This invention generally relates to retail merchandise security devices, and more particularly to retail merchandise security devices which are affixed to retail merchandise to provide anti-theft functionality.
There are various methods and devices employed by retail establishments to deter or prevent retail theft. One common approach is to affix a security device directly to a product. Such security devices employ some mode of anti-theft functionality. As one example, it is known to affix an RFID tag directly to a product. A gate is positioned at an exit point of the retail establishment. If the RFID passes through the gate without being deactivated, an alarm will sound. Such RFID tags are oftentimes a small tag with an adhesive back which is adhered directly to a product or its packaging.
However, some packaging does not readily allow for the use of such tags. Indeed, it is not uncommon to utilize shrink wrap on the exterior of a package. Such a packaging arrangement is provided at the source and thus the retail establishment must accommodate their security device to this packaging. Adhesive back RFID tags are not readily employed in such a configuration as they would need to be adhered to the shrink wrap, which can be easily removed in-store by a would be thief.
To address this, there are security devices which are referred to in the art as box wraps. Such box wraps include a central hub housing an anti-theft arrangement and a spool. A cable of fixed length is attached to the spool at both ends thereof. As a result, a loop of cable may be drawn from or taken up by the central hub. The loop is first enlarged and merchandise is passed through the loop. The loop is then taken up by the spool so that the cable is tightly wound around the merchandise such that the security device is effectively affixed to the merchandise. There is typically a locking mechanism within the central hub which prevents the loop from being enlarged again which would otherwise allow for the unwanted removal of the security device. Once activated, the device will sound an alarm if not deactivated, and or, if the device is tampered with, e.g. the cable loop is cut.
Typically, the anti-theft componentry is contained within the central hub. If a retail establishment wishes to change their anti-theft methodology to something which is not compatible with the anti-theft componentry of their existing devices, their existing security devices are rendered entirely obsolete.
Further yet, in other security devices, the security device may have a button that presses against the retail merchandise. When the security device is removed from the retail merchandise, an alarm will be triggered. However, these buttons are often small and it can be difficult to maintain compression of the button.
As such, there is a need in the art for a security device which can accommodate a broad range of retail packaging sizes rather than being limited to a maximum size of retail merchandise before it must be entirely replaced. There is also a need for a security device that can accommodate retail packaging of various shapes, and a device that is adaptable to differing anti-theft methodologies.
The application provides new and improved security devices that provide anti-theft functionality.
In one example, a security tag holder is provided. The tag holder can be used to hold a security tag. The tag holder includes a holder body that defines a security tag holding cavity. A first band retaining finger is attached to the holder body. A second band retaining finger is attached to the holder body on an opposite side of the security tag holding cavity as the first band retaining finger. The security tag holding cavity is interposed between the first and second band retaining fingers.
In an example, the first and second band retaining fingers are oppositely oriented relative to one another (e.g. extend in opposite directions). In one example the band retaining fingers extend parallel to one another, but in opposite directions.
In an example, each of the first and second band retaining fingers includes a connection portion and a band retaining portion. The connection portion secures the band retaining portion to the holder body.
In an example, for each of the first and second band retaining fingers, a band receiving slit is formed between the band retaining portion and the holder body.
In an example, for each of the first and second band retaining fingers, the band retaining portion extends from the connection portion over a portion of the holder body in a cantilevered orientation.
In an example, for each of the first and second band retaining fingers, the band retaining portion includes a retaining nib projecting towards the holder body.
In an example, the holder body includes a first recess receiving the retaining nib of the first band retaining finger and the holder body includes a second recess receiving the retaining nib of the second band retaining finger. Note the nibs are received when no band is being engaged by the band retaining fingers. With a band being secured by the band retaining fingers, the thickness of the band may prevent the nibs from being received in the recesses.
In an example, the band retaining fingers are flexible to allow for securement or removal of a retention band.
