The present invention relates to security devices used to protect merchandise or other objects and, more particularly, to security devices having one or more adjustable cables used to wrap around objects of various shapes and sizes such that the security devices are secured to the objects.
Electronic article surveillance (EAS) systems are often used to deter and detect shoplifting. Typically, an EAS security system includes an EAS tag and EAS “gates” located near the doors of a retail establishment. The EAS tag is usually incorporated into a security device that has some mechanism, such as pin and magnet, for attaching it to an article of merchandise or other object.
EAS gates are configured to establish a detection zone, often between gates or within a given distance from a gate, through which a consumer must pass as he or she exits the retail establishment. The gates often include a transmitter, a receiver, and an audio and/or visual alarm. The transmitter is configured to send signals through the detection zone. When an EAS tag enters the detection zone, the EAS tag can respond to the signal being sent by the gate's transmitter. The EAS tag's response can include generating a signal or changing or disturbing the original signal transmitted by a gate's transmitter, which is detectable by a gate's receiver. Upon detecting the EAS tag, the alarm is activated to notify store personnel that someone is trying to exit the retail establishment with merchandise that has an attached EAS tag.
In an EAS system, it is the actual EAS tag that is being detected and not the merchandise itself. Therefore, an EAS system can be circumvented by removing the EAS tag from the merchandise. Consequently, devices having additional, integrated layers of security have been developed to prevent the unauthorized removal or destruction of the EAS element. For example, a security device can be configured to house the EAS tag and attach the EAS tag to the merchandise in a manner that limits the likelihood that a consumer or a would-be thief could tamper with or otherwise remove the EAS tag from the merchandise. While these systems and methods provide a number of benefits, they are improved by the embodiments discussed herein.
The present disclosure is directed to systems, apparatuses, methods and other means for providing a security device structured for attachment to an object. The security device can comprise, among other things, a cable and a main body.
The cable can comprise one or more types of material, including an electrical conductor. The cable can be configured to physically attach the security device to the object. In other embodiments, the security device can include a pin-based attaching mechanism (for protecting articles of clothing), a bottle lock attaching mechanism (for protecting bottles), a keeper or plastic enclosure attaching mechanism (for protecting compact disks, software, cologne, and the like), among others.
The main body can comprise, for example, circuitry, at least one contact, and an attaching mechanism configured to facilitate the mechanical and/or communicative coupling of an alarm module to the main body. The contact can be, for example, an electrical contact, an optical contact, or any other type of contact that can facilitate the transmission and/or reception of a communications signal. The communications signal can be electrical, magnetic, optical, any other type, or a combination thereof. To avoid overcomplicating the discussion, electrical contacts and communications are sometimes referred to herein, however one skilled in the art would appreciate that any type of contacts and/or communications can be used without departing from the spirit of embodiments of the invention.
The main body's circuitry can be configured to function as a passive wireless component, such as an EAS tag, that causes actuation of an external alarm of a gate, in response to receiving a signal from the gate.
The at least one electrical contact can be configured to be electrically coupled with the electrical conductor of the cable. In this regard, the electrical contact can also be configured to facilitate the electrical coupling of the cable to a removable alarm module.
The main body of the security device can further comprise a locking mechanism that secures the cable within the main body. The locking mechanism can comprise one or more of the electrical contact(s).
When the removable alarm module is electro-mechanically coupled to the main body, the security device is sometimes referred to herein as comprising the removable alarm module. Unlike some embodiments of the security device, the removable alarm module can include an independent power source, such as a battery, and an alarm mechanism, such as a speaker and/or light emitting component. The removable alarm module can be configured to actuate the alarm mechanism in response to, for example, the alarm module being removed from the main body without using the proper key or other type of tool. The removable alarm module can also be configured to actuate the alarm mechanism in response to the cable being cut. As yet another example, the removable alarm module can be configured to actuate the alarm mechanism in response to receiving a signal from the circuitry of the main body.
The alarm module can comprise a housing and circuitry. The housing can include an attaching mechanism configured to allow the alarm module to be removably coupled to a security device. Although the alarm module can be configured to attach to a security device, in some embodiments the alarm module lacks any mechanism to be physically attached directly to an article for sale.
The alarm module's circuitry can comprise, for example, the alarm mechanism, one or more electrical contacts configured to electrically couple with the security device's electrical contacts (directly or indirectly), and an independent power source, such as a battery. The circuitry can be configured to receive an input from the security device. The circuitry can be further configured to actuate the alarm mechanism in response to receiving the input from the security device. For example, the alarm module can comprise two electrical contacts, which are both electrically coupled to the circuitry, and wherein the circuitry is further configured to output a signal to the first electrical contact and, in response to failing to receive a corresponding signal from the second electrical contact, actuate the alarm mechanism.
