Various example embodiments relate generally to security tags and, more particularly, to a device including a self-contained lock and pin, and a method for attaching the device to an article for protection and/or inventor management purposes.
Electronic article surveillance (EAS) includes the tracking and/or detecting the presence or removal of items from warehousing, inventory, or a retail establishment. EAS is achieved by applying an EAS element as part of a security tag to the item or its packaging and when the security tags are exposed to a predetermined electromagnetic field (e.g. pedestals located at a retail establishment exit), they activate to provide some type of alert and/or supply data to a receiver or other detector. In the electronic article surveillance (EAS) industry, a “hard tag” refers to either a re-usable or disposable tag which is intended to be removed from an article, e.g., merchandise at the point of sale to be re-used on other merchandise or thrown away. Hard tags typically are constructed to contain an EAS element, which may be for example an acousto-magnetic element (AM), a radio frequency element (RF), or electro-magnetic element (EM). Tags may also be constructed to contain a radio frequency identification (RFID) element, which may respond at low, high, or ultra-high frequencies.
An EAS element may include a resonant circuit with a coil coupled to a capacitor. The EAS security element is tuned to a predetermined frequency and if one attempts to remove the hard tag with the security element from a store, an alarm triggers as the tag passes through a surveillance field created by a transmitter and receiver located between pedestals at the store exit, tuned to the same frequency. The alarm goes off as the EAS element resonates, providing an output signal detected by a receiver, also located in the pedestals.
An RFID element typically includes an integrated circuit (IC) and an RF LC circuit (resonant circuit) or antenna (e.g. a dipole antenna), tuned to a predetermined RF frequency. Often, the integrated circuit (IC) comprises memory that has been programmed with information associated with the article (e.g., product ID information such as a serial number, unique identification number, price, etc.). When a transmitter emits a signal at the predetermined RF frequency and threshold value which is received by the tuned antenna, the RFID element emits a signal containing the stored information which is then received by a receiver and the information demodulated from the element-emitted signal. This information can then be used for, among other things, determining whether to set off an alarm or not. The RFID tag may also be used for merchandise visibility and inventory control, to identify where a tag and associated product are located or where they have moved to or from within the store.
As an alternative to an EAS element embedded in a hard tag, the hard tag may be equipped with a benefit denial device. A benefit denial tag typically includes ink releasing elements, such that when an attempt to break the tag from a product is performed, glass vials of ink shatter within the tag, ultimately leaking about the product which devalues the product and likewise to provide notification to the retailer that that particular merchandise was tampered with.
Accordingly, some example embodiments may provide devices for improving the capability for securing products. In one example embodiment, a security tag is provided. The security tag may include a pin cover, a pin housing, a receiving gap disposed between the pin cover and the pin housing, a pin configured to engage an article placed within the receiving gap, and a biasing member configured to actuate the pin by urging the pin toward the pin cover in response to the article being substantially placed within the receiving gap.
In another example embodiment, a lock and pin mechanism for transferring a security tag between a locked state in which the security tag is affixed to an article and an unlocked state in which the security tag is not affixed to the article is provided. The lock and pin mechanism may include a pin and a biasing member. The pin may be substantially retained in a pin housing. The pin may be configured to advance to the locked state by moving toward a pin cover separated from the pin housing by a receiving gap disposed between the pin cover and the pin housing. The pin may be configured to engage the article responsive to placement of the article within the receiving gap. The biasing member may be configured to actuate the pin by urging the pin toward the pin cover in response to the article being substantially placed within the receiving gap.
Having thus described some embodiments in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Some example embodiments now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all example embodiments are shown. Indeed, the examples described and pictured herein should not be construed as being limiting as to the scope, applicability or configuration of the present disclosure. Rather, these example embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout. Furthermore, as used herein, the term “or” is to be interpreted as a logical operator that results in true whenever one or more of its operands are true. As used herein, operable coupling should be understood to relate to direct or indirect connection that, in either case, enables functional interconnection of components that are operably coupled to each other.
