This invention relates to portable consumer articles and, more particularly, to a monitoring system for the articles that generates a signal as an incident of a system breach.
A multitude of monitoring/security systems have been devised to limit unauthorized handling and theft of portable articles. The theft problem is particularly prevalent in consumer electronics stores where expensive consumer articles such as cell phones, and the like, are displayed in large numbers and handled by many shoppers contemplating purchase.
The monitoring systems that have been devised vary widely in terms of construction, how they operate, and the particular breaches that they are designed to detect.
Typically, regardless of the precise construction of the monitoring system, it is configured to have an armed state and an unarmed state. In the unarmed state, the system can be set up to monitor one or more articles, as at a particular display location. Once the desired articles have been integrated into the monitoring system, the system can be placed in the armed state, as a result of which the designed-for system breach will cause generation of a signal that is detectable by itself and/or sent to another device or location for processing. By disarming a system, previously monitored articles may be handled and moved about without restriction. A disarmed system might be changed by being connected to another article, reconfigured, reprogrammed, etc.
Various actuators have been devised to facilitate the changing of the state of such systems by only authorized personnel. Currently, systems use keys, RFID, I-buttons, keypads, etc. Most of these systems require a user to carry or obtain a separate, commonly dedicated, device to be used when the system is armed and/or disarmed.
Keypads that are operable without an external device are prone to being compromised by creative thieves who may independently obtain access codes and/or observe the input thereof by an authorized person.
Given the number of such monitoring systems that may be present in a particular retail establishment, it is important for efficiency that authorized personnel be able to readily arm and disarm the systems as to permit articles to be moved between displays and allow reconfiguration of such systems, without compromising overall security.
One option is to have a number of different arming/disarming devices with each being operable with security systems associated with only one displayed device, or a limited number of displayed devices. In a large retail operation, this could require dozens of such arming/disarming devices to be kept on hand in a manner that their use can be coordinated with their related security systems. This may be highly inconvenient and may create situations where such devices are not readily available when needed.
Alternatively, a “master” device may be usable to operate large numbers, or all, of the monitoring systems in a display area. If the master device is controlled by an unauthorized person, the security of large numbers of devices may be compromised, thereby requiring re-keying, reprogramming, or other system modifications to safeguard the devices.
In one form, the invention is directed to the combination of a portable article and a system for monitoring the portable article. The monitoring system has an armed state and an unarmed state. The monitoring system in the armed state is configured to generate a signal as an incident of a system breach. The monitoring system includes an actuator system that is operable to change the monitoring system between the armed state and the unarmed state. The monitoring system is changeable at least one of: a) from the armed state into the unarmed state; and b) from the unarmed state into the armed state in response to an input generated by a detected fingerprint.
In one form, the monitoring system is changed from one of the armed state and unarmed state into the other of the armed state and the unarmed state as an incident of the input being generated.
In one form, as an incident of the input being generated, the actuator system is operable to change the monitoring system from one of the armed and unarmed states into the other of the armed and unarmed states.
In one form, the actuator system includes a fingerprint detector that has at least one of: a) an optical; b) a capacitive; c) an ultrasound; and d) a thermal scanner.
In one form, the actuator system has a fingerprint detector that is configured to operate by pressing one or more fingers on a surface.
In one form, the actuator system has a fingerprint detector that is configured to operate by dragging the finger relative to a surface.
In one form, the system breach that causes the generation of the detectable signal is movement of the portable article in relationship to a support for the portable article.
In one form, the system breach that causes the generation of the detectable signal is a change in orientation of the portable article.
In one form, the system breach that causes the generation of the detectable signal is a movement of the portable article outside of a prescribed area.
In one form, the system breach that causes the generation of the detectable signal is a separation of a part of the monitoring system from the portable article.
In one form, the system breach that causes the generation of the detectable signal is a reconfiguration of a part of the monitoring system.
