This invention relates in general to security systems and anti-theft devices, and more particularly, to self shunting security devices for use in retail stores, offices and other establishments to prevent theft of items such as electronic devices.
In order to deter and prevent the theft of various items from retail stores, offices and other establishments, various security devices and systems employing sensors and alarms have been developed. The current systems generally fall into two categories, closed loop systems and open loop systems.
Closed loop systems typically include an alarm box, a splitter box having a number of ports, sensors and a power supply. These systems are referred to as closed loop systems because a circuit loop is formed when the sensors are properly attached to the articles at one end and to the ports of the splitter box by way of a plug at the other end. In particular, the sensor is in an opened state when it is not attached to an article to be protected. Attachment to the article causes a sensor switch to close, thereby creating a closed circuit with the sensors operatively connected to the alarm box. Once the sensors are connected, the system may be “armed.” As long as the sensors remain attached to the article and operatively connected to the alarm box, the electrical circuit will remain closed and the security system will remain in the armed state. The removal or, in some cases, attempted removal of the sensor from the article acts to open the switch and break the circuit, thereby sounding an alarm.
One of the problems with conventional closed loop systems is that they require shunt plugs to be inserted into unused ports in the splitter box that are not connected to articles in order to complete the circuit and allow the system to be armed. Use of shunt plugs complicates use of the security system because it requires an extra step and the shunt plugs are easily misplaced. Furthermore, as the system will not arm if the plugs of sensors connected to articles or shunt plugs are not occupying all of the ports, there is a risk that lazy or careless employees or personnel may turn off the security device or system (e.g., if one or more of the shunt plugs are lost or misplaced, whereby the system will not arm with the empty port), thereby allowing for possible theft of the articles.
The circuit in an open loop system is normally closed when the plugs are inserted into the connections and the sensors are attached to an article, and open upon removal of the sensor from the article. In particular, the sensor switch is typically in an open position when unattached to the article. Attaching the sensor to an article acts to close the switch, thereby allowing current to flow in the circuit. Removal of or tampering with the article's sensor acts to open the sensor switch and actuate the alarm. Any ports that do not have a plug properly inserted therein or that do not have sensors that are attached to articles are considered by open loop systems to be open and therefore not protected by the system.
As an open loop system allows the system to arm even if the ports do not contain either a shunt or a sensor that is attached to an article, one problem with these systems is that it is possible for unscrupulous individuals to manipulate or trick the system in such a way as to permit the articles to be stolen. In particular, an open loop system typically may be circumvented by partially removing the sensor from the article, thereby setting off the alarm if the system is armed. If the personnel monitoring the articles, after turning off the system to quiet the alarm or before turning the system on, does not check to make sure that all of the sensors are properly attached to the articles, when the personnel turns the system back on, the circuit associated with the partially removed plug assembly or improperly attached sensor is therefore open and not protected by the system. Accordingly, the individual can then later come back and remove the article without setting off the alarm. The self-shunting feature of applicant's invention would prevent such 2-step theft.
Therefore, there is a need to produce a security device capable of monitoring a variety of different articles that is retailer-friendly, encourages employees to use the system properly, and addresses the problems with the prior systems and devices, while being economical and easy to manufacture.
The present invention is an improvement over the prior security systems in the way that the security device provides the benefits of a closed loop system while eliminating the need for removable shunt plugs. In particular, the preferred embodiment of the security system of the present invention comprises a plurality of jacks or ports mounted on a circuit board for receiving connector plug assemblies that are operatively connected to sensors that are attachable to merchandise or other articles.
Each jack includes one or more nail contacts extending upward from or otherwise operatively attached to the circuit board and one or more jack contacts that are normally aligned with the nail contacts so that when the jacks are not in use (i.e., there are no connector plug assemblies inserted), the jack contact will engage the respective nail contact to create a first circuit. Completion of the first circuit acts to shunt the unused port, thereby eliminating the need for an external shunt plug. When a connector plug assembly is inserted into the jack, the end of the connector plug assembly will deflect the jack contact away from engagement with the nail contact, while creating a second circuit with a switch associated with the sensor to monitor and warn of any tampering with the sensor or protected article. When the associated security system is armed, removal of the connector plug assembly from the jack or removal of the sensor from the article will break the second closed circuit and activate an alarm to notify the operator or user of a potential theft or problem with the sensor or protected item or article. Furthermore, in a preferred embodiment, a status indicator such as an LED associated with the port in which the circuit was broken will allow personnel to promptly determine which articles and/or sensors to investigate for any potential thefts or problems.
It is therefore an object of the present invention to provide a new and improved security device for use in the prevention of theft.
Another object of the present invention is to provide a new and improved security device for monitoring articles that is retailer-friendly.
Yet another object of the present invention is to provide a new and improved security device that eliminates removable shunt plugs, but still provides the features and benefits of a closed loop system.
It is yet another object of the present invention to produce a security device that is economical and easy to manufacture and use.
Other objects, features and advantages of the invention will be apparent from the following detailed disclosure, taken in conjunction with the accompanying sheets of drawings, wherein like reference numerals refer to like parts.