The alarm module's housing can include at least two pieces, namely a top portion and a bottom portion. The alarm module can further comprise an electronics subassembly onto which the circuitry is mounted. The electronics subassembly can then be sandwiched between the top portion and the bottom portion of the housing, wherein the electronics subassembly is configured to rotate independent from the housing. The electrical contacts can be configured to rotate with the electronics subassembly.
The alarm module can further comprise at least one locking pin configured to mechanically lock the alarm module to the main housing or other part of the security device. One or more of the locking pins can be configured to rotate with the housing. One or more of the locking pins can also include a spring and/or be comprised of magnetically permeable material. A magnet can then be used to unlock each spring-loaded magnetically permeable locking pin by, for example, placing the magnet outside the housing, causing the spring to be compressed.
An exemplary method for protecting an object using a security device can comprise providing a main body having circuitry and being configured to receive a removable alarm module; providing the removable alarm module including a local alarm mechanism; and actuating the local alarm mechanism of the removable alarm module in response to detecting unauthorized tampering with the security device. The step of providing the main body can also include providing passive one-alarm functionality (e.g., external gate alarming); and the step of providing the removable alarm module can include providing active two-alarm functionality (e.g., internal security device alarming in response to detecting a gate's broadcast signal and in response to detecting security device damage or tampering).
The method of detecting unauthorized tampering of the security device can comprise, for example, determining that a cable incorporated in the security device has been severed. As another example, the method of detecting unauthorized tampering of the security device can comprise determining that the main body has been damaged. The method can also include actuating the local alarm mechanism in response to a signal being received from the main body. As another example, the local alarm mechanism can be actuated in response to the removable alarm module detecting an alarm condition, such as being located in an unauthorized location, damage to the cable, tampering, among others. The method can also comprise, among other things, sending a wireless signal causing the actuation of an external alarm mechanism.
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the inventions are shown. Indeed, these inventions may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout.
Embodiments of the present invention provide a security device, among other things. The security device can include at least one cable and/or wire which may encircle all sides of a box, package, book, or other similar structure. It is possible to secure the security device to other packages having other shapes, sizes, and configurations as will be appreciated by one of ordinary skill in the art; however a six-sided package is the configuration most commonly used with a Spider Wrap® at this time, and is therefore shown in some of the drawings. The cable or cables of the security device extend from a main housing of the security device, encircle the object to be secured, and terminate at the main housing. The main housing is configured to maintain cable alignment and secure the cable or cables at a desired length.
A feature of this invention includes providing a security device that is easily adjustable to accommodate objects of varying sizes and shapes. The security device may have a main housing, sometimes referred to herein as a main body, that secures the cable at a desired length and cannot be removed without destruction of the cable or the main body. In this regard, the security device or at least a portion thereof is considered “disposable.” The main body may contain an EAS tag. As used herein, an EAS tag includes, among other things, circuitry that is responsive to an acousto-magnetic field, RFID tag, microwave-responsive circuitry, and/or any other wireless device that can be configured to actuate and/or trigger the actuation of an alarm at a security gate should a potential theft attempt be detected (e.g., determining that the object is leaving the premises before removing and/or deactivating the security device from the protected object).
A further feature of the present invention is to provide an active security module, which may take the form of a removable, battery powered module, that is configured to provide additional alarm functionality to a passive (e.g., parasitic) security device. The active alarm portion may be removable from the main body of the security device by application of a key or other type of tool, which may utilize physical, magnetic, electrical and/or any other means to unlock the removable module from the disposable main body.
For example, the active security module can include an integrated audible alarm, including a speaker and/or visual indicator. The audible alarm may be actuated in response to, for example, the integrity of the cable loop of the security device being jeopardized or severed. In addition to or instead of responding to the destruction of the cable loop, the audible alarm can be configured to actuate in response to an EAS tag of the passive security device being activated. The integrated audible alarm of the security device may also be activated when the security device is in relative proximity to a specific location such as the exit of a retail establishment. The security device is sometimes referred to herein as a “three-alarm security device” when the security device provides three types of alarming functionality (e.g., passive gate alarming, active tamper alarming, and active gate alarming), which are each discussed in more detail herein.
These features and others may be obtained by embodiments of the security device described herein, the general nature of which may be stated as comprising a cable for placement about an object to be secured, a locking member including a main body, and a securing insert wherein once the securing insert is engaged within the main body, the length of the cable is locked and the security device may be removed only by destruction of either the cable or the main housing.
