Embodiments of the present invention relate generally to merchandise display security systems and methods for protecting an item of merchandise from theft. More particularly, embodiments of the present invention relate to merchandise security devices configured for use with an electronic key.
It is common practice for retailers to store and/or display relatively expensive items of merchandise on or within a merchandise security device, such as a security display (e.g. alarming stand), security fixture (e.g. locking hook, shelf, cabinet, etc.) or security packaging (e.g. merchandise safer). Regardless, the merchandise security device displays and/or stores an item of merchandise so that a potential purchaser may view, and in some instances, interact with the merchandise before making a decision whether to purchase the item. At the same time, the item is secured on or within the merchandise security device so as to prevent, or at least deter, theft of the item. The value of the item, however, may make it an attractive target for a shoplifter despite the presence of a merchandise security device. A determined shoplifter may attempt to detach the item from the security display, or attempt to remove the item from the security fixture or from the security packaging. Alternatively, the shoplifter may attempt to remove the security device, or at least a portion thereof, from the display area along with the item.
In the case of a security display or security fixture, the security device is oftentimes firmly attached to a support, such as a pegboard, wire grid, horizontal bar rack, slatwall (also known as slatboard), wall, table, desk, countertop or like structure. In some instances, the security device is secured to the support using a mechanical lock mechanism, for example a conventional tumbler lock or a magnetic lock, operated by a non-programmable key. In other instances, the security device is secured to the support using an electronic lock mechanism operated by a programmable electronic key.
Some types of security devices are configured to operate with only a mechanical key, and as a result, may be less secure than security devices that operate with an electronic key. Accordingly, there exists a need for an improved merchandise security device configured for use with an electronic key.
In one aspect, the invention is embodied by a merchandise security device for protecting items of merchandise from theft. The merchandise security device includes a lock mechanism operably engaged with a shape memory material configured to receive electrical power for locking and unlocking the lock mechanism. The shape memory material is configured to change in shape in response to the at least one conductor receiving electrical power to thereby lock or unlock the lock mechanism. The merchandise security device may also include at least one electrical conductor operably engaged with the lock mechanism and in electrical communication with the shape memory material. In one embodiment, the at least one conductor is configured to receive electrical power inductively. In another embodiment, the at least one conductor includes a coil having a plurality of continuous windings. In another embodiment, the shape memory material includes a wire in electrical communication with the at least one conductor and is configured to change in length in response to the at least one conductor receiving electrical power. In some embodiments, the merchandise security device does not include a rectifier, a battery, and/or a logic control circuit to facilitate locking or unlocking thereof.
In other aspects, the merchandise security device further includes a housing defining an enclosure configured to receive the item of merchandise therein and a lid engaged with the housing and configured to move between open and closed positions relative to the housing. The lock mechanism is operably engaged with the lid or the housing and is operable to lock the lid to the housing in the closed position. Moreover, the shape memory material is configured to change in shape in response to receiving electrical power for unlocking the lid from the housing so that the item of merchandise may be removed from the housing in the open position. In one aspect, the lock mechanism is operably engaged with the lid. The merchandise security device may include a transfer port on the lid or the housing that is operably engaged with the shape memory material, wherein the transfer port is configured to receive electrical power and transfer the power to the at least one electrical conductor. In another aspect, the merchandise security device includes a locking hook comprising at least one rod for supporting items of merchandise and a housing configured to releasably engage the at least one rod in response to actuation of the lock mechanism. In yet another aspect, the merchandise security device includes a housing configured to releasably engage, and be removed from, at least one rod for supporting items of merchandise in response to actuation of the lock mechanism.
In another aspect, the invention is embodied by merchandise security system for protecting an item of merchandise from theft that is configured for use with an electronic key. The merchandise security system includes an electronic key, and a merchandise security device comprising a lock mechanism that is operated by electrical power transferred from the electronic key to the lock mechanism. The lock mechanism is operably engaged with a shape memory material that is configured to change in shape in response to receiving electrical power to thereby lock or unlock the lock mechanism. In one embodiment, the electronic key is configured to transfer power inductively to the lock mechanism. In another embodiment, the electronic key is configured to time out after a predetermined period of time. In another embodiment the merchandise security device does not include a rectifier, a battery, and/or a logic control circuit to facilitate locking or unlocking thereof. In one aspect, the merchandise security system includes a transfer port operably engaged with the merchandise security device, wherein the at least one conductor is disposed adjacent to the transfer port, and wherein the transfer port is configured to receive electrical power from the electronic key and transfer the power to the shape memory material.
In yet another aspect, the invention is embodied by a method for protecting an item of merchandise susceptible to theft. The method includes receiving electrical power from an electronic key at a lock mechanism, and locking or unlocking the lock mechanism in response to a change in shape of a shape memory material operably engaged with the lock mechanism. In another embodiment, the method includes receiving electrical power inductively. In another embodiment, the method includes receiving a wireless security signal prior to receiving electrical power at the lock mechanism. In another embodiment receiving electrical power includes receiving electrical power only when no return signal is provided by the lock mechanism in response to receiving the wireless security signal. In another embodiment, locking or unlocking includes locking or unlocking a lid to a housing configured to receive the item of merchandise therein. In another embodiment, locking or unlocking comprises locking or unlocking a housing to a rod configured to support items of merchandise thereon.
