The present application is generally related to electronic article surveillance (EAS) tags that are attached to objects to be monitored. More specifically, the present application relates to EAS tags attachable by a shackle to items to be monitored. Also, the tags of the present application may be used with various electronic article surveillance (EAS) systems. These EAS systems may use interrogation zones and passive tag elements as well as utilizing tags and deactivators featuring wireless communication for deactivation and alarming, and featuring dynamic time-based passcode modification, and other tamper resistant features. The wireless communication may be radio frequency communication or optical communication, such as infrared.
Electronic article surveillance systems have been used for many years as a means of deterring retail shoplifting in clothing stores, electronic stores, and a myriad of other retail establishments. Generally speaking, an EAS system will begin with a tag, consisting of a durable and reliable, yet small, sensor tag which is affixed to the article to be detected in such a way that it cannot be easily removed by a customer in the store. Usually, the system depends upon the feature that the attachment mechanism is constructed such that it can only be removed by the use of a specialized tool which is only in the possession of the authorized store personnel at the checkout register or exit port for the establishment. In the event that an EAS tag is not removed from a protected article prior to exiting the store, an alarm or other signal is activated.
In many commercially available EAS systems, one or more antennas are placed at the exits and entrances to the retail location. These antennas set up zones, sometimes referred to as interrogation zones, in which an EAS tag (or marker) may be sensed. At least one antenna serves the function of sending out what is called an interrogation signal. The markers on the merchandise are affected by this signal and will respond with a signal of their own. Either the same antenna that sends out the interrogation signal or other additional antennas can sense the signals from the markers. The most effective way to do this is by stopping the broadcast of the interrogation signal to listen for the signals emanating from the markers. If a marker is sensed within the zone created by the antennas, it is presumed that an article is being removed without purchase, and alarms are set off. These alarms may be audible alarms for general broadcast or the alarms may be silent alarms in the form of a light at a check-out counter or security station, etc. Additionally, some EAS tags have onboard audible alarm generators and can generate audible alarms by themselves. These tags may produce this audible alarm when onboard logic elements determine that the tag is being removed from the store, or when the larger EAS system communicates to the tag to alarm. The onboard logic elements and the larger EAS system may also cause the tag to cease to alarm under certain situations.
An assortment of attachment mechanisms are available in the prior art. One of the more common and more successful attachment mechanisms is an EAS tag consisting of a tack which is used to physically pin the protected article to the EAS tag base. The tag base is usually constructed of a hard and durable plastic and is generally in the neighborhood of three inches long. The tag serves as a housing for an electronic signal generation means secured within the housing. The housing is designed to be resistant to tampering. A cap on the tack keeps the tag attached to the article.
Another common and successful method of attaching tags, or transponders, is a lanyard. One end of the lanyard is fixed in the transponder and the other end is capable of being inserted into an aperture in the transponder where it can be retained by the transponder. The lanyard can pass through an aperture on the article to be protected or may be placed around an article in a position where it cannot be simply slid off the article. The lanyard is typically constructed of material that is very difficult to break or cut, but yet, is easy to bend into place. A variation on lanyard tags passes the unfixed end of the lanyard through the body of its tag to form a loop which may be adjusted onto an object by pulling the unfixed end. A clutch in the body prevents the lanyard loop from being enlarged unless the clutch is release by an authorized person. Some tags may form more than one loop.
A common device for releasably retaining both tack shafts and lanyards is a ball clutch mechanism. The ball clutch mechanism may be constructed to release the retained item after application of a magnetic force to the tag. Other clips and clamps may also be used. Other types of tags may employ vials of ink, which may break if the tag is physically bent, thereby destroying the benefit of the theft attempt.
While tack, lanyard, and other types of tags have found wide use in protecting objects, they must remain attached to a given object to protect it. A common manner of defeating an EAS tag is to forcibly remove the tag from the object being protected. A countermeasure employed with some EAS tags is the introduction of a switch which has its state changed and arms the tag when a tag is attached to an object to be protected. For example, in tags employing a tack, a switch is positioned on the tag at a location beneath the head of the tack. When the tack is inserted through an object, the object and the head of the tack bear upon the switch and change its state. Depending on the mechanism being used to attach the tag to an object, a switch can be positioned to have its state changed when the tag is attached to an object.
Associated devices may communicate with electronics within the EAS tag to add an additional step to the tag arming process. When the tag is attached to an object and the state of the switch changed, this change of state functions as confirmation that the tag is attached, and an authorized person can use an associated device to wirelessly communicate with the tag to complete the tag installation and arming process. Once armed, if a tag is forcibly removed, the switch's state again changes, and the electronics of the EAS tag determine that an alarm condition exists. The EAS tag can sound an audible alarm with an onboard audible alarm generator or wirelessly communicate an alarm to other elements of the EAS system.