In an example, the holder body includes a first side and a second side, the first and second sides being spaced apart with the security tag holding cavity being positioned therebetween. The first band retaining finger is mounted to a top of the first side and the second band retaining finger is mounted to the top of the second side.
In an example, the holder body is annular body that surrounds the security tag holding cavity. The annular body may be open on both the top or bottom ends.
In another example, a security tag holder including a holder body and a contact lever is provided. The holder body defines a security tag holding cavity. The contact lever is hingedly attached to the holder body for pivoting motion about a pivot axis. The contact lever extends across the security tag holding cavity. The contact lever has a free end spaced away from the pivot axis. The contact lever pivots between an alarm position and an inactive position, the free end being positioned closer to the holder body in the inactive position than in the alarm position.
In an example, the contact lever has an outer surface that faces away from or otherwise outward relative to the holder body. The outer surface being curved at least proximate the free end.
In an example, the contact lever has an outer surface that faces away from the holder body. The outer surface is convexly curved. This allows for improved contact with retail merchandise packaging.
In an example, the holder body has a bottom end. The bottom end includes a notch therein. The contact lever is positioned with in the notch when in the inactive position. In use, the bottom end would face the retail merchandise packaging to which the security tag holder is attached.
In an example, the contact lever may pivot about the pivot axis such that the pivot lever is flush with or recessed above the bottom end of the holder body.
In an example, the holder body has a first side and a second side spaced from the first side. The security tag holding cavity is formed, at least in part, between the first and second sides. The first side has an inner face that faces towards the second side. The contact lever is pivotable about the pivot axis such that the free end is pivotable into the security tag holding cavity with the free end of the contact lever positioned adjacent to the inner face of the first side.
In an example, the contact lever is hingedly attached to the holder body proximate the second side.
In an example, the outer surface is curved for less than half of the distance between the free end and the pivot axis.
In an example, the contact lever has a pair of legs that are laterally spaced apart along the pivot axis. The holder body includes at least one mounting projection. The pair of legs pivotally engage the at least one mounting projection to pivotally secure the contact lever to the holder body.
In an example, a pair of nibs provided by the pair of legs or the at least one mounting projection and a pair of recesses provided by the other one of the pair of legs or the at least one mounting projection are provided. The pair of nibs engage the pair of recesses to secure the contact lever to the holder body, to define the pivot axis, and to permit pivotal motion between the holder body and the contact lever.
In an example, the hinged attachment between the contact lever and the holder body is free of a separate hinge pin.
In another example, a security tag assembly comprising a security tag and a security tag holder as outlined above is provided.
In another example a security tag assembly comprising a security tag and a security tag holder outlined above having a contact lever is provided. The security tag has a housing and an alarm button. The alarm button is movable relative to the housing body between an extended state and a retracted state. The alarm button projecting from the bottom side a further distance in the extended state than in the retracted state. The security tag can generate an alarm when the alarm button is in the retracted state. The security tag is mounted within the security tag holding cavity of the security tag holder. The contact lever transitions the alarm button from the extended state to the retracted state when the contact lever is transitioned from the alarm position to the inactive position.
In an example, the alarm button is biased from the retracted state towards the extended state by a biasing force. The biasing force being sufficient to bias the contact lever from the inactive position to the alarm position when the contact lever is not in engagement with an object.
In an example, a retention band for securing the security tag holder to an object is provided. The retention band is configured to maintain the contact lever in the inactive position when the security tag and retention band are mounted to the object.
In an example, the holder body includes first and second band retaining fingers as well as a retention band. The first band retaining finger is attached to the holder body. The second band retaining finger is attached to the holder body on an opposite side of the security tag holding cavity as the first band retaining finger with the security tag holding cavity being interposed between the first and second band retaining fingers. The retention band is secured to the holder body by the first and second band retaining fingers.
In an example, the retention band will extend across a top surface of the security tag when attached to the holder body.