In another embodiment, a lockable enclosure for securing an item of merchandise from theft is provided. The lockable enclosure includes a housing defining an enclosure configured to receive the item of merchandise therein and a lid engaged with the housing and configured to move between open and closed positions relative to the housing. The lockable enclosure also includes a lock mechanism operably engaged with the lid or the housing, the lock mechanism operable to lock the lid to the housing in the closed position, and a shape memory material operably engaged with the lock mechanism and configured to change in shape in response to receiving electrical power for unlocking the lid from the housing so that the item of merchandise may be removed from the housing in the open position.
In one embodiment, a merchandise security assembly is provided and includes an electronic key and a lockable enclosure comprising a lock mechanism that is operated by electrical power transferred from the electronic key to the lock mechanism. The lockable enclosure includes a housing configured to receive an item of merchandise and a lid configured to be locked to the housing with the lock mechanism. The lock mechanism is operably engaged with a shape memory material that is configured to change in shape in response to receiving electrical power from the electronic key to thereby lock or unlock the lock mechanism.
In another embodiment, a method for securing an item of merchandise from theft is provided. The method includes positioning an item of merchandise within a housing and closing a lid relative to the housing such that the item of merchandise is enclosed within the housing and the lid is locked to the housing with a lock mechanism. The method further includes actuating the lock mechanism with electrical power to unlock the lid from the housing in response to a change in shape of a shape memory material operably engaged with the lock mechanism to facilitate removal of the item of merchandise from the housing.
In an additional embodiment, a method of manufacturing a lockable for securing an item of merchandise from theft is provided. The method includes forming a housing defining an enclosure configured to receive the item of merchandise therein and forming a lid configured to engage with the housing and move between open and closed positions relative to the housing. The method further includes attaching a lock mechanism to the lid or the housing, the lock mechanism operable to lock the lid to the housing in the closed position. The lock mechanism comprises a shape memory material operably engaged with the lock mechanism and configured to change in shape in response to receiving electrical power for unlocking the lid from the housing so that the item of merchandise may be removed from the housing in the open position.
The detailed description of the invention provided below may be better understood with reference to the accompanying drawing figures, which depict embodiments of an electronic key and a merchandise security device configured for use with an electronic key.
Referring now to the accompanying drawing figures wherein like reference numerals denote like elements throughout the various views, one or more embodiments of a merchandise display security system and method are shown. In the exemplary embodiments shown and described herein, the system includes an electronic key and a merchandise security device configured for use with the electronic key. Merchandise security devices suitable for use with an electronic key include, but are not limited to, a security display (e.g. alarming stand or module), security fixture (e.g. locking hook, shelf, cabinet, etc.), security wraps or cables, garment tags, or security packaging (e.g. merchandise safer) for securing an item of merchandise from theft. The electronic key may be useable with any security device that utilizes power transferred from the key to operate a mechanical lock mechanism associated with the security device, and/or utilizes data transferred from the key to authorize the operation of a mechanical lock mechanism or an electronic alarm circuit. In other words, an electronic key according to embodiments of the invention is useable with any security device or lock mechanism that requires power transferred from the key to the device and/or data transferred between the key and the device. Further examples of security devices include, but are not limited to, a door lock, a drawer lock or a shelf lock, as well as any device that prevents an unauthorized person from accessing, removing or detaching an item from a secure location or position.
It should be noted that although the invention is described with respect to embodiments including an electronic key for transferring both data and power to a merchandise security device to operate a mechanical lock mechanism, the invention is equally applicable to an electronic key for transferring only electrical power to a merchandise security device to operate any component of the merchandise security device (e.g., a lock mechanism, alarm circuit, etc.), whether or not the security device includes an internal or external power source for operating another component of the device.
One embodiment of an electronic key for use with a merchandise display security system and method according to the invention is shown in
In addition to the programming station, the system and method may further comprise an optional charging station that is operable for initially charging and/or subsequently recharging an internal power source disposed within the key. The electronic key may be provisioned with a single-use (i.e. non-rechargeable) power source, such as a conventional or extended-life battery, or alternatively, the key may be provisioned with a multiple-use (i.e. rechargeable) power source, such as a conventional capacitor or rechargeable battery. In either instance, the internal power source may be permanent, semi-permanent (i.e. replaceable), or rechargeable, as desired. In the latter instance, the charging station is provided to initially charge and/or to subsequently recharge the internal power source disposed within the electronic key.
In certain embodiments, the merchandise security device is a passive device. As used herein, the term “passive” is intended to mean that the security device does not have an internal power source (e.g., a battery) sufficient to lock and/or unlock a mechanical lock mechanism. Significant cost savings are obtained by a retailer when the merchandise security device is passive since the expense of an internal power source is confined to the electronic key, and one such key is able to operate multiple security devices. In addition, the security device may not require an electric motor, such as a DC stepper motor, solenoid, or the like, that is configured to lock or unlock the lock mechanism. As such, the security device may employ a simplified lock mechanism that does not require various components operated by its own source of electrical power.
Moreover, in certain embodiments the merchandise security device is not required to include a logic control circuit, while the electronic key includes such a logic control circuit. In this regard, some security devices include a logic control circuit adapted to perform a handshake communication protocol with the logic control circuit of the electronic key (e.g., using an SDC). Thus, the security device may or may not include a logic control circuit used to communicate with the electronic key in order to determine whether the merchandise security device is an authorized device. Likewise, the electronic key may or may not include a logic control circuit. Regardless of whether the electronic key includes a logic control circuit, an SDC may be unnecessary where the electronic key configured to transmit power to the security device is not readily duplicated by a potential thief. For example, where the electronic key is configured to transmit power inductively, the inductive signature may provide increased security relative to conventional lock mechanisms that utilize mechanical or magnetic actuators. For instance, the electronic key may be configured to transmit an inductive signature including a particular amplitude and/or frequency of a power signal that is not readily apparent to, or is not readily able to be duplicated by, a potential thief.
