The invention relates to a security mechanism for a package, a package including such a security mechanism and/or a component of such a security mechanism and a method of making the package and the security mechanism. More specifically, but not exclusively, the invention relates to a security device where at least one security loop is formed integrally with the package for detecting a breach of the complete package. Additionally, the security loop may be formed with a portion that will be interrupted if the contents are removed from the package.
In the field of packaging it is often required to maximise the display of premium (high-cost) articles for marketing and advertising purposes in retail outlets, yet at the same time it is necessary to secure those premium articles against theft or damage. Electronic article surveillance (EAS) is one known method for preventing shoplifting from retail stores. Special tags are fixed to merchandise and these tags are usually removed or deactivated at a pay counter once the article has been purchased. At the exits of the store, a detection system sounds an alarm if the security device has not been removed or deactivated and an attempt is made to remove the article from the retail outlet without paying.
In another method of theft prevention, wired alarm clips may also be used. These wired clips are wound around the exterior of an article or package. However, these known methods of securing against theft can be bulky and can obscure the product from display and/or may be vulnerable if the security tag or wired alarm is only affixed to the packaging containing the article and not the article itself. In such arrangements, by removing the article from the packaging and hence security tag, it may be possible to then take the article from the store without detection. Additionally, since it is not always possible to affix a security device directly to an article, for example, in the case of delicate or fragile articles, an alternative solution is required.
One such solution is offered by the Natralock® packaging, a product made by the present applicant, which utilises a tear-resistant polymer laminated recyclable paperboard combined with an APET or RPET thermoform to create a visible package nearly impossible to tear apart by hand which deters theft in stores. Whilst, the package can be opened easily and safely with household scissors, the requirement for use of scissors introduces a difficulty to the consumer. Furthermore, this package still requires an external security module to secure against theft of the entire package.
The present invention seeks to mitigate or overcome these and other problems associated with known security devices and/or provide an improvement over known security devices.
According to a first aspect, the invention provides a package containing a primary article and comprising a security feature having first and second parts which together are capable of detecting when the package is opened and in response to that detected opening issues an electrical signal, which electrical signal causes an alert to be issued. Preferably, the alert is an audible alarm emitted directly by the security feature.
According to a second aspect, the invention provides a package containing a primary article and having a first part of a security feature incorporated therein, the first part of the security feature being connectable to a second part of a security feature such that together, the first and second parts of the security feature are capable of detecting when the package is opened and capable of issuing an electrical signal in response to that detected opening which electrical signal is operable to cause an alert to be issued.
Preferably, the first part of the security feature is a security loop incorporated within the package and disposed relative to the article such that removal of the article from the package is likely to cause interruption of said security loop, said security loop being connectable to a second part of the security feature for detecting an interruption in said security loop and operable to react to such a detected interruption by issuing an alert.
According to an optional feature of the above aspect, the security loop is formed as an integral part of the package and comprises two terminals, each connectable to the second part of the security feature and said second part of the security feature is operable to issue an alert by sounding an alarm and/or by illuminating a light and/or by transmitting an electromagnetic signal. Preferably, the security loop is formed as an integral part of the package, is electrically conductive and is formed from conductive printed ink, conductive ribbon, conductive foil and/or conductive wire.
According to a preferable feature of the first and second aspects of the invention, the security feature detects opening of the carton by detecting a change in resistance of an electric circuit of said security feature. Preferably, the first part of the security feature is a security loop incorporated within the package and wherein the change in resistance is an increase in resistance and is due to one or more of the following: an interruption in the package integrity, an interruption in the security loop or the breaking of the security loop.
The second part of the security feature is either integrally formed within the package or is formed as a separate module that is connectable to and removable from the package.
Optionally, the second part is formed as a separate module that is removable from the package and the package further comprises an integral retaining means for retaining and releasing the module.
According to a third aspect, the invention provides a security module for use in a package according to any of the preceding paragraphs, which comprises a second part of a security feature and is connectable to a first part of a security feature disposed within the package.
Preferably, the first part of the security feature is a security loop incorporated within the package and second part of a security feature is capable of detecting an interruption in said security loop and capable of reacting to such a detected interruption by issuing an alert.
