The present invention relates to a system for detecting and alerting intrusion into a protected area with a mechanism for deciphering authorized versus unauthorized access.
Glass showcases, an example of a protected area, are typically used to display smaller but expensive items for sale like jewelry, watches, etc. These items are typically displayed in the glass showcase on small, velvet-lined trays or stands that can be arranged on shelves or in compartments within the cabinet. Customers are on the outer side of the showcase while salespersons are on the inner side. A showcase has doors on the inner side which can be opened to place the items in or to be taken out by the salesperson. The outer side does not have the doors. The doors have locks but usually these are unlocked during normal operation of the store for convenience to avoid having to open and close frequently.
Although there are no doors on the outer side, if the salesperson is not watching, a customer standing on the outer side can extend his/her arm, reach out to the inside doors, into the showcase and take items out without being noticed, detected, or caught. This practice is commonly used by thieves to steal expensive items from showcases.
Previous technologies have attempted to solve this problem. One such solution for preventing unauthorized access into glass showcases uses doors on the inside which can be closed and locked. Locking the doors does prevent customers from reaching into the showcase but it is inconvenient and impractical for the salesperson to keep opening and closing the locks, especially when there are many showcases, and the shop is busy with customers. For this reason, locks are left open during normal operation of the shop and the jewelry is removed from the showcases and placed in safes when the shop is closed.
Another solution is to have showcases that are unbreakable. These are good to protect the shelves from burglars and robbers but do not solve the problem to prevent an amateur customer or the thief from reaching inside the showcase during normal business hours.
Another solution is what gets deployed in large museums and display-only exhibitions to detect intruders from stealing expensive items that are displayed. This perhaps can be deployed after hours but does not solve the problem during business hours when the store is open, has items for sale, and requires the salesperson to constantly remove and return the expensive items in the showcase.
There are devices to detect if the sliding door was opened. Also, there are wired or wireless devices that are attached to the items on display, e.g., on cellphones or cameras for sale, which prevents them to be removed or moved far from their cradle. None of these detect a person's hand reaching inside a glass showcase.
Also, there are alarm systems which use RFIDs assigned to the authorized individuals to disable the alarm. This works, but covers a large area, and assumes that the presence of just one individual is enough to monitor the full area. This may not be true if there are many shelves in close-proximity and if the salesperson gets busy with a customer on one side of the area, leaving shelves on the other side vulnerable.
Accordingly, there is still an unsolved need for a system that addresses these problems discussed above and may address other existing issues.
The disclosed system is unique when compared with other known systems and solutions. The disclosed system detects authorized or unauthorized access by owners or intruders, from the inner and/or outer side into the protected area of a showcase and generates an alarming or nonalarming alert upon detection while its detection system is activated. A mechanism is in place to disable the alert or to change the alert type if an authorized person, such as a shop owner or a salesperson, reaches into the protected area rather than an unauthorized person reaching into the protected area.
In one or more embodiments, a system for detecting and alerting intrusion into a protected area with a mechanism to decipher between authorized and unauthorized access is described herein. The system includes a mechanism to detect and alert an attempted access into a protected area. The system further includes a device that takes action when such an access is detected. The system includes a mechanism capable of deciphering between an authorized versus an unauthorized access. Additionally, the system will include an audible/visual signal to notify and/or warn when the system is activated and/or deactivated. These can include panel display lights, on/off switches, warning signs, an automatic and possibly artificial intelligence (AI) driven messaging system, alternative messaging system such as text messages, etc.
Other aspects and advantages of the invention will be apparent from the following description and the appended claims.
Embodiments of the present disclosure are described in detail below with reference to the following drawings. These and other features, aspects, and advantages of the present disclosure will become better understood with regard to the following description, appended claims, and accompanying drawings. The drawings described herein are for illustrative purposes only of selected embodiments and not all possible implementations and are not intended to limit the scope of the present disclosure.
In the Summary above, in this Detailed Description, the claims below, and in the accompanying drawings, reference is made to particular features of the invention. It is to be understood that the disclosure of the invention in this specification includes all possible combinations of such particular features. For example, where a particular feature is disclosed in the context of a particular aspect or embodiment of the invention, or a particular claim, that feature can also be used—to the extent possible—in combination with and/or in the context of other particular aspects and embodiments of the invention, and in the invention generally.
The term “comprises” and grammatical equivalents thereof are used herein to mean that other components, ingredients, steps, etc. are optionally present. For example, an article “comprising” (or “which comprises”) components A, B, and C can consist of (i.e., contain only) components A, B, and C, or can contain not only components A, B, and C but also contain one or more other components.
Where reference is made herein to a method comprising two or more defined steps, the defined steps can be carried out in any order or simultaneously (except where the context excludes that possibility), and the method can include one or more other steps which are carried out before any of the defined steps, between two of the defined steps, or after all the defined steps (except where the context excludes that possibility).