In some embodiments, the electronic key does not transmit an SDC to the security device. However, in other embodiments, the electronic key may be configured to transmit an SDC to the security device. In the latter embodiments, the security device may include a corresponding SDC. Thus, the electronic key may be configured to perform a handshake communication protocol with the security device. In the event that the SDC of the electronic key matches the SDC of the security device, the electronic key may then be configured to transmit electrical power to the security device.
However in other embodiments, the security device may not recognize the SDC transmitted by the electronic key, such as where the security device does not include a logic control circuit or a component including an SDC. If the electronic key does not receive a return signal from the security device, the electronic key may nevertheless still transmit electrical power to the security device as described in further detail below. Thus, although the electronic key may transmit an SDC to the security device, the security device may not recognize or even receive the SDC and the SDC transmitted by the electronic key will not affect the operation of the security device. As will be readily apparent to those skilled in the art, the SDC may be transmitted from the electronic key to the merchandise security device by any suitable means, including without limitation, via one or more electrical contacts, or via optical, acoustic, electromechanical, electromagnetic or magnetic conductors, as desired. In certain embodiments, the SDC may be transmitted by inductive transfer of data from the electronic key to the merchandise security device.
In one embodiment, the logic control circuit of the electronic key is configured to cause the internal power source of the key to transfer electrical power to the security device to operate a lock mechanism of the security device. In one example, electrical contacts disposed on the electronic key electrically couple with cooperating electrical contacts on the merchandise security device to transfer power from the internal battery of the key to the merchandise security device. As such, electrical power may be transferred directly to the lock mechanism via one or more conductors. For example, a conductor may be coupled to a mechanical lock mechanism and when electrical power is conducted through the conductor a state change occurs, thereby resulting in operation of the lock mechanism. In the exemplary embodiments shown and described herein, the conductor is coupled to a shape memory material (e.g., Nitinol) such that electrical power transferred through the conductor results in a change in shape of the shape memory material. Such a change in shape may cause a mechanical actuation (e.g., linear, rotary, etc.) of the lock mechanism to lock or unlock the lock mechanism. In other embodiments, the conductor may couple with a motor or solenoid for operating the lock mechanism.
An available feature of a merchandise security system and method according to an embodiment of the invention is that the electronic key may include a time-out function. More particularly, the ability of the electronic key to transfer power and/or data to the merchandise security device is deactivated after a predetermined time period. By way of example, the logic control circuit of the electronic key may be deactivated after about six to about twelve hours (e.g., about eight hours) from the time that the key was last fully charged, or last programmed or refreshed by the programming station. In this manner, an authorized sales associate typically must charge, program, re-program or refresh an electronic key assigned to him or her at the beginning of each work shift. Furthermore, the charging station may be configured to deactivate the logic control circuit of the key when the key is positioned within the charging station. In this manner, the charging station can be made available to an authorized sales associate in an unsecured location without risk that a charged key could be removed from the charging station and used to disarm and/or unlock a merchandise security device in an unauthorized manner. The electronic key would then have to be programmed, re-programmed or refreshed by the programming station, which is typically monitored or maintained at a secure location, in order to reactivate the logic control circuit of the key.
The merchandise security device may include a transfer port sized and shaped to receive a transfer probe of the electronic key. At least one, and sometimes, a plurality of magnets may be disposed within the transfer port for securely positioning and retaining the transfer probe of the key in physical contact with the transfer port of the merchandise security device. In certain embodiments, the magnet(s) securely retain one or more electrical contacts of the electronic key in electrical contact with one or more electrical contacts of the mechanical lock mechanism of the security device. In this instance, electrical power is transferred from the electronic key to the security device through the one or more electrical contacts disposed on the transfer probe of the key and the corresponding electrical contacts disposed within the transfer port of the security device.
Exemplary embodiments of a merchandise display security system and method according to the invention shown and described herein comprise an electronic key with inductive transfer capability and a merchandise security device that is configured to be operated by the key. However, the electronic key is useable with any security device or locking device with inductive transfer capability that requires power transferred from the key to the device by induction, or alternatively, requires data transferred between the key and the device and power transferred from the key to the device by induction. Examples of such security devices include, but are not limited to, locking hooks, a door lock, a drawer lock or a shelf lock, as well as any device that prevents an unauthorized person from accessing, removing or detaching an item from a secure location or position. The merchandise display system and method may further comprise an optional programming station, as previously described, operable for programming the electronic key with an SDC. In addition to a programming station, the system and method may further comprise an optional charging station with electrical contact and/or inductive transfer capability that is operable for initially charging and subsequently recharging an internal power source disposed within the key.
In certain embodiments, the security device comprises an internal lock mechanism. A transfer port may be formed in the security device that is sized and shaped to receive a transfer probe or a portion of the electronic key. If desired, the transfer port may comprise mechanical or magnetic means for properly positioning and securely retaining the key within the transfer port. In one instance, it is necessary that an inductive transceiver of the electronic key is sufficiently aligned or proximate to a corresponding inductive transceiver of the security device. In another instance, it is only necessary that the transfer probe is proximate to the transfer port. Therefore, magnets are not required to position, align, retain and/or maintain the transfer probe of the electronic key in physical and/or electrical contact with the transfer port provided on the security device.
