The present application is generally related to an electronic article surveillance (EAS) tag, and more specifically, an EAS tag that can be attached to irregularly shaped objects. Also, the tag of the present application may used with various electronic article surveillance (EAS) systems, including for example, an EAS system utilizing tags and deactivators featuring infrared communication for deactivation and alarming, and featuring dynamic time-based passcode modification, and other tamper resistant features.
A. Description of the State of the Art
Electronic article surveillance systems have been used for many years as a means of deterring retail shoplifting in clothing stores, electronic stores, and a myriad of other retail establishments. Generally speaking, an EAS system will begin with a tag, consisting of a durable and reliable, yet small, sensor tag which is affixed to the article to be detected in such a way that it cannot be easily removed by a customer in the store. Usually, the system depends upon the feature that the attachment mechanism is constructed such that it can only be removed by the use of a specialized tool which is only in the possession of the store personnel at the checkout register or exit port for the establishment. In the event that an EAS tag is not removed from a protected article prior to exiting the store, an alarm or other signal is activated.
In many commercially available EAS systems, one or more antennas are placed at the exits and entrances to the retail location. These antennas set up zones, sometimes referred to as interrogation zones, in which an EAS tag (or marker) may be sensed. At least one antenna serves the function of sending out what is called an interrogation signal. The markers on the merchandise are affected by this signal and will respond with a signal of their own. Either the same antenna that sends out the interrogation signal or other additional antennas can sense the signals from the markers. The most effective way to do this is by stopping the broadcast of the interrogation signal to listen for the signals emanating from the markers. If a marker is sensed within the zone created by the antennas, it is presumed that an article is being removed without purchase, and alarms are set off. These alarms may be audible alarms for general broadcast or the alarms may be silent alarms in the form of a light at a check-out counter or security station, etc.
In order to make an EAS system effective, one must consider how to make the EAS tags tamper resistant. This is an on-going effort, because over time, thieves become more clever in learning how to tamper with an EAS tag to defeat it. The retailer (and the tag manufacturer) must consider how to detect and prevent tampering with the tags. The particular construction of a tag will determine how tampering is detected.
An assortment of attachment mechanisms are available in the prior art. One of the more common and more successful attachment mechanisms is an EAS hard tag, consisting of a tack which is used to physically pin the protected article to the EAS tag base. The tag base is usually constructed of a hard and durable plastic and is generally in the neighborhood of three inches long. The tag serves as a housing for an electronic signal generation means secured within the housing, and which is designed to be immune to tampering. A cap on the tack keeps the tag attached to the article.
Another common and successful method of attaching tags, or transponders, is a lanyard. One end of the lanyard is fixed in the transponder and the other end is capable of being inserted into an aperture in the transponder where it can be retained by the transponder. The lanyard can pass through an aperture on the article to be protected or may be placed around an article in a position where it cannot be simply slid off the article. The lanyard is typically constructed of material that is very difficult to break or cut, but yet, is easy to bend into place.
A common device for releasably retaining both tack shafts and lanyard ends is a ball clutch mechanism. The ball clutch mechanism may be constructed to release the retained item after application of a strong magnetic force. Other clips and clamps may also be used. Other types of tags may employ vials of ink, which may break if the tag is physically bent, thereby destroying the benefit of the theft attempt.
B. The Need for Improvement
While tack and lanyard tags are effective and successful in certain applications, there continues to be a need for tags that can be attached to irregularly shaped objects. Tack attached tags are limited to being attached to objects that can be pierced with a tag without damage. Lanyard tags are limited to objects that provide a good location to employ the lanyard and are generally of a fixed length. The class of objects not amenable to tack or lanyard tags of fixed length is substantial. The EAS tag or device of the present application can be used with objects having irregular shapes while still employing locking technology available in conventional systems. Also the EAS tag of the present application can be made to be compatible with various EAS systems and other antitheft systems.