The term “at least” followed by a number is used herein to denote the start of a range including that number (which may be a range having an upper limit or no upper limit, depending on the variable being defined). For example, “at least 1” means 1 or more than 1. The term “at most” followed by a number is used herein to denote the end of a range, including that number (which may be a range having 1 or 0 as its lower limit, or a range having no lower limit, depending upon the variable being defined). For example, “at most 4” means 4 or less than 4, and “at most 40%” means 40% or less than 40%. When, in this specification, a range is given as “(a first number) to (a second number)” or “(a first number)-(a second number),” this means a range whose limits include both numbers. For example, “25 to 100” means a range whose lower limit is 25 and upper limit is 100 and includes both 25 and 100.
Referring now to the drawings and the following written description of the present invention, it will be readily understood by those persons skilled in the art that the present invention is susceptible to broad utility and application. Many embodiments and adaptations of the present invention other than those described herein, as well as many variations, modifications, and equivalent arrangements will be apparent from or reasonably suggested by the present invention and the detailed description thereof without departing from the substance or scope of the present invention. This disclosure is only illustrative and exemplary of the present invention and is made merely for purposes of providing a full and enabling disclosure of the invention.
The present disclosure is generally directed to one or more non-limiting embodiments of a system that can be used as a theft prevention system for use with display cases, which will be referred to as the system herein. The system provides an easy and efficient way of detecting access with a disablement mechanism for authorized personnel.
Referring to
Another mechanism to detect intrusion 110 may include a combo device that has both the light source (laser or non-laser convention) and light sensor that can be placed inside one end of the shelf. That is the light source and light sensor are positioned on the same side such that the intrusion is detected when the light from the light source is reflected to the light sensor off an intruding object, such as from an intruder's hand.
Another detection mechanism 110 may include a simple light sensor inside the showcase that can detect an intrusion just by monitoring the changes in light intensity of light sources outside the showcase when some foreign object enters inside the shelf.
Yet another mechanism to detect intrusion 110 may include a camera connected to a computing device which is capable of recognizing hand positioning, i.e., a hand positioned from behind the counter or a hand reaching from above the display case. In this embodiment, a computing device would be employed with a computer-vision based machine learning capable of recognizing hand positioning. The camera may be positioned inside the shelf to detect the presence of foreign objects and intruding hands much more effectively. The camera may be connected to a computing device via a wired network or a wireless network.
It is to be understood that in either of these examples, the detection mechanism 110 may be connected to the output device 120 that takes an action to alert that an intrusion in the protected area has occurred. The output device 120 may be wired to or wirelessly connected to one or more detection mechanisms 110, each with its own unique identification (ID). The output device 120 takes an action when intrusion is detected via any of the above-described detection mechanisms. A unique action is taken for each unique detection mechanism based on its unique ID, and based on the deciphering mechanism input, whether it was an authorized or an unauthorized access. The output device 120 can be any type of device that outputs a corresponding intrusion signal, along with an indicator, indicating the ID of the detection mechanism that was intruded. One such example of the output device 120 can include a device that sounds an audible alarm upon detecting an intrusion, the tone of the alarm could be based on the ID of the intruding mechanism, and based on the deciphering mechanism input, whether it was an authorized or an unauthorized access. Another example of the output device 120 can include a device that sounds an audible alarm and may also display information on a display panel, upon detecting an intrusion, the tone of the alarm and/or the display output could be based on the deciphering mechanism input, whether it was an authorized or an unauthorized access and/or the ID of the intruding mechanism. Another example can be a device that sends a signal to a phone. The signal can be a text message and/or a call to an emergency line, a security guard, and/or an owner. The message itself may include the ID of the detection mechanism and can use AI capabilities to determine the best signaling method. Another example of the output device 120 would include a mechanism that locks the doors into and out of an establishment wherein the sales counter with the system is located so the intruder cannot escape the premises. Yet another example of the output device 120 may include a surveillance camera that is activated to record the critical scenes after a detected intrusion. The position of the intrusion would be known from where the signal is received from based on the ID of the detection mechanism, and thus the surveillance camera can be oriented and focused on that scene.
The deciphering mechanism 130 is connected to the corresponding detection mechanism 110 deciphering between authorized and unauthorized access. The deciphering mechanism 130 can signal to the output device 120 whether the access into a protected area is authorized or not. To reiterate, the deciphering mechanism 130 detects whether the access into the protected area is authorized or unauthorized. It then passes this information to the output mechanism 120 which subsequently generates either a non-alarming or an alarming response, respectively. The non-alarming response is related to the authorized access. One of the non-alarming responses is to not generate any alert on an authorized access. Basically, it can indicate an authorized access alert and allow access into the protected area without generating an alarming alert through the output device 120. The alarming response is related to an unauthorized access. Several examples of a deciphering mechanism 130 are provided below to demonstrate the various ways such can be achieved.