In some embodiments, data may be transferred from the electronic key to the security device by wireless communication, such as infrared (IR) optical transmission. Power may be transferred from the electronic key to the security device by induction across the transfer port of the security device using an inductive transceiver disposed within the transfer probe of the key that cooperates with a corresponding inductive transceiver disposed within the security device. For example, the transfer probe of the electronic key may comprise an inductive transceiver coil that is electrically connected to the logic control circuit of the key to provide electrical power from the internal battery of the key to an inductive transceiver coil disposed within the security device. The inductive transceiver coil of the security device may then transfer the electrical power from the internal battery of the key to the lock mechanism disposed within the security device. Thus, the security device may include at least one conductor configured as a coil having a plurality of continuous windings. As previously mentioned, the power transferred from the electronic key may be used to unlock the lock mechanism without the need for various other electrically powered mechanisms, for example, an electric motor, DC stepper motor, solenoid, or the like.
According to one aspect, the electronic key does not require a physical force to be exerted by a user on the key to operate the lock mechanism of the merchandise security device. By extension, no physical force is exerted by the electronic key on the lock mechanism. As a result, the electronic key cannot be unintentionally broken off in the lock, as often occurs with conventional mechanical key and lock mechanisms. Furthermore, neither the electronic key nor the lock mechanism suffer from excessive wear as likewise often occurs with conventional mechanical key and lock mechanisms, and to a lesser extent, with electronic key and lock mechanisms having exposed electrical contacts. In addition, there is no required orientation of the transfer probe of the electronic key relative to a charging port of a charging station, a programming port of a programming station and/or the transfer port of the merchandise security device. Accordingly, any wear on the transfer probe of the key, the charging port of the charging station, the programming port of the programming station and/or the transfer port of the security device is avoided, or at the least minimized. As a further advantage, an authorized person is not required to position the transfer probe of the electronic key in a particular orientation relative to the transfer port of the security device, and thereafter exert a compressive and/or torsional force on the key to operate the mechanical lock mechanism of the security device.
As shown herein, the electronic key 40 comprises a housing 42 defining an internal cavity or compartment 41 (see
In one embodiment, an internal battery 48 and a logic control circuit, or printed circuit board (PCB) 50 are disposed within the housing 42 of the electronic key 40 (see
In another embodiment, the logic control circuit 50 is further operatively coupled and electrically connected to a communication system, for example an optical transceiver 56 (see
As previously mentioned, transfer probe 44 contains an inductive coil 46 comprising ferrite core 45 and inductive core windings 47 for transferring electrical power to the merchandise security device and/or receiving electrical power from the charging station to charge the internal battery 48, as required. Accordingly, the leads 47A and 47B of the inductive coil 46 are electrically connected to the logic control circuit 50, which in turn is electrically connected to the battery 48, in a suitable manner, for example by conductive insulated wires or plated conductors. Alternatively, the optical transceiver 56 may be eliminated and data transferred between the electronic key 40 and the merchandise security device via magnetic induction through the inductive coil 46.
In one embodiment, the end assembly 140 includes an inductive coil 146 disposed within or proximate to the transfer port 144 on the end assembly 140 and a solenoid that is in electrical communication with the inductive coil. As previously described with reference to the inductive coil 46 of the electronic key 40, the inductive coil 146 comprises a plurality of inductive core windings 147 of an electrically conductive material. An alternating current may be transferred through the core windings 147. The alternating current in the core windings 147 may be provided to the solenoid by connecting leads of the windings to the solenoid. As a result, the inductive coil 146 is in electrical communication with the solenoid such that power transferred through the inductive coil is provided to the solenoid. The solenoid may be operable to disengage a lock mechanism 150 engaging the rod 130. For example, actuation of the solenoid may result in linear and/or rotary movement of a mechanical lock mechanism 150 that disengages the end assembly 140 from a notch, recess or the like formed in the lower rod 130.
In another embodiment shown in
In this embodiment, the shape memory material 154 is Nitinol in the form of a wire. The shape memory material changes length, and in particular, contracts when an electrical current is transferred from the inductive coil 146 in response to actuation of the electronic key 40. Wire 154 is operably connected to the retaining arm 152 such that the retaining arm pivots upwardly about the retaining arm pin 153 when the shape memory material contracts. As a result, the end of the retaining arm 152 disengages from the notch 155 formed in actuator 156, and the actuator rotates under the biasing influence of the torsional spring 157 to move latch 158 from a retracted position (
In one example, the lock mechanism 250 includes a plunger mechanism 260 that is configured to extend and retract relative to the housing 220. The plunger mechanism 260 may include an arm member 262 that is operable for being retracted across the opening 225 when the locking device 200 is in a locked configuration, and to be extended to expose the opening 225 when the locking device 200 is in an unlocked configuration. The plunger mechanism 260 may be in sliding engagement with the housing 220 such that the plunger mechanism is configured to slide relative to the housing in a substantially linear direction A (see
As before, the locking device 200 includes an inductive coil 246 disposed proximate to or within a transfer port 244 of the locking device 200. In this example, the inductive coil 246 may be wrapped about a bobbin 252 and coupled to a shape memory material 254. In this embodiment, the shape memory material 254 is Nitinol in the form of a wire. The inductive coil 246 is in electrical communication with the wire 254, and further, is configured to receive electrical power from electronic key 40 via transfer port 244, as previously described. In certain embodiments, one end 254A of the wire 254 is attached to one end 247A of the inductive coil 246, while an opposite end 254B of the wire 254 is attached to the opposite end 247B of the inductive coil 246. Alternatively, it is understood that one or more shape memory materials 254 may be employed to electrically couple the inductive coil 246 to the plunger mechanism 260. As shown in