Of note, the orifice 60 of
In one example, the security tag 100 may include an aperture 106 for hanging of the security tag 100 and the article 50 together as a unit. In this regard, if the orifice 60 is generally intended as a receiver for a hook or other protrusion by which to hang or display the article 50, the attachment of the security tag 100 may otherwise prevent hanging or display in such a manner. Accordingly, the aperture 106 may provide an alternate structure by which to hang or display the unit formed when the security tag 100 is affixed or otherwise attached to the article 50.
In some embodiments, the security tag 100 may be formed entirely, or in part, of a solid material. As such, all or portions of the security tag 100 may be formed from molded plastic or other rigid materials. In an example embodiment, the security tag 100 may include a lock and pin cover 102. The lock and pin cover 102 may cover a lock and pin mechanism (see
The security tag 100 may further include a tag housing 104. The tag housing 104 may include one or more information elements, e.g., an RFID, RF, AM, and/or EM element. The tag housing 104 may be made of any hard material that protects the security tag 100 from breakage. In some examples, the tag housing 104 may be made of hard plastic, nylon, etc. Further, the tag housing 104 may be configured to align with the article 50 for attachment. As such, for example, the tag housing 104 may be flat (as depicted in
In the example of
In an example embodiment, a trigger element 107 may be provided in the catch portion receiving gap 105 to engage the catch portion 70 of the article 50 responsive to insertion of the catch portion 70 into the catch portion receiving gap 105. The catch portion 70 may exert a force on the trigger element 107 to trigger the pin 110 to move toward the locked state when the orifice 60 is substantially aligned with the pin 110 so that the pin 110 can pass through the orifice 60 into the pin receiver 103. In the specific example of
Accordingly, in connection with the example of
In an example embodiment, the spring 112 may generally be housed within the lock and pin housing 108 along with a spring locator 114 and spring cup 116. In some examples, the spring 112 may be contained within the spring cup 116, and around the spring locator 114 (or spring positioned). The spring cup 116, in some embodiments, may be made of metal, plastic, or any other solid material that can be used to hold the spring 112. The spring cup 116 may also be sized and shaped to fit snugly within a portion of the pin 110. However, in other examples, the pin 110 may have a hollow cylindrically shaped center into which the spring 110 may fit so that there is no need to form or employ the spring cup 116 as a separate component. The spring locator 114 may be a protrusion that fits inside the spring 112 (or a portion of the spring 112) to ensure that the spring 112 is not displaced laterally. The spring locator 114, shown on
In an example embodiment, the security tag 100 may also include a recess 118 within the tag housing 104. The recess 118 may be used to receive an information element, such as an RF, AM, EM, or RFID element. In some examples, the recess 118 may be configured to include one or more compartments to receive one or more information elements. In some examples, the recess 118 may be configured to align longitudinally and/or laterally along the tag housing 104. In other examples, the recess 118 may be located within a center of the tag housing 104. Further, the tag housing 104 may be configurable to allow for at least one additional information element. The information element disposed in the recess 118 may trigger an alarm when placed in a surveillance field as described above. However, in one example embodiment, the tag housing 104 may include an attachment mechanism which allows an additional tag housing (see
In an example embodiment, once the pin 110 is enabled to pass through the orifice 60 to capture the catch portion 70 in the catch portion receiving gap 105 to be received in the pin receiver 103, the pin 110 may generally be considered to be in the locked state. In the locked state, the security tag 100 is affixed to the article 50. Generally speaking, the security tag 100 may stay in the locked state until some action is taken to unlock the security tag 100. In an example embodiment, shifting the security take to an unlocked state may be accomplished using a key. In some cases, the key may be magnetic, and may be placed proximate to a distal end of the lock and pin housing 108 to draw the pin 110 out of the pin receiver 103. In this regard, for example, the key may draw a metallic component such as the spring cup 116 and/or the pin 110 (when either or both are metallic) away from the pin receiver 103 against the force of the spring 112. When the pin 110 is drawn substantially clear of the pin receiver 103 and the catch portion receiving gap 105 (e.g., into the lock and pin housing 108), the catch portion 70 may be removed from the security tag 100 and the article 50 may be freed from the security tag 100. In some embodiments, rather than magnetic key, a wireless signal may be communicated to a locking mechanism to position the pin 110 in the locked and unlocked states.