An exemplary embodiment of the security device is shown in
The first end 105 of the cable 102 is secured within the main body 100 such that the first end 105 is not accessible or removable (without, e.g., damaging or destroying the main body 100). The cable 102 forms a first loop 110 extending from the first end 105 and is threaded around and back through the main body at the opening 106. The cable 102 is then routed back out of the main body at opening 107. As shown in
As shown in
The second end 104 of the cable 102 is pulled until the desired tension is achieved around the object to be secured, such that the security device cannot be removed from the object without damaging or breaking some part of the security device. The securing insert 109 is then pressed into the main body 100, whereupon the securing insert 109 locks the cable portion 120 at the desired length as shown in
In some embodiments, including those shown in
Embodiments of the present invention may include an EAS tag (e.g., ultra-high frequency RFID tag), and/or other wireless component secured within the main body 100. While not shown in
The cable wrap security device may be of an embodiment as described above with respect to
The removable alarm module 430 may have complementary contacts, such as connection pads (not shown), that contact the electrical connection pads 401 and 402, located on the external portion of the main body 400. The connection pads of the removable alarm module 430 can be configured to contact the electrical connection pads 401 when, as shown in
The removable alarm module 430 may be configured to sense when one or both of the cable loops 410 and 420 are compromised. Such a configuration may include, for example, circuitry within the removable alarm module 430 that is configured to send one or more electrical pulses (e.g., a pulse signal) between the electrical connection pads 401 and 402 and/or maintain a voltage (digital signal) above a certain threshold (e.g., 2.5V DC) between the electrical connection pads 401 and 402. If the signal is sent by the first electrical connection pad 401, but the second electrical connection pad 402 fails to receive the same signal, circuitry of the removable alarm module 430 can be configured to trigger the alarm module's audio and/or visual alarm(s). For example, the electrical pulse would not be received at the second electrical connection pad 402 and the alarm of the alarm module 430 would be activated in response to either of the cable loops 410 or 420 being severed or broken.
The circuitry of removable alarm module 430 may further be configured to detect and trigger its audio and/or visual alarm in response to an EAS component of the main body 400 entering and/or maintaining a passively excited or activated state. Such embodiments may be realized by incorporating an antenna (not shown) into the removable alarm module 430 that detects an excited state of the EAS tag. As another example, the main body 400 may include its own EAS tag and/or other component (not shown) that, when activated, sends a signal via one or more of the electrical connection pads 401 and/or 402. There are other configurations and methods that can be implemented by the main body 400 to trigger the alarming components of the removable alarm module 430 when the two are in close proximity (e.g., electrically and/or mechanically coupled together), such as shown in
In some embodiments, the removable alarm module 430 may be configured to detect, independent of any functionality of the main body 400, when the alarm module is proximate to a security gate (e.g., between two sensors or within a given distance from a sensor. For example, some embodiments of the removable alarm module 430 may include a ferrite element that may be triggered and or excited by a magnetic field around the security gate. As another example, a security gate can create a local acousto-magnetic field that is detected by logic circuitry and triggers an alarm within the removable alarm module 430. Other examples include electronic security gates that create, and security devices that are triggered by, radio frequency signals and microwave signals. The alarm module may then activate its alarm so that a person carrying the alarm device may be distinguished from other nearby people.
Alarm module 430 may be configured to switch between an operational state, when attached to the security device 300, and an inactive state, typically when detached from a security device. For example, when the circuitry of the removable alarm module 430 detects that its connection pads are uncoupled, the circuitry of the removable alarm module 430 may enter a sleep or power saving mode, where at least some the functionality of the removable alarm module 430 is powered OFF or otherwise disabled. In response to determining its connection pads are coupled together (e.g., via electrical connection pads 401 and 402 of main body 400), the circuitry can be powered ON and the module function accordingly.
The removable alarm module 430 of
Alarm module 430 may further be configured to activate when attached to a security device 300 such that detachment of the active alarm module 430 from the security device, without first applying the appropriate key, will trigger the module's alarm. In addition to or instead of the electrical contact triggering means, a mechanical switch can also be utilized to determine when the removable alarm module 430 is decoupled from main body 400. The mechanical means for activating the alarm of the removable alarm module 430 may include, for example, a plunger housed within the removable alarm module 430 that is depressed when the removable alarm module 430 is attached to the main body 400 and released when improperly detached from the main body 400. As used herein “plunger” includes any type of depression, pressure, and/or contact switch. The plunger may be made, at least partially, of a magnetically permeable material, which as used herein includes any magnetically sensitive material.