The plunger mechanism 260 may include one or more engagement members 268 that are configured to engage one or more corresponding engagement members 228 of the housing 220 in a locked configuration. In one embodiment, at least a portion of the plunger mechanism 260 may be flexible such that contraction of the shape memory material 254 is configured to bias engagement member 268 out of engagement with engagement member 228. In one example, a portion of the plunger mechanism 260 may be cantilevered such that an end is configured to pivot relative to the housing 220. When the engagement members 268, 228 disengage, the plunger mechanism 260 is configured to slide relative to the housing 220 to the unlocked configuration (
In some embodiments, the plunger mechanism 260 may be biased towards the engagement member 228 such that when the plunger mechanism 260 is retracted within the housing 220, the engagement member 268 of the plunger mechanism is urged back into engagement with the engagement member 228 of the housing 220 in the locked configuration (
In one embodiment, the housing 320 also includes a removable hang tag 324 operably engaged with the housing. The hang tag 324 may be defined on an upper surface 322 of the housing 320 opposite the lid 340. The hang tag 324 may include an opening 326 configured to receive a rod therethrough for hanging one or more of the security devices 300 on the rod in a display orientation. The hang tag 324 may be configured to pivot between an upright position (
As shown herein, the lid 340 is pivotally attached to the housing 320 (
In this embodiment, the lid 340 of the security device 300 includes a movable latch 345. As illustrated in
In some embodiments, the lock mechanism 350 comprises a plurality of engagement features 360 (e.g., pins, protrusions, or the like) and the housing 320 comprises a plurality of retaining features 359 (e.g., holes, openings, slots, or the like) (see, e.g.,
As the shape memory wire 354 contracts, the retaining arms 356 move, and in particular, pivot inwardly about retaining pins 355 to release the retaining arms from the retaining features 358 such that the latch 345 moves outwardly to the extended (unlocked) configuration. As shown, the retaining arms 356 may be biased, for example by one or more elastic, linear springs 357 to pivot outwardly about the retaining pins 355. In this manner, the retaining arms 356 will return into engagement with the retaining features 358 as the latch 345 is moved inwardly against the biasing force of the springs 348 to the retracted (locked) configuration. With the latch 345 in the extended (unlocked) configuration, one or more engagement features 360 provided on the latch are disengaged from corresponding retaining features 359 provided on the housing 320 such that lid 340 can be moved, and in particular, rotated about pivot connection 330 from a closed position to an opened position to access the interior compartment 321 of the housing 320. It should be noted that the lid 340 may be opened manually, or the lid could be biased towards an open position such that when the engagement features 360 on the lid disengage from the retaining features 359 on the housing 320, the lid is configured to at least partially open. In addition, the latch 345 may be manually retracted relative to the housing 320 to return the lock mechanism 350 to a locked configuration. Alternatively, the lock mechanism 350 could be configured to automatically lock when the lid 340 is returned to a closed position on the housing 320.
In this embodiment, the shape memory wire 354A is operably engaged in electrical communication with the inductive coil 346 disposed proximate to or within the transfer port 344 for receiving electrical power from the electronic key 40 (e.g.,
In one embodiment, the latch 345, 345A and/or lock mechanism 350, 350A may be configured to be manufactured and assembled independently of the remaining components of the security device 300. Thus, the latch 345, 345A and/or lock mechanism 350 may be configured to be secured to any particular lid 340, 340A and may be readily replaceable if needed. The lid 340, 340A may include one or more alignment members 349 or other similar function features for aligning the latch 345, 345A and/or lock mechanism 350 on the lid. The latch 345, 345A and/or lock mechanism 350 may be secured to the lid 340, 340A using any desired technique, such as adhesives, welding, and/or fasteners.
The housing 420 or the lid 440 may include a hang tag 424 that may be used in the manner described above. The hang tag 424 may be configured to pivot relative to the housing 420 or the lid 440 between active (upright) and inactive (folded) positions. The hang tag 424 may be configured to pivot about the same axis as the pivot connection 430 between the housing 420 and the lid 440.
As in previous embodiments, a lock mechanism 450 may be operably engaged with a latch 445 provided on the lid 440, while the housing 420 may include one or more retaining features 459 configured to removably engage corresponding engagement features 460 provided on the lid. In this example, each of the retaining features 459 is configured to receive and engage a corresponding engagement feature 460 with the lid 440 in a closed position on the housing 420 and the latch 445 in a retracted (locked) configuration. As previously mentioned, in some embodiments the lock mechanism 450 provided on latch 445 of lid 440 comprises a plurality of engagement features 460 (e.g., pins, protrusions, or the like) and the housing 420 comprises a plurality of retaining features 459 (e.g., holes, openings, slots, or the like) (see, e.g.,
The engagement features 460 and retaining features 459, 462 may be arranged in any suitable manner and include any desired number. In the illustrated embodiment, the retaining features 459 extend along a linear axis and are disposed on a lower edge proximate a front surface of the housing 420. Similarly, the engagement features 460 and/or retaining features 462 may extend along a linear axis on the latch 445 that is disposed adjacent a lower edge of the lid 440.
Furthermore,
It is understood that various configurations of lock mechanisms 450 may be employed with the latch 445. For example, although a pair of retaining arms 456 are shown, it is understood that one or more arms may be used. In addition, although linear motion of the shape memory material 454 causes pivoting of one or more retaining arms 456, contraction of the shape memory material may alternatively result in rotational motion for releasing the plate 452. Moreover, the shape memory material 454 and retaining arm(s) 456 may be located at any desired location relative to the plate 452.