According to a further aspect the invention provides a blank for forming a package, the blank comprising an integrally formed security loop having terminals for coupling to a security module and/or comprising parts of a security loop, which parts are connected together to form a security loop having terminals for coupling to a security module once said blank is formed into a carton or package.
According to a further aspect the invention provides for a security loop incorporated within the package to be interrupted if package contents are removed from the package. The contents may be secured to a portion of the security loop by tape or glue whereby removing the contents breaks the tape and/or the loop, and breaks the circuit.
Optionally, the blank comprising integral means for retaining a security module, said integral means comprising one or more engaging tabs and being structured such that said security module is connectable to said terminals of the security loop.
Optionally, in any of the aspects, the security loop may be formed with a portion associated with the contents of the package, such that removing the contents from the package, or detaching the contents from the package, breaks the security loop.
Optionally, the security module may provide a hang hole, or be associated with an existing hang hole on the package.
Optionally, in certain of the aspects, the security module may cover or obscure an easy-open feature such as a nick or tear in the package, by which the package can be opened after removal of the security module.
A further aspect of the invention provides a kit of parts for forming a package having an integral security feature, the kit of parts comprising one or more blanks for forming the package, at least one of said blanks having a first part of a security feature incorporated therein; one or more articles to be contained in the package; and a second part of the security feature comprising an electronic circuit capable of connecting to the first part of the security feature and capable of detecting a breach of the package integrity and in response to that detected breach issues an electrical signal, which electrical signal causes an alert to be issued.
Exemplary embodiments of the invention will now be described with reference to the accompanying drawings, in which:
A first embodiment of the invention is depicted in
In
The first part blank 10 forms a front part of a composite package (not shown) formed by sandwiching a blister (for example an APET or RPET thermoform) between the first part blank 10 of
The package of the present invention also includes a security module 70, as shown in
The first part blank 10 is defined by an edge 22 and includes an aperture 20 through which a blister (not shown) can protrude; a security loop 12 and first and second contacts 14, 16. A hanging aperture 18 is also provided merely for facilitating hanging display or hanging storage of the package. This hanging aperture feature 18 is entirely optional. Aperture 20 is an optional feature which would not be present when the invention is applied to other formats of package not including a blister. The security loop 12 is formed of conductive ink that is printed onto the paperboard panel 10. In alternative embodiments, the security loop is printed onto the blister itself or the blister and the panel 10. A stamping technique can be used to print onto the blister, but there is a greater cost associated with printing on plastic compared to paperboard like materials.
The security loop 12 is printed such that it at least partially surrounds the article to be held within the blister to be disposed within the aperture 20. The specific path or shape of the security loop will alter according to various considerations for example: the nature of the package to which the invention is applied; the configuration (i.e. shape) of article(s) held by the package and the number and orientation of articles contained within the package. It is required that the security loop 12 is arranged in such a manner that in order to gain access to an article held within the package, interruption or complete breaking of the security loop 12 is necessary or at least highly likely. The more likely it is that the security loop 12 will be interrupted or broken when the package is tampered with in order to remove an article, the more effective the security feature of the package will be. The security loop 12 is coupled to an external security module (see
Using conductive ink is beneficial because the security loop 12 can be easily printed onto the inside face of panel 10. This ink may be printed onto the board using regular printing press methods. In the specific embodiment described, the conductive ink used has a temperature and/or pressure sensitivity. Preferably, during the printing stage the temperature of the ink should not exceed 70° C. (degrees Celsius) or 160° F. (degrees Fahrenheit). The ink should be allowed to dry. It may take up to five minutes or up to ten minutes or longer depending upon conditions for the conductive ink to fully set. After the conductive ink is printed and set then the panel 10 is further processed and graphic printing takes place. During the graphics printing process and subsequent package forming process, the temperature and pressure sensitivity of the conductive ink must be considered. It is to be understood that a variety of tools may be used to apply the graphics to the package and that each set of tools may effect the appropriate pressure and temperature ranges that may be applied without disrupting the functionality of the conductive ink. A pressure of up to 20 psi may be used and a temperature up to 400° F. may be used to seal the package. Other ranges for pressure and temperatures may also work to seal and print the graphics without damaging the ink's conductive properties depending upon the conditions, equipment and materials used. Damage or change in the conductive properties of the conductive ink material could cause the security feature to fail. The pressure and temperature limits may vary based on the materials used. Development of conductive inks may alter these temperature and pressure considerations. It is to also be understood that the exact order of these sequences may be adjusted depending upon manufacturing preferences. For example, the graphics could be printed on the external package prior to the conductive ink being printed on the package.
