The present application is generally related to an anti-theft tag, and more specifically, an anti-theft tag that attaches to wine bottles or other similar bottles. Also, the tag of the present application may be used with various electronic article surveillance (EAS) systems, including for example, an EAS system utilizing tags and deactivators featuring wireless communication for deactivation and alarming, such as RFID systems, and featuring dynamic time based passcode modification and other tamper resistant features, and/or an EAS system using passive element technology. In certain applications the mere presence of the tag may be deemed to be sufficient deterrence from theft and in those applications the anti-theft tag may actually not have any EAS electronics.
Theft is a major concern for retail operations. While electronic article surveillance (EAS) systems are in wide use, it is still necessary to adapt the individual monitoring elements, or tags, to specific variations of protected products, including bottled products. Wine, for example, is a bottled product that can easily be valuable enough to justify the use of EAS technology to prevent theft. Embodiments of the present invention are capable of attaching to wine bottles and other bottles of similar shape and configuration.
The present invention is for an antitheft electronic article surveillance tag having a first and second component hingably attached to each other. The two hinged components can move from the many open positions of an open state to the closed position of a closed state. When in the closed position the two components combine to form a passageway which can close around the neck of a wine bottle, or similar bottle. The first component has a housing and a first latching component. The second component has a second latching component. When the first and second components are in the closed position, and the first and second latching components are engaged, the latching components keep the first and second components in the closed position. The latching components are releasable so that the anti-theft tag may be removed from an object by an authorized person. The housing may also contain a blocking component to lock the latching components in position to prevent them from being disengaged without authorization. This blocking component is releasable as well.
In some embodiments, the second component will have a hoop at one end. In those embodiments, the top of a bottle is inserted through the hoop before the first and second components are rotated to the closed position and latched in the closed position. This hoop provides an additional resistance to forced removal of the second component from the first component. If an attempt is made to pry the second component from the first component, the hoop will press against the bottle and make this more difficult. Additionally, as will be described later, the first component has switches which have their state changed by a bottle when the tag is installed on a bottle. If the second component is forced away from the first component, the hoop will pull the bottle along with it, moving the bottle away from the switches, allowing the state of the switches to change. In some embodiments of the tag, the second component will be closed at the end opposite the hoop.
The housing contains an internal compartment which holds several electronic components. Among the electronics components are arming switches. One arming switch is associated with a spring biased yoke that extends from the housing of the first component into the passageway. As the two components are rotated to the closed position about a bottle, the bottle depresses the yoke into the housing and changes the state of its associated switch. Another arming switch is associated with a spring biased lever that extends from the housing into the passageway, as the two components are rotated to the closed position about a bottle, the bottle moves the lever about its pivot and the lever changes the state of its associated switch. Another switch is associated with the first latching component of the first component. When the first latching component is moved to the latched position, the associated switch has its state changed. When either or both of the yoke and lever are depressed by a bottle and the first latching component is moved to the latched position, the tag is armed. If the state of the switches associated with the yoke and, or, lever change without the electronics of the tag being disarmed by an external device or by the latch being properly disengaged, the tag will alarm.
Among the other electronics which may be contained in the electronics compartment of the housing of the anti-theft tag are: a microprocessor, a circuit board, a battery, a passive EAS element, an audible alarm producing device, light emitting diodes, and communication elements including wireless communication elements such as radio frequency (RFID), optical (infrared), or other communication elements. The microprocessor or circuit board can detect when the switches undergo a changes in state. If an appropriate combination of switch states occurs, the tag may be armed. In some embodiments, the order in which the switches change state will also determine whether a tag arms. For example, it may be required that at least one of the switches associated with the yoke and lever change state before the latch switch. This would indicate that a bottle has been enclosed before the latch was engaged.
In some embodiments, the latch switch detects when the latch has been engaged and that, in combination with at least one other switch, is sufficient to arm the electronics. In other embodiments, the EAS tag may be armed using an external device that communicates with the tag via the communication elements which may be wireless optical communication elements (such as infrared), wireless radio frequency communication elements (such as RFID), or other communication elements. The external device can be a hand held remote communication device or a device associated with a base station.
