1. Field of Invention
This invention relates to anti-theft devices for items of merchandise. More particularly, this invention relates to a security device powered with electrical power. Specifically, this invention relates to a security device having a primary power source and a secondary power source that backs up the primary power source and still allows the security device to activate and alarm when the primary power source fails.
2. Background Information
Heretofore, there have existed many product independent anti-theft devices intended to secure a wide range of commercial products. For example, electronic article surveillance (EAS) tags may be placed inside a box, adhered onto a product, or placed within the pages of a book. To defeat the EAS tag, an individual would only have to remove it from the product. As a natural consequence, anti-theft devices have evolved to include devices which secure the EAS tag to the product while also protecting the tag from tampering and removal. These devices incorporate attachment mechanisms which are simultaneously difficult for a thief to remove yet easy for a checkout clerk to remove when supplied with the right key. At present, many anti-theft devices are generally “one size fits all” and product independent. Furthermore, present anti-theft devices require a key or code to unlock the anti-theft device adding complexity and time to the checkout process.
Other more complex security device can be armed with electronic sensors to detect when the security device is tampered with or removed from an item of merchandise. For example, electronic cable types wherein cables wrap around a box containing merchandise or through a portion of the merchandise to lock the security device to the merchandise. When one of the cables is cut or removed while the device is armed it will sound an alarm. However, these more complex type security devices require electrical power, often in the form of a battery. To defeat these types of electronic protection devices, a thief can remove screws from a door covering a battery that powers the device. Once the door is opened, the battery can be quickly removed to disable the device. Because of flaws in current anti-theft devices, better anti-theft devices are desired.
The preferred embodiment of the invention includes a merchandise protection device. The merchandise protection device includes a housing with an access door that has an open position and a closed position, a primary power source, a secondary power source and alarm system. The access door can be simply opened (without needed any tools) to allow the primary power supply to be changed. For example, the door may contain a simple finger tab that can be pressed to allow the access door to be opened. The alarm system determines when a voltage of the primary power source drops below a threshold value. When the voltage drops below the threshold value, the alarm system switches to the secondary power source for its power. When the alarm system is in a standby mode, it will not generate alarms when operating on the secondary power source. However, when the alarm system has not been placed into a standby mode, the alarm system will generate alarms when operating on the secondary power source and the access door is in the open position.
In another embodiment, the merchandise protection device is associated with a key. When the key is in the proximity of the merchandise protection device, a sensor on the merchandise protection device will place it into the standby mode.
In other configurations of the preferred embodiment, the merchandise protection device includes a lock to prevent the access door from being opened by unauthorized personnel. When the lock is unlocked, the access door can be opened allowing access to the primary power source.
In one configuration of the preferred embodiment, the primary power source is a battery and the secondary power source is a capacitor.
One or more preferred embodiments that illustrate the best mode(s) are set forth in the drawings and in the following description. The appended claims particularly and distinctly point out and set forth the invention. The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate various example methods, and other example embodiments of various aspects of the invention. It will be appreciated that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent one example of the boundaries. One of ordinary skill in the art will appreciate that in some examples one element may be designed as multiple elements or that multiple elements may be designed as one element. In some examples, an element shown as an internal component of another element may be implemented as an external component and vice versa. Furthermore, elements may not be drawn to scale.
Similar numbers refer to similar parts throughout the drawings.
Security device 100 can also include a key 121 for deactivating an internal alarm within cable-lock 102. The key 121 can be any key that can deactivate the alarm and can be used in combination with a key sensor 120 (
A primary power source 112 and a secondary power source 113 are connected to the alarm control logic 110. The primary power source 112 can be a battery and the secondary power source 113 can be a large capacitor (e.g., megacap) or another smaller battery. The alarm control logic 110 is configured to receive its power from the primary power source 112 until its voltage falls below a threshold value. When this happens, the alarm control logic 110 is configured to switch to the secondary power source 113.
In the cable-lock embodiment, the alarm control logic 110 can also be connected to other devices in cable-lock 102 useful in the operation of the cable-lock. For example, alarm control logic 110 is connected to a door sensor 117 by a switch or another type of device that can detect when the access door 108 is open. Alarm control logic 110 is also connected to an audio speaker 116. The cable-lock also may contain other security devices such as an EAS tag 130.