The conductive ink used for printing the security loop of the present embodiment may be replaced with other suitable means for allowing an interruption of that loop to be conveyed to an alert means. Other electrically conductive materials readily could be used in replacement of or in combination with the conductive ink, for example: foil ribbon, wire and conductive plastics or polymer material. In the present example, a conductive material is used so that a break or interruption in the security loop 12 causes an increased resistance within an electronic circuit to which the security loop 12 is coupled which results in an alarm sounding. This mechanism is described in further detail below with reference to
The second part blank 8 for forming the back panel of the package of this example is shown in
The retaining feature 68 also includes two side engaging portions which each includes a pair of fold lines 56a, 54a and 56b, 54b respectively and a tab 60a and 60b respectively. Cutline 62 defines a lower edge of the security module retaining feature 68. The aforementioned fold lines, cut lines and tabs are shaped and arranged to receive and securely retain a module 70 (see
The security module 70 is loaded into the package by first lifting up tab 58 and adjacent triangular portions to thereby define an upper opening. The module 70 can then be aligned with, and by using a sliding action, loaded into that upper opening such that side portions 72a, 72b of the security module 70, each slide behind the adjacent tab 60a, 60b. Once the module 70 has been slipped between the front 10 and back panel 8 of the package, each of the tabs 58, 60a, and 60b can be manipulated into engagement with a corresponding recess 74 of the security module 70 to thereby secure that module 70 onto and within the package. The module 70 includes two electrical contacts that couple to the terminals 14, 16 of the security loop 12, this contact is maintained by the engagement of the tabs 58, 60a, 60b holding the module 70 in place.
The security module 70 is arranged such that the start contact 14 and terminal contact 16 of the security loop make an electrical contact with the circuit held within the module 70. Turning now to the exemplary circuit, reference is made to
The circuit includes two parts, the first part includes a power supply 50 coupled to an optional switch 52, coupled to a second resistor 46 (in this example, the second resistor is 4.7 MΩ) coupled via a third 100 kΩ resistor to the security loop 12, which is coupled at its other end to the negative of the power supply. The second part of the circuit includes a transistor (FET) 36, light 32 (red LED) and an alarm 30. The switch 52, if present, is closed to turn the circuit on.
The first and second parts of the circuit are therefore in parallel with one another and the voltage across the first part is divided across the second 46 and third 48 resistors. In normal operation the third resistor 48 is relatively small compared to the second, and the gate 42 of the FET is effectively grounded, via the security loop 12 to the negative terminal of the power supply 50. Thus, the FET is held in a non-conducting state and current is prevented from flowing through the second part of the circuit containing the alarm 30.
When the security loop 12 is broken or interrupted or affected in any way, the resistance of the security loop 12 increases and the voltage at the gate of the FET consequently rises as a result of the potential division taking place in the first part of the circuit. The ratio between the combined resistance of the security loop 12 and the third resistor 48 in comparison to the resistance of the second resistor 46 dictates the percentage of the power supply's potential that is present at the gate of the FET 42.
If the resistance in the security loop 12 is increased sufficiently to cause the voltage at the gate of the FET to reach the threshold “switch on voltage” for the FET to conduct, then the FET will permit current to flow through the second part of the circuit, including the LED 32 and alarm 30. Thus the LED 32 and the alarm 30 will be operated.