Once armed, if the electronics detect an unauthorized change in status, the electronics can determine an alarm condition and issue an alarm. For example, if a tag is removed from a protected bottle, and the bottle neck is removed from the passageway, the status of the one of the switches associated with the yoke or lever will change. If an authorization signal is not previously received by the tag, the electronics will determine an alarm condition and issue an alarm. This alarm may be an audible alarm or an alarm broadcast to a respective receiver in an electronic article surveillance anti-theft system. The broadcast may be by infrared communications, radio frequency communications (RFID), or other wireless type communications.
Disarming of the EAS tag may be accomplished by authorized personnel. An authorized person having access to other elements of the EAS system such as a hand held communication device or a base station having communication capabilities may disarm the device. Some embodiments will add another element of security with passcode capabilities in the respective electronics. The EAS tag electronics of these embodiments are capable of storing a passcode which is known to the communication elements of the EAS system and which can be used to confirm to the EAS tag that the disarming signal is authorized. A further element of security can be added by using clock based algorithms to change the passcode synchronously. In those embodiments, the EAS system and the EAS tag both have clock generators and are programmed with the same algorithm and both are programmed with the same initial passcode. As time passes, the algorithm alters the passcode at preset intervals as regulated by the clock generators. This changing passcode further complicates unauthorized attempts to disarm the EAS tag. If an EAS tag is detached without being disarmed with the appropriate passcode, the EAS tag will detect an alarm condition and generate an alarm.
To physically prevent the release of the engaging of the first latching and the second latching component and the movement of the first component and the second component from the closed position, a blocking component or mechanism may be employed. In one embodiment, a biased blocking member moves into a blocking position when the first and second latching components engage. The biased blocking member has a magnetically attractable element associated with it, and when a magnet is applied to the EAS tag, the biased blocking member moves to a position where it no longer blocks the release of the latching components. If a magnet is used to detach an EAS tag without authorization and the EAS tag is still armed, the electronics detect an alarm condition and generate an alarm. In some embodiments a magnet may be built into a communication device so that the EAS tag may be disarmed and its latch released for detachment using the same device.
Additional utility and features of the invention will become more fully apparent to those skilled in the art by reference to the following drawings, which illustrate some of the primary features of preferred embodiments.
Neck 502 is of a size that anti-theft tag 10 can accommodate. The annular feature may take several forms. The annular feature may be: an increase in diameter of neck 502 which starts proximal to the end of bottle 500 and continues to the end; an increase in diameter of neck 502 which starts proximal to the end of bottle 500 and returns to the nominal diameter of neck 502 before the end, i.e. a raised ring; or, a recessed ring proximal to the end of neck 502 of bottle 500. In
Hinge 40 connects first component 20 and second component 30. Hinge 40 is formed of first hinge component 41, second hinge components 42, and hinge pin 43. First hinge component 41 is actually part of first component 20 and second hinge components 42 are actually parts of second component 30. Hinge pin 43 passes through both first hinge component 41 and second hinge components 42 to hold the two parts together and allow the hinging motion.
In addition to cylindrical shell 31, second component 30 has latch receiver panel 38 along the edge of rectangular aperture 37 opposite to second hinge components 42. Latch receiver panel 38 has latch receiver apertures 39 which receive hooks 51 of latch 50 when first component 20 and second component 30 are in the closed position. Latch button 52 is used to move latch 50 back and forth. Hooks 51 engage the edges of latch receiver panel 38 around latch receiver apertures 39 when first component 20 and second component 30 are in the close position and latch 50 us moved to the latched position. Hooks 51 extend out of hook apertures 25 of first component 20 and latch button 52 is accessible through latch button aperture 24.
Closing surface 22 on first component 20 faces second component 30 and closes over rectangular aperture 37 in second component 30 when first component 20 and second component 30 are in the closed position. Lever 65 extends from lever aperture 23 in closing surface 22 of first component 20 and yoke 80 extends from yoke aperture 26 in closing surface 22 of first component 20. Lever 65 and yoke 80 are moved when a bottle is place in second component 30 and first component 20 and second component 30 are rotated to the closed position. As will be discussed below, depending on the embodiment of tag 10, lever 65 or yoke 80 or both may have an arming switch in the electronics package of first component 20 associated with them. When a switch is associated with them, lever 65 and yoke 80 changed the state of the switch when a bottle is enclosed by tag 10.