In another example, a retail package is provided. The retail package includes a product, a security tag assembly as outlined above and a retention band. The retention band extends around the product and secures the security tag assembly to the product. The retention band maintains the contact lever in contact with an outer surface of the product to maintain the contact lever in the inactive position. The contact lever transitions to the alarm position when the holder body is lifted away from the outer surface of the product or slid off of the product. Note, that the contact lever may remain in contact with the outer surface of the product, as long as the contact lever is still allowed to pivot towards the alarm position.
In an example, the biasing force biasing the alarm button transitions the contact lever to the alarm position when the holder body is lifted away from the product or slid off of the product.
Other aspects, objectives and advantages of the invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings.
The accompanying drawings incorporated in and forming a part of the specification illustrate several aspects of the present invention and, together with the description, serve to explain the principles of the invention. In the drawings:
While the invention will be described in connection with certain preferred embodiments, there is no intent to limit it to those embodiments. On the contrary, the intent is to cover all alternatives, modifications and equivalents as included within the spirit and scope of the invention as defined by the appended claims.
The security tag assembly 104 includes a security tag holder 106, a retention band 108 and a security tag 110. The security tag 110 is mounted within the security tag holder 106 and the retention band 108 secures the security tag holder 106 and security tag 110 operably to the product 102.
The retention band 108 may be an elastic band or a non-elastic band. The retention band 108 may be non-elastic but adjustable in size such that it can be used with different sized products 102. Further, while the retention band 108 is illustrated as a separate component other embodiments may incorporate the retention band in the security tag holder 106.
With additional reference to
In the illustrated example, the holder body 114 is generally rectangular including two sets of opposed sides. However, other shapes and configurations as contemplated such as oval, triangular, circular, etc. Further, an oval or circle can be considered to have opposed sides for purposes of this application. Further, while the holder body 114 in this example is open from a top side 120 and a bottom side 122 such that the security tag holding cavity 118 is accessible from both the top side 120 and the bottom side (see e.g.
The contact lever 116 is hingedly attached to the holder body 114 for pivotal movement about a pivot axis 124 between an alarm position (
Further, in at least this position, the contact lever 116 extends across security tag holding cavity 118. In this example, the contact lever 116 extends at least 50 percent the distance D1 between the opposed sides of the holder body 114 and preferably at least 75 percent (see e.g.
In this position, the contact lever 116 presses an alarm button 128 of the security tag 110 into housing 130 of the security tag 110. Thus, in this position, the alarm button 128 extends a first extent from the bottom 131 of the security tag 110. In this position, the security tag 110 is not generating an alarm due to removal of the security tag assembly 104/security tag 110 from the product 102.
The alarm position corresponds to the position when the security tag holder 106 is sufficiently removed from the product 102. This is typically achieved when the security tag holder 106 is either lifted away from the product 102 by stretching or breaking the retention band 108 (see e.g.
Thus, pivotal motion between the alarm position and the inactive position of the contact lever 116 activates and deactivates the alarm feature of the security tag 110.
With reference to
In an example, the bottom surface 138 is curved in a convex manner. This curved configuration improves the engagement of the contact lever 116 with the product 102, particularly if the product 102 may have a concave or recessed outer surface.
In an example, the curved portion 139 of the bottom surface 138 is proximate a distal end 140 of the contact lever 116. This distal end 140 is opposite the connection end 142 of the contact lever 116, which is proximate the pivotal connection of the contact lever 116 to the holder body 114.
In one example, the curved portion of the bottom surface 138 extends less than half of the distance between the distal end 140 and the connection end 142.
In some examples, the contact lever 116 is configured such that it may be sufficiently pivoted about axis 124 such that bottom surface 138 of contact lever 116 is fully recessed inward from a bottom surface 146 of the holder body 114 or at most flush with bottom surface 146 (see e.g.
In some examples, the distal end 140 is closer to or received within the holder body 114 when in the inactive position than when in the alarm position.
With reference to
The contact lever 116 and holder body 114, in this example, are connected without the use of a hinge pin. This allows for a simpler assembly and reduces the number of parts that are needed for manufacture and/or assembly. However, other examples could include such a hinge pin.
