Embodiments of the present invention relate generally to merchandise display security devices, systems, and methods for protecting an item of merchandise from theft.
It is common practice for retailers to store and/or display relatively expensive items of merchandise on or within a merchandise security device, such as a security display (e.g. alarming stand), security fixture (e.g. locking hook, shelf, cabinet, etc.) or security packaging (e.g. merchandise keeper). Regardless, the security device stores and/or displays an item of merchandise so that a potential purchaser may view, and in some instances, interact with the item before making a decision whether to purchase the item. At the same time, the item is secured on or within the merchandise security device so as to prevent, or at least deter, theft of the item. The value of the item, however, may make it an attractive target for a shoplifter despite the presence of a merchandise security device. A determined shoplifter may attempt to detach the item from the security display or to remove the item from the security fixture or from within the security packaging. Alternatively, the shoplifter may attempt to remove the or a portion of the security device from the display area along with the item.
In the case of a secure display or fixture, the security device is oftentimes firmly attached to a support, such as a pegboard, wire grid, horizontal bar rack, slatwall (also known as slatboard), wall, table, desk, countertop or like structure. In some instances, the security device is secured to the support using a rod with a mechanical lock mechanism operated by a non-programmable key, for example a conventional tumbler lock or a magnetic lock. Accordingly, there exists a need for an improved merchandise security device for items of merchandise.
Embodiments of the present invention are directed to merchandise display security systems and methods for securing items of merchandise from theft. In one embodiment, a merchandise display security device includes a base configured to be attached to a support surface. The base includes an alarm circuit and a tether, and the tether is configured to be extended and retracted relative to the base and to be coupled to one or more items of merchandise. The alarm circuit configured to detect removal of the base from the support surface, cutting of the tether, and/or removal of the tether. In addition, the security device includes a lock mechanism configured to lock to the tether for securing the one or more items of merchandise to the tether, wherein one or more items of merchandise are removable from the tether when the lock mechanism is unlocked.
In another embodiment, a merchandise display security system is provided and includes an electronic key, as well as a merchandise security display device similar to that described above. A lock mechanism is configured to be operated by electrical power transferred from the electronic key to the lock mechanism.
In another embodiment, a method for securing an item of merchandise from theft is provided. The method comprises attaching a base to a support surface, wherein the base includes an alarm circuit and a tether. The tether is configured to be extended and retracted relative to the base and to be coupled to one or more items of merchandise, and the alarm circuit is configured to detect removal of the base from the support surface, cutting of the tether, and/or removal of the tether. The method further includes coupling the tether to one or more items of merchandise, and locking a lock mechanism to the tether such that the one or more items of merchandise are secured to the tether.
Referring now to the accompanying drawing figures wherein like reference numerals denote like elements throughout the various views, one or more embodiments of a merchandise display security system are shown. In the embodiments shown and described herein, the system includes an electronic key and a merchandise security device. In some embodiments shown and described herein, the merchandise security device is employed for shelf security whereby items of merchandise displayed on a shelf or other support surface are secured. For example, the merchandise security device may be suitable for use with a variety of display surfaces, such as pegboard, slat board, slat wall, counter, and the like. The electronic key may be useable with any security device that utilizes power transferred from the key to operate a lock mechanism associated with the security device and/or utilizes data transferred from the key to authorize the operation of a lock mechanism, such as an alarm circuit. In other words, an electronic key according to embodiments of the invention is useable with any security device or lock mechanism that requires power transferred from the key to the device and/or data transferred from the key to the device. It should be noted that although the invention is described with respect to embodiments including an electronic key for transferring both data and electrical power to a merchandise security device to operate a mechanical lock mechanism and/or an alarm circuit, the invention is equally applicable to an electronic key for transferring only electrical power to a merchandise security device to operate any component of the merchandise security device (e.g., a lock mechanism), whether or not the device includes an internal or external power source for operating another component of the device.
One embodiment of a merchandise display system 10 according to the invention is illustrated in
In some embodiments, the base 14 includes an opening 19 configured to receive the tether 18 therethrough.
A lock mechanism 20 is configured to be locked or otherwise coupled to the tether 18. The lock mechanism 20 is configured to secure items of merchandise to the tether 18, and an item of merchandise cannot be removed without first unlocking the lock mechanism or otherwise damaging the item of merchandise or the tether 18. In some embodiments, the lock mechanism 20 is configured to releasably engage an end of the tether 18. For example,
In one embodiment, a reinforced hang tag 32, such as shown in
In some embodiments, the lock mechanism 20 may be configured to lock to and unlock from the connector 22. The lock mechanism 20 may include a transfer port 30 for communicating with an internal lock mechanism for disengaging the connector 22. For example, the lock mechanism 20 may include an electrical conductor in the form of a coil having a plurality of continuous windings. The coil is arranged to correspond to a transfer port 30 of the lock mechanism 20. Thus, an electronic key 12 may be positioned within or proximate to the transfer port 30 for communicating with the lock mechanism 20. In one example, the electronic key 12 is configured to be inserted within an opening defined by the coil and transfer power to the coil inductively. The coil may be in electrical communication with a wire formed of shape memory material that is configured to shorten when power is conducted through the coil, as explained in further detail below.
The lock mechanism 20 may also include a blocking member 40 that is configured to prevent removal of the connector 22 and maintain engagement between the ball(s) 34 and the recess 36. When fully inserted in the lock mechanism 20, the blocking member 40 may prevent the connector 22 from being disengaged from the lock mechanism. The blocking member 40 may be operably engaged with a shape memory wire 46 (see, e.g.,
In one embodiment, the lock mechanism 20 may provide only mechanical security to the end of the tether 18. Thus, where the base 14 includes an alarm circuit 27, the alarm circuit may not detect unauthorized removal of the lock mechanism. However, it is understood that the lock mechanism 20 may be electrically connected to an alarm circuit 27 in other embodiments whereby the alarm circuit is configured to generate an alarm signal (e.g., an audible and/or visible alarm) in response to unauthorized removal of the lock mechanism from the tether 18 or the connector 22.
In one embodiment, a recoiler 54 is provided within the base 58 and is coupled to the tether 52. The recoiler 54 may include a spool, and the tether 52 may be configured to be wound on the spool and to unwind as tension is applied to the end of the tether. The recoiler 54 may be biased to retract the tether 52 within the base 58 and onto the spool, such as with a suitable spring. The base 58 may also include a printed circuit board (PCB) 62. The PCB 62 may be electrically connected to one or more components of the security device, such as the tether 52, sensor 60, alarm circuit, the recoiler 