The aforementioned “safer” type security devices 300, 400 may be formed of any desired material such as a clear polymeric material so that an item of merchandise can be seen through the housing. The housing may be any desired shape, such as a housing with a bottom surface and four sidewalls extending from the bottom surface to an open end. In addition, the housing may include a tapered wall thickness. For example, the sidewall thickness may increase progressively from the bottom surface towards the open end. The tapering sidewalls may be the front and rear sidewalls, while the lateral sidewalls are uniform in thickness. However, the entire sidewall may be tapered in some embodiments. In one non-limiting example, the sidewall thickness increases from about 2 mm to about 3 mm, with a draft of about 0.25 degrees on one surface and about 0.5 degrees on the opposing surface. The increased wall thickness may provide for more robust engagement between the engagement features and the retaining features, as well as at the pivotable connection. Furthermore, the bottom surface of the housing may include a curved surface, while the lid may be substantially flat. Thus, the bottom surface may be intended as the “top” of the security device so that the security device may rest on the lid. It is noted that use of the terms “bottom”, “front”, and “top” are not intended to be limiting and will depend on the orientation of the security device. In addition, it is understood that the top and/or bottom may include flat or curved surfaces. Flat surfaces on one or both of the top and bottom surfaces may facilitate stacking for storage when the security devices are not in use.
In other embodiments, the security device is an alarm stand, display, or module. For example, the security device may be similar to that disclosed in U.S. Pat. No. 7,740,214, entitled Display Having Self-Orienting Mounting Area, the disclosure of which is incorporated herein by reference in its entirety. The alarm stand may be operably engaged with a sensor, and the sensor may in turn be secured to an item of merchandise. The alarm stand may be operably engaged with the sensor via a cable extending between and coupled to each of the sensor and the alarm stand, while the sensor may be removably disposed on the alarm stand such that the sensor and the item of merchandise may be removed and replaced on the alarm stand.
In one embodiment, the alarm stand may include a lock mechanism similar to that discussed above that is configured to lock and/or unlock the sensor engaged with the item of merchandise via an electronic key. Thus, an authorized user may readily remove the sensor from the item of merchandise, unlike conventional systems that utilize mechanical fasteners. Similarly, the cable may be removably attached to the alarm stand and also or alternatively include a lock mechanism similar to that discussed above that allows the cable to be locked and/or unlocked from the alarm stand via an electronic key. For example, a connector on the end of the cable may be configured to cooperate with a lock mechanism in the alarm stand. In conventional systems, the cable may be readily removed by an unauthorized user and is typically not locked to the alarm stand.
In another embodiment, the security device may be configured to be locked to a support surface or device. For instance, a locking hook may be configured to lock to a support surface (e.g., pegboard or slat wall) and utilize a lock mechanism similar to that described above for locking and/or unlocking the locking hook from the support surface. Likewise, the security device may be configured to be locked or unlocked to a table, counter, shelf, wall, or the like and utilize a similar lock mechanism as discussed above that is operable via an electronic key.
Therefore, it is apparent that any number of security devices may be employed in conjunction with various forms of power transfer for actuating a lock mechanism (e.g., electrical, inductive, capacitive, etc.). For example, where a shape memory material is utilized, a change in shape of the shape memory material may cause mechanical actuation (e.g., linear and/or rotary movement) of the lock mechanism. The shape memory material may be operably engaged with a lock mechanism in any number of configurations to facilitate such actuation. Moreover, the shape memory material may be any suitable material, such as a metal, a polymer, or a combination thereof, that is configured to change its shape (e.g., length, area, etc.) in response to an electric current or a change in temperature and to return to its original shape after the electric current is no longer transferred therethrough. For example, transferring current through the shape memory material may cause the material to be heated and thereby contract. Upon removal of the current, the shape memory material may return to its original shape. In addition, other mechanisms may be utilized for actuating a lock mechanism, including mechanical, electrical, and/or chemical state changes. As such, the security devices and associated lock mechanisms should not be limited in light of the exemplary embodiments shown and described herein.
In some embodiments, the security device and the electronic key are similar to those disclosed in U.S. Patent Publication No. 2013/0081434, entitled Cabinet Lock for Use with Programmable Electronic Key and filed Sep. 28, 2012, U.S. Patent Publication No. 2012/0047972, entitled Electronic Key for Merchandise Security Device and filed Aug. 31, 2011, and U.S. Patent Publication No. 2011/0254661, entitled Programmable Security System and Method for Protecting Merchandise and filed Jun. 27, 2011, each of the disclosures of which is incorporated herein by reference in its entirety. In other embodiments, the security device and the electronic key are similar to those manufactured by InVue Security Products Inc. of Charlotte, N.C., USA, including the Plunger Locks, Smart Locks, and IR2 and IR2-S Keys.
The foregoing has described one or more exemplary embodiments of a merchandise display security system and method for use with an electronic key. Embodiments of a merchandise display security system have been shown and described herein for purposes of illustrating and enabling one of ordinary skill in the art to make, use and practice the invention. Those of ordinary skill in the art, however, will readily understand and appreciate that numerous variations and modifications of the invention may be made without departing from the spirit and scope thereof. Accordingly, all such variations and modifications are intended to be encompassed by the appended claims.