In one form, the monitoring system includes a signal generator on the portable article and a signal receiver. The system breach results from the signal generator and signal receiver either: a) establishing communication; or b) having a communication interrupted.
In one form, the monitoring system includes a signal receiver on the portable article and a signal generator. The signal breach results from the signal generator and signal receiver either: a) establishing communication; or b) having a communication interrupted.
In one form, the system breach that causes the generation of the detectable signal is movement of the portable article.
In one form, the generated signal is communicated to a receiver.
In one form, the receiver generates a separate signal that can be identified by a user.
In one form, the generated signal is an audible signal.
In one form, the generated signal is a visual signal.
In one form, the portable article is a portable electronic article.
In one form, the portable article is a portable smart device displayed on a stand with the monitoring system in the armed state.
In
The portable article 10 may be any type of article, typically of the type displayed in retail establishments for inspection or purchase on site. The article may range from an article of clothing to an expensive or complicated electronic article. As one example, the portable article 10 may be a mobile smart device, with a display having an input surface, that is mounted/displayed on a stand 15.
The monitoring system 12 has an armed state and an unarmed state. The monitoring system 12 has a signal generator 16. The monitoring system 12 is configured so that the signal generator 16 generates a signal as an incident of a system breach.
The actuator system 14 has a fingerprint detector 18. Upon detecting an authorized fingerprint, an input is generated whereupon the actuator system 14 is operable to change, or allow change of, at least one of: a) the monitoring system from the armed state into the unarmed state; and b) the monitoring system from the unarmed state into the armed state.
Upon detecting the authorized fingerprint, the actuator system 14 may automatically cause the monitoring system 12 to change from the armed/unarmed state into the unarmed/armed state.
Alternatively, upon detecting the authorized fingerprint, the actuator system 14 may be changed into a mode wherein it is capable of being operated, as by further inputs, to change the state of the monitoring system and/or to make other system changes.
In
The signal generator 16 may itself be capable of producing a signal that is detectable, as by sight and/or sound. Alternatively, the signal generator may generate an input to a separate device 20, as at a remote location, where it can be viewed and/or otherwise processed. For example, the signal may be sent to a monitoring location, as to a computer or cell phone, from which information may be gathered and/or other action might be initiated. For example, details regarding the breach might be obtained, such as identification of an article and/or its location. Follow-up procedures might be initiated as to track the subject article, notify others of the breach, etc.
As shown in
The connection may be between the monitoring system 12 and some part of the portable article 10 that already exists. Alternatively, as shown in
The system breach may result from movement of the portable article outside of a prescribed area which breaks or establishes a connection between the monitoring system 12 and the portable article 10 as to cause the signal generation.
For example, as shown in
Alternatively, the interruption may occur by reason of a system reconfiguration. For example, the sensor 24 and the portable article 10 may be separated in an unauthorized fashion whereby the communication is interrupted. This may occur as the sensor 24 is removed from the portable article 10, if there is a severance of an electrical communication line between the monitoring system 12 and portable article 10, etc.
In an alternative design, a signal receiver/generator 30 at an exit location senses the presence of the signal receiver/generator 32 and causes a breach signal to be generated.
Essentially, the generic showing of components in
The fingerprint detector may be constructed utilizing well-known and developed fingerprint scanning/reading technology. Fingerprint reading technology usable, without limitation, is that in the optical, capacitive, ultrasound, and thermal categories. The fingerprint may be processed by pressing one or more fingers on a surface or by dragging the finger(s) relative to a surface.
The actuator system 14 might be programmed to recognize one or more fingerprints such that it might be inoperable by other than those persons authorized and whose prints are recognizable. The actuator system might be reprogrammable upon an authorized person inputting his/her print. Backup actuator devices could be implemented together with the print reading capability; however, as noted above, this may increase the likelihood of a system compromise.
The foregoing disclosure of specific embodiments is intended to be illustrative of the broad concepts comprehended by the invention.
Number | Date | Country | |
---|---|---|---|
62848660 | May 2019 | US |