In
When tag 10 is closed around a bottle, the bottle moves lever 65 which changes the state of lever switch 72 and yoke 80 is moved which changes the state of yoke switch 69. When latch 50 is moved to the latched position, latch 50 changes the state of latch switch 73. In some embodiments of tag 10, the combined states of these switches will be enough for the electronics to arm. In other embodiments, communication from an external device may finalize the arming of the electronics.
Communication between anti-theft tag 10 and the external device may be by optical, infrared communication via infrared communication port 75, other wireless communication such as with radio frequency circuitry 78, or other known methods of communication. Once anti-theft tag 10 is armed, if it is removed from the protected bottle without prior disarming communication, the electronics of anti-theft tag 10 will determine an alarm condition and issue an alarm. The alarm may be an audible alarm generated by audible alarm generator 74. The alarm may also be a broadcast alarm broadcast by the communication elements of the electronics of tag 10 to respective receivers in other components of the broader electronic article surveillance system. The broadcast alarm may be broadcast by wireless communications such as infrared communication and radio frequency communication, or other type of communication. Receivers in the broader electronic article surveillance system such as those in base stations, hand held devices, etc. receive the broadcast alarm and can communicate to personnel with screen displays, audible alarms, etc. that an alarm condition has been determined in a tag and to take appropriate action.
Returning to
In
Circuit board 70 and microprocessor 71 are capable of storing machine readable instructions and are programmable to monitor the status of EAS tag 10 and to communicate with remote programmers and other elements of an EAS system. Circuit board 70 and microprocessor 71 may be reprogrammed via communication with hand held remotes, or other elements of an EAS system when communicating with these devices. In the embodiment shown in
Audible alarm generator 74 is capable of generating an audible alarm when EAS tag 10 is tampered with, for example, in an attempted unauthorized removal of EAS tag 10, bottle 500 may lose contact with lever 65 and yoke 80, changing the states of their associated switches, lever switch 72 and yoke switch 69, respectively. The change in status of arming either switch is detected by circuit board 70 and microprocessor 71 which can determine an alarm status for EAS tag 10 and generate an alarm signal. Audible alarm generator 74 may also be used to indicate the status of EAS tag 10 as it is installed. For example, when first component 20 and second component 30 are rotated to the closed position with bottle 500 in position, bottle 500 contacts lever 65 and yoke 80, which changes the state of the associated switches. When latch 50 is moved to the closed position, the state of latch switch 73 is changed. Audible alarm generator 74 can produce a sound indicating that EAS tag 10 is installed. If the electronics of tag 10 are so programmed that those conditions are sufficient to arm tag 10, the sound indicates that tag 10 is installed and armed. If the electronics are so programmed that communication from an external device is to finally arm tag 10, the sound indicates that tag 10 is ready to be armed by another device such as a handheld remote. Similarly, LED 76 can be used to provide visual cues for the status of EAS tag 10. Battery 77 generally provides power for the electronic components of EAS tag 10, such as audible alarm generator 74, microprocessor 71, LED 76, etc.
Some embodiments of EAS tag 10 may have an motion detection chip 79 in its electronic package. Motion detection chip 79 detects when the object being protected, bottle 500, is being moved. When motion detection chip 79 detects motion, it signals microprocessor 71 which may be programmed to take specific actions. These actions may include sending query signals out to the broader EAS system, checking for specific field signals from the broader EAS system, as well as other actions. Depending on what it determines upon receiving the signal from motion detection chip 79, microprocessor 71 may determine an alarm condition and generate an alarm.