Having described the components of cable-lock 102, its operation is now discussed. In operation, the primary power source 112 is used to power the alarm control logic 110 and other electronic devices in the cable-lock 102. The secondary power source 113 is used as a backup to the primary power source 112, such as when the primary power source 112 loses some of its charge and needs to be replaced. Before the charge from primary power source 112 is insufficient to power the cable-lock 102, the alarm control logic 110 will switch to the secondary power source 113 and use this power for its power needs. In some embodiments, this may be a smaller power source but will provide time necessary to change the primary power source 112. There may be an LED (not shown) that the alarm control logic 110 can cause to blink when it has switched to the secondary power source 113 to provide an indication that the primary power source 112 has failed and needs to be replaced.
In operation, a store employee can take the cable-lock 102 and attach it to a merchandise item by wrapping the cable 104 around or through a merchandise item and then locking both ends of the cable 104 into the housing body 103. As previously mentioned, one cable end may be permanently attached the housing body 103. The other end may contain a plug that is slid into the housing body 104 and locked inside by a mechanical type of locking mechanism as understood by those of ordinary skill in the art that can be opened with a magnetic key or another mechanism. In one configuration, the sliding and locking of the cable 104 to the housing body 103 activates the alarm system.
When the alarm system is activated, the merchandise item with the cable-lock 102 securely attached to it can be securely placed in a retail setting. Consumers can now handle the merchandise item and become acquainted with the item before purchasing the item. The retail establishment can rest assured that the merchandise item is secure due to one or more alarms monitored by the alarm control logic 110.
A variety of alarms can be monitored and alarm signals generated by the alarm control logic 110. For example, when the cable 104 is severed, an electrical pathway passing through the cable 104 is opened. The alarm control logic 110 detects this open circuit and can generate an audible alarm using the speaker 116, flash LEDs, send electronic messages or generate other alarm indications. Alternatively, a thief may try to open the access door 108 to quickly remove the primary power source 112 (battery) in an attempt to disable the entire alarm system. When the access door 108 is opened, the door sensor 117 is decompressed and the alarm control logic 110 can detect this and generate an appropriate alarm. Even when the primary power source 112 is quickly removed, the secondary power source 113 which is not readily accessible through open door 108, can still operate the alarm system and generate alarm indicators. The EAS tag 130 provides another level of security. When the cable-lock 102 is brought within range of an alarm gate near an exit, the alarm gate will sense the EAS tag 130 and sounds an alarm.
When the primary power source 112 needs to be replaced, an authorized person can bring the electronic key 121 in proximity of the key sensor 120 so that the alarm control logic 110 can securely disable the alarm. Of course, the alarm system can be deactivated in other ways as understood by those with ordinary skill in the art. When the system is disabled, the access door 108 can be opened by merely pressing the tab button 109 and opening the access door 108. No screws need to be removed and no other tools may be needed. With the access door 108 open, the primary power source 112 can be replaced. After replacement, the alarm system can be rearmed by again engaging the key sensor 120 with the key 121, pressing an activation button, or by another method as understood by those of ordinary skill in the art.
At the time of purchase, a cashier may deactivate the system with the key 121 and remove at least one end of the cable 104 from the housing body 103 and removed the cable lock 102 from the merchandise item. The cable-lock 102 can be kept in deactivated state until it is re-attached to a different merchandise item and reused.