The security module 70 includes all components of the afore described circuit, with the exception of the security loop 12 which is integrally formed within the package by means of being printed on the inside face of panel 10. The security module in this embodiment is re-usable and is releasably attached to the back panel 8 of the package as described above. Optionally, the security module can operate as a stand or support for the package for display and storage purposes (thus obviating the need for hanging aperture 18). The security module can take a variety of sizes and/or shapes and is not limited to that illustrated. It must be designed suitably for connecting to the terminals 14, 16 of the security loop 12. Whether the circuit is printed on the front card or the rear card determines where the module needs to connect or contact the package. The module may be magnetically turned on or off or a key could be used, other means to turn the module off and on may be used as well. The security module can be attached in a number of ways to the package including: clip in, slide in, strapped onto the package, affixed by other mechanical means and/or adhered.
The circuit described is formed of standard known components. It will be understood that other configurations and arrangement and types of electrical components will be suitable for forming a security module for application of the present invention and the circuit of the security module could be formed on an integrated semiconductor chip. The important elements of the circuit are that in response to a break or interruption in the security loop 12 disposed within the package, the circuit is capable of causing an alert to be issued. This alert may be the illumination of a light such as an LED and/or the sounding of an alarm or buzzer. Additionally or alternatively, the alert may be the transmission of a signal, for example an RF (radio frequency) signal that is coupled to a receiver disposed elsewhere, within a store which could prompt a member of staff to take action. The transmitted signal could for example cause an alarm to sound in the security guard's office, or could cause a primary alarm in the store to sound rather than a small alarm contained within the security module itself. The aforedescribed alerts represent a few of many envisaged options which could be used in combination or separately depending upon the application of the invention.
The security module may be disarmed by a tool or other mechanism which can be used to open the switch 52. Once disarmed, the security module 70 can be removed from the package (by manipulating the tabs 60a, 60b and 58 out of engagement with the module 70, which can then be reused. An attempt to disconnect the security module 70 from the package (and hence security loop 12) before the security module 70 is switched off will cause the alert to be issued.
In
The purpose of the key 196 is that the demonstration model of the package can be assembled and the security loop 112 broken by removing the key 196 without destroying or damaging the package. Once it has been demonstrated how the integrally disposed security mechanism operates, the key 196 can easily be replaced (without having to interfere with the switch 52 of the security module) to stop the alert (i.e. to turn the LED and alarm off). Repeated demonstrations can then be made without having to damage a package each time and without having to switch the security module on and off.
In the third illustrated embodiment (see
A fourth embodiment is illustrated in
The security loop 312 is printed such that it at least partially surrounds the area 320 corresponding to the blister that may be disposed on the front panel (not shown). The specific path or shape of the security loop may vary according to considerations such as the nature of the package to which the invention is applied; the configuration (i.e. shape) of article(s) held by the package and the number and orientation of articles contained within the package. The security loop 312 may be arranged such that to gain access to an article held within the package, interruption or complete breaking of the security loop 312 is necessary or at least highly likely. The security loop 312 may be coupled for example via contacts 314, 316 (or other means) to an external security module (see
In the embodiment of
In order to complete the circuit of the security loop, the gap 304 may be bridged by a conductive material, for example, a conductive tape 306 placed on or across the gap 304.
Tape 306 may be attached perpendicular to the loop as shown, or along the loop, or at an angle to the loop, as long as gap 304 is bridged by the tape. The tape 306 is also attached to the product contained within the package, either at the opposite end of the tape, or anywhere else along the tape, especially if a two-sided adhesive conductive tape is used. The attachment of tape 306 to the product should be stronger than the attachment of tape 306 to gap 304, so that if the product is taken from the package, tape 306 will be pulled off gap 304, causing an alert to be issued. In this manner, if a thief cuts into the blister to remove the product, an alert may be issued, even if the blister itself was not protected by the security loop (e.g. by printing or stamping a portion of the security loop onto the blister).
Instead of a conductive tape strip being used as depicted by tape 306, the conductive tape may take the form of a patch such as a square or round patch that is adhered to gap 304, and to which patch the product may also be adhered, such that removing the product will lift the patch off gap 304 and sound an alert.
