This invention relates to the prevention of the theft of electronic devices. More specifically, this invention relates to the prevention of the theft of rechargeable electronic devices by connecting an electronic article surveillance device to the charging port of the device.
Theft of goods in the retail environment is a serious concern. Theft cuts into the margins of a business making it more difficult for a business to compete and succeed. Electronic devices are particularly targeted for theft, especially portable electronic devices; they are portable and have high value, both in cost and desirability. These portable electronic devices include cell phones, computer tablets, laptops, games, and DVD players, among other devices. Despite the theft risk, effective sales and marketing still requires that electronic devices be available for a consumer to hold and review to select the most desirable product for a particular consumer. Therefore there is a need for an effective way to protect electronic articles on display while giving a shopper the full ability to hold and inspect the product.
Portable electronics have onboard rechargeable batteries. To recharge the batteries, the portable electronic devices have ports for the connection of chargers. Typically, the chargers have a standard wall type plug, a transformer, cord length, and a plug for insertion into the charging port on the electronic device. Embodiments of the anti-theft tag for electronic device charging port connect to the charging port of the portable electronic device that it is protecting from theft.
Embodiments of the anti-theft tag have a housing. A plug compatible with the charging port of an electronic device extends from the housing at a first location. A plug like the charging port of the electronic device is positioned at a second location on the housing. In some embodiments of the anti-theft tag, there is electrical continuity between the plug on the housing compatible with the charging port and the plug like the charging port. This allows a charger to be plugged into the anti-theft tag to charge the electronic device, while the tag is plugged into the electronic device.
In addition to attaching to the electronic device with the plug compatible with the charging port, some embodiments of the anti-theft tag have additional mechanisms to attach to the electronic device. In some embodiments, the anti-theft tag has a panel with an adhesive element on it. When the tag is attached to the electronic device, the adhesive element contacts and adheres to the electronic device to maintain the tag in position on the electronic device. Some embodiments with the panel with the adhesive element have a hinge between the housing and the panel. The hinge facilitates the use of the adhesive panel. In practice, the tag is plugged into the charging port, and then the panel is brought into contact with the electronic device. Some embodiments of the tag have a double hinge between the housing and the panel. The double hinge gives an additional degree of freedom in bringing the panel into contact with the electronic device.
In some embodiments of the tag, the housing will enclose electronic article surveillance electronics. The EAS electronics may include a passive EAS element. Two types of possible passive EAS elements are acousto-magnetic (AM) passive elements which function at approximately 58 kHz frequency and ferrite core and coil passive elements. Both AM passive elements and core and coil passive elements generate signals in response to interrogation fields.
Some embodiments of the anti-theft tags may contain more active EAS electronic elements. These EAS electronics may comprise: a microprocessor; a motion sensor; a magnetometer; switches, wireless communication elements such as a radio frequency (RF) transmitter and receiver, or RF transceiver or an infrared communication port; an audible sound generator; and a battery, or other power source, powering the foregoing elements. The electronics can monitor the status of switches, the connections to the phone and charger, and the status of the battery. The microprocessor can execute machine readable instructions to interpret the state of switches, plugs, and sensors, to communicate with other devices, and to generate alarms if an alarm condition is determined.
Additional utility and features of the invention will become more fully apparent to those skilled in the art by reference to the following drawings, which illustrate some of the primary features of preferred embodiments.
Referring now to
In addition to plug 16, tag 10 may have an additional attaching mechanism for attaching tag 10 to a portable electronic device. In the embodiment of
In some embodiments, panel 18 is connected to body 12 by a hinge to facilitate moving panel 18 and adhesive element 20 into contact with the electronic device. In the embodiment shown in
Although adhesive element 20 maintains tag 10 on the electronic device under normal conditions, it may not be sufficient to prevent the forced removal of tag 10 by a determined thief. For that reason, some embodiments of tag 10 employ additional electronic monitoring elements capable of detecting when tag 10 has been removed without authorization and generating an alarm when the electronics determine an alarm condition. In
Referring to both
Circuit board 50 and microprocessor 52 monitor several inputs and execute machine readable instructions and generate outputs based on the instructions and inputs. When male plug 16 is inserted into the female receptacle of an electronic device, switch 34 is depressed and its state is changed, arming the electronics in tag 10. Male plug 16 may also be monitored for confirmation that tag 10 is attached to an electronic device. The arming of anti-theft tag 10 may be automatic or it may be completed by communication from an external device. Other embodiments of anti-theft tag 10 may be armed by communication from an external device.
