As technology progresses, connectivity and functionality of electronic devices have expanded. This has resulted in rapid advancements in machine-to-machine connectivity and user experience with the electronic devices (e.g., smartphones and tablet personal computers). Operational improvements and value added applications are being achieved by the emergence of cost effective and ubiquitous connectivity. Standardization in the area of communication protocols and security measures is allowing for a rapidly evolving landscape in the retail and other environments.
In retail environments, Electronic Article Surveillance (“EAS”) systems are employed. A typical EAS system in a retail setting may comprise a monitoring system and at least one security tag or label attached to an article to be protected from unauthorized removal. The monitoring system establishes a surveillance zone in which the presence of security tags and/or labels can be detected. The surveillance zone is usually established at an access point for the controlled area (e.g., adjacent to a retail store entrance and/or exit). If an article enters the surveillance zone with an active security tag and/or label, then an alarm may be triggered to indicate possible unauthorized removal thereof from the controlled area. In contrast, if an article is authorized for removal from the controlled area, then the security tag and/or label thereof can be deactivated and/or detached therefrom. Consequently, the article can be carried through the surveillance zone without being detected by the monitoring system and/or without triggering the alarm.
The security tags may be reusable, and thus include releasable attachment elements for affixing the security tags to the articles. Such attachment elements are further designed to be releasable by authorized personnel only so that unauthorized removal of the security tags from their articles can be avoided. To this end, many attachment elements are made releasable only through the use of an associated special hook or detaching mechanism.
An exemplary security tag employing an attachment element and an associated detacher is described in U.S. Pat. No. 5,426,419 (“the '419 patent”), entitled SECURITY TAG HAVING ARCUATE CHANNEL AND DETACHER APPARATUS FOR SAME and assigned to the same assignee hereof. The security tag of the '419 patent includes a tag body and an attachment element in the form of a tack assembly. Notably, all of the security tag electronic components are disposed within the tag body. Accordingly, the tack assembly comprises a mechanical component absent of any electronic components.
The tack assembly is used to attach the tag body to an article which is to be protected by the security tag. This is accomplished by inserting a tack into an opening in the tag body. When the tack is fully inserted into the opening, it is releasably secured in the tag body via a releasable locking means. Access to the releasable locking means is through an arcuate channel. With this configuration, a special arcuate probe is needed to reach and release the releasable locking means, and thus detach the security tag from the article.
The present disclosure concerns implementing systems and methods for operating a security tag. The methods involve: coupling the security tag to an article by at least partially inserting an attachment assembly into a tag body; performing core security tag functions by a first electronic circuit disposed within the tag body of the security tag to protect the article from an unauthorized removal of the article from an area; performing at least one first peripheral security tag function by a second electronic circuit disposed within the attachment assembly of the security tag; and optionally performing at least one second peripheral function by a third electronic circuit exclusively coupled to the attachment assembly when the security tag is not coupled to the article.
In some scenarios, the core security tag functions include at least one of Electronic Article Surveillance (“EAS”) functions, Radio Frequency Identification (“RFID”) functions and tamper detection functions. The first peripheral security tag function is selected from a plurality of peripheral security tag functions based on an application-specific criteria. The application-specific criteria comprises cost of security tag fabrication, security tag disposability, security tag utilization flexibility, and security tag power saving capability. The plurality of peripheral security tag functions comprise at least one of power supply functions, power supply monitoring functions, sensor functions, sensor network transceiver functions, energy harvesting functions, user interface functions, alarm functions, and tamper detection functions.
In those or other scenarios, the first and second electronic circuits are electrically connected to each other via an elongate tack body extending down and away from a tack head of the attachment assembly. The elongate tack body comprises a plurality of conductive segments separated from each other by a plurality of insulative elements. Each conductive segment contacts a respective electrical contact of a plurality of electrical contacts disposed within the tag body so as to establish an electrical connection between the first and second electronic circuits. At least one of a battery, a battery monitoring circuit, a sensor circuit, an energy harvesting circuit, and an alarm circuit is disposed within a tack head of the attachment assembly.
In those or yet other scenarios, a closed circuit is created between the second and third electronic circuits when the security tag is coupled to the article. In contrast, an open circuit is created between the second and third electronic circuits when the security tag is decoupled from the article.
Embodiments will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures, and in which:
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
Reference throughout this specification to “one embodiment”, “an embodiment”, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present invention. Thus, the phrases “in one embodiment”, “in an embodiment”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used in this document, the singular form “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to”.