The tape 306 may be conductive over its entirety, or may be conductive only in the vicinity of gap 304. While the embodiment shown in
Ideally any tape 306 will be attached to or adhere strongly to the product, yet be capable of being removed from the product without excessive effort after purchase, either by peeling, scraping, untying, or otherwise removing tape 306 from the product. If the product is connected to the conductive pathway 302 by tape 306, or string, wire, glue or other means, the product may advantageously be close to the conductive pathway so that the tape, wire, string, glue or other means itself cannot be cut which could allow the product to be removed without raising an alarm.
A fifth embodiment is illustrated in
The security loop 412 is printed or otherwise formed such that it at least partially surrounds the area 420 corresponding to the blister that may be disposed on the front panel 410. As in the other embodiments, the specific path or shape of the security loop may vary according to considerations such as the nature of the package to which the invention is applied; the configuration (i.e. shape) of article(s) held by the package and the number and orientation of articles contained within the package. The security loop 412 may be coupled for example via contacts 414, 416 (or other means) to an external security module (see
A sixth embodiment is illustrated in
A seventh embodiment is illustrated in
The security loop 312 may be printed such that it at least partially surrounds the area 320 corresponding to the blister that may be disposed on the front panel (not shown). The specific path or shape of the security loop may vary according to considerations such as the nature of the package to which the invention is applied; the configuration (i.e. shape) of article(s) held by the package and the number and orientation of articles contained within the package. The security loop 312 may be arranged such that to gain access to an article held within the package, interruption or complete breaking of the security loop 312 is necessary or at least highly likely. The security loop 312 may be coupled for example via contacts 314, 316 (or other means) to an external security module (see
In the embodiment of
Thus if the product article is taken from the package, securing material 305 will be pulled away from conductive pathway 302, tearing the pathway, and causing an alert to be issued. In this manner, if a thief cuts into the blister to remove the product, an alert may be issued, even if the blister itself was not protected by the security loop (e.g. by printing or stamping a portion of the security loop onto the blister). Since the product article cannot be removed from the package without raising an alarm, it may not be necessary for a conductive pathway to surround the area 320.
Ideally any securing material 305 will be attached to or adhere strongly to the product, yet be capable of being removed from the product without excessive effort after purchase, either by peeling, scraping, dissolving, or otherwise removing securing material 305 from the product. If the product is connected to the conductive pathway 302 by securing material 305, the product may advantageously be close to the conductive pathway so that the a knife cannot be inserted between the product and the package to cut through the securing material without breaking the conductive pathway.
An eighth embodiment is shown in
This package of
Package 600 may be a container such as a paperboard carton holding a product item 650 such as a bottle. In a manner somewhat similar to that described for
Package 600 may include a back panel 608 supporting conductive pathway 612. The package may include other panels, for example front panel 602 and top panel 604. The conductive pathway may extend upward from back panel 608 onto back panel extension 609 on which the conductive pathway may terminate in a pair of contacts 614, 616. These contacts may be located adjacent or partly contiguous with hang hole 618. The package shown in
A variation of the package 600 shown in
Since the security system shown in
It will be recognized that various features of different embodiments as described herein may be utilized in combination with each other.
Although the examples shown in the Figures incorporate a single security loop, it should be understood that more than one security loop may be used. For example, the single security loop shown in
Multiple security loops may be utilized in other embodiments. For example, a package in the form of a box may have six faces (e.g. top, bottom, and four sides), and the six faces may each have a security loop, or multiple security loops may be used with some faces sharing a security loop. Multiple security loops may be used when a single security loop would have too high a resistance, or would be large enough to have other undesirable attributes, such as acting as an antenna.
Instead of having multiple pairs of contacts for the security loops (and the security module) the security loops may share common contacts to be connected to one pair or a few pairs of contacts on the security module, with the security module circuitry adjusted to detect differences in resistances which occur when one or more of the security loops are breached. When two or more security loops share a pair of common contacts, their combined resistances may therefore be reduced below the individual resistance of any individual loop among the two or more security loops. This may result in a combined resistance that is more readily measured by the security module.
Optionally, the security module may cover or obscure an easy-open feature such as a nick, tear, or cut in the package, by which the package can be opened after removal of the security module. For example, the package may be formed with a notch or cut in one or more of the panels, and the security module when installed may cover or otherwise obscure the notch or cut, and prevent access thereto. Once the security module has been removed, the package may readily be opened using the easy-open feature. The notch or cut may be provided in the package during its fabrication, then covered by the security module. Alternately, the security module may create the tear in the package when the security module is installed.
