The invention relates to a security device for securing a jack plug during retail display of a product fitted with a jack plug.
One type of retail product that is fitted with a jack plug is a pair of headphones. During retail display of a pair of headphones, it is desirable to allow a potential customer to listen to music through the headphones so that the customer can assess the sound quality. The customer may wish, for example, to plug the headphones into his or her MP3 player or mobile phone so that the customer can listen, through the headphones, to music with which the customer is familiar
When allowing customers to try out headphones as described above, it is also desirable to secure the headphones to a fixture, such as a display stand, so that the headphones cannot be stolen.
In accordance with a first aspect of the invention, there is provided a security device for securing a jack plug during retail display of a product fitted with a jack plug, the security device comprising: a jack plug socket for engagement with a jack plug and operable to lock a jack plug in said engagement so as to resist withdrawal of the jack plug, an input for receiving electrical signals, the input being electrically connected to the jack plug socket so that electrical signals received at the input are transmitted to the jack plug socket for transmission of the electrical signals from the jack plug socket to a jack plug locked in engagement with the jack plug socket and for onward transmission of the electrical signals to a product connected to the jack plug, and an attachment for attaching the security device to a fixture.
Accordingly, the security device of the current invention allows a retail product to be secured by securing the jack plug connected to the product. It will be appreciated that the security device can be used with other retail products fitted with a jack plug. The use is not limited to pairs of headphones.
The term “jack plug” is used to signify an electrical male plug having a single, generally cylindrical pin provided with a plurality of contact areas along its length and the term “jack plug socket” is used to refer to the corresponding female socket. Jack plugs are also commonly known as audio jacks or phone jacks. The term jack plug includes all sizes (e.g. with 2.5 mm, 3.5 mm and 6.35 mm diameter pins). The term jack plug also covers plugs with any plural number of contacts. For example, an audio stereo jack plug commonly has three contacts and is often referred to as a TRS plug (the initials TRS referring to the three contact areas of the pin known as Tip, Ring and Sleeve). An audio mono jack plug commonly has two contacts and is often referred to as a TS (Tip, Sleeve) plug. A four contact plug is commonly referred to as a TRRS (Tip, Ring, Ring, Sleeve) plug. Jack plugs having greater numbers of contacts are available. All such plugs are included within the term “jack plug” and the corresponding jack plug sockets are included within the term “jack plug socket”. The terms “jack plug” and “jack plug socket” are not limited to audio plugs and sockets and also cover all other uses, such as a microphone plug having a cylindrical configuration and the corresponding socket. In general, the tip of a jack plug is separated from ring and sleeve contacts on the jack plug by a neck. The tip generally includes a convex frusto-conical surface which faces generally radially outwardly and rearwardly (ie towards a handle portion of the jack plug).
Preferably, the security device includes a housing. The jack plug socket is provided in the housing and the attachment allows attachment of the housing to a fixture. In this way, the housing protects and hides the locking mechanism of the jack plug socket.
Preferably, the jack plug socket comprises a locking member which is moveable between a locking position and a release position. When the locking member is in the release position, the jack plug can be withdrawn from the jack plug socket. The locking member is lockable in the locking position to lock the jack plug within the jack plug socket. When the locking member is in the locking position, the locking member engages a tip of a jack plug. In this case, the shape of the tip of the jack plug allows the locking member to achieve purchase on the jack plug. In this way, locking of the jack plug within the jack plug socket can generally be achieved without deforming the pin of the jack plug.
Where the jack plug socket has a locking member as described above, the locking member preferably has a concave frusto-conical surface. In this case, the security device is used with a jack plug having a tip which has a convex frusto-conical surface. By providing the locking member with a concave frusto-conical surface which corresponds closely in shape to the convex frusto-conical surface of the tip of the pin of a jack plug, it has been found possible to achieve secure locking of a jack plug within a jack plug socket.
Where a locking member is provided, the jack plug socket preferably also comprises a rotatable control member which interacts with the locking member. The rotatable control member is rotatable between a first stop at which the locking member is locked in the locking position and a second stop at which the locking member is in the release position. The provision of the two distinct stops is advantageous compared to, for example, a locking screw which can be tightened or loosened without any distinct stops to limit its rotation. The provision of these stops avoids over tightening.
Where the jack plug socket comprises both a locking member and a rotatable control member, as described above, the locking member preferably has a first end and a second end. The first end is pivoted and the second end of the locking member interacts with the rotatable control member to control movement of the locking member between the locking position and the release position. Where a concave frusto-conical surface is provided on the locking member, this is preferably intermediate the first and second ends of the locking member. In this way, a high degree of positional accuracy of the frusto-conical surface may be achieved.
When the jack plug socket is provided with a rotatable control member, the security device preferably also includes a security key. The rotatable control member has a formation which is shaped for engagement with the security key so that the rotatable control member can be rotated by the security key between the first and second stops. Even more preferably, the shape of the formation on the rotatable control member is such that it cannot be engaged by a screwdriver with a slot head or a cross-head. In this way, even if a potential customer is able to gain access to the jack plug socket, the customer may not be able to release the jack plug without a security key which corresponds to the formation on the rotatable control member.