This disclosure concerns systems and methods for providing a multi-technology transponder and system. Security tag functions are modularized. The modularized functions are separated into two tag pieces, namely a tag body and an attachment element (e.g., a tack assembly). The modularized functions interface directly with each other and provide connectivity between the two tag pieces. This connectivity may be a wired or wireless connectivity. Although two tag pieces are described herein, a security tag may contain additional module pieces that directly connect as discussed herein.
The two tag pieces may comprise independent networks, where one network serves a particular application and the second network provides an alternate method of communicating with the security tag. Communication is provided by the modular connectivity between the two networks. Information and actions can be communicated between the different tag modules. For example, a 6LoWPAN network may receive a price update and communicate the information to a Bluetooth smart controller. Also, sensor events occurring in a module can be communicated to other modules.
The systems and methods described herein are applicable to intrusion applications, access applications, home automation applications, and/or other applications where security tag functionality is enhanced by attaching sensors or electronics in a tightly coupled manner. In retail applications, the security tag disclosed herein can be attached to an item so as to provide improved customer experience and desired operational efficiencies.
Referring now to
Tack assembly 110 has a tack head 112 and an elongate tack body 202 extending down and away from the tack head. The tack body 202 is sized and shaped for insertion into opening 204 and removal from opening 204. A plurality of grooves 406 may be formed along a length of the tack body 202 for engagement with a securement mechanism 206 disposed within the housing 104. When the grooves 406 are engaged by the securement mechanism 206, the security tag 100 is secured to the article 114. The invention is not limited in this regard. For example, in other scenarios the tack body does not have any grooves formed there along. As such, a magnetic securement mechanism (instead of a mechanical securement mechanism) is employed in this case.
Thereafter, unauthorized removal of the article 114 from a controlled area can be detected by a monitoring device of an EAS system. Such monitoring devices are well known in the art, and therefore will not be described herein. Still, it should be understood that at least one sensor (not shown in
Such detection occurs when the security tag is present within a surveillance zone established by the monitoring device. The surveillance zone is usually established at an access point for the controlled area (e.g., adjacent to a retail store entrance and/or exit). If the article 114 enters the surveillance zone with the security tag 100, then an alarm may be triggered to indicate possible unauthorized removal thereof from the controlled area. In contrast, if the article 114 is authorized for removal from the controlled area, then the security tag 100 thereof can be deactivated and/or detached therefrom using a detachment mechanism 102 (or external tool). Consequently, the article 114 can be carried through the surveillance zone without being detected by the monitoring system and/or without triggering the alarm.
The detachment mechanism 102 is sized and shaped to at least be partially slidingly inserted into and removed from an insert space 116 formed in the housing 104. When inserted into insert space 116, the detachment mechanism 102 travels through an arcuate channel 500 so as to be guided towards the securement mechanism 206. In this regard, the detachment mechanism 102 has a generally arcuate shape matching that of the arcuate channel 500. Upon engagement with the securement mechanism 206, the detachment mechanism 102 releases the tack body 202 therefrom. Next, the tack body 202 can be removed from the housing, so as to decouple the security tag 100 from the article 114.
As noted above, the security tag 100 comprises a plurality of electronic components. The electronic components include, but are not limited to, an EAS/RFID component, a battery, an energy harvesting circuit, sensors, a display and/or alarm outputs. The electronic components can be selectively disposed within the tag body and/or the tack assembly in accordance with a particular application. Notably, this selective disposition of electronic components provides a tack assembly with a modular form of construction that can be customized to a particular application, whereby overall fabrication costs of security tags are decreased and/or power savings are achieved.
Referring now to
An EAS/RFID component 306 is disposed within the tag body 302. EAS/RFID components are well known in the art, and therefore will not be described herein. Any known or to be known EAS/RFID component can be used herein without limitation. In some scenarios, the EAS/RFID component comprises a transceiver, antenna and processor. The tack assembly 304 may comprise at least a portion of the antenna.
Optional detachment sensors 308, 310 are also disposed within the tag body 302. The detachment sensors 308, 310 are provided to detect when tampering of the security tag occurs (e.g., a lanyard has been cut or a circuit has been shorted). When such detection is made, the security tag 300 performs one or more operations to notify store personnel that such tampering has occurred. These operations can include, but are not limited to, communicating a signal to a remote computing device via the EAS/RFID component, and/or outputting an alarm via an optional alarm circuit. In some scenarios, 6LoWPAN and Bluetooth are used as a network and user interface. The alarm may be an auditory alarm, a visual alarm or a vibrational alarm. The optional alarm circuit can be provided with the EAS/RFID component 306.
