Protecting retail items from theft is an ongoing concern. There are security tags that can be applied to retail items via an adhesive or other means of attachment for securing retail items. A typical electronic article surveillance (EAS) system will include pedestals that will alarm when a security tag passes through the pedestals. To overcome EAS systems, thieves have different devices for removing the tag. The tag may be removed by the thief in store, or outside of the store.
A large portion of stolen retail items are sold to illicit organizations, which subsequently re-sell the stolen retail items. Typically, the organization purchasing the stolen retail items will pay only a fraction of the intended price of the merchandise. Depending on the quality of the product, and/or the condition of the product's packaging, the purchase price for the stolen retail item may be reduced further.
Since the quality of the product packaging can affect the purchase price, thieves desire to avoid damaging the product packaging when removing security tags. There exists a need to provide a security tag and product packaging whereby removal of the tag causes damage to the product packaging, thus reducing the re-sale value of stolen merchandise and deterring thieves from committing retail theft.
The present disclosure is directed to a method and system for applying a security tag. In one aspect, the method includes cutting a portion of a top layer of a product packaging, the cutting comprising making cuts that form a closed shape, the cutting causing a break in the top layer that exposes a second layer of the product packaging; and adhering, via an adhesive, a security tag over the cut portion, the adhesive penetrating into the break in the top layer to contact the exposed second layer; wherein, upon removal of the security tag from the product packaging, a section of the cut portion of the top layer is removed from the product packaging.
In another aspect, a method includes degrading a portion of a top layer of the product packaging; and adhering a security tag over the degraded portion.
In yet another aspect, a system includes a degrading tool configured to degrade a portion of a top layer of the product packaging; and a tag applicator configured to adhere a security tag over the degraded portion.
Further areas of applicability of the present method and system will become apparent from the detailed description provided hereinafter. It should be understood that the detailed description and specific examples, while indicating certain embodiments, are intended for purposes of illustration only and are not intended to limit the scope of the invention.
The example embodiments of the present disclosure will become more fully understood from the detailed description and the accompanying drawings, wherein:
The following description of the preferred embodiment(s) is merely exemplary in nature and is in no way intended to limit the invention. The description of illustrative embodiments is intended to be read in connection with the accompanying drawings, which are to be considered part of the entire written description. In the description of the exemplary embodiments disclosed herein, any reference to direction or orientation is merely intended for convenience of description and is not intended in any way to limit the scope of the present invention. Relative terms such as “lower,” “upper,” “horizontal,” “vertical,” “above,” “below,” “up,” “down,” “left,” “right,” “top,” “bottom,” “front” and “rear” as well as derivatives thereof (e.g., “horizontally,” “downwardly,” “upwardly,” etc.) should be construed to refer to the orientation as then described or as shown in the drawing under discussion. These relative terms are for convenience of description only and do not require that the apparatus be constructed or operated in a particular orientation unless explicitly indicated as such. Terms such as “attached,” “affixed,” “connected,” “coupled,” “interconnected,” “secured” and similar refer to a relationship wherein structures are secured or attached to one another either directly or indirectly through intervening structures, as well as both movable or rigid attachments or relationships, unless expressly described otherwise. The discussion herein describes and illustrates some possible non-limiting combinations of features that may exist alone or in other combinations of features.
Referring now to
A challenge with packages having a silicon or similar coating is that it is generally easy to peel adhered tags off such a coating, thus enabling a thief to remove a security tag without damaging the product 50. To address this issue and help ensure that the product packaging 10 is damaged when the security tag 30 is removed, a portion 20 of a top layer 12 of the product packaging 10 is degraded prior to application of the tag 30. In the exemplified embodiment, the top layer 12 is degraded by applying cuts, (e.g., die cuts that are microscopically thin) in the top layer 12 of the product packaging 10. Specifically, the exemplary cuts are intersecting vertical and horizontal lines 24.
The example embodiments are not limited to any particular cutting pattern, and can include any pattern for degrading the top layer, including patterns made by skiving or scoring.
Patterns 20a and 20b include a cut line or cut lines 24 that form one or more closed shapes 22. The cut lines 24 of pattern 20a from a closed square 22. Further, the cut lines 24 of pattern 20b form three closed circles 22. Such closed shapes 22 can cause a portion of the product packaging defined by the closed shape 22 to more easily pull away when the tag 30 is later removed.
Pattern 21 is in the shape of an “L” and is representative of a logo. The pattern can be any identification pattern, including a name, logo, or image. For example, the pattern can spell the name of the retailer or manufacturer selling the item.
The example embodiments are not limited to degrading by die cutting or other cutting methods, but can include any method of degrading the top layer of a product packaging. For example, the top layer can be degraded by application of a chemical, or by the application of heat (including burning or scorching), or by plasma discharge (e.g., corona treatment). These techniques may nonetheless be utilized to form a closed shape for the degraded area as described above.
Returning to
Referring now to
The example embodiments are not limited to the above embodiment. In other embodiments, the product packaging 10 can include different numbers of layers. Further, the degrading can be such that it does not cause a break in the top layer. Further, the break 24 can be caused by a non-cutting method of degrading, such as the chemical or heat methods discussed above. Further, the cutting of the degraded portion 20 of the top layer can cause a break in the exposed second layer 14.
The adhesive 40 can be of any type of bonding material, and can be applied at any temperature. In a preferred embodiment, the adhesive 40 has a viscosity of approximately 12000 cPs, and has a high level of oil to provide high initial tack and better penetration of the degraded portions 20 of the top layer 12. An adhesive with a high level of oil can migrate more easily and quickly than harder adhesives. The adhesive can be applied at any temperature. In a preferred embodiment, an adhesive of 11700 cPs is applied at 160° C. In certain other embodiments, the viscosity is 10000-13000 cPs and is applied at a temperature of 150-170° C.
The system 60 further includes a tag applicator 80 configured to adhere a security tag 30 over the degraded portion. In the exemplified embodiment, the tag applicator 80 is an industry-standard high-speed label applicator, though any device for adhering a security tag can be used. The system can include a conveyor belt 55 to transport the package 10 from the degrading tool 70 to the tag applicator 80. In other embodiments, the system can utilize one or more handheld devices. For example, a device can include in a single housing a die-cutting mechanism and a label applicator 80. Alternatively, degrading can be performed by hand by a knife, stamp, or other degrading tool, and the application of a tag can be performed by hand.
Returning to
While the various example embodiments have been described with respect to specific examples, those skilled in the art will appreciate that there are numerous variations and permutations of the above that may be implemented without departing from the scope of the present invention. Also, it is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present invention. Thus, the spirit and scope should be construed broadly as set forth in the appended claims.