In one example, a switch may be accessible only to authorized personnel allowing them to alert the detection mechanism 110 which is deciphered by the deciphering mechanism 130, signaling the output device 120 of an authorized access alert. An authorized person alerts the detection mechanism 110 before accessing items inside the shelves. The switch may be a simple on and off switch such that the authorized personnel can manually flip the switch before accessing the protected area to indicate an authorized access to the deciphering mechanism. The authorized personnel will flip the switch back after completing the access into the protected area. In alternate embodiments, a timer may be included with the switch which can automatically flip the switch back after some delay. Once the switch is flipped back, all accesses will be deciphered as unauthorized by the deciphering mechanism.
In another example, a foot pedal switch may be used to alert the detection mechanism 110 indicating an authorized access alert by authorized personnel (accessible only to authorized personnel). The foot pedal may be placed along the ground on the inner side of the showcase and in the vicinity of the associated shelf making it accessible to authorized personnel accessing the shelf. The authorized personnel can step on the pedal before accessing items inside the shelf or shelves to indicate an authorized access to the deciphering mechanism. All accesses into the protected area are deciphered as authorized while the foot pedal is being stepped on. Once the authorized person steps off the foot pedal all current and/or succeeding accesses are deciphered as unauthorized by the deciphering mechanism. In alternate embodiments, a timer may be included with the foot pedal which can add a delay after the authorized person has stepped off the foot pedal before unauthorized accesses are deciphered.
In another example, a non-intrusive automated mechanism may be employed. This may be achieved in several ways. One or more sensors may be positioned in an area where only authorized personnel would be allowed, such that a presence of authorized personnel at the counter would activate the one or more sensors which subsequently makes deciphering mechanism 120 to categorize all accesses as authorized accesses. Once the authorized person moves away from a monitoring zone of the one or more sensors, the deciphering mechanism 120 categorizes all accesses as unauthorized accesses.
In the example system that uses AI cameras with hand recognition capability, the system may automatically detect if the intrusion is from an authorized or an unauthorized person.
In yet another example, the system 100 may also be configured using RFID, which can be used to differentiate between authorized and unauthorized access into the showcase. As an example, an authorized person may use a key card that alerts the detection mechanism 110 of an authorized access when the key card is in the appropriate vicinity of the deciphering mechanism 130. When the authorized person moves away from the detection mechanism 110, the detection mechanism 110 is not receiving the alert that the authorized person is in the vicinity.
In yet another example, the system 100 may also be configured using a mobile phone's short-range wireless connectivity such as Bluetooth, NFC, etc., which can be used to differentiate between authorized and unauthorized access into the protected area. As an example, an authorized person's mobile phone that is linked to the deciphering mechanism 130 using Bluetooth, will alert the detection mechanism 110 of an authorized access alert when the authorized person carrying the linked phone is in the appropriate vicinity/range of the deciphering mechanism 130. When the authorized person with this linked phone moves away from the deciphering mechanism 130, subsequent accesses will be categorized as unauthorized.
Accordingly, the present description provides for various embodiments for a system 100 that can be used with display cases, such as at a sales counter, to prevent customers or other unauthorized persons from reaching over the counter into the display case by alerting an authorized person. Further, the system 100 also provides an easy and efficient way to indicate an authorized access alert when a salesperson or other authorized person reaches into the display case. The system 100 described herein includes various mechanisms to achieve the above purpose.
The corresponding structures, materials, acts, and equivalents of any means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention.
The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated. The present invention, according to one or more embodiments described in the present description, may be practiced with modification and alteration within the spirit and scope of the appended claims. Thus, the description is to be regarded as illustrative instead of restrictive of the present invention.
This application is a non-provisional application which claims priority to U.S. Provisional Patent Application No. 63/541,187 filed on Sep. 28, 2023, which is incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4141610 | Ando | Feb 1979 | A |
6720874 | Fufido et al. | Apr 2004 | B2 |
8830060 | Pikkarainen et al. | Sep 2014 | B2 |
8907792 | Mezger | Dec 2014 | B2 |
10698132 | Alessi | Jun 2020 | B2 |
11462065 | Ogram | Oct 2022 | B1 |
20020017604 | Nakazaki et al. | Feb 2002 | A1 |
20070236111 | Gray | Oct 2007 | A1 |
20080079337 | Vardaro | Apr 2008 | A1 |
20090224875 | Rabinowitz | Sep 2009 | A1 |
20100039006 | Lawrence et al. | Feb 2010 | A1 |
20110273293 | Itkin et al. | Nov 2011 | A1 |
20140043162 | Siciliano et al. | Feb 2014 | A1 |
20220067635 | Fawcett | Mar 2022 | A1 |
20220166785 | Grant et al. | May 2022 | A1 |
20230377392 | Creque | Nov 2023 | A1 |
Number | Date | Country |
---|---|---|
112056872 | Dec 2020 | CN |
Number | Date | Country | |
---|---|---|---|
63541187 | Sep 2023 | US |