1. Field of the Invention
This invention relates to electronic article surveillance (EAS) systems and, more particularly to EAS tags that provide systems for potential recovery of stolen articles.
2. Description of Related Art
Most conventional EAS systems include EAS pedestal systems that are positioned at the ingress/egress locations of retail stores, which trigger an alarm when an EAS tag associated with an article is near the EAS pedestal systems (assuming the EAS tag is not neutralized). Regrettably, known EAS systems (e.g., pedestals, tags, alarms, etc.) do not provide any mechanism for potential recovery of stolen articles that are removed from the store.
Accordingly, in light of the current state of the art and the drawbacks to current EAS systems mentioned above, a need exists for EAS tags that would provide for protection of articles inside the merchant store but also would potentially enable the recovery of stolen article.
A non-limiting, exemplary aspect of an embodiment of the present invention provides an anti-theft tag, comprising:
a locator module for tracking location of the anti-theft tag;
the locator module providing location information with respect to the location of the anti-theft tag.
Another non-limiting, exemplary aspect of an embodiment of the present invention provides anti-theft tag, comprising:
a locking cable that is coupled with a housing of an anti-theft tag;
the housing of the anti-theft tag includes:
a first member coupled with a second member, forming a hollow internal chamber within which is mounted a locator module for tracking location of the anti-theft tag, and a first side that includes a first aperture for accommodating an actuator switch;
the second member includes a protuberance that houses a clutch;
the first member and the second member include perforated areas that form the grill-openings of the housing for output of audio indicator.
Such stated advantages of the invention are only examples and should not be construed as limiting the present invention. These and other features, aspects, and advantages of the invention will be apparent to those skilled in the art from the following detailed description of preferred non-limiting exemplary embodiments, taken together with the drawings and the claims that follow.
It is to be understood that the drawings are to be used for the purposes of exemplary illustration only and not as a definition of the limits of the invention. Throughout the disclosure, the word “exemplary” may be used to mean “serving as an example, instance, or illustration,” but the absence of the term “exemplary” does not denote a limiting embodiment. Any embodiment described as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments. In the drawings, like reference character(s) present corresponding part(s) throughout.
FIG. 4A to 4C-2 are non-limiting, exemplary detailed illustration of a locator module of the anti-theft tag illustrated in
The detailed description set forth below in connection with the appended drawings is intended as a description of presently preferred embodiments of the invention and is not intended to represent the only forms in which the present invention may be constructed and or utilized.
For purposes of illustration, programs and other executable program components are illustrated herein as discrete blocks, although it is recognized that such programs and components may reside at various times in different storage components, and are executed by the data processor(s) of the computers. Further, each block within a flowchart (if a flowchart is used) may represent both method function(s), operation(s), or act(s) and one or more elements for performing the method function(s), operation(s), or act(s). In addition, depending upon the implementation, the corresponding one or more elements may be configured in hardware, software, firmware, or combinations thereof.
One or more embodiments of the present invention provide an EAS tag that has a transponder that triggers an alarm, and includes a locator module for tracking the location of the EAS tag, with the locator module providing location information with respect to the location of the EAS tag. In general, locator modules are well known a non-limiting example of which may includes a locator module provided by TELIT®. Accordingly, when an article associated with the EAS tag of the present invention is still stolen (despite the trigger of an alarm), the locator module of the EAS tag may provide tracking capability and location information of the EAS tag for potential recovery of stolen article.
Referring to
Housing 104 further includes a first side 122 (
As further illustrated, EAS tag 100 includes a triggering unit 602 in a form of a transponder. EAS transponders 602 may comprise of elements that respond to specific types of electronic surveillance signals of different types of EAS systems, non-limiting examples of which may include Magnetic, Acousto-Magnetic (AM), Radio Frequency (RF), Microwave, etc. For example, the elements may comprise a ferrite coil antenna that includes an inductor L and capacitor C (e.g., an LC tank) for radio frequency (RF) systems, amorphous metals for Magnetic systems, magnetostrictive and or ferromagnetic amorphous metals for use with acousto-magnetic (AM) systems, or non-linear elements such as a diode for Microwave systems. It should be noted that several transponders of different types may be used within the same EAS tag 100, with each tuned to a different resonant frequency and or systems for activation of different types of EAS systems.
