The invention relates to theft deterrent and security tags in general, and in particular to a disposable tag body containing a swiveling engagement having a marker comprised of either an electronic article surveillance (EAS) or for RFID device, or a combination of both.
Various types of theft deterrent and article monitoring devices are known in the art. Electronic article surveillance (EAS) systems are known having the common feature of employing a marker or tag which is affixed to an article to be protected against theft, such as merchandise in a retail store. When a legitimate purchase of the article is made, the marker can either be removed from the article, or converted from an activated state to a deactivated state. Such systems employ a detection arrangement, commonly placed at all exits of a retail store, and if an activated marker passes through the detection system, it is discovered by the detection system and an alarm is triggered. In addition, other tags are known that utilize ink vials that break and release a permanent staining fluid onto the article if the tag is not removed by an authorized individual.
U.S. Pat. Nos. 3,911,534 and 3,974,581 to Henry J. Martens et al. disclose a security tag having the pin contained on a first strip that is attached by a hinge to a second strip that has the locking component thereon. The hinged attachment may lead to the bending of the pin when contacting the locking component because of the predetermined arc that it must travel as a result of the hinged arrangement. Furthermore, the hinged arrangement allows the pin to protrude vertically when the device has fallen to the floor and may lead to injury. The '534 and '581 patents also disclose a pin soldered to a chain at one end and the other end of the chain riveted to the tag cover. The riveting of the chain on the outside of the tag body may subject the tag to easy defeat by unscrupulous individuals.
U.S. Pat. No. 3,932,918 to Paskert discloses a releasably attachable clip for attachment to certain cloth articles, wherein the pin component is incorporated into the tag. However, the pin once again is held in a substantially hinged relation to the locking component and may lead to bending of the pin as a result of the arc which must be traveled in order to engage the locking component. Furthermore, the '918 patent may only be used with articles made of cloth and cannot engage solid components as disclosed in the instant invention.
U.S. Pat. No. 3,942,829 to Humble et al. discloses a security tag having the pin contained on a first strip that is attached by a hinge to a second strip that has the locking component thereon. The hinged attachment may lead to the bending of the pin when contacting the locking component because of the predetermined arc that it must travel as a result of the hinged arrangement. In addition, the hinged arrangement allows the pin to protrude vertically when the device has fallen to the floor and may lead to injury. Furthermore, the '829 patent may only be used with articles made of cloth and cannot engage solid components as disclosed in the instant invention.
U.S. Pat. No. 6,535,130 to Nguyen et al. discloses a complex electronic tag having visual and audible alarm systems incorporated into the tag body itself. The tag also incorporates a lanyard that is made of an electrical circuit wire that will cause an audible or visual alarm in the tag body to be activated should the lanyard be cut. The Nguyen device, however, uses a traditional independent pin having a head to attach the lanyard to an article, thereby possibly leading to work place injuries when the pin is dropped on the floor.
U.S. Pat. No. 6,933,847 to Feibelman discloses an anti-theft tag that utilizes a lanyard where an additional crimping tool and open access to the interior of the tag is necessary in order to attach one end of the tag to the lanyard. The crimping tool of Feibelman may be easily lost and is difficult to negotiate by a user when attempting to hold the article to be tagged and the tag itself during such complex attachment manipulation. In addition, the Feibelman device may be defeated by an unscrupulous individual that inserts a screwdriver or similar tool within the loop created by the lanyard and continues turning the tool until the lanyard twists around itself and leads to failure of the lanyard or the plastic housing.
The prior art does not address the need for an integrated security tag that is difficult to defeat and easy to use. In addition, the prior art fails to provide a theft deterrent tag assembly that allows attachment of the lanyard to the tag without the need for a separate tool. Therefore, there remains a long standing and continuing need for an advance in the art of security devices and theft deterrent tags that makes the tags more difficult to defeat, simpler in both design and use, more economical and efficient in their construction and use, and provides a more secure engagement of the article.