A key device (an example of which is shown in
The alarm module 430 of the type described above may serve to provide at least two of the three-alarm protections over the secured object. A first alarm refers to the alarm that is emitted by the alarm module in response to a cable or other component being tampered with or severed. A second alarm refers to the alarm sounding by the security gates' alarm system, typically by the exit and/or other restricted area(s). A third alarm refers to the alarm that sounds by the removable alarm module 430's alarm system in response to the module determining it has entered or is about to enter a restricted area, such as within the vicinity of security gates, or for any other, non-tampering reason.
In embodiments using a single cable consistent with that shown in
Cable opening 1002, cable opening 1004, cable opening 1006, cable opening 1008 and the two cable openings not shown in
A first end of cable 1102, namely first end 1104, can exit main body 1000 through opening 1002. A second end of cable 1102, namely second end 1106, can exit main body 1000 through opening 1004. The ends of cable 1102 can then wrap around object 1108, enter main body 1000 through the two openings not shown in
As discussed above, after the ends of cable 1102 are wrapped around an object, the ends 1104 and 1106 are reinserted into openings of main body 1000. For example, second end 1106 can enter opening 1206, pass through conduit 1204, and exit main body 1000 through opening 1008. First end 1104 can enter opening 1212, pass through conduit 1210, and exit main body 1000 through opening 1006.
Within conduits 1204 and 1210, one or more locking mechanisms can be included to secure cable 1102 within the housing of main body 1000. In addition to or instead of the securing inserts discussed herein (see, e.g.,
Main body 1000 can also include internal contacts 1216, detailed in
One skilled in the art would appreciate that additional components, which are not shown in
Returning to
For example,
Housing 1400 of alarm module 1302 is shown in
Within housing 1400, alarm module 1302 can include, for example, ferrite 1406, circuit board 1408, independent power source 1410, piezo audio alarm 1412, locking pins 1414, electrical contacts 1416, which protrude through bottom 1418. In some embodiments, bottom 1418 can be considered part of housing 1400 and be configured to protect alarm module 1302's internal components.
Ferrite 1406 can be used in some embodiments to determine when alarm module 1302 is within a broadcast range of, for example, an EAS gate. As such, ferrite 1406 can activate in response to determining it is within range of an EAS gate and send a corresponding signal (e.g., logical 1) to circuit board 1408. Circuit board 1408 can include, for example, a printed circuit and/or any other type of circuit and control the functionality alarm module 1302 and/or a security device to which alarm module 1302 is coupled. Circuit board 1408 can be screwed to or otherwise affixed to bottom 1418 and/or electrical contacts 1416 can be used to physically couple circuit board 1406 to bottom 1418. In some embodiments, ferrite 1406 and/or piezo audio alarm 1412 can also be physically coupled to bottom 1418.
Circuit board 1408 and/or the other active components of alarm module 1302 can be powered by independent power source 1410. Independent power source 1410 can include, for example, a battery. As used herein, an independent power source includes any source of power that is generated absent another device or system. For example, a passive, ultra-high frequency RFID tag would be considered as lacking an independent power source if it derives its power parasitically from wireless energy emitted by an interrogating device.
The circuitry of alarm module 1302, also shown in
Locking pins 1414 are shown in
According to some exemplary aspects of embodiments of the present invention, the processor included on circuit board 1408 may operate under control of a computer program product. For example, the memory can also be included on circuit board 1408, and be configured to store firmware, one or more application programs, and/or other software that is executed by the processor to control the operation of alarm module 1302, main body 1000, the entire puck security device, and/or a remote device. The computer program product for directing the performance of one or more functions of exemplary embodiments of the processor includes a computer-readable storage medium, such as a non-volatile storage medium and software (including computer-readable program code portions), such as a series of computer instructions are embodied in the computer-readable storage medium of circuit board 1408.
As will be appreciated, any such computer program instructions may be loaded onto a remote computer or other programmable apparatus included on circuit board 1408, to produce a machine, such that the instructions which execute on the computer or other programmable apparatus (e.g., hardware) create means for implementing the functions described herein. These computer program instructions may also be stored in a computer-readable memory that may direct a computer or other programmable apparatus (integrated, e.g., onto circuit board 1408) to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the functions described herein. The computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps (including those described in connection with, e.g.,
Circuit board 1408 can also be electrically coupled to electrical contacts 1416. In some embodiments, electrical contacts 1416 can be used to couple to cable 1102 (discussed above). Circuit board 1408's circuitry can be configured to output a signal (analog or digital) to one of electrical contacts 1416 (“output contact”) and monitor the other of electrical contacts 1416 (“input contact”) for the same signal. Should, for example, no signal arrive at the input contact, the circuitry of alarm module 1302 can be configured to alarm. A lack of an expected input signal may indicate, e.g., that cable 1102 has been tampered with or damaged, alarm module 1302 has been tampered with or damaged (e.g., is no longer properly coupled to main body 1000), and/or the security device has been tampered with or damaged.
