Security system and method for protecting merchandise

Information

  • Patent Application
  • 20070159328
  • Publication Number
    20070159328
  • Date Filed
    December 14, 2006
    18 years ago
  • Date Published
    July 12, 2007
    17 years ago
Abstract
A security system for protecting items of merchandise includes a programmable key, a programming station for generating a security disarm code (SDC) into the key, and a security device attached to the item of merchandise. The security device is initially programmed with the SDC from the key and is subsequently disarmed by the key upon matching the SDC of the key with the SDC stored in the security device. A wireless interface is provided in the programming station, programmable key and security device for programming the SDC into the key and for matching the SDC of the key with the SDC of the alarm module. An internal timer in the key invalidates the SDC in the key after a predetermined time period to prevent use of the key for disarming a security device after the time period has expired. The programming station initially generates a unique SDC which remains in the programming station for use with the programmable keys and alarm modules. Each retail store will have its own programming station so that each store has its own unique SDC usable only in that store and with the keys programmed therein.
Description

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

A preferred embodiment of the invention, illustrated of the best mode in which Applicant contemplates applying the principles, is set forth in the following description and is shown in the drawings and is particularly and distinctly pointed out and set forth in the appended claims.



FIG. 1 is a diagrammatic view of the principal components of the security system of the present invention.



FIG. 2 is a diagrammatic side elevational view of the programming station component of the security system.



FIG. 3 is a cross-sectional view of the programming station of FIG. 2.



FIG. 4 is a block diagram of the logic control circuit of the programming station shown in FIG. 2.



FIG. 5 is a diagrammatic side elevational view of one type of security device which can be used in the security system of the present invention.



FIG. 6 is a cross-sectional view of the security device of FIG. 5.



FIG. 7 is a block diagram of the logic control circuit of the security device shown in FIG. 5.



FIG. 8 is a plan view of the programmable smart key of the security system shown in FIG. 1.



FIG. 9 is a cross-sectional view taken on line 9-9, FIG. 8.



FIG. 10 is a block diagram of the logic control circuit of the programmable key shown in FIG. 8.



FIGS. 11, 11A and 11B is a flow chart of the control circuitry of the programmable key shown in FIG. 8.



FIGS. 12, 12A and 12B is a flow chart of the control circuitry of the programming station shown in FIG. 2.



FIG. 13 is the flow chart of the control logic circuit for the security device shown in FIG. 5.



FIGS. 14, 15, 16 and 17 are diagrammatic views of other types of security devices which can be used with the security system of the present invention.


Claims
  • 1. A security system for protecting items of merchandise comprising: a) a programmable key;b) a programming station for generating a security code into the key; andc) a security device for attachment to the item of merchandise, said security device being initially programmed with the security code from the key and subsequently being controlled by the key upon matching the security code of the key with the security code in the security device.
  • 2. The security system defined in claim 1 wherein the programming station includes a wireless interface for generating the security code in the key.
  • 3. The security system defined in claim 2 wherein the wireless interface is IR or RF communications.
  • 4. The security device defined in claim 1 wherein the key includes an internal timer which automatically invalidates the security code in the key after a preset period of time.
  • 5. The security system defined in claim 4 wherein the timer is a resetable timer upon receiving the security code from the programming station.
  • 6. The security system defined in claim 1 wherein the key includes a counter which counts the number of activations of the key.
  • 7. The security device defined in claim 6 wherein the counter permanently inactivates the key after counting a predetermined number of activations.
  • 8. The security system defined in claim 7 wherein the timer causes an indicator to be activated advising that the key has a certain time period before being permanently inactivated.
  • 9. The security system defined in claim 1 wherein the security device contains an audible alarm; and in which a sense loop connects the security device to the item of merchandise; and in which the alarm is activated upon the integrity of the sense loop being compromised.
  • 10. A method of protecting an object including the steps of: attaching an alarm module to the object;programming a key with a security code;programming the security code into the alarm module from the key;controlling the alarm module by verifying the security code in the key with the security code in the alarm module by wireless communication between the key and alarm module; andinvalidating the security code in the key after a period of time to prevent subsequent disarming of the alarm module by said key unless the security code is refreshed in the key within said period of time.
  • 11. The method defined in claim 10 including the step of counting the number of activations of the key upon refreshing the key with the security code and disarming the alarm module by communication between the key and alarm module.
  • 12. The method defined in claim 11 including the step of permanently inactivating the key after a certain number of activations.
  • 13. The method defined in claim 12 including the step of providing a signal that the number of activations of the key is approaching the number which permanently inactivates the key.
  • 14. The method defined in claim 10 including the step of sounding an alarm in the alarm module when the integrity of the alarm module is compromised.
  • 15. The method defined in claim 10 including the steps of providing a programming station for generating the security code; and providing a wireless interface between the programming station and key for programming the key with the security code.
  • 16. The method defined in claim 15 including the step of providing the wireless interface with IR or RF communication.
  • 17. The method defined in claim 15 including the step of providing the alarm module with an internal timer which records the amount of time that an internal alarm is sounded.
  • 18. The method defined in claim 10 including the step of sounding an alarm in the alarm module when an incorrect security code is communicated to the alarm module by a key.
  • 19. A security system for protecting an item of merchandise comprising: a) a key containing a code;b) a security device for protecting the item of merchandise, said security device being responsive to the code contained in the key; andc) a timer mechanism to deactivate the code in the key after a certain time period.
  • 20. The security system defined in claim 19 including a programming station for generating the code in the key by a wireless interface between the key and programming station.
Provisional Applications (1)
Number Date Country
60753908 Dec 2005 US