Accordingly, it is a general object of the present invention to overcome the disadvantages of the prior art.
Therefore, it is a primary objective of the invention to provide a security tag that is more difficult to defeat.
It is another objective of the invention to provide a security tag that is cost-efficient in use and manufacture.
It is a further objective of the invention to provide a security tag that may be disposable.
In keeping with the principles of the present invention, a unique security tag is disclosed wherein a lanyard passes through an article to be monitored and is securely maintained within the tag body by an attaching member that receives the lanyard. The attaching member being maintained within the tag body in a secure yet moveable manner such that a turning force applied to the lanyard does not cause the lanyard to twist. The attaching member also has an attaching mechanism that does not require a tool to be inserted into the tag body to secure the lanyard within the attaching member in a secure manner.
Such stated objects and advantages of the invention are only examples and should not be construed as limiting the present invention. These and other objects, features, aspects, and advantages of the invention herein will become more apparent from the following detailed description of the embodiments of the invention when taken in conjunction with the accompanying drawings and the claims that follow.
It is to be understood that the drawings are to be used for the purposes of illustration only and not as a definition of the limits of the invention. In the drawings, wherein similar reference characters denote similar elements throughout the several views:
Referring now to
Second half 24 has a peripheral wall 26 extending inwardly from an inner surface 28a of second half 24 and securely engaging—along a substantial portion of the periphery thereof—first half 22. Peripheral outer wall 26 of tag 20 encloses the tag body except for the front end 21. If plastic or like material is used for the body of tag 20, the mating of peripheral wall 26 to first half 22 can be accomplished via an ultrasonic weld or like joining mechanism. However, it is to be understood that other joining methods, such as adhesives for example, may also be used. Inner surface 28b of first half 22 and inner surface 28a of second half 24 create a cavity 30 within which a marker 32 is enclosed.
Marker 32 may be an Electronic Article Surveillance (“EAS”) device or any electronic means of monitoring an article to which it is attached. Conventional EAS devices or tags include a resonator that, when activated, causes an alarm to sound when the EAS tag is brought within operative proximity of detection apparatus (which is typically located at the exit of a store). Marker 32 may also be a radio-frequency (“RFID”) device. RFID is a generic term for technologies that use radio waves to automatically identify objects such as tagged products. There are several conventional methods of identifying objects using RFID, the most common of which is to store a serial number (and other information if desired) that identifies the object on a microchip that is attached to an antenna. The chip and the antenna, together with any supporting substrate, herein are called an RFID device or an RFID tag. The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves from the RFID device into a form that can then be utilized by a computer and read by a user. Marker 32 may also be any transponder or a combination of both an EAS and RFID device, and can also incorporate any later developed technology to track inventory or surveil articles. Marker 32 is adapted to operate along the lines of a frequency modulated (FM) radio and also amplitude modulated (AM) radio signals.
A chamber 34—defined between first half 22 and second half 24—securely maintains an attaching member 36 therein in a swiveling or rotating manner. Chamber 34 is created by a first protrusion 38 extending outwardly from first half 22 and a second protrusion 40 extending outwardly from second half 24. In one preferred embodiment, chamber 34 is located proximal to front end 21 of tag body 20. First protrusion 38 and second protrusion 40 have an inwardly extending lip 44 such that lip 44 defines an opening 42. Inner surface of first protrusion 38 and second protrusion 40 are substantially concave and form a substantially cylindrical chamber 34 when the tag body is attached. Although a cylindrical embodiment is herein presented, it is to be understood that attaching member 36 and chamber 34 may be substantially spherical, or any other appropriate shape that would allow the swiveling of attaching member 36 within chamber 34. In fact, attaching member 36 may take any shape that does not prevent it from being moveably maintained within chamber 34. And, as a further example, attaching member 36 may be substantially conical.
