Not Applicable
Not Applicable
1. Field of the Invention
This invention relates to electronic article surveillance (EAS) and more particularly to a portable apparatus that resets the security features of an EAS device to a preselected configuration.
2. Description of the Related Art
EAS systems are well known for the prevention or deterrence of unauthorized removal of articles from a controlled area. In a typical EAS system, tags designed to interact with an electromagnetic field located at the exits of the controlled area are attached to articles to be protected. If a tag is brought into the electromagnetic field or “interrogation zone”, the presence of the tag is detected and appropriate action is taken. For a controlled area such as retail store, the appropriate action taken for detection of an EAS tag may be the generation of an alarm. Some types of EAS tags remain attached to the articles to be protected, but are deactivated prior to authorized removal from the controlled area by a deactivation device that changes a characteristic of the tag so that the tag will no longer be detectable in the interrogation zone. U.S. Pat. No. 4,510,489 illustrates one such EAS system.
The majority of EAS tag deactivation devices are fixed at a specific location, such as adjacent a point-of-sale (POS) station in a retail environment. If an article is purchased, and for whatever reason the attached EAS tag is not deactivated at the deactivator adjacent the POS station, the EAS tag will set off an alarm at the store exit. To then deactivate the EAS tag, the article must be brought back to the deactivator adjacent the POS station, which causes confusion and customer embarrassment. Handheld deactivators for RF type EAS tags, which are part of a handheld bar-code scanner, are known, but still require the EAS tag to be brought near the POS station, within range of the handheld scanner/deactivator cord, for deactivation.
In U.S. patent application Ser. No. 09/723,641, filed Nov. 27, 2000, a cordless, handheld deactivator that deactivates EAS tags when they are away from or “remote” from the hardwired deactivator near the POS station is disclosed. Operation of that device, and many other devices, require storing a security code, or personal identification code, into the device that must be input to activate the device, much like a password permits access to a computer. Upon initial use of the device, a security code is selected by the user and must be input before the device can be activated. If the selected security code is forgotten, the device cannot be activated. A service call must be made to reinitialize or reset the device to the initial factory configuration. Once the device is initialized, the user can select a new security code for operation. An apparatus is needed that provides a secure method to enable a user to reinitialize the device so that a new security code can be stored therein. Presently, re-initialization requires a service call for security reasons. Otherwise, a stolen portable deactivator, or similar device, could be reinitialized and used by a thief, even though the thief does not know the security code that was initially used to activate the device.
Certain devices may have other user-defined settings, which would be lost upon reinitializing the device. A reinitializing apparatus could be used to read and temporarily store the user-defined settings and restore the device to those settings upon reinitialization. Thus, a technician performing service call to work on such a device will be able to reset the device to user-specified settings rather than to default factory settings after servicing the device.
A portable and programmable security reinitialization method and apparatus for electronic article surveillance devices, includes a processor; and a method of communication with an electronic article surveillance device to be reinitialized connected to the processor. A button or other mechanism connected to the processor for activating a security code reinitialization in the device to be reinitialized wherein a security code stored in the device is set to a preselected value. The processor is preferably battery powered and includes a sleep mode and an active mode, where the sleep mode uses less power than the active mode for reducing battery consumption. Including either a reset or timeout for putting the processor into the sleep mode. A push-button or other method can be used for putting the processor into the active mode and for activating the security code reinitialization.
The apparatus can further include a receiver for sending a signal to the processor after receipt of a valid EAS transmit signal at a preselected frequency and threshold, the processor activating the security code reinitialization only after receipt of the valid EAS transmit signal. The apparatus can include an interface for programming the processor. The communication can be via RS-232 protocol. The apparatus can include video and/or audio feedback to a user. A real-time clock can be used with a software-controlled oscillator for driving audio feedback.
Objectives, advantages, and applications of the present invention will be made apparent by the following detailed description of embodiments of the invention.
The present invention is an electronic key capable of reinitializing or resetting a security disabled EAS device. The key can be connected to the programming port of an EAS device and perform a preset reprogramming operation, resetting activated security features. The key could be purchased for customer use, and would be secured by pre-selecting the total number of uses, such as one use. The one-time use would begin once the key is activated. Activation of the key is also uniquely controlled to prevent its misuse. In one embodiment, the electronic key must detect the interrogation field of a properly functioning EAS exit system prior to becoming enabled. The allowed usage can be limited by time, the number of units reprogrammed, or a combination of both. Once the key has been activated for its pre-selected number of uses and shuts off, only qualified service personnel can reset the electronic key function for further uses.
The electronic key can be a secure, portable, and battery powered for initializing a secured EAS system's security protocol to factory default state, or to another preselected state. The key has its own set of security protocols to prevent unauthorized use and can easily be reprogrammed for a wide variety of other functions including, but not limited to, firmware upgrading, diagnostic testing, and the like.
Referring to
Processor 2 can be configured to prevent operation of key 1 until an interrupt is received from EAS system receiver 14. If enabled, receiver 14 provides passive signal sampling for an EAS interrogation field. If transmit bursts are received from an EAS system transmit antenna at a predetermined frequency and threshold, receiver 14 sends an interrupt to processor 2 indicating that a valid EAS system detection has occurred. This feature will prevent the key from being used in an unauthorized area to reinitialize a portable EAS tag deactivator, for example.
Programming interface 16 is a serial interface that permits reprogramming of processor 2. Updates and configuration/operational changes are easily performed on key 1 through interface 16. Reset 18 returns processor 2 to the sleep mode, which conserves battery life. Processor 2 may be configured to return to the sleep mode automatically after a preselected time period without activity. Real-time clock 20 provides counter/timer functions for processor 2 and can provide a software-controlled oscillator to drive the audio indicator, piezo 10.
The processor 2, which can be a microcontroller, is programmed to be responsible for analyzing all signal inputs. When all required conditions have been met, the processor 2 initiates communication with the desired EAS equipment via the RS-232 port 8 and performs the security code reset function. Processor 2 will then qualify whether or not its programmed life cycle has expired. If the preselected number of resets has expired, the processor 2 renders the electronic key 1 inoperable. The user cannot reset this shutdown mode, even if power to key 1 is cycled, and requires the key 1 to be reset/reinitialized by authorized personnel.
Referring to
Referring to
As illustrated for the alternate embodiment, security key 1 can be configured in further embodiments for any number of specific applications and is not limited to the examples demonstrated herein.
It is to be understood that variations and modifications of the present invention can be made without departing from the scope of the invention. It is also to be understood that the scope of the invention is not to be interpreted as limited to the specific embodiments disclosed herein, but only in accordance with the appended claims when read in light of the forgoing disclosure.
Number | Name | Date | Kind |
---|---|---|---|
4510489 | Anderson et al. | Apr 1985 | A |
4546436 | Schneider et al. | Oct 1985 | A |
5353011 | Wheeler et al. | Oct 1994 | A |
5433096 | Janssen et al. | Jul 1995 | A |
5537126 | Kayser et al. | Jul 1996 | A |
5583819 | Roesner et al. | Dec 1996 | A |
5675490 | Bachhuber | Oct 1997 | A |
5778882 | Raymond et al. | Jul 1998 | A |
6025780 | Bowers et al. | Feb 2000 | A |
6360208 | Ohanian et al. | Mar 2002 | B1 |
6630885 | Hardman et al. | Oct 2003 | B2 |
6700489 | Easter et al. | Mar 2004 | B1 |
Number | Date | Country |
---|---|---|
WO 9115645 | Oct 1991 | WO |
Number | Date | Country | |
---|---|---|---|
20040046664 A1 | Mar 2004 | US |