The tack assembly 304 has a tack head 316 and an elongate tack body 318 extending down and away from the tack head. As shown in
Notably, elongate tack body 318 is configured to electronically connect the electronic components 402, 404 disposed within the tack head 316 and the electronics component 306 disposed within the tag body 302. In this regard, the elongate tack body 318 comprises three conductive segments 406, 408, 410 separated from each other by two insulative segments 412, 414. Conductive segment 406 provides a means for communicatively connecting the electronic components 402, 404 to the EAS/RFID component 306. Conductive segment 408 provides a means for supplying power from battery 402 to the EAS/RFID component 306. Conductive segment 410 provides a means for providing a ground connection between the tag body 302 and the tack assembly 304. The electrical connections are achieved via electrical contacts 320 disposed within the tag body 302. Each electrical contact 320 contacts a respective conductive segment 406, 408 or 410 when the elongate tack body 318 is inserted into the tag body 302.
Referring now to
An EAS/RFID component 508 is disposed within the tag body 502. EAS/RFID components are well known in the art, and therefore will not be described herein. Any known or to be known EAS/RFID component can be used herein without limitation. In all scenarios, the EAS/RFID component 508 comprises a transceiver, an antenna and/or a processor. For example, the EAS and RFID data, conditions and parameters can be defined and communicated by network communication through Bluetooth or other network module. In some scenarios, the tack assembly 512 and/or a lanyard (not shown in
Optional detachment sensors 532, 534 are also disposed within the tag body 502. The detachment sensors 532, 534 are provided to detect when tampering of the security tag is occurring (e.g., the cutting of a lanyard 750 or the shorting of a circuit). When such detection is made, the security tag 500 performs one or more operations to notify store personnel that tampering of the security tag has occurred. These operations can include, but are not limited to, communicating a signal to a remote computing device via the EAS/RFID component, and/or outputting an alarm via an optional alarm circuit. The alarm may be an auditory alarm, a visual alarm or a vibrational alarm. The optional alarm circuit can be included with the EAS/RFID component 508.
The tack assembly 512 has a tack head 514 and an elongate tack body 516 extending down and away from the tack head. As shown in
The sensor circuit includes, but is not limited to, at least one sensor, a transceiver, antenna and/or processor. The sensor comprises, but is not limited to, an environmental sensor (e.g., an ambient light sensor, a temperature sensor, a humidity sensor and/or a carbon dioxide sensor) and/or a motion sensor (e.g., accelerometers and/or gyroscopes). The sensor circuit is supplied power from a battery 544 disposed within the tack head, and communicates sensor data to a remote computing device via a wireless sensor network (e.g., a WiFi or RS232 based network).
The energy harvesting circuit 542 includes a capacitive storage element and/or a photovoltaic cell. The magnet 518 is provided to facilitate detecting when tampering of the tack assembly 512 occurs (e.g., the unauthorized pulling of the tack assembly in a direction 538 so as to be decoupled from the tag body 502). In some scenarios, the magnet 518 actuates a switch (not shown in
Notably, elongate tack body 516 is configured to electronically connect the electronic components 506, 510, 542, 544 coupled to the tack assembly 512 and the electronics component 508 disposed within the tag body 502. In this regard, the elongate tack body 516 comprises three conductive segments 520, 524, 528 separated from each other by two insulative segments 522, 526. Conductive segment 520 provides a means for communicatively connecting the electronic components 506, 510, 542 and/or 544 to the EAS/RFID component 508. Conductive segment 524 provides a means for supplying power from battery 544 to the EAS/RFID component 508. Conductive segment 528 provides a means for providing a ground connection between the tag body 502 and the tack assembly 512. The electrical connections are achieved via electrical contacts 530 disposed within the tag body 502. Each electrical contact 530 contacts a respective conductive segment 520, 524 or 528 when the elongate tack body 516 is inserted into the tag body 502.
Referring now to
However, security tag 600 includes additional components which are not present in security tag 500. These components include an energy harvesting circuit 648 disposed within the tag body 502 and a switching element 646, 650 at least partially disposed within the tack assembly 504. The energy harvesting circuit 648 comprises a capacitive storage element for facilitating the detection of tampering and/or the communication of a signal from the EAS/RFID component 508 to a remote computing device subsequent to when the tack assembly 512 has been removed from tag body 502, i.e., subsequent to when battery 544 is no longer supplying power to the EAS/RFID component 508.