Although EAS systems have been used effectively for many years, the retail landscape has been challenged by thieves that are becoming ever more sophisticated. For example, a sophisticated thief may learn how to defeat a ball clutch mechanism, or other releasable one-way clutch, by carrying into a store a magnet similar to the magnet used to remove the tags at the check-out counter. To prevent theft by using an unauthorized magnet, various techniques and systems have been developed. The tag of the present application is adaptable to incorporate these techniques and to work in these systems.
For example, a sophisticated thief can use devices designed to determine the algorithm of the deactivation devices or tags in order to jam the operation of the tag. A sophisticated thief may have a means for determining passcodes for the system by espionage or by breaching electronic security codes. Furthermore, a large amount of theft (or shrinkage) results from an “inside job” by dishonest employees, who may have access to passcodes and the like. Therefore, EAS systems that are dynamic such that key passcode coding and the like may be quickly or even randomly changed have been developed. Thus, a need has been demonstrated for an EAS tag that can attach to irregularly shaped objects and also accommodate sophisticated EAS systems.
This application generally discloses an electronic article surveillance tag, or marker, capable of attaching to irregularly shaped objects. The tag employs a retention cable capable of passing around the irregularly shaped objects and a releasable one-way clutch to keep the retention cable tight about the object. The retention cable passes through the releasable one-way clutch. In some embodiments a releasable blocking mechanism prevents the release of the one-way clutch. In some embodiments, the retention cable is infinitely adjustable from its full extension to its tightest retraction, while in other embodiments, the retention cable may be adjusted in discrete increments within that range.
At least one embodiment of the tag may be employed with a system utilizing infrared technology to protect retail merchandise. The system utilizes infrared technology to communicate between central elements of the system and individual tags. The system can employ passcodes to securely authorize detachment of the tags and, in some embodiments, the system utilizes infrared technology to affect a system in which time-based passcode coding may be easily changed to create greater security and less vulnerability for the system to be compromised. The tag is capable of carrying the electronics necessary to operate in such a system.
In one embodiment, an electronic article surveillance system comprises at least one tag. Each tag comprises an accurate clock generator, a microprocessor, infrared communication capabilities, and machine readable instructions encoded for performing an algorithm for generating multiple passcodes. At a specified time, each active tag possesses a passcode. In at least one embodiment, all of the tags in a given location or vicinity have the same changeable passcode at any given time. The EAS system is further characterized by at least one base station, each base station comprising an accurate clock generator, a processor, machine readable instructions encoded for performing an algorithm generating multiple passcodes. The base station further includes infrared communication capabilities with an infrared communication path between each tag and each base station, the path enabling interchange of information between each tag and each base station. Each tag replaces the passcode at a specified interval, or at a specified point in time.
In another embodiment, an electronic article surveillance system comprises: at least one tag, each tag comprising an accurate clock generator, a microprocessor, infrared communication means, and machine readable instructions encoded for performing an algorithm for generating multiple passcodes, and wherein at a specific time, each active tag possesses a passcode; at least one base station, each base station comprising an accurate clock generator, a processor, and machine readable instructions encoded for performing an algorithm for generating multiple passcodes; at least one remote for remotely detecting information and programming additional information; an infrared communication path between each tag, each base station and each remote, the path enabling interchange of information between each tag and each base station; wherein each tag replaces the passcode at a specified time.
In other embodiments, the EAS tags and other elements of the system may use radio frequency communication to transmit information between them. The EAS tags of those embodiments are capable of containing the necessary electronic components to communicate with radio frequency communications. As with embodiments discussed above the information may include security passcodes, alarms, etc.
A person of ordinary skill in the art would understand how to incorporate the improvements described herein into a conventional EAS system.
Additional utility and features of the invention will become more fully apparent to those skilled in the art by reference to the following drawings, which illustrate some of the primary features of preferred embodiments.