As shown in
A flange 426 may be provided at a portion of the actuator 422 to prevent motion of the pin 410 toward the pin receiver 403 when the security tag 400 is in the unlocked state. In this regard, the flange 426 may contact a retaining edge 428 on a side of the pin 410 to hold the pin 410 substantially out of the catch portion receiving gap 405. However, when the catch portion 70 pushes the trigger element 407 and actuator 422 in the direction of arrow 430 against the force of the actuator spring 420, the flange 426 may be pushed out of contact with the retaining edge 428 and the spring 412 may urge the pin 410 upward. When the orifice 60 is generally aligned with the pin 410, the pin 410 may move through the orifice 60 and into the pin receiver 403 to retain the catch portion 70 in the catch portion receiving gap 405. This shifts the security tag 400 into the locked state. In the locked state, the retaining edge 428 engages the tag housing 404, thereby preventing the flange 426 from reengaging the retaining edge 428. As such, the pin 410 will remain in the locked state responsive to biasing by the spring 412 until a force is applied to overcome the spring force exerted by the spring 412. In some examples, the spring force of the spring 412 may be overcome by a magnetic key or wirelessly triggered unlocking mechanism, as described above. When the pin 410 is withdrawn into the lock and pin housing 408 far enough to allow the flange 426 to reengage the retaining edge 428, the actuator spring 420 may bias the actuator 422 (and the flange 426) in a direction opposite the direction of arrow 430 so that the flange 426 again engages the retaining edge 428 to hold the pin 410 in the unlocked state. The catch portion 70 can then be removed from the catch portion receiving gap 405 and the security tag 400 is thereby removed from the article 50.
As can be appreciated from the examples of
As can be seen in
As can be appreciated from
When a portion of the article 50 (i.e., the catch portion 70) is placed within the catch portion receiving gap 605, and pressed against the distal end of the spring lock 640, the spring lock 640 may be urged in the direction shown by arrow 650. The movement of the spring lock 640 may cause the spring lock 640 to move away from the top surface of pin 610. When the catch portion 70 sufficiently pushes spring away from pin 610, and the orifice 60 is substantially aligned with the pin 610, the spring 612 forces the pin 610 in an upward direction (i.e., towards pin receiver 603) to cause the pin 610 to pass through the orifice 60. While a solid material of article 50 (i.e., the catch portion 70) is within the catch portion receiving gap 605 but the orifice 60 is not aligned with the pin 610, the pin 610 is prevented from entering the pin receiver 603 by the solid material of the article 50. However, when the article 50 moves to align the orifice 60 with the pin 610 while the spring lock 640 is away from the pin 610, the spring 612 pushes the pin 610 into the pin receiver 603 and the security tag 600 is affixed to the article 50.
When the pin 610 is advanced to the locked state (e.g., being advanced to enter into the pin receiver 603), the catch portion 70 cannot be removed and the security tag 600 is fixed to the article 50 until some action is taken to transfer the lock and pin mechanism to the unlocked state. As discussed above, a magnetic key may be placed proximate to the lock and pin housing 608 to draw the pin 610 downward (i.e., in the direction shown by arrow 660). As an alternative, a wireless signal may be used to actuate a solenoid or other electrical actuator to draw the pin 610 downward. When the pin 610 is withdrawn from the pin receiver 603 and clears the catch portion receiving gap 605, the spring lock 640 is enabled to return to the position shown in
As can be appreciated from the examples described above, in each case, a portion of the article 50 (e.g., the catch portion 70) is moved at least partially in a first direction (i.e., the direction of arrows 430 and 650) to encounter and displace a trigger element. Displacement of the trigger element in some examples also occurs substantially in the first direction to allow the pin to advance from an unlocked state to the locked state by moving in a second direction (i.e., the direction opposite of the direction shown by arrow 660) that is substantially perpendicular to the first direction to retain the portion of the article.
The examples of
Referring now to
As mentioned above, the tag housing may sometimes include an attachment mechanism which allows an additional tag housing, including information elements, to be added to the tag housing.