While this invention is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail several specific embodiments, with the understanding that the present disclosure is to be considered merely an exemplification of the principles of the invention and the application is limited only to the appended claims.
Referring now to the drawings and particularly to
Referring now to
The alarm system 58 includes a housing enclosing an alarm circuit and an audible alarm such as, but not limited to, a horn or siren. A switch controlled by a keyhole 63 allows for the alarm system 58 to be selectively armed and disarmed. Power is preferably supplied to the alarm system 58 through an external power supply 60 such as, but not limited to, an AC adapter and an electrical wall socket, or an external battery. It is also appreciated that the alarm system 58 may include an internal battery or other type of power supply and not depart from the scope of the present invention. The alarm system 58 is preferably connected to splitter box 52 through an electrical cord or cable 64 such as, but not limited to, a telephone cord or coaxial cable.
It is also appreciated that the security device may be utilized with a system wherein the alarm or alarm system 66 is incorporated into or integral with the splitter box 52. In such a case, the splitter box may be fitted with a keyhole 68 for accepting a key for selectively arming and disarming the alarm system 66. The splitter box 52 may either be powered by an external power supply 62 such as, but not limited to, an AC adapter and an electrical outlet or an external battery, or it may contain an internal battery 70.
Referring now to
The jack contact 36 is made of a resilient or spring-like material to permit the jack contact 36 to return to its initial state and engage the nail contact 34 upon removal of the connector plug assembly 16 from the jack 12. As shown in
When no connector plug assembly is fully inserted into the respective jack, the indicator light will not illuminate, thereby indicating which jacks are not in use. Accordingly, the system of the present invention will notify the user (e.g., retail store personnel) of any connector plug assemblies that are partially inserted into or removed from the jacks to prevent sensors or connector plug assemblies from being partially removed to enable the product to be later stolen.
Referring again to
In one embodiment, when the system is armed and the second circuit is complete (i.e., a jack is properly inserted in a respective port and the sensor is properly attached to an article), the system will illuminate the indicator light or other status indicator 72 associated with the respective port to indicate that the article is properly protected. When the second circuit is broken in connection with one of the ports (e.g., a sensor is removed from an article), in addition to triggering the alarm, the respective indicator light may flash to indicate which sensor and article have problems or have been potentially compromised.
It is appreciated that the sensor may be any of the known types of sensors for use with security systems for monitoring articles such as, but not limited to clips, RJ-type plugs, adhesive strips and housing members, or the like. Examples of sensors are shown in U.S. Pat. Nos. 5,172,098 and 6,956,479, the teaching of which is hereby incorporated by reference. For example, the sensor may include an adhesive sheet having a hole that is placed on and adhered to an article, and a sensor housing having a button that extends into the hole and is biased inward when attached to a product, thereby biasing a first conductor into engagement with a second conductor. The removal or, in some cases, attempted removal of the sensor housing from the product causes the first conductor to disengage from the second conductor, thereby breaking the circuit and activating an alarm or other warning. As another example, the sensor may comprise a housing having a passage that permits an elongated fastener to extend through the housing and attach the sensor to a surface. When attached to the surface, the elongated fastener engages a pair of contacts within the housing to form an electrical path (i.e., close the circuit). Removing or withdrawing the elongated fastener from engagement with the surface acts to break the circuit and activate an alarm or other warning.
It will be understood that modifications and variations may be effected without departing from the scope of the novel concepts of the present invention, but it is understood that this application is limited only by the scope of the appended claims.
This application claims priority to U.S. provisional patent application 60/740,451, filed Nov. 29, 2005.
Number | Name | Date | Kind |
---|---|---|---|
3932857 | Way et al. | Jan 1976 | A |
4455464 | Leyden | Jun 1984 | A |
4620182 | Keifer | Oct 1986 | A |
4639713 | Kitagawa et al. | Jan 1987 | A |
4746909 | Israel et al. | May 1988 | A |
4962369 | Close | Oct 1990 | A |
5066942 | Matsuo | Nov 1991 | A |
5124685 | Rankin | Jun 1992 | A |
5146205 | Keifer et al. | Sep 1992 | A |
5172098 | Leyden et al. | Dec 1992 | A |
5543782 | Rothbaum et al. | Aug 1996 | A |
5561417 | Rothbaum et al. | Oct 1996 | A |
5821857 | Rand | Oct 1998 | A |
5995003 | Rogers | Nov 1999 | A |
6104289 | Rand | Aug 2000 | A |
6278365 | Kane et al. | Aug 2001 | B1 |
RE37590 | Leyden et al. | Mar 2002 | E |
6626697 | Martin et al. | Sep 2003 | B1 |
6690277 | Hansen et al. | Feb 2004 | B1 |
6755055 | Sedon et al. | Jun 2004 | B2 |
6756900 | Leyden et al. | Jun 2004 | B2 |
6861953 | Deconinck et al. | Mar 2005 | B2 |
7209038 | Deconinck et al. | Apr 2007 | B1 |
20050277339 | Caveney et al. | Dec 2005 | A1 |
20070171061 | Belden et al. | Jul 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
60740451 | Nov 2005 | US |