Now also referring to
Attaching member 36 is substantially cylindrically shaped having a leading end 60 and a trailing end 62. In one preferred embodiment, leading end 60 has a smaller diameter than trailing end 62 such that a peripherally extending ridge 64 is formed at the transition between leading end 60 and trailing end 62. Ridge 64 is engaged by lip 44 of tag body 20 in a swiveling yet secure manner such that leading end 60 is substantially flush with front end 21 when assembled. First aperture 58 is defined by the attaching member and traverses from leading end 60 to trailing end 62. First catch 54 is fed through aperture 58 from trailing end 62 such that first catch 54 emanates from leading end 60. However, as a result of the larger diameter of second catch 56, it cannot pass through the aperture 58 and is securely maintained within attaching member 36.
A second aperture 66 is also defined by and extends from leading end 60 to trailing end 62 of attaching member 36. First end 48 of engaging element 46 is passed through an article to be monitored and first catch 54 is inserted into second aperture 66 and is securely therein via an attaching mechanism 68. In such a state, the article to be monitored is maintained within a loop formed by engaging element 46. Furthermore, in said state, an unscrupulous individual will not be able to insert a screw driver or similar tool within the loop and turn the same into a tightening helical form in an attempt to break the engaging element 46 or cause failure of the tag body 20. Attempts to turn the screw driver in order to twist the engaging element 46 upon itself will not be successful because it will result in the swiveling of the attaching member 36 within tag body 20.
Attaching mechanism 68 is comprised of a cap 70, a biasing member 72, and a ball 74. Ball 74 is larger in diameter than second aperture 66 and cannot travel therethrough. Cap 70 is substantially disc shaped and is adapted to be received on trailing end 62 of attaching member 36. Cap 70 has an elevated region 76—that is substantially shaped like a right triangle—extending inwardly therefrom. Cap 70 also has a first hole 78 and a second hole 80 defined through the disc region thereof. First hole 78 and second hole 80 have the same size as and are axially aligned with first aperture 58 and second aperture 66, respectively. Elevated region 76 has a first side 82 that is inclined and is similar to a hypotenuse of a right triangle, a second side 84 extends downwardly from a top portion 86 of first side 82 in a substantially perpendicular manner to disc region of cap 70. A third side 88 is defined on said flat region of the cap 70 and forms the final side of the triangular elevated region 76 and attaches to a bottom portion 90 of first side 82. Bottom portion 90 is distal to top portion 86 of first side 82.
A base 92 emanates vertically from disc region of cap 70 at bottom portion 90 of first side 82. Base 92 is adapted to receive one end of biasing member 72 thereon such that biasing member 72 is maintained in parallel alignment with and rests on top of first side 82. The other end of biasing member 72 rests proximal to top portion 86 of first side 82.
In one preferred embodiment, first side 82 and second side 84 have an axially extending concavity along the lengths thereof such that a first channel 94 is defined along first side 82 and a second channel 96 is defined along second side 84. Biasing member 72 and ball 74 are adapted to travel on top of the side rail like structures created by first channel 94 without falling into second channel 96.
Now referring more particularly to
When attaching mechanism 68 is inserted into crevice 98 of attaching member 36, ball 74 is maintained at top portion 86 of first side 82 by the application of force from biasing member 72 thereto. Ball 74 and biasing member 72 are moveably maintained between first side 82 and first wall 100 and maintained within first channel 94. Now referring more particularly to
It is to be understood that while a ball mechanism is illustrated herein, other attaching mechanisms known in the art may be substituted therefor without departing from the essence of the invention. In a single use theft deterrent device, the authorized user is provided with a cutting tool that is capable of cutting engaging element 46 from the article that is enclosed within the loop.
While the above description contains many specificities, these should not be construed as limitations on the scope of the invention, but rather as an exemplification of preferred embodiments thereof. Many other variations are possible without departing from the essential spirit of this invention. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their legal equivalents.
This application claims priority from non-provisional U.S. design patent application Ser. No. 29/249,235, filed on Sep. 27, 2006, the contents of which are incorporated herein by reference.