In this example, the contact lever 116 includes a pair of spaced apart legs 152, 154. The legs 152, 154, each include an inward extending retaining nib 156, 158, respectively. These retaining nibs 156, 158 are pivotally engaged with recesses 160, 162 formed in connection projections 164, 166. In this example, the recesses 160, 162 are through bores formed entirely through the connection projections 164, 166. However, in other embodiments, the recesses 160, 162 could simply be dimples formed in the connection projections 164, 166. In other examples, the nibs and recesses could be switched such that the holder body 114 includes the nibs and the contact lever 116 includes the recesses.
In this example, when assembled the legs 152, 154 straddle the connection projections 164, 166.
In this example, the connection projections 164, 166 include rotation limiting features 168 that limit rotation of the contact lever 116 about axis 124. The end 142 of the contact lever 116 will abut the rotation limiting features 168.
In an example, the alarm button 128 of the security tag 110 is biased from the retracted state towards its extended state (e.g. the position illustrated in
In an example, the biasing force acting on the alarm button 128 is sufficient to transition the contact lever 116 from the inactive position to the alarm position. Thus, when the security tag holder 106 is sufficiently moved away from the surface of the product 102, the biasing force will be sufficient to extend alarm button 128 to the extended state and cause the alarm to be generated by the security tag 110. There is no requirement, in some examples, for an external spring to transition the contact lever 116 from the inactive position to the alarm position.
With reference to
In this example, the band retaining fingers 170, 172 or 174, 176 of a pair of retaining fingers are oppositely oriented. As such, the band retaining fingers 170, 172 or 174, 176 extend opposite one another.
The band retaining fingers 170, 172, 174, 176 each include a connection portion 180 and a band retaining portion 182. The connection portion 180 secures the band retaining portion 182 to the top of corresponding sides of the holder body 114. In the illustrated example, the band retaining portion 182 extends in a cantilevered orientation from the connection portion 180.
A band receiving slit 184 is formed between the trap retaining portion 182 and the adjacent portion of the holder body 114. When mounted to a product 102, the retention band 108 is received in the band receiving slits 184 of the opposed pair of retaining fingers. The opposite orientation of the fingers 170, 172 or 174, 176 helps maintain securement of the retention band 108 within the band receiving slits 184. In this configuration, mouths 185 of the band receiving slits 184 associated with the pairs of band retaining fingers 170, 172 or 174, 176 open opposite one another. The mouths 185 are at opposite ends of the retaining portion 182 as the connection portion 180.
To further secure the retention band 108 relative to the security tag holder 106, retaining nibs 186 extend from the inner side of the band retaining portion 182 of the band retaining fingers 170, 172, 174, 176.
In an example, the holder body 114 includes recesses 188 that receive the retaining nibs 186.
While the illustrated example uses fingers 170, 172, 174, 176 that engage the retention band(s) 108, other embodiments can use other attachment arrangements. For example, the band could extend through the holder body 114 rather than use fingers. The band could be integrally molded/formed with holder body.
All references, including publications, patent applications, and patents cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
The use of the terms “a” and “an” and “the” and similar referents in the context of describing the invention (especially in the context of the following claims) is to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
Preferred embodiments of this invention are described herein, including the best mode known to the inventors for carrying out the invention. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate, and the inventors intend for the invention to be practiced otherwise than as specifically described herein. Accordingly, this invention includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the invention unless otherwise indicated herein or otherwise clearly contradicted by context.
This patent application is a Continuation of co-pending U.S. patent application Ser. No. 17/323,483 filed May 18, 2021, which is now pending. This patent application claims the benefit of U.S. Provisional Patent Application No. 63/026,233, filed May 18, 2020, the entire teachings and disclosure of which are incorporated herein by reference thereto.
Number | Date | Country | |
---|---|---|---|
63026233 | May 2020 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17323483 | May 2021 | US |
Child | 18647659 | US |