In other embodiments, rather than electrical contacts 1416 being configured to function as input/output ports, electrical contacts 1416 can both be configured as input ports or output ports, or switch among the two. For example, in embodiments such as a security device lacking a cable and instead including one or more pressure switches and/or a pin mounting components, both electrical contacts 1416 can be configured to be inputs to the circuitry of alarm module 1302. In the event a signal is received from one or more of electrical contacts 1416, the circuitry can be configured to determine that a pressure switch has been triggered due to a product being prematurely removed from the packaging (e.g., before the security device had been removed from the product or its packaging) and/or as a result of tampering or damage caused to the object being secured and/or tracked.
In some embodiments, bottom 1418 can be sandwiched between cover 1402 and ring 1404, such that bottom 1418 (and the components affixed thereto) can rotate freely within housing 1400. For example, locking pins 1414 are also trapped between cover 1402 and ring 1404, and can be configured to remain stationary relative to cover 1402 and ring 1404. To accommodate locking pins 1414 remaining stationary while cover 1402 and ring 1404 rotate, slots 1420 can be incorporated into bottom 1418 as shown in
In some embodiments, one or more components discussed herein can be combined or omitted without departing from the spirit of the present invention. For example, ferrite 1406 can be omitted from alarm module 1302. In some embodiments, alarm module 1302's circuitry can be configured to receive an input from a passive wireless component incorporated into, e.g., main body 1000.
One difference of the puck security device shown in
One skilled in the art would appreciate that, consistent with the discussion above, additional components that are not shown in
The housing of alarm module 1504 is shown in
A difference between alarm module 1504 and alarm module 1302 is that alarm module 1504 lacks a component similar to or the same as ring 1404. Rather, circuit board 1408 can be physically coupled to either (or both) of cover 1702 or bottom 1704. Similarly, electrical contacts 1416 can be embedded into or otherwise physically attached to bottom 1704 and/or any other portion of alarm module 1504. As such, electrical contacts 1416 of alarm module 1504 can rotate with (instead of independent from) the housing of alarm module 1504. Likewise, locking pins 1414 and the other internal components of alarm module 1504 may be incorporated into alarm module 1504 in a manner that all the components rotate with the housing of alarm module 1504. Locking holes 1706 can be included in bottom 1704 to allow locking pins to extend out of and retract into bottom 1704.
Locking pins 1414, like those discussed in connection with
Puck device 1900 can be adapted to attach to object 1108 and receive removable alarm module 1902. In this manner, removable alarm module 1902, which like embodiments of some other removable modules discussed herein, may lack any mechanism to attach directly to a retail or other type of article, but can be attached indirectly to object 1106 by means of puck device 1900 or any other kind of device.
Removable alarm module 1902 is shown as including locking component 1904, which includes locking button 1906. Locking component 1904 can be used in addition to or instead of locking pins 1414 discussed above. Locking button 1906 can be a physical button adapted to protrude from the side of locking component 1904 when locking component 1904 is disarmed. Locking component 1904 may also be physically unlocked while disarmed, thereby enabling removable alarm module 1902 to be detached from main body 1900. Among other benefits, locking button 1906 also visually indicates if locking component 1904 is locked.
In response to removable alarm module 1902 being rotated onto puck device 1900, locking component 1904 can be armed. When armed, locking component 1904 can electro-mechanically lock removable alarm module 1902 onto puck device 1900. For example, the rotating motion may automatically activate the alarming system (which may be similar to those discussed elsewhere herein), while physically locking onto puck device 1900. As another example, button 1906 may have to be manually depressed, subsequent to or while twisting removable alarm module 1902 into position, to arm locking component 1904.
Switch 2004 can be electrically coupled to the other circuitry included on circuit board 1408. Switch 2004 can detect, for example, if removable alarm module 1902 is improperly disconnected from puck device 1900. An improper disconnection may include, e.g., removable alarm module 1902 being removed from puck device 1900 without first being properly disarmed by means of a key and/or other device. For example, when locking component 1904 is locked in place, button 1906 causes switch 2004 to depress and removable alarming module 1902's alarming functionality can be activated. When button 1906 is properly disengaged (with, e.g., a magnetic key), switch 2004 can be released and the electronics on circuit board 1408 can deactivate. Although switch 2004 is shown in
Puck device 1900 may function otherwise the same as or substantially similar to any other puck device discussed herein. Similarly, removable alarm module 1902 may otherwise function the same as or substantially similar to any other removable alarm module discussed herein.