The input of the security device may be any suitable input. It could, for example, be a standard jack plug socket without a locking function. It could also be, for example, a standard USB socket. In one specific embodiment, the input is itself a jack plug which a potential customer can plug into his or her MP3 player or mobile phone.
In accordance with a second aspect of the invention, there is provided a method of securing a jack plug during retail display of a product fitted with a jack plug, comprising providing a product fitted with a jack plug, providing a security device, securing the security device to a fixture, locking the jack plug in engagement with the security device, and providing an input. The input being electrically connected to the jack plug so that electrical signals received at the input are transmitted to the jack plug for onward transmission of the electrical signals to the product.
The following is a more detailed description of embodiments of the invention, by way of example, reference being made to the following schematic drawings in which:
Looking first at
As best seen in
As best seen in
Looking now at
The standard jack plug socket 18 is conventional in design and will not be described in detail.
Referring now to
The second end of the locking arm 32 is provided with a locking ring 40. The locking ring 40 cooperates with the control screw 34, as described below, to achieve movement of the locking arm 32 between a locking position and a release position.
As shown in
The control screw 34 is best seen in
The top end of the control screw 34 is provided with a security formation in the form of a truncated pyramid 46. This truncated pyramid 46 is shaped so as to engage with a security key (not shown). The security key is used to rotate the control screw 34 either in a clockwise or anti-clockwise direction.
Immediately below the truncated pyramid 46, the control screw 34 is provided with a locking disc 48. The locking disc 48 cooperates with the locking ring 40 of the locking arm 32 to control movement of the locking arm 32 between a locking position and a release position, as will now be described.
As best seen in
As best seen in
However, the security key (not shown) can be engaged with the truncated pyramid 46 of the control screw 34 and the security key is then used to rotate the control screw 34 in a clockwise direction (as seen from above). This causes the control screw 34 and the locking disc 48 to move downwardly into/towards the nut 44. During this process, the cam surface 54 on the locking disc 48 moves against and along the cam surface 50 on the locking ring 40 of the locking arm 32. The engagement of the two cam surfaces 50, 54 and the downward movement of the control screw 34, moves the locking arm 32 downwardly from the position shown in
This process continues until the stop surface 56 on the locking disc 48 of control screw 34 contacts the stop surface 52 on the locking ring 40 of the locking arm 32. After contact between the two stop surfaces 52, 56 no further clockwise motion of the control screw 34 is possible. At this point, the locking arm 32 is in the locking position, and this is shown in
As seen in
As best seen in
In order to unlock the locking jack plug socket 16, so as to allow removal of the jack plug 60, the control screw 34 is rotated in an anticlockwise direction whereupon the two cam surfaces 50, 54 move against each other back into the unlocking position shown in
As best seen in
The upper surface of the intermediate lid 12 is shown in
A slot 86 is also provided in the intermediate lid 12 to facilitate lifting of the intermediate lid 12 out of the casing bottom 10.
In operation, the security device is fixed to a fixture using the attachment bosses 20 as described above. In this example, the security device is used to secure a pair of headphones on retail display. The jack plug 60 of the headphones is inserted into the locking jack plug socket 16. A retail assistant then removes the outer lid 14 by rotating the outer lid 14 so as to reveal the intermediate lid 12. There is no need to remove the intermediate lid 12. The retail assistant uses the security key to rotate the control screw 34 in a clockwise direction which causes the locking arm 32 to move from the release position to the locking position as described above. The jack plug 60 is now locked in the locking jack plug socket 16. The retail assistant replaces the outer lid 14.
A potential customer is now able to listen to music through the headphones. In order to do this, a connecting cable (not shown) having a jack plug at each end is used. One of the jack plugs of the connecting cable is inserted into the standard jack plug socket 18 of the security device. The other jack plug of the connecting cable is inserted into the customer's MP3 player or mobile phone. Electrical signals carried by the connecting cable to the standard jack plug socket 18 are passed to the locking jack plug socket 16 and the music can be heard in the headphones. The locking of the jack plug 60 in the locking jack plug socket 16 prevents theft of the headphones.
It will be appreciated that the security device need not be as described above and many adaptations may be made while remaining within the scope of the appended claims.
For example, while the locking mechanism described above has been found to be very effective, any locking mechanism capable of holding a jack plug within a locking jack plug socket may be used.
In addition, it is not necessary to provide a standard jack plug socket 18. Instead, the security device may be provided with a jack plug of its own connected to the locking jack plug socket 16 by a cable fixed to the casing. The jack plug of the security device can then be simply inserted into the MP3 player or mobile phone of the customer.
Alternatively, the security device could be provided with any other type of input, such as a USB socket or USB plug.
Number | Date | Country | Kind |
---|---|---|---|
1309246.5 | May 2013 | GB | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2014/060309 | 5/20/2014 | WO | 00 |