It can be appreciated that various changes may be made within the scope of the present invention, for example, the size and shape of the panels and aperture may be adjusted to accommodate blisters and articles of differing size or shape. In other embodiments of the invention it is envisaged that the package will include more than two panels and/or that the articles themselves may not be on direct display through a blister or similar transparent material, but rather fully contained and enclosed within the package. The security loop may be printed onto a number of panels of the carton blank, which when folded and glued to form a complete carton are aligned so that a continuous security loop is formed and opening of the carton will cause an interruption or complete breaking of the security loop.
It is envisaged that in other embodiments of the invention more than one electronic circuit of the type described above is accommodated within a single module and/or that a single electronic circuit capable of detecting interruptions in more than one security loop is accommodated within a single module. In such embodiments, more than one continuous security loop is incorporated within the package for protecting the articles within that package. This is useful where more than one article is contained within a single package. It is to be understood that the loop may printed on the internal side of the package thereby not interfering with the external graphics of the package. If so desired based on manufacturing preferences, the loop could be printed on the external side of the packaging materials. It is to be understood that this positioning may result in more accidental alarms from the ink being scraped off of the package.
To safeguard against the front panel 10 being separated from the back panel 8 to remove the article without the security loop being interrupted, the first part and second part panels 10, 8 can be either be adhered using very strong adhesive, or alternatively, part of the security loop 12 can be printed on the inside face of each panel, so that neither panel includes the entire loop 12. When the panels 10, 8 are mated together, the security loop 12 is completed, and then if the package is tampered with by separating the front 10 and back 8 panels, the security loop will be broken and an alert will be issued.
By the term “interruption” it is meant any perturbation of the package that affects the resistance of the security loop 12. Indeed, it may not be necessary to completely break the security loop 12, nor even partially tear the security loop 12, the circuitry can be sensitive enough to detect a tear within the material of the package even if that cut does not directly sever the circuit loop, albeit with some limitation on the size of cut that can be detected. The module's sensitivity to changes in resistance may be adjusted based on manufacturing preferences.
There are various advantages to the disclosed security package such as using the conductive ink to surround the package and prevent access to the interior of the package reduces the number of steps the retailer has to perform to place and activate the security device onto a package, which saves in labor time as well as reduces the possible errors that could occur. Using the conductive ink also reduces the interruption to the external graphics of a package allowing products to more effectively use this space for advertising.
It will be recognized that as used herein, directional references such as “top,” “bottom,” “front,” “back,” “end,” “side,” “inner,” “outer,” “upper” and “lower” do not limit the respective panels to such orientation, but merely serve to distinguish these panels from one another. Any reference to hinged connection should not be construed as necessarily referring to a single fold line only; indeed it is envisaged that hinged connection can be formed from one or more of the following, a short slit, a frangible line or a fold line without departing from the scope of the invention.
It will be recognized that where lists of examples have been given in the above description, these exemplary lists are non-exhaustive and represent only some suitable options for variations of the invention and should not, in anyway, be construed as constituting an exhaustive, finite limitation of the invention's application.
This application is a continuation of U.S. application Ser. No. 12/975,635, filed on Dec. 22, 2010, now U.S. Pat. No. 8,698,627, which is a continuation-in-part of International Application PCT/US10/020169, entitled “SECURITY PACKAGING,” filed Jan. 6, 2010, which claims the benefit of U.S. Provisional Application 61/143,112, filed Jan. 7, 2009 and U.S. Provisional Application 61/260,547, filed Nov. 12, 2009, and claims the benefit of, and incorporates herein by reference in their entirety, each of those applications; the Ser. No. 12/975,635 application also claimed the benefit of U.S. Provisional Application 61/348,594, filed May 26, 2010, which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61348594 | May 2010 | US | |
61260547 | Nov 2009 | US | |
61143112 | Jan 2009 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12975635 | Dec 2010 | US |
Child | 14249392 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/US10/20169 | Jan 2010 | US |
Child | 12975635 | US |