As illustrated in
As further illustrated in
A magnetic detacher may be used to release locking plug 202 from the internal chamber and to open actuator switch 118, and unlock cable 102 to open position shown in
Locator module 340 includes a rechargeable power source 128 for powering continuous communication of location information and data regarding the associated EAS tag 100 with a central point in a well-known manner. Further included with locator module 340 is an input and output (IO) port 130 for both power and data. In general, the rechargeable power source (e.g., a battery) 128 is charged via a charging port 132 coupled with the IO port 130. In one embodiment, the charging port 132 is a Universal Serial Bus (USB) charging port that includes a micro-USB break-out board 134 with power and ground coupled with locator module IO port 130 to recharge power source 128. It should be noted that micro-USB break out board 134 is used because power and ground pins of IO port 130 of locator module 340 are too small and hence, break-out board 314 is used to facilitate USB connections for charging.
As best illustrated in
The microprocessor of locator module 340 at the next operation 404 determines if locator module 340 is being charged. If the microprocessor determines that locator module 340 is being charged, locator module 340 continues to remain active, transmitting its location information (or other data). If the microprocessor determines that locator module 340 is not being charged, locator module 340 sets a timer for motion at operation 406 and at operation 408 determines if the minimum timer threshold is met for motion (or lack thereof). Accordingly, locator module 340 will remain active for as long as motion is sensed within the set time where the time is reset otherwise, it reverts to sleep mode at operation 410 if no motion is sensed within the set minimum timer threshold.
Therefore, if at operation 408 it is determined that the minimum timer threshold is not met (no motion is sensed passed the threshold timer), at operation 410 locator module 340 becomes inactive (sleep mode) and continues to determine if motion is sensed at operation 412. In other words, when the EAS 100 is handled and physically changes orientation locator module 340 within the EAS tag 100 is activated, transmitting current location information to a central point. Accordingly, if EAS tag 100 and the associated article with which EAS tag 100 is coupled are stolen and moved to an unknown location, locator module 340 would transmit location information for potential recovery of the stolen merchandise, with the transmitted location information received and processed at a centrally authorized point.
Although the invention has been described in considerable detail in language specific to structural features and or method acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary preferred forms of implementing the claimed invention. Stated otherwise, it is to be understood that the phraseology and terminology employed herein, as well as the abstract, are for the purpose of description and should not be regarded as limiting. Further, the specification is not confined to the disclosed embodiments. Therefore, while exemplary illustrative embodiments of the invention have been described, numerous variations and alternative embodiments will occur to those skilled in the art. Such variations and alternate embodiments are contemplated, and can be made without departing from the spirit and scope of the invention.
It should further be noted that throughout the entire disclosure, the labels such as left, right, front, back, top, bottom, forward, reverse, clockwise, counter clockwise, up, down, or other similar terms such as upper, lower, aft, fore, vertical, horizontal, oblique, proximal, distal, parallel, perpendicular, transverse, longitudinal, etc. have been used for convenience purposes only and are not intended to imply any particular fixed direction or orientation. Instead, they are used to reflect relative locations and/or directions/orientations between various portions of an object.
In addition, reference to “first,” “second,” “third,” and etc. members throughout the disclosure (and in particular, claims) is not used to show a serial or numerical limitation but instead is used to distinguish or identify the various members of the group.
In addition, any element in a claim that does not explicitly state “means for” performing a specified function, or “step for” performing a specific function, is not to be interpreted as a “means” or “step” clause as specified in 35 U.S.C. Section 112, Paragraph 6. In particular, the use of “step of,” “act of,” “operation of,” or “operational act of” in the claims herein is not intended to invoke the provisions of 35 U.S.C. 112, Paragraph 6.
This Application claims the benefit of priority of co-pending U.S. Utility Provisional Patent Application No. 61/923,555, filed Jan. 3, 2014, the entire disclosure of which is expressly incorporated by reference herein. It should be noted that where a definition or use of a term in the incorporated patent application is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the incorporated patent application does not apply.
Number | Date | Country | |
---|---|---|---|
61923555 | Jan 2014 | US |