This application is a continuation of U.S. application Ser. No. 14/824,205 filed on Aug. 12, 2015, which is a continuation of U.S. application Ser. No. 14/328,051 filed on Jul. 10, 2014 and claims the benefit of the filing dates of U.S. Provisional Application No. 61/845,392 filed on Jul. 12, 2013, U.S. Provisional Application No. 61/891,061 filed on Oct. 15, 2013, U.S. Provisional Application No. 61/902,900 filed on Nov. 12, 2013, U.S. Provisional Application No. 61/904,479 filed on Nov. 15, 2013, U.S. Provisional Application No. 61/924,321 filed on Jan. 7, 2014, and U.S. Provisional Application No. 61/973,314 filed on Apr. 1, 2014, the disclosures of which are incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
3901057 | Coley, Sr. | Aug 1975 | A |
3979647 | Perron et al. | Sep 1976 | A |
4031434 | Perron et al. | Jun 1977 | A |
5147034 | Broadhead et al. | Sep 1992 | A |
5351042 | Aston | Sep 1994 | A |
5509528 | Weisburn | Apr 1996 | A |
5598728 | Lax | Feb 1997 | A |
5636737 | Marsilio | Jun 1997 | A |
5760689 | Holmgren | Jun 1998 | A |
5762187 | Belden, Jr. et al. | Jun 1998 | A |
5782350 | Weisburn et al. | Jul 1998 | A |
5868013 | Julien | Feb 1999 | A |
5905446 | Benore et al. | May 1999 | A |
5984388 | Bacon | Nov 1999 | A |
6008992 | Kawakami | Dec 1999 | A |
6073469 | Julien | Jun 2000 | A |
6082153 | Schoell et al. | Jul 2000 | A |
6209367 | Hyatt, Jr. et al. | Apr 2001 | B1 |
6227020 | Lerchner | May 2001 | B1 |
6285286 | Tyrén et al. | Sep 2001 | B1 |
6310411 | Viallet | Oct 2001 | B1 |
6331812 | Dawalibi | Dec 2001 | B1 |
6354435 | Belden, Jr. et al. | Mar 2002 | B1 |
6412631 | Belden, Jr. et al. | Jul 2002 | B2 |
6422387 | Sedon et al. | Jul 2002 | B1 |
6450725 | Roth et al. | Sep 2002 | B1 |
6474470 | Byrne et al. | Nov 2002 | B2 |
6474478 | Huehner et al. | Nov 2002 | B1 |
6485081 | Bingle et al. | Nov 2002 | B1 |
6496101 | Stillwagon | Dec 2002 | B1 |
6497125 | Necchi | Dec 2002 | B1 |
6561347 | Lax | May 2003 | B1 |
6588243 | Hyatt, Jr. et al. | Jul 2003 | B1 |
6598742 | Belden, Jr. et al. | Jul 2003 | B1 |
6601701 | Belden, Jr. et al. | Aug 2003 | B1 |
6601702 | Byrne et al. | Aug 2003 | B2 |
6626290 | Byrne et al. | Sep 2003 | B2 |
6659291 | Huehner et al. | Dec 2003 | B2 |
6666330 | Sedon et al. | Dec 2003 | B2 |
6688463 | Peterson et al. | Feb 2004 | B2 |
6731212 | Hirose et al. | May 2004 | B2 |
6832498 | Belden, Jr. et al. | Dec 2004 | B2 |
6871519 | Butera et al. | Mar 2005 | B2 |
6926164 | Broadhead et al. | Aug 2005 | B1 |
6938758 | Marsilio et al. | Sep 2005 | B2 |
6951278 | Pettigrew et al. | Oct 2005 | B2 |
6957555 | Nagel et al. | Oct 2005 | B1 |
6966438 | Belden, Jr. et al. | Nov 2005 | B2 |
6997311 | Sankey et al. | Feb 2006 | B2 |
7000441 | Sutton et al. | Feb 2006 | B2 |
7007810 | Huehner et al. | Mar 2006 | B2 |
7029056 | Browne | Apr 2006 | B2 |
7066325 | Bird et al. | Jun 2006 | B2 |
7099474 | Liden et al. | Aug 2006 | B1 |
7100402 | Holmgren | Sep 2006 | B2 |
7131542 | Sedon et al. | Nov 2006 | B2 |
7140489 | Lax et al. | Nov 2006 | B2 |
7167096 | Marsilio et al. | Jan 2007 | B2 |
7194879 | Sedon et al. | Mar 2007 | B2 |
7194880 | Necchi | Mar 2007 | B2 |
7215250 | Hansen et al. | May 2007 | B2 |
7243800 | Feibelman | Jul 2007 | B1 |
7260962 | Lax et al. | Aug 2007 | B2 |
7269983 | McHatet | Sep 2007 | B1 |
7320235 | Belden, Jr. et al. | Jan 2008 | B2 |
7344025 | Belden, Jr. et al. | Mar 2008 | B2 |
7380711 | Simon et al. | Jun 2008 | B2 |
7380843 | Alacqua et al. | Jun 2008 | B2 |
7392673 | Fawcett et al. | Jul 2008 | B2 |
7406846 | Chiu | Aug 2008 | B2 |
7456745 | Marsilio et al. | Nov 2008 | B2 |
7484389 | Sedon et al. | Feb 2009 | B2 |
7552822 | Belden, Jr. et al. | Jun 2009 | B2 |
7581418 | Sedon et al. | Sep 2009 | B2 |
7581419 | Belden, Jr. et al. | Sep 2009 | B2 |
7581708 | Kennedy et al. | Sep 2009 | B2 |
7598861 | Belden, Jr. et al. | Oct 2009 | B2 |
7610783 | Rudduck | Nov 2009 | B2 |
7614265 | Belden, Jr. et al. | Nov 2009 | B2 |
7617703 | Osvatic | Nov 2009 | B2 |
7625019 | Alacqua et al. | Dec 2009 | B2 |