Referring now to
In EAS systems, each tag 12 is generally capable of generating a signal 130 detectable by an interrogation unit. While many commercially available EAS systems operate on a frequency of 58 kHz, other arrangements are also possible, and the present invention is not limited to any particular frequency. This signal may be generated by any of the known methods, such as by means of a resonator or a ferrite coil located in the tag or transponder, typical of conventional electronic article surveillance markers.
In the system shown by
Each base station 14 may comprise an accurate clock generator 142, microprocessor 144, algorithm 146 for passcode generation, tag erase function 148, USB port for function configuration 150, and the capability to communicate via infrared communication path 120. In some systems, base station 14 can run software capable of performing database functions for tracking tag passcodes, operating a detacher and configuring tags 12 and remotes 16, and can generally operate at the level of a typical PC running a specialized application.
Each remote 16 comprises an accurate clock generator 162, microprocessor 164, and algorithm 166 for passcode generation.
In addition to infrared communication between the tags and the base station 14 and remote station(s) 16, it is important that the system facilitates communication between the tags 10 and a detacher unit 34. This is shown more fully in
In some systems, the IR communication means 120 provides communication between each tag 12 and each base station 14, remote 16, and detacher 34 respectively. Communication means 120 enables the base station 14 or remote 16 or detacher 34 to read information from and communicate and/or write information to each tag 12. The path 120 enables each tag 12, base station 14, remote 16 and detacher 34 to effectively communicate concerning the accurate clock generator 122 and its cooperative relationship with the passcode 128 and algorithm 126 generating the passcode 128. In this manner, the path 120 facilitates the exchange of information important in activating, resetting or deactivating each tag 12.
In some systems, the accurate clock generator 122 of tag 12 operates in synchronicity with one or all of the accurate clock generators 142 (associated with base station 14) and 144 (associated with remote 16), respectively. The generators 122, 142 and/or 162 cooperatively synchronize so that each component is accurately detecting the same clock time. In the event that the detacher has its own accurate clock generator separate from the base station, the synchronization feature will apply to that clock as well. The passcode 128 of each tag 12 is periodically altered or changed by the algorithm 126 in accordance with a determined interval of time (e.g. 30 minute intervals). Thus, each tag 12 may be programmed so that the algorithm 126 alters or changes the passcode 128 every 30 minutes, for example, thereby minimizing the opportunities for theft of an article through passcode manipulation or by-pass. As such, the accurate clock generators 122, 142, 162 and any detacher clock generator enable the base station 14, remote 16 and detacher 34 to detect the passcode 128 of each tag 12, and if necessary or desired, alter or change the passcode 128 or completely erase the passcode at the point of interaction, temporarily disabling the tag 12.
Depending on the system, each base station 14 may provide at least two desirable functions. First, the base station 14 may permit resetting of the tag 12 parameters existing at the moment, including parameters previously input for the accurate clock generator, microprocessor, and passcode. The passcode may be altered or changed to a passcode or series of codes assigned by the store or business utilizing the system. Secondly, the base station 14 may be utilized to confirm tag parameters, such as status or passcode/code(s).
Referring to
The alarm 132 on board tag 12 may be independent of the alarm generated in response to tag 12 detection by the regular EAS antenna system within the respective interrogation zone. The sensitivity of the alarm 132 may be adjustable or preset, depending upon preference, so that attempted removal of the tag 12 from an article, or a separation of one or more of the components of the tag 12, actuates the alarm 132 at the point of tampering. Alternatively, the sensitivity may be adjustable or preset, depending upon preference, so that actual removal of the tag 12, or separation of one or more of the components of the tag 12, actuates the alarm 132 at the point of tampering. Under either circumstance or condition, if sufficient tampering or successful removal of the tag 12 is achieved, the alarm 132 may generate an alarm signal detectable by security personnel or assigned personnel. Various embodiments of tags of the present invention are programmable to incorporate the specific functions employed and required by various systems through infrared and radio communications.