The final arming of anti-theft tag 10 may be automatic or it may be completed by communication from an external device. Infrared communications port 54 and radio communication circuitry 57 provide means for tag 10 to receive a signal from an external device such as a handheld device held by an authorized person. LED 55 and audible alarm generator 53 allow tag 10 to communicator directly to persons. When tag 10 is plugged into an electronic device, tag 10 may provide a confirmation signal by flashing LED 55 or issuing sounds from audible sound generator 53. An operator may then use an external device to send an optical signal to infrared communication port 54 or a radio signal to radio communication circuitry 57 to finalize arming tag 10.
An external device may also be used to disarm tag 10 before it is removed. Some embodiments of tag 10 will store a passcode in microprocessor 52. The external device must communicate the appropriate passcode before tag 10 will communicate with the external device or allow its status or machine readable instructions to be modified by the external device. The wrong passcode may itself be a cause to issue alarm.
Once tag 10 is installed, the electronics monitor at least switch 34. If tag 10 is removed without its electronics being disarmed, the electronics may determine an alarm condition and generate an alarm. This alarm may be an audible alarm generated by audible sound generator 53, a radio signal generated by radio communication circuitry 57, or an optical signal from LED 55. The radio signal alarm and optical signal alarm may be detected by elements in the electronic article surveillance system monitoring the area in which tag 10 and its respective electronic device are located. The EAS system may then respond as programmed, for example by sounding alarms, displaying alarms on computer screens, etc.
Radio communication circuitry 57 in tag 10 can also communicate with the EAS system to monitor the location of tag 10. Radio communication circuitry 57 can communicate actively with the EAS system or monitor for interrogation fields such as those used to stimulate passive EAS elements. If radio communication circuitry 57 detects an interrogation field, the electronics in tag 10 may determine an alarm condition and activate. Alternatively, the EAS system may instruct tag 10 to generate an alarm as well.
In some embodiments, the electronics of tag 10 are powered by battery 56. Some embodiments of tag 10 may also have a motion sensor 58. Motion sensor 58 may be employed to conserve battery life. Motion sensor 58 monitors for motion and is in communication microprocessor 52. After a preprogrammed period of stasis, with the exception of microprocessor 52 and motion sensor 58, the electronics of tag 10 go dormant. Motion sensor 58 monitors for movement of tag 10 and microprocessor 52 is in communication with motion sensor 58 to receive notice that tag 10 is being moved. When motion sensor 58 detects that tag 10 is in motion, the other electronic elements of tag 10 in addition to motion sensor 58 and microprocessor 52 become active. In some embodiments of tag 10, battery 56 may also be rechargeable when the charger for the electronic device is connected to female receptacle 18.
Magnetometer 59 provides another method for the electronics of tag 10 to monitor the status of tag 10 and its environment. Magnetometer 59 measures magnetic fields around tag 10 and communicates a digitized representation of the fields to microprocessor 52. Microprocessor 52 stores the digitized representations of the magnetic environment and compares them to each other over time for changes, consistency, etc. Sudden changes may indicate an alarm condition is present. For example, if the surrounding field is suddenly attenuated, it may be an indication that a thief has isolated tag 10 and its electronic device by placing them in a foil bag. In such a case, microprocessor 52 may issue an audible alarm from audible sound generator 53.
It is to be understood that the embodiments and arrangements set forth herein are not limited in their application to the details of construction and arrangement of the components set forth in the description and illustrated in the drawings. Rather, the description and the drawings provide examples of the embodiments envisioned, but the invention is not limited to the specific embodiments. The embodiments disclosed herein are further capable of other embodiments and of being practiced and carried out in various ways, including various combinations and sub-combinations that may not have been explicitly disclosed. Also, it is to be understood that the phraseology and terminology employed herein are for the purposes of description and should not be regarded as limiting the claims.
Accordingly, those skilled in the art will appreciate that the conception upon which the application and claims are based may be readily utilized as a basis for the design of other structures, methods, and systems for carrying out the several purposes of the embodiments and claims presented in this application. It is important, therefore, that the invention be regarded as including such equivalent constructions.
This application is a utility application which claims priority to U.S. Provisional Application 62/279,287, filed on Jan. 15, 2016. The entire disclosures contained in the specification and figures for U.S. Provisional Application 62/279,287, including the attachments thereto, are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
8373565 | Yang | Feb 2013 | B2 |
8452868 | Shafer | May 2013 | B2 |
8890694 | Yang | Nov 2014 | B2 |
9443404 | Grant | Sep 2016 | B2 |
9521227 | Kim | Dec 2016 | B2 |
Number | Date | Country | |
---|---|---|---|
20170206762 A1 | Jul 2017 | US |
Number | Date | Country | |
---|---|---|---|
62279287 | Jan 2016 | US |