The switching element 646 provides a means to (a) create an open circuit between the battery 544 of the tack assembly 512 and at least the sensor circuit 510 when the tack assembly 512 is not coupled to the tag body 502, and (b) a closed circuit between the battery 544 of the tack assembly 512 and at least the sensor circuit 510 when the tack assembly 512 is coupled to the tag body 502. In this way, the switching element 646 provides power savings in relation to the battery. In some scenarios, the switching element 646 comprises a reed switch which is actuated via a magnet 650 and/or a pin (not shown) disposed in the tag body 502, i.e., the magnet and/or pin cause the position of the switching element 646 to transition from a closed position to an open position (or vice versa).
As an alternative to disconnecting the battery, the sensors of circuit 510 are disabled when not in communication with the electronics of tag body 502. Although the sensors will draw power from the battery 544, the sensor circuit would be placed in a standby mode or a low power mode. Power conservation is also implemented by disabling certain functions when the security tag 600 has been dormant for a period of time. Microprocessors implement power save options for this purpose. Sensors can be turned on and off as needed to conserve power. For example, the processor and all sensors, except for the accelerometer, can be turned off or placed in a low power mode. A processor can be re-enabled (or turned on) based on an interrupt or input from accelerometer motion causing the crossing of a given G-force threshold or movement. A capacitive touch sensor or other sensor can also provide this type of re-enablement.
Referring now to
However, security tag 600 includes additional components which are not present in security tag 500. These components include projections 702, 706 and cavities 704, 708. The projections 702, 706 protrude out and away from a surface 710 of the electronic components 504. The cavities 704, 708 are formed in a surface 712 of the tag body 502. The projection 702 and cavity 704 are shaped and sized so as to mate with one another when the electronic component 504 is moved in proximity to the tag body 502. Similarly, the projection 706 and cavity 708 are sized and shaped so as to mate with one another when the electronic component 504 is moved in proximity to the tag body 502. The matting projections and cavities provide a means for relatively positional stability of the tag body 502 and the electronic component 504. In this regard, the mating projections and cavities prevent rotation of the tag body 502 and the electronic component 504 relative to each other when the tack assembly 512 is coupled to the tag body 502.
Notably, the present invention is not limited to the projection and cavity arrangement of
As evident from above, the novel approach described herein provides a tag body including a core controller (e.g., the EAS/RFID component) and tack assembly including select electronic components (e.g., sensors and/or battery). The electronic components of the tack assembly are selected based on the particulars of an application. This selective or modular arrangement of the security tag's electronic components facilitates the flexibility in the design and cost of the security tags. For example, a first person desires a security tag comprising only EAS/RFID functionality. In this case, the tag body is provided with the EAS/RFID component disposed therein, while a battery and battery monitoring circuit is disposed within the tack assembly. In contrast, a second person desires a security tag comprising EAS/RFID functionality as well as sensor network functionalities. In this case, the tag body is provided with the EAS/RFID component disposed therein, while a battery, battery monitoring circuit and sensor circuit are respectively disposed within or directly coupled to the tack assembly. In this way, the tack assembly is customizable to particular applications.
Referring now to
In a next step 806, core security tag functions are performed by a first electronic circuit (e.g., electronic circuit 306 of
Thereafter in step 808, at least one first peripheral security tag function is performed by a second electronic circuit (e.g., circuit 402 of
Notably, the first and second electronic circuits are electrically connected to each other via an elongate tack body (e.g., elongate tack body 318 of
Referring again to
Subsequently, the security tag is decoupled from the article, as shown by step 812. Notably, an open circuit is optionally created between the second and third electronic circuits when the security tag is decoupled from the article, as shown by step 814. In this regard, it should be understood that a closed circuit between the second and third electronic circuits when the security tag is coupled to the article. Thereafter, step 816 is performed where method 800 ends or returns to step 804.
All of the apparatus, methods, and algorithms disclosed and claimed herein can be made and executed without undue experimentation in light of the present disclosure. While the invention has been described in terms of preferred embodiments, it will be apparent to those having ordinary skill in the art that variations may be applied to the apparatus, methods and sequence of steps of the method without departing from the concept, spirit and scope of the invention. More specifically, it will be apparent that certain components may be added to, combined with, or substituted for the components described herein while the same or similar results would be achieved. All such similar substitutes and modifications apparent to those having ordinary skill in the art are deemed to be within the spirit, scope and concept of the invention as defined.
The features and functions disclosed above, as well as alternatives, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements may be made by those skilled in the art, each of which is also intended to be encompassed by the disclosed embodiments.
This application is a continuation of U.S. patent application Ser. No. 14/790,215 filed Jul. 15, 2015, now U.S. Pat. No. 9,978,235 issued May 22, 2018, the entirety of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 14790215 | Jul 2015 | US |
Child | 15986519 | US |