While both tack attached tags and lanyard attached tags have achieved wide acceptance in the field, they have limitations as well. The tacks of the tack attached tags must pierce the article to be monitored. This is not always desirable or even possible. Lanyards may be cut. There is a need for additional methods of releasably attaching an EAS tag to an object to be monitored.
U.S. Pat. No. 5,856,782 by Sasagawa, et al. is for a “Portable wire loop anti theft alarm with magnetic unlocking” In Sasagawa et al., a portable anti-theft monitor comprises a case; a detection conductive wire led out of said case, having a loop portion; an engaging member provided in said case so as to freely get it in and out, for engaging by catching the loop portion of said detection conductive wire in a state in which it has been pressed in said case; and a locking member for locking said engaging member in the state in which said engaging member has been pressed into said case, and for being attracted by a magnet to be moved in the unlocking direction.
U.S. Pat. No. 7,183,914 by Norman, et al. is for a “Hang tag with swivel attachment.” A hang tag provides for the accommodation of electronic article surveillance (EAS) marker. The hang tag includes a housing for supporting the EAS marker therein. A securement head is provided for accommodating a securement strap for coupling the housing to an article which is to be protected. The head is coupled to the housing in such a fashion that it permits continuous rotation with respect to the housing to thwart and attempt to improperly sever the securement strap from the article.
U.S. Pat. No. 6,933,847 by Feibelman is for an “Anti-theft tag.” The anti-theft security tag of Feibelman includes an engagement member having a first and second end securable within a housing for attachment to an article. The housing supports an electronic article surveillance marker and may include one or more channels for receiving and securing at least one crimping sleeve. The at least one crimping sleeve is sized to receive one end of the engagement member. A slot is disposed within the housing in alignment with the at least one crimping sleeve, and is sized to receive a crimping tool to crimp the sleeve and secure the wire to the article within the housing.
An EAS tag has a shackle and a housing. A first end of the shackle is slideably enclosed in the housing while a second end of the shackle may be received in the housing when the tag is attached to the protected object. The shackle may pass around a portion of the object or through an aperture in the object. When the tag is attached to an object, the shackle is passed around a portion of the object or through an aperture in the object, and the second end is inserted into the housing. As the second end of the shackle is inserted into the housing, the first end of the shackle slides deeper into the housing. As the first end slides deeper into the housing, a clutch engages the first end of the shackle and prevents the shackle from sliding outward from the housing until the clutch is released. In some embodiments, when the second end of the shackle is not engaged in the housing, the shackle may turn about the first end.
The housing encloses an electronics package. In some embodiments, the electronics package includes a passive EAS element that generates a signal when brought into an interrogation field. Other embodiments include a more sophisticated electronics package with a microprocessor, onboard power supply, and wireless communication elements along with other electronic components. The wireless communication elements communicate with components of the larger security system.
Additional utility and features of the invention will become more fully apparent to those skilled in the art by reference to the following drawings, which illustrate some of the primary features of preferred embodiments.
It may be seen in
In
As discussed above with respect to
Although the embodiments of EAS tag 10 shown in
An additional housing feature, sensor retainer 29, can be seen in
The exploded perspective views of
As mentioned above, some embodiments of EAS tag 10 with shackle 30 may employ additional electronics.
Microprocessor 72 is capable of storing and executing machine readable instructions to perform logic operations. Microprocessor 72 can communicate with other devices through wireless communication elements such as radio frequency communication circuitry 79 or optical communication port 75 and LEDs 78. These other devices can include the overall EAS system, EAS tag deactivators, EAS tag programmers, etc. EAS tag programmers can reprogram the machine readable instructions stored on microprocessor 72 as well as providing logic inputs for microprocessor 72 to interpret.
Sound generator 73 can generate audible alarms when microprocessor 72 determines an alarm situation is present. This may occur when the wireless communication elements detect that EAS tag 10 is present in an unauthorized area such as an interrogation zone at the exit of an establishment. The wireless communication elements can also receive a signal to cease alarming which is communicated to microprocessor 72 which in turn causes sound generator 73 to cease alarming. Sound generator 73 can also communicate that EAS tag 10 has been successfully armed by beeping, etc.
When EAS tag 10 is assembled, switch 76 is positioned in proximity to shackle assist 60 to detect its position. When shackle assist 60 is depressed, switch 76 conveys this to microprocessor 72 which interprets this to mean that EAS tag 10 is attached to an object to be monitored. If shackle assist 60 changes position without a wireless communication from the EAS system to disarm it, microprocessor 72 interprets this as unauthorized removal of EAS tag 10 from the object to be monitored and determines that an alarm condition exists. Microprocessor 72 can then cause sound generator 73 to generate an audible alarm and also generate an alarm signal over the wireless communication elements.
Optical communication port 75 aligns with aperture 77 in the bottom of housing 20. LEDs 78 can generate signals for optical communication or may generate more general visual cues for users. In some embodiments, the optical communication may be done in the infrared spectrum range.