7665603 | Leesberg | Feb 2010 | B2 |
7690231 | Field | Apr 2010 | B1 |
7703308 | Nagelski | Apr 2010 | B2 |
7837051 | Broadhead et al. | Nov 2010 | B2 |
7870766 | Sedon et al. | Jan 2011 | B2 |
7878389 | Rudduck et al. | Feb 2011 | B2 |
7924154 | Belden, Jr. et al. | Apr 2011 | B2 |
7963131 | Zhang et al. | Jun 2011 | B2 |
7966851 | Sedon et al. | Jun 2011 | B2 |
7992711 | Belden, Jr. et al. | Aug 2011 | B2 |
7999672 | Fiebelman | Aug 2011 | B1 |
8016147 | Broadhead et al. | Sep 2011 | B2 |
8061514 | Necchi | Nov 2011 | B2 |
8207849 | Belden, Jr. et al. | Jun 2012 | B2 |
8276410 | Sedon et al. | Oct 2012 | B2 |
8286454 | Richardson et al. | Oct 2012 | B2 |
8286565 | Valiulis et al. | Oct 2012 | B2 |
8325039 | Picard et al. | Dec 2012 | B2 |
8341958 | Brown et al. | Jan 2013 | B2 |
8341987 | Nagelski | Jan 2013 | B2 |
8376150 | Surma et al. | Feb 2013 | B2 |
8542119 | Sankey | Sep 2013 | B2 |
9133649 | Taylor et al. | Sep 2015 | B2 |
9428938 | Taylor et al. | Aug 2016 | B2 |
20040027236 | Zhai | Feb 2004 | A1 |
20040160305 | Remenih et al. | Aug 2004 | A1 |
20050183479 | Alacqua et al. | Aug 2005 | A1 |
20050252260 | Chu | Nov 2005 | A1 |
20070131005 | Clare | Jun 2007 | A1 |
20070132551 | Mozer | Jun 2007 | A1 |
20070296545 | Clare | Dec 2007 | A1 |
20080184355 | Walrath et al. | Jul 2008 | A1 |
20080272606 | Alacqua et al. | Nov 2008 | A1 |
20090013736 | Voosen | Jan 2009 | A1 |
20090229321 | Eccles et al. | Jul 2009 | A1 |
20090217717 | Mrkovic et al. | Sep 2009 | A1 |
20090230275 | Lawall et al. | Sep 2009 | A1 |
20090230700 | Arabia et al. | Sep 2009 | A1 |
20090273440 | Marschalek et al. | Nov 2009 | A1 |
20090322531 | Estevez et al. | Dec 2009 | A1 |
20100097223 | Kruest et al. | Apr 2010 | A1 |
20100133126 | Shute et al. | Jun 2010 | A1 |
20100170310 | Ivashin et al. | Jul 2010 | A1 |
20100175438 | Sankey | Jul 2010 | A1 |
20100229610 | Garrigan et al. | Sep 2010 | A1 |
20100236306 | Trempala et al. | Sep 2010 | A1 |
20100300159 | Berg et al. | Dec 2010 | A1 |
20100320103 | Nilsson | Dec 2010 | A1 |
20110084799 | Ficko | Apr 2011 | A1 |
20110254661 | Fawcett et al. | Oct 2011 | A1 |
20110259063 | Foti | Oct 2011 | A1 |
20120043228 | Ezzo et al. | Feb 2012 | A1 |
20120047972 | Grant et al. | Mar 2012 | A1 |
20120085757 | Will et al. | Apr 2012 | A1 |
20120112912 | Berg | May 2012 | A1 |
20120228290 | Conti | Sep 2012 | A1 |
20130081434 | Grant et al. | Apr 2013 | A1 |
20130152646 | Field | Jun 2013 | A1 |
20130213100 | Cohen | Aug 2013 | A1 |
20150013398 | Taylor et al. | Jan 2015 | A1 |
Number | Date | Country |
---|---|---|
16979710 | Nov 2005 | CN |
9836142 | Aug 1998 | WO |
0061899 | Oct 2000 | WO |
2008034022 | Mar 2008 | WO |
2013008257 | Jan 2013 | WO |
Entry |
---|
First Office Action from corresponding Chinese patent application No. 201480039465.6, dated Nov. 18, 2016, 9 pages. |
“Instant security for standard commodity hooks”, 2013, 4 pages, InVue Security Products Inc., Charlotte, NC, USA. |
Lee W. Young, “Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration” for International Patent Application No. PCT/US2014/046158 filed Jul. 10, 2014, dated Jan. 16, 2015, pp. 1-10, Commissioner for Patents, Alexandria, Virginia USA. |
Extended European Search Report from related European Application No. 14834493.0, dated Jun. 20, 2016, 7 pages. |
First Examination Report from corresponding European Patent Application No. 14834493.0, dated Jul. 4, 2017 (4 pages). |
Second Office Action from corresponding Chinese Patent Application No. 201480039465.6, dated Sep. 5, 2017 (8 pages). |
Number | Date | Country | |
---|---|---|---|
20160369530 A1 | Dec 2016 | US |
Number | Date | Country | |
---|---|---|---|
61845392 | Jul 2013 | US | |
61891061 | Oct 2013 | US | |
61902900 | Nov 2013 | US | |
61904479 | Nov 2013 | US | |
61924321 | Jan 2014 | US | |
61973314 | Apr 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14824205 | Aug 2015 | US |
Child | 15249620 | US | |
Parent | 14328051 | Jul 2014 | US |
Child | 14824205 | US |