiments may comprise an alarm module that comprises a piezoelectric speaker (620 in
Turning to
In other embodiments, the security device may further comprise a printed circuit board, a light-emitting diode (LED), and a battery. The LED may be configured to electrically communicate with the printed circuit board and the battery, and may extend at least partially through an opening defined by the outer cap of the rotatable assembly such that at least a portion of the LED is visible to the user or consumer. The LED may be used as an indicator (e.g., by providing a constant light or a blinking on/off light) of the existence of a particular condition or circumstance. For example, the LED may indicate that the security device has power, that the locking assembly is in the locked position, that the alarm is armed, or that the alarm has been triggered.
As explained in more detail in U.S. Pat. No. 7,497,101, which is incorporated by reference herein in its entirety, an alarm feature of the security device may be configured to activate in the event that a portion of the cable has been compromised, such as by being cut or damaged. For example, the cable may include or may itself be an electrically conductive element and may form a sense loop in contact with a trigger of the security device. Thus, in event that the cable is compromised, the trigger may be configured to detect the change in the cable and respond by activating the alarm. In this regard, the use of a single, continuous cable forming one or more loops allows for the monitoring of only one sense loop to trigger the alarm functionality, as opposed to monitoring multiple sense loops corresponding multiple cables.
In other embodiments, the trigger may be configured to excite and, thus, activate the alarm depending on the location of the EAS element with respect to the security system. The trigger may be configured to activate the alarm once the EAS element is near, at, or beyond a security system gate, which should help employees to detect the merchandise with the attached security device. Therefore, in some embodiments, the security device may have three alarm features: (1) the gates themselves alarming when the EAS element is detected; (2) the audible alarm (e.g., the piezoelectric speaker) of the security device itself triggering when the cable is compromised or otherwise tampered with; and (3) the audible alarm (e.g., the piezoelectric speaker) of the security device triggering when the EAS element is at, near, or beyond the security gates.
As mentioned previously, various embodiments of the security device may include a specially configured key comprising two magnets and one or more locating features or locating knobs configured to engage key locating indentations defined by the housing of the security device. When the key locating knobs and the locating indentations are aligned, the key magnets are positioned relative to the locking assembly of the security device to focus the magnetic fields of the key magnets towards the respectively aligned magnetically attractive elements. The application of the focused, well-aligned, dual magnetic fields causes the locking assembly to disengage. In some embodiments, keys structured for use with security devices as described herein may incorporate rare earth magnets in specific orientations and combinations to produce a specific flux field for disengaging the locking assembly.
As will be apparent to one of ordinary skill in the art in view of this disclosure, the biasing force used to bias the locking assembly toward the rotatable assembly, the relative positioning of the magnetically attractive elements within the locking assembly, the positioning of the magnetic fields produced by the specially configured key, and the magnitude or strength of the magnetic fields produced by the key, are all design considerations to be optimized for security purposes in connection with security device and key systems structured in accordance with the embodiments of the present invention. Similar locking assemblies may be used that include a unique physical profile of a key to disengage the locking assembly from the rotatable assembly.
In some embodiments, the security device may further comprise a winder mechanism (not shown). In particular and as further described in U.S. patent application Ser. No. 12/027,296, filed on Feb. 7, 2008, titled “Cable Wrap Security Device,” the contents of which are hereby incorporated by reference in their entirety, the security device may include a winder mechanism that biases the rotatable assembly to a tightened position. The tightened position corresponds to a position in which the cable is substantially wound around the spool or that the cable loops have a minimum length. The winder mechanism may include a torsion spring extending from a first end to a second end. The torsion spring may be positioned within a center opening of the rotatable assembly with the first end attached to the rotatable assembly and the second end attached to a non-rotating element, such as a portion of the housing or the collar (shown as element 1121 in
Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This application claims the benefit of priority to U.S. Provisional Application No. 61/257,321, which was entitled “Adjustable Cable Wrap Security Device” and was filed Nov. 2, 2009, and further claims priority to U.S. Provisional Application No. 61/298,820, which was entitled “Security Device” as was filed Jan. 27, 2010. The contents of each of the above provisional applications are hereby incorporated by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
61257321 | Nov 2009 | US | |
61298820 | Jan 2010 | US |