Referring now to
Referring to
Many active EAS tags have the ability to produce an audible alarm. In the embodiment of EAS tag for irregular objects 400 shown in
In addition to the active elements of EAS tag for irregular objects 400 shown in
With respect to retention aspects of EAS tag for irregular objects 400, mechanical housing 410 with retention cable 401 and looping anchor 405 may be seen removed from retention half 407 of shell 423. Channel 411 in looping anchor 405 may be seen. To assemble the embodiment of EAS tag for irregular objects 400 shown in
Referring now to
Because anti-tamper switch 437 is in an exposed position, it is desirable that the tag not be set accidentally by any random contact with the tag and anti-tamper switch 437. Activation switch 438 provides an arming step for applying the tag to an object. Activation switch 438 protrudes through retention half 407 of shell 423 into a recessed area (not visible in the figures). This recess may be located in contact surface 439, and in that case means that activation switch 438 is not contacted by the object to which EAS tag for irregular objects 400 is attached, but is covered by the object. In one embodiment of EAS tag for irregular objects 400, the electronics are programmed to start a predetermined time interval when activation switch 438 is pressed. During this time interval, EAS tag for irregular objects 400 must be attached to an object and anti-tamper switch 437 depressed for EAS tag for irregular objects 400 to become armed. After EAS tag for irregular objects 400 is attached to an object, anti-tamper switch 437 is depressed, and the electronics armed. If EAS tag for irregular objects 400 is tampered with in such a way that anti-tamper switch 437 is released, then EAS tag for irregular objects 400 will determine an alarm condition. In some embodiments, EAS tag for irregular objects 400 will sound an audible alarm, and may, in some embodiments, flash light emitting diode 432. Other embodiments, may send a signal via the onboard communication elements of the electronics to the EAS system to create a system alarm. These signals may be via infrared light or radio frequency communications.
Referring now to both
Referring now to
Within nesting half 415 of mechanical housing 410, a releasable ball clutch mechanism can be seen which locks retention cable 401 against attempts to relax retention cable 401. Ball clutch 417 is comprised of clutch housing 418, cup 419 with tapered profile, spindle 420, balls 421, and clutch spring 422. Retention cable 401 passes through an aperture in cup 419 and through the center of spindle 420, clutch spring 422 and clutch housing 418. Spindle 420 carries balls 421 and nests into cup 419 with tapering profile. As may more clearly be seen in
Referring to
Release rocker 456 has at one end, follower arm 457, at the other end, lift prongs 458, and in the center, pivot aperture 459. Release rocker 456 is mounted by pivot aperture 459 on pivot 461 which has its ends inserted into pivot apertures 462 in nesting half 415 and cover plate half 416 of mechanical housing 410. Follower arm 457 of release rocker 456 fits between cam pins 454 on release driver 452. Cam pins 454 on release driver 452 fit on both sides of follower arm 457 of release rocker 456 and can therefore move release rocker 456 in both directions as release driver 452 moves up and down. Lift prongs 458 of release rocker 456 engage spindle 420 of ball clutch 417 under rim 424. As release button 451 is pressed, release driver 452 transfers the motion into follower arm 457. This causes follower arm 457 to also move downward and lift prongs 458 on the opposing end of release rocker 456 to move upward. This lifts spindle 420 in ball clutch 417. As spindle 420 is lifted from cup 419, balls 421 are moved to a position within cup 419 where there is space between retention cable 401, clutch balls 421, and cup 419, removing the wedging effect created between those elements.
To prevent the unauthorized release of retention cable 401, blocking pin 463 protrudes through locking pin aperture 464 and blocking pin 463 protrudes below one of shoulders 453 on release driver 452. Blocking spring 465 biases blocking pin 463 into an extended position where it keeps release driver 452 from being moved downward to release ball clutch 417. At least some part of blocking pin 463 is magnetically attractable and the application of a magnet to nesting half 415 of mechanical housing 410 over blocking pin 463 will retract blocking pin 463 from its locking position under one of shoulders 453 on release driver 452. This will allow the depression of release button 451 to actuate the release of ball clutch 417 and allow retention cable 401 to be pulled to a relaxed position.