In addition to optical communication capabilities, some embodiments of EAS tag 10 may have radio frequency capabilities for wireless communication. Radio frequency communication circuitry 79 provides this capability. Radio frequency communication circuitry 79 can both transmit and receive signals for communication with other elements of the larger system.
Motion detection chip 80 can detect when EAS tag 10 is being moved and can provide an additional logic input for microprocessor 72. For example, the electronics package of EAS tag 10 may generally function at a low level of operation until motion detection chip 80 detects that EAS tag 10 is being moved. Then microprocessor 72 may change to a more active mode of operation to monitor the current situation.
In some embodiments of EAS tag 10, the electronics package more generally, or microprocessor 72 in particular, may have a clock function. This clock function can be used to change a passcode for EAS tag 10 according to a time based algorithm. This change in passcode is synchronized with the broader EAS security system. This is an added layer of security against unauthorized disarming of the electronics of EAS tag 10.
Column 180, clutch 40, EAS element 50, and first segment 131 of shackle 130 are located within housing 120 of EAS tag 110 when top 122 is assembled to canister 121. In the embodiment shown in
Referring back to
Spindle 44 is at least partially made of a magnetically attractable material. Application of a magnet to canister 121 beneath clutch 40 pulls spindle 44 down away from cup 42. This moves balls 47 down into a wider section of cup 42 removing the wedging effect and allowing the withdrawal of first end 134 from engagement with balls 47.
Although specific embodiments of the invention have been described with specificity, the embodiments described should not be considered exhaustive of the possible embodiments of the invention and should not be held as limiting the scope and range of the claims. Similarly the drawings are not exhaustive depictions of embodiments of the invention and the abstract is intended to allow a person to quickly gain the general field of the invention and should not be taken as limiting the scope of the claims. Both the shackle and housing could vary to create additional embodiments.
This application claims priority from U.S. Provisional Application No. 61/477,580, filed on Apr. 20, 2011. The entire disclosure contained in U.S. Provisional Application 61/477,580, including the attachments thereto, is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4811578 | Masoncup et al. | Mar 1989 | A |
5404735 | Hsieh | Apr 1995 | A |
5406257 | Saito | Apr 1995 | A |
5524463 | Schenkel et al. | Jun 1996 | A |
5587702 | Chadfield | Dec 1996 | A |
5594228 | Swartz | Jan 1997 | A |
5627520 | Grubbs et al. | May 1997 | A |
5727405 | Cromwell | Mar 1998 | A |
5786759 | Ling | Jul 1998 | A |
5856782 | Sasagawa et al. | Jan 1999 | A |
5969613 | Yeager et al. | Oct 1999 | A |
6188320 | Kolton et al. | Feb 2001 | B1 |
6326890 | Costa | Dec 2001 | B1 |
6624753 | Elston | Sep 2003 | B2 |
6753821 | Yang et al. | Jun 2004 | B2 |
6933847 | Feibelman | Aug 2005 | B2 |
6958698 | Maloney | Oct 2005 | B2 |
7005989 | Benoit et al. | Feb 2006 | B2 |
7129841 | Feibelman | Oct 2006 | B2 |
7134302 | Gorst | Nov 2006 | B2 |
7183914 | Norman et al. | Feb 2007 | B2 |
7190272 | Yang et al. | Mar 2007 | B2 |
7286055 | Girvin et al. | Oct 2007 | B2 |
7334443 | Meekma et al. | Feb 2008 | B2 |
7382250 | Marcelle et al. | Jun 2008 | B2 |
7400254 | Yang | Jul 2008 | B2 |
7474209 | Marsilio et al. | Jan 2009 | B2 |
7474222 | Yang et al. | Jan 2009 | B2 |
7501957 | Plottke | Mar 2009 | B1 |
7518521 | Feibelman et al. | Apr 2009 | B2 |
7595733 | Spagna | Sep 2009 | B2 |
7685850 | Nilsson | Mar 2010 | B2 |
7921682 | Chang | Apr 2011 | B1 |
7948359 | Marcelle et al. | May 2011 | B2 |
7999656 | Fisher | Aug 2011 | B2 |
20080036596 | Auerbach et al. | Feb 2008 | A1 |
20090289798 | Yang | Nov 2009 | A1 |
20100115632 | Tsuruga et al. | May 2010 | A1 |
20100171621 | Yang | Jul 2010 | A1 |
20100135239 | Yang | Dec 2010 | A1 |
20100315237 | Yang | Dec 2010 | A1 |
20100315238 | Yang | Dec 2010 | A1 |
20110227706 | Yang | Sep 2011 | A1 |
Number | Date | Country | |
---|---|---|---|
20120267436 A1 | Oct 2012 | US |
Number | Date | Country | |
---|---|---|---|
61477580 | Apr 2011 | US |