A preferred embodiment of the invention, illustrated of the best mode in which Applicant contemplates applying the principles, is set forth in the following description and is shown in the drawings and is particularly and distinctly pointed out and set forth in the appended claims.
Similar numbers refer to similar parts throughout the drawings.
The programmable key of the present invention is indicated generally at 1, and is shown particularly in
In accordance with one of the main features of the invention, a logic control circuit is formed on a printed circuit board 13 and is located within housing chamber 9. The logic control circuit includes a main controller, which preferably is a microprocessor 15, a security disarm code (SDC) memory 17, a wireless communication circuit 19 and an activation switch 21. The details of the various circuitry is shown in
An LED 35 is mounted on printed circuit board 13 and is located adjacent a light pipe 37 mounted in upper housing 5, to enhance the visual effect of LED 35 when actuated. A foam pad 37 preferably is located between battery 23 and printed circuit board 13 and secures battery 23 in position, as well as providing cushioning for the circuit board and maintains its spacing and location within housing chamber 9.
Controller 15 includes as a feature thereof a timer shown diagrammatically for illustrative purposes as block 39 in
It is readily understood that the particular circuitry shown in
Key 1 is intended to be used primarily in a security system for protecting items of merchandise such as shown and described in a copending patent application entitled, Security System And Method For Protecting Merchandise, filed concurrently herewith, and shown diagrammatically in
Key 1, when supplied to a retail establishment, preferably will not contain any coded information and will obtain the same by communicating with the circuitry of programming station 43 via wireless communication circuit 19. This is accomplished by placing housing end 28, and particularly lens 31, adjacent a wireless communication port 49 in programming station 43, and upon actuation by depressing button 21, will receive a randomly generated security disarm code (SDC) from programming station 43. Once this SDC is generated by programming station 43, it preferably will always remain the same throughout its useful life. This SDC is received and stored in SDC memory 17 of the control logic circuit of key 1. Key 1 is then taken by a clerk to a security device 45, which could be an alarming module or other type of device, which is connected to merchandise 47 by a cable 51, flexible conductor or other type of lanyard which preferably includes a sensing loop which will prevent the removal of merchandise 47 therefrom and/or will cause an alarm to be sounded in security device 45 if the integrity thereof is compromised. The particular form and type of security device 45 can vary considerably from that shown in the above referenced pending patent application without affecting the concept of the invention. Key 1 is then placed in a wireless communication port 53 formed in security device 45. Switch 21 is again activated, and communication circuit 19 will transmit the previously stored SDC from key 1 into an SDC memory contained in a logic circuit of security device 45.
Upon key 1 acquiring the SDC from programming station 43, it will start internal timer 39 which has been preset at the factory, for example 96 hours, which through the control logic circuit will automatically invalidate the SDC contained therein, unless refreshed within the preset time period, thereby making the key inoperative for further use even by authorized personnel. This prevents the key from being stolen and then subsequently reused in the same store after this preset time period, and even more importantly, since the SDC is unique only to that store, the key cannot be taken to another store even using the same type of security system and security devices, and be used in an unauthorized manner since the SDC contained therein will not match the SDC previously stored in the security devices of a different store. Thus, a store clerk after the key has been programmed with the SDC initially or revitalized within the time period by placing it in wireless communication with programming station 43, can use it with the security devices 45 to either disarm an alarm contained in the security device and/or activate a lock mechanism etc. to enable the security device to be disarmed or unlocked or removed from a protected item of merchandise for completing a lawful sales transaction.
Each time button 21 is activated, counter 41 will record the actuation. The logic circuit has been preset at the factory in combination with counter 41, that after a certain number of activations, for example 55,000, the logic circuit will completely shut down and forever be inoperative. This is referred to as an “end-of-life” counter and it begins counting on the first receipt of the actuation of switch 21 and all subsequent activations thereof. This end-of-life counter ensures that battery 23 always has sufficient power for operating the SDC memory and wireless communication circuitry of key 1 before losing its charge to be ineffective. This prevents using key 1 beyond its useful life. However timer 39 will be automatically reset each time key 1 is brought into communication with the SDC programmer of station programmer 43.
In summary, key 1 provides a programmable or smart key that receives a randomly generated SDC from a programming station unique to an individual retail store, and stores it in an internal memory, in combination with a timer which after a preset period of time will delete the SDC from the memory rendering the key inoperable, and which includes a wireless communication circuit preferably IR or RF, for receiving the SDC from a programming station and for supplying the SDC to a control logic circuit built into a security device. This enables the key to actuate the security device such as disarming an internal alarm, operating a locking mechanism or the like. Furthermore, the key contains an internal counter which counts the number of times the key is activated, either in conjunction with the SDC programmer or a security device, to ensure that the battery has sufficient power to properly maintain the functions of the key.
Furthermore, the logic control circuit of the programming station upon reading an SDC from a smart key different from the unique SDC stored in the program station will immediately time-out the usable time period in the key rendering it useless. This prevents a thief from using a programmed key from one store in the programming station of another store even if the key has yet to be timed out.
Although the above description refers to the security code being a disarm code, it is understood that the code can activate and control other functions and features of the security device such as unlocking the device from the product, shutting off an alarm etc. without departing from the concept of the invention. Likewise, the various components of the logic circuit and resulting flow charts can easily be modified by one skilled in the art to achieve the same results. Also, the security code can be preset in programming station at the factory or chosen by the customer, and if desired, be changed later by the customer, also without affecting the concept of the invention.
In the foregoing description, certain terms have been used for brevity, clearness, and understanding. No unnecessary limitations are to be implied therefrom beyond the requirement of the prior art because such terms are used for descriptive purposes and are intended to be broadly construed.
Moreover, the description and illustration of the invention is an example and the invention is not limited to the exact details shown or described.
This application claims priority from U.S. Provisional Application Ser. No. 60/753,630 filed Dec. 23, 2005; the disclosure of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60753630 | Dec 2005 | US |