As an example of use of EAS tag for irregular objects 400, an application of EAS tag for irregular objects 400 with respect to a fishing pole will be described. While generally cylindrical, handles for fishing poles may have a somewhat irregular contour. This creates challenges for EAS tags designed to affix to a smooth and predictable contour. To arm and attach EAS tag for irregular objects 400 to a fishing pole, a magnet may be used to withdraw blocking pin 463 from beneath shoulder 453 of release driver 452, so that ball clutch 417 may be released and retention cable 401 may be adjusted out to a sufficiently relaxed and accommodating length. Then activation switch 438 may be pressed, so that a predetermined time period starts, and EAS tag for irregular objects 400 may be put into place against the handle of a fishing pole, depressing anti-tamper switch 437 within that predetermined time period. Once EAS tag for irregular objects 400 is in place and anti-tamper switch 437 is depressed, retention cable 401 can be adjusted to a snug fit by pulling on pull knob 404 on adjustable end 403 of retention cable 401. Retention cable 401 adjusts through looping anchor 405 so that both retention loops 413 are pulled down onto the handle and ball clutch 417 maintains retention cable 401 in the tightened state. Now EAS tag for irregular objects 400 is attached to the fishing pole handle and is armed.
Some embodiments of EAS tag for irregular objects 400 require an authorized user to use a detacher specifically made to release EAS tag for irregular objects 400 from an object being protected. Referring back to
While the above example discussed a fishing pole, EAS tag for irregular objects 400 can be attached to other irregular objects. Any object that provides a contour about which retention cable 401 could be placed and tightened while keeping anti-tamper switch 437 depressed, can be protected by EAS tag for irregular objects 400. Other items include baseball bats, golf clubs, tools, etc.
In other embodiments of EAS tag for irregular objects 400, shell 423 may contain breakable ink vials. If EAS tag for irregular objects 400 is tampered with and shell 423 sufficient strained, the breakable ink vials will be broken, spilling ink onto the object being protected, and giving visual indication of the tampering. Shell 423 provides several spaces for location of the ink vials.
Although specific embodiments of the invention have been described with specificity, the embodiments described should no be considered exhaustive of the possible embodiments of the invention and should not be held as limiting the scope and range of the claims. Similarly the drawings are not exhaustive depictions of embodiments of the invention and the abstract is intended to allow a person to quickly gain the general field of the invention and should not be taken as limiting the scope of the claims.
This application claims priority to U.S. Provisional Application 61/185,787 filed on Jun. 10, 2009. The entire disclosures contained in U.S. Provisional Application 61/185,787, including the attachments thereto, are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5524463 | Schenkel et al. | Jun 1996 | A |
5535606 | Nguyen et al. | Jul 1996 | A |
6052876 | Hogan et al. | Apr 2000 | A |
6853304 | Reisman et al. | Feb 2005 | B2 |
6958698 | Maloney | Oct 2005 | B2 |
7129841 | Feibelman | Oct 2006 | B2 |
7388484 | Hsu | Jun 2008 | B2 |
7474209 | Marsilio et al. | Jan 2009 | B2 |
7724146 | Nguyen et al. | May 2010 | B2 |
7916020 | Seidel | Mar 2011 | B2 |
8044806 | Sayegh | Oct 2011 | B2 |
8144014 | Yang | Mar 2012 | B1 |
8269632 | Hesch et al. | Sep 2012 | B2 |
20050093704 | Feibelman | May 2005 | A1 |
20090224918 | Copeland | Sep 2009 | A1 |
20100315239 | Yang | Dec 2010 | A1 |
20110115632 | Yang | May 2011 | A1 |
20110260594 | Yang | Oct 2011 | A1 |
Number | Date | Country | |
---|---|---|---|
20100315237 A1 | Dec 2010 | US |
Number | Date | Country | |
---|---|---|---|
61185787 | Jun 2009 | US |