At 2104, the alarm module waits in a power saving mode. While in the power saving mode (e.g., powered OFF, in stand-by, etc.), the alarm module circuitry can be configured to periodically check for a triggering event or wait for an awake signal (caused by, e.g., a power button being depressed, etc.).
At 2106, the circuitry determines whether the alarm modules electrical contacts are coupled to another device, such as the main body of a passive alarm security device. Although the Spider Wrap® security devices are often used in the examples provided herein, one skilled in the art would appreciate that any type of passive alarm security device, including pin-based security devices (for protecting articles of clothing), bottle lock security devices (for protecting bottles), a keeper or plastic enclosure security device (for protecting compact disks, software, cologne, and the like), among others, can also be electrically and mechanically coupled to an active, two-alarm module implementing embodiments of the present invention.
In response to determining at 2106 that the alarm module's electrical contacts are uncoupled, process 2100 can return to 2104 and the alarm module can enter the power saving mode.
In response to determining at 2106 that the alarm module's electrical contacts are coupled to another device, the circuitry of the alarm module can begin initiating, at 2108, a relatively more power consuming operation of the alarm module.
Next, a determination is made at 2110 as to whether or not the electrical contacts of the alarm module are coupled to a passive security device. This determination can be made based upon, for example, any signal the device is generating and sending to the alarm module's electrical contacts and/or based upon how the device responds to one or more signals generated by the alarm module and sent to the device via one or more of the electrical contacts. For example, a passive security device can be configured to simply route a signal from the alarm module's output electrical contact to the alarm module's input electrical contact. In this regard, any signal (whether it be analog or digital) outputted by the alarm module should be nearly instantaneously received by the alarm module.
In response to determining at 2110 that the alarm module is not coupled to a passive security device, but instead electrically coupled to something else, a determination can be made as to what type of device it is coupled to. For simplicity of this disclosure, only one example of such devices is shown in
At 2112, a determination is made by the alarm module as to whether its electrical contacts are connected to an independently powered device. In some embodiments, this type of determination can be used to determine whether or not the device is a battery charger. In other embodiments, more sophisticated authentication protocol can be implemented using, for example, particular voltages and/or ramp up algorithms to determine first whether the device is a battery charging device and second whether the device is authorized to charge the particular alarm module (or type of alarm module).
In response to determining at 2112 that the alarm module is connected to an independently powered device, the alarm module begins, at 2114, to charge its independent power source from the charge of the independently powered device. The alarm module can also be configured to monitor its charging process to, e.g., avoid over heating its battery, and at 2116 make a decision as to whether it has been fully charged or disconnected. In response to determining it is still connected and/or not fully charged, process 2100 returns to 2114 and the charging of the alarm module's power source continues.
In response to determining at 2116 that the alarm module has been disconnected or has been fully charged, process 2100 can return to 2104 and the alarm module can enter a power-saving mode. Similarly, in response to determining at 2112 that the alarm module is not connected to an independently powered device (which is also not a passive security device as previously determined at 2110), process 2100 can return to 2104.
Process 2100 can proceed to 2118 in response to determining at 2110 that the alarm module is coupled to a passive security device using, e.g., the methods noted above. Upon being coupled to a passive security device, the alarm module can begin performing active alarm monitoring at 2118. Active alarm monitoring, as referenced herein, involves alarm monitoring and alerting requiring an independent power source (e.g. battery) and integrated alarm output circuitry (e.g., visual and/or audio alarm, wireless communications circuitry to report an alarm condition, etc.).
At 2120, the alarm module determines whether it has detected tampering to the object being secured, the security device, the alarm module, or any other component it is designed to protect. At 2120, the alarm module can also monitor, among other alarm conditions, unauthorized removal of the security device from the object and/or the unauthorized removal of the alarm module from the passive security device. Authorized removal may require, for example, the use of a key, passcode, physical location determination, etc.
In response to detecting at 2120 a lack of tampering or unauthorized removal, a determination can be made that there is no alarm condition and there has been no triggering event, and process 2100 can proceed to 2122. At 2122, a determination is made as to whether the alarm module has properly decoupled from the passive security device and, if so, process 2100 proceeds to 2104. If not, process 2100 returns to 2118 and continues to perform active monitoring for an alarm condition and/or triggering event.
In response to determining at 2120 that an alarm condition is present and/or alarm triggering event has occurred, process 2100 proceeds to 2124 and one or more alarms are activated. Process 2100 then ends at 2126.
Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. For example, one or more buttons, such as the button shown
This patent application claims priority to U.S. Provisional Patent Application No. 61/159,509, filed Mar. 12, 2009, entitled “Disposable Cable Lock with Detachable Alarm Module,” which is also hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
1964058 | Holtzman | Jun 1934 | A |
2870239 | Ustin | Jan 1959 | A |
2880489 | Burbank | Apr 1959 | A |
3116945 | Blomquist et al. | Jan 1964 | A |
3636547 | Brace et al. | Jan 1972 | A |
3929031 | Webb | Dec 1975 | A |
4061893 | Sanner | Dec 1977 | A |
4102022 | Aoki | Jul 1978 | A |
4400967 | Owens | Aug 1983 | A |
4515991 | Hutchison | May 1985 | A |
4733453 | Jacoby | Mar 1988 | A |
4751017 | Wachtler et al. | Jun 1988 | A |
4751350 | Eaton | Jun 1988 | A |
4786900 | Karasawa et al. | Nov 1988 | A |
4957017 | Corbett | Sep 1990 | A |
4979382 | Perry | Dec 1990 | A |
5195860 | Steyn | Mar 1993 | A |
5369970 | Voiculescu et al. | Dec 1994 | A |
5434552 | Ems | Jul 1995 | A |
5520031 | Davidge | May 1996 | A |
5541377 | Stuhlmacher | Jul 1996 | A |
5647620 | Kuenzel | Jul 1997 | A |
5664449 | Sedley | Sep 1997 | A |
5667091 | Slaber, Jr. et al. | Sep 1997 | A |
5689240 | Traxler | Nov 1997 | A |
5711558 | Woody | Jan 1998 | A |
5722266 | Yeager et al. | Mar 1998 | A |
5794464 | Yeager et al. | Aug 1998 | A |
5803692 | Postadan | Sep 1998 | A |
5842359 | Longueira | Dec 1998 | A |
5936530 | Meinhold | Aug 1999 | A |
5969613 | Yeager et al. | Oct 1999 | A |
6092401 | Sankey et al. | Jul 2000 | A |
6125669 | McDaid et al. | Oct 2000 | A |
6149455 | Levi | Nov 2000 | A |
6179646 | Horchler | Jan 2001 | B1 |
6189407 | Champ et al. | Feb 2001 | B1 |
6230526 | Fontes et al. | May 2001 | B1 |
6237375 | Wymer | May 2001 | B1 |
6298695 | Vezina et al. | Oct 2001 | B1 |
6308928 | Galant | Oct 2001 | B1 |
6388558 | Emmei | May 2002 | B1 |
6438802 | Beeman et al. | Aug 2002 | B1 |
6453795 | Eicher et al. | Sep 2002 | B1 |
6672269 | Bonde et al. | Jan 2004 | B1 |
6931265 | Reyes et al. | Aug 2005 | B2 |
6994370 | Sabol | Feb 2006 | B2 |
7053774 | Sedon et al. | May 2006 | B2 |
7098792 | Ahlf et al. | Aug 2006 | B1 |
7129841 | Feibelman | Oct 2006 | B2 |
7162899 | Fawcett et al. | Jan 2007 | B2 |
7168275 | Fawcett et al. | Jan 2007 | B2 |
7174752 | Galant | Feb 2007 | B2 |
7227467 | Feibelman | Jun 2007 | B2 |
7251966 | Fawcett et al. | Aug 2007 | B2 |
7272962 | Benda et al. | Sep 2007 | B2 |
7350381 | Fawcett et al. | Apr 2008 | B2 |
7385522 | Belden et al. | Jun 2008 | B2 |
7403118 | Belden, Jr. | Jul 2008 | B2 |
7446664 | White | Nov 2008 | B2 |
7479879 | Merrem et al. | Jan 2009 | B2 |
7481086 | Fawcett et al. | Jan 2009 | B2 |
7497100 | Fawcett et al. | Mar 2009 | B2 |
7497101 | Fawcett et al. | Mar 2009 | B2 |
7522048 | Belden, Jr. | Apr 2009 | B2 |
7543466 | Loughlin et al. | Jun 2009 | B2 |
7562422 | D'Addario et al. | Jul 2009 | B2 |
7659817 | Conti et al. | Feb 2010 | B2 |
7682100 | Duval | Mar 2010 | B2 |
7685850 | Nilsson | Mar 2010 | B2 |
7737846 | Belden et al. | Jun 2010 | B2 |
7808382 | Bonato | Oct 2010 | B2 |
7836734 | Lynch | Nov 2010 | B2 |
7918112 | Fawcett et al. | Apr 2011 | B2 |
7936267 | Pasma | May 2011 | B2 |
7969305 | Belden et al. | Jun 2011 | B2 |