The lock unit 141 as well as a speaker 156 is connected to the alarm control logic 152. A switch 155, which is a plunger switch in the embodiment shown in the drawings, is located so that it is depressed when the drawer is in the closed position as shown in
The lock unit 141 is illustrated in
Having described the structure of the security gate 135 with a drawer 140, its operation will now be discussed. In normal operation, the security gates 135 will be powered up continually sensing to determine when a device with an EAS tag is within proximity or passing through the gates 135. For example, when a cable-lock 102 such as shown in
During normal operation, the electronics within the gate 135 are normally powered by the primary power source 150. However, when power source 150 fails or its voltage drops past a predetermined threshold value, the alarm control unit 152 will switch to the secondary power source 151. Example circuits in the alarm control unit 152 that make this switch are discussed below with reference to
When the primary power source 150 needs changed, an authorized person can unlock the lock unit 141 using a key 142 to rotate the key as shown by arrow E in
When the drawer 140 is pulled out, the alarm control unit 152 and other electronics in the gate 135 can still be powered by the secondary power source 151. Normally the alarm control unit 152 and other electronics are powered by the primary power source 150 through wires 163 and 164. Wire 163 is connected to the primary power source through the contact pin 162 and contact strip 160 (
If, however, someone tries to open the drawer 140 by sliding it open without deactivating the alarm control unit 152 by unlocking the lock 141, then the alarm unit will detect that the drawer 140 is being opened because the plunger switch 155 will open as shown in
As discussed in detail above, the preferred embodiment of the invention includes a primary power supply and a secondary power supply. For example, these two power supplies can be included in each of the wireless alarm units 220A, 220B, 220C attached to each corresponding merchandise items 203A, 203B, 203C. Initially, alarm circuits inside the wireless alarm units 220A, 220B, 220C would be powered by the primary power supplies. Again, if the primary power supply loses power, the alarm circuits are still powered by a secondary power supply. The alarm circuits can be used to generate an alarm if the wireless alarm units 220A, 220B, 220C are removed from the corresponding merchandise items 203A, 203B, 203C or if the corresponding merchandise items 203A, 203B, 203C are moved too far away from the merchandise display 202. Alternatively, the alarm units 220A, 220B, 220C can be configured to generate an alarm when moved within a predetermined distance of a security gate located near a door.
The merchandise display stand 202 can include a power supply 205 for supplying power through cables 212 to the wireless alarm units 220A, 220B, 220C when the wireless alarm units 220A, 220B, 220C are resting on corresponding pedestal assemblies 219A, 219B, 219C. For example, when the primary and secondary power supplies in the wireless alarm unit 220A are batteries, then the batteries can be charged and the alarm unit 220A can be powered through a cable 212 when it is resting on its corresponding pedestal assembly 219A.
In operation, the voltage input line is used to power the control logic 171 with the auxiliary battery. In normal operation, the gate output voltage from the sensor logic 171 is low to open the source and drain of the transistor so that the auxiliary battery does not supply power to a load (Vout). Instead, the main battery is connected to and supplies power to the load. The control logic 171 senses the voltage supplied to the load by the main battery through input sense. If this voltage drops below a threshold value, then it is likely that the main battery has failed or can no longer supply adequate power. The control logic 171 can sense this condition and supply a voltage to the transistor 170 to turn it on and connect the auxiliary battery to the load (Vout). When this occurs, the control logic 171 can also output a signal to alert that the auxiliary battery is now being used. For example, the control logic 171 can output a voltage to turn on an LED (not shown).
The circuit 1100 of
Example methods may be better appreciated with reference to a flow diagram. While for purposes of simplicity of explanation, the illustrated methodologies are shown and described as a series of blocks. It is to be appreciated that the methodologies are not limited by the order of the blocks, as some blocks can occur in different orders and/or concurrently with other blocks from that shown and described. Moreover, less than all the illustrated blocks may be required to implement an example methodology. Blocks may be combined or separated into multiple components. Furthermore, additional and/or alternative methodologies can employ additional, not illustrated blocks.
A method for switching from a primary power source to a secondary power source is illustrated in
In other configurations of the method, a determination could be made to see if the alarms of the device were securely disabled. If so, then the alarm will not sound when the primary power source is replaced. If not, then an alarm can be sounded when an access door to the primary power source and a tray holding the primary power source is opened.
In the foregoing description, certain terms have been used for brevity, clearness, and understanding. No unnecessary limitations are to be implied therefrom beyond the requirement of the prior art because such terms are used for descriptive purposes and are intended to be broadly construed. Therefore, the invention is not limited to the specific details, the representative embodiments, and illustrative examples shown and described. Thus, this application is intended to embrace alterations, modifications, and variations that fall within the scope of the appended claims.
Moreover, the description and illustration of the invention is an example and the invention is not limited to the exact details shown or described. References to “the preferred embodiment”, “an embodiment”, “one example”, “an example”, and so on, indicate that the embodiment(s) or example(s) so described may include a particular feature, structure, characteristic, property, element, or limitation, but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element or limitation. Furthermore, repeated use of the phrase “in the preferred embodiment” does not necessarily refer to the same embodiment, though it may.
This application claims priority from U.S. Provisional Application Ser. No. 61/504,857, filed Jul. 6, 2011, the disclosure of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61504857 | Jul 2011 | US |