EAS tag 10 may also carry a passive element compatible with prior art EAS systems. These EAS systems generate what is called an interrogation field at a given frequency. These interrogation fields will build up a small amount of stored energy on passive EAS elements brought into the zone. When the interrogation field is turned off and the EAS system listens for a response, the passive EAS elements dissipate their energy and generate a signal at a designed frequency. The EAS system is capable of detecting the signal as an indication of the unauthorized presence of the passive elements and can generate an alarm based on the signal. In some embodiments, circuit board 70 and microprocessor 71 can monitor the status of the passive element and issue an alarm as well. If microprocessor 71 or circuit board 70 detect energy storage and dissipation activity in the passive element, then audible alarm generator 74 may be instructed to generate an alarm or the communication capabilities of the electronics may be employed to broadcast a signal to respective receivers in the broader EAS system to generate an alarm. Any passive element known in the art could be used.
The electronics of some embodiments of EAS tag 10 may have passcode protection. These embodiments are capable of storing a passcode which is required to be matched by remote devices and detachers for various communications to be verified as authorized. For further protection the electronics of some embodiments of EAS tag 10 may include a clock generator and the electronics may have machine readable instructions with an algorithm to change the passcode at preprogrammed time intervals. The EAS system, including handheld remotes, also has at least one clock generator and is capable of updating the passcode at the preset intervals to update the system's record of the passcode. This keeps the passcode between EAS tag 10 and the rest of the EAS system synchronized.
It is to be understood that the embodiments and claims are not limited in application to the details of construction and arrangement of the components set forth in the description and illustrated in the drawings. Rather, the description and the drawings provide examples of the embodiments envisioned, but the claims are not limited to any particular embodiment or a preferred embodiment disclosed and/or identified in the specification. The drawing figures are for illustrative purposes only, and merely provide practical examples of the invention disclosed herein. Therefore, the drawing figures should not be viewed as restricting the scope of the claims to what is depicted.
The embodiments and claims disclosed herein are further capable of other embodiments and of being practiced and carried out in various ways, including various combinations and sub-combinations of the features described above but that may not have been explicitly disclosed in specific combinations and sub-combinations. Accordingly, those skilled in the art will appreciate that the conception upon which the embodiments and claims are based may be readily utilized as a basis for the design of other structures, methods, and systems. In addition, it is to be understood that the phraseology and terminology employed herein are for the purposes of description and should not be regarded as limiting the claims.
This application claims priority to U.S. Provisional Application 61/907,063 filed on Nov. 21, 2013. The entirety of U.S. Provisional Application 61/907,063 including both the figures and specification are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
2093688 | Smith | Sep 1937 | A |
6822567 | Durbin | Nov 2004 | B2 |
7134302 | Gorst | Nov 2006 | B2 |
7259674 | Marsilio et al. | Aug 2007 | B2 |
7266979 | Belden, Jr. | Sep 2007 | B2 |
7397375 | Marsilio et al. | Jul 2008 | B2 |
7486190 | Marsilio et al. | Feb 2009 | B2 |
7492263 | Marsilio et al. | Feb 2009 | B2 |
7492264 | Marsilio et al. | Feb 2009 | B2 |
7492265 | Marsilio et al. | Feb 2009 | B2 |
7498944 | Marsilio et al. | Mar 2009 | B2 |
7498945 | Marsilio et al. | Mar 2009 | B2 |
7570161 | Necchi | Aug 2009 | B2 |
7602297 | Marsilio et al. | Oct 2009 | B2 |
7866497 | Belden, Jr. | Jan 2011 | B2 |
8152009 | Hulin | Apr 2012 | B2 |
8269631 | Yang | Sep 2012 | B2 |
8368537 | Zhang et al. | Feb 2013 | B2 |
8421633 | Yang | Apr 2013 | B2 |
8482414 | Leyden et al. | Jul 2013 | B2 |
8665095 | Yang | Mar 2014 | B2 |
20050237205 | Gorst | Oct 2005 | A1 |
20100253524 | Kolton | Oct 2010 | A1 |
20110140894 | Sayegh | Jun 2011 | A1 |
20120151974 | Zhang et al. | Jun 2012 | A1 |
20120152883 | Zhang et al. | Jun 2012 | A1 |
20130321153 | Yang | Dec 2013 | A1 |
Number | Date | Country | |
---|---|---|---|
20150137977 A1 | May 2015 | US |
Number | Date | Country | |
---|---|---|---|
61907063 | Nov 2013 | US |