7984629 | Xiaobin | Jul 2011 | B2 |
8002232 | Meislahn | Aug 2011 | B2 |
8087269 | Conti et al. | Jan 2012 | B2 |
8122744 | Conti et al. | Feb 2012 | B2 |
8281626 | Conti et al. | Oct 2012 | B2 |
20020089434 | Ghazarian | Jul 2002 | A1 |
20020134119 | Derman | Sep 2002 | A1 |
20030230870 | Sabol | Dec 2003 | A1 |
20040032333 | Hatt | Feb 2004 | A1 |
20050051978 | Sabol | Mar 2005 | A1 |
20050242959 | Watanabe | Nov 2005 | A1 |
20050264383 | Zhang | Dec 2005 | A1 |
20060123856 | Loughlin et al. | Jun 2006 | A1 |
20060137409 | Fawcett et al. | Jun 2006 | A1 |
20060137411 | Fawcett et al. | Jun 2006 | A1 |
20060145848 | Marsilio et al. | Jul 2006 | A1 |
20060169008 | Fawcett et al. | Aug 2006 | A1 |
20060170550 | Marsilio et al. | Aug 2006 | A1 |
20070039360 | Fawcett et al. | Feb 2007 | A1 |
20070080806 | Lax et al. | Apr 2007 | A1 |
20070101775 | Fawcett et al. | May 2007 | A1 |
20070107477 | Fawcett et al. | May 2007 | A1 |
20070120669 | Belden, Jr. | May 2007 | A1 |
20070146134 | Belden et al. | Jun 2007 | A1 |
20070152836 | Nagelski et al. | Jul 2007 | A1 |
20070159328 | Belden et al. | Jul 2007 | A1 |
20080034815 | Fawcett et al. | Feb 2008 | A1 |
20080061975 | Belden et al. | Mar 2008 | A1 |
20080076479 | Nagamine et al. | Mar 2008 | A1 |
20080169924 | Belden | Jul 2008 | A1 |
20080186550 | Meuwese et al. | Aug 2008 | A1 |
20080236209 | Conti et al. | Oct 2008 | A1 |
20080251623 | Goldstein et al. | Oct 2008 | A1 |
20080303670 | Seidel | Dec 2008 | A1 |
20080316028 | Conti et al. | Dec 2008 | A1 |
20090139615 | Ayada et al. | Jun 2009 | A1 |
20090158786 | Fawcett et al. | Jun 2009 | A1 |
20090223260 | Conti et al. | Sep 2009 | A1 |
20090267766 | Pasma | Oct 2009 | A1 |
20090288460 | Zhang et al. | Nov 2009 | A1 |
20090289798 | Yang | Nov 2009 | A1 |
20090320532 | Bonato | Dec 2009 | A1 |
20090323287 | Patterson | Dec 2009 | A1 |
20100090830 | Conti et al. | Apr 2010 | A1 |
20100139336 | Necchi | Jun 2010 | A1 |
20100171621 | Yang | Jul 2010 | A1 |
20110068906 | Shafer | Mar 2011 | A1 |
20110068921 | Shafer | Mar 2011 | A1 |
20110094274 | Conti et al. | Apr 2011 | A1 |
20110115632 | Yang | May 2011 | A1 |
20110154867 | Fawcett et al. | Jun 2011 | A1 |
20110199210 | McLean | Aug 2011 | A1 |
20110203327 | Fong | Aug 2011 | A1 |
20110227706 | Yang | Sep 2011 | A1 |
20110241879 | Fawcett et al. | Oct 2011 | A1 |
20110254661 | Fawcett et al. | Oct 2011 | A1 |
20110260594 | Yang | Oct 2011 | A1 |
20110283750 | Will | Nov 2011 | A1 |
20110283751 | Avganim | Nov 2011 | A1 |
20110283754 | Ezzo et al. | Nov 2011 | A1 |
20110308283 | Nilsson | Dec 2011 | A1 |
20120223838 | Conti et al. | Sep 2012 | A1 |
20120234055 | Bland et al. | Sep 2012 | A1 |
Number | Date | Country |
---|---|---|
WO 9840591 | Sep 1998 | WO |
WO 2006123152 | Nov 2006 | WO |
WO 2008057740 | May 2008 | WO |
Entry |
---|
International Search Report and Written Opinion for corresponding International Application No. PCT/US2010/027018 mailed Jul. 6, 2010. |
International Search Report and Written Opinion for International Application No. PCT/US2011/034532, mailed Sep. 29, 2011. |
Number | Date | Country | |
---|---|---|---|
20100231388 A1 | Sep 2010 | US |
Number | Date | Country | |
---|---|---|---|
61159509 | Mar 2009 | US |