In an example embodiment, a lock and pin mechanism for transferring a security tag between a locked state in which the security tag is affixed to an article and an unlocked state in which the security tag is not affixed to the article may therefore be provided. The lock and pin mechanism may include a pin and a biasing member. The pin may be substantially retained in a pin housing. The pin may be configured to advance to the locked state by moving toward a pin cover separated from the pin housing by a receiving gap disposed between the pin cover and the pin housing. The pin may be configured to engage the article responsive to placement of the article within the receiving gap. The biasing member may actuate the pin by urging the pin toward the pin cover in response to the article being substantially placed within the receiving gap.
In some embodiments, the features described above may be augmented or modified, or additional features may be added. These augmentations, modifications and additions may be optional and may be provided in any combination. Thus, although some example modifications, augmentations and additions are listed below, it should be appreciated that any of the modifications, augmentations and additions could be implemented individually or in combination with one or more, or even all of the other modifications, augmentations and additions that are listed. As such, for example, the lock and pin mechanism may include a trigger element that is displaced to enable the biasing member to actuate the pin. In an example embodiment, a portion of the article may be inserted into the receiving gap in a first direction to displace the trigger element in the first direction, and the pin may move in a second direction substantially perpendicular to the first direction to advance toward the pin cover. In some cases, the security tag may be in an unlocked state responsive to the trigger element blocking the pin from moving toward the pin cover, and the security tag may be in a locked state responsive to the trigger element being displaced and the pin being actuated. In an example embodiment, the pin may advance through the receiving gap into a pin receiver disposed at the pin cover in the locked state. In some cases, the trigger element may include a sloped, top surface of the pin. Alternatively, the trigger element may include an actuator biased toward engagement with the pin. The actuator may include a flange configured to engage a retaining edge of the pin to prevent movement of the pin toward the pin cover in an unlocked state, and the flange may disengage the retaining edge responsive to the article displacing the actuator. As another alternative, the trigger element may include a spring lock having a proximal end anchored at a portion of the security tag, and a distal end biased toward a rest position at which the pin is held out of the receiving gap. The pin is enabled to extend toward the pin cover responsive to the spring lock being displaced away from the rest position. In an example embodiment, the biasing member may be retained in a metallic cup, and the security tag may transition from a locked state to an unlocked state responsive to a magnetic key drawing the metallic cup away from the pin cover to withdraw the pin from the receiving gap. In some cases, the security tag may further include a tag housing that has a first surface that extends substantially parallel to a top surface of the pin, and a second surface that extends substantially parallel to the first surface. The pin cover may face the first surface and the pin housing may extend away from the second surface. In an example embodiment, the tag housing may include a recess disposed between the first and second surfaces and the recess may hold an information element therein. In some cases, the information element may include an acousto-magnetic element (AM), a radio frequency element (RF), an electro-magnetic element (EM), or a radio frequency identification (RFID) element. In an example embodiment, the pin may be configured to be transitioned to a locked state based on physical contact with the article, and the pin may be configured to be transitioned to an unlocked state based on operation of a magnetic key or wirelessly triggered unlocking mechanism.
Many modifications and other embodiments set forth herein will come to mind to one skilled in the art to which these embodiments pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the embodiments covered are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Moreover, although the foregoing descriptions and the associated drawings describe exemplary embodiments in the context of certain exemplary combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the scope of the appended claims. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of the appended claims. In cases where advantages, benefits or solutions to problems are described herein, it should be appreciated that such advantages, benefits and/or solutions may be applicable to some example embodiments, but not necessarily all example embodiments. Thus, any advantages, benefits or solutions described herein should not be thought of as being critical, required or essential to all embodiments or to that which is claimed herein. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This application claims the benefit of U.S. Provisional Application No. 61/951,339 filed on Mar. 11, 2014, the entire contents of which are hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
8403227 | Day | Mar 2013 | B2 |
20090278691 | Valade | Nov 2009 | A1 |
20100287998 | Anderson | Nov 2010 | A1 |
20120204608 | Sayegh | Aug 2012 | A1 |
Number | Date | Country |
---|---|---|
2006127674 | Nov 2006 | WO |
Entry |
---|
Extended European Search Report and Written Opinion of corresponding European Application No. 15158481.0 mailed on Aug. 13, 2015. |
Number | Date | Country | |
---|---|---|---|
20150262463 A1 | Sep 2015 | US |
Number | Date | Country | |
---|---|---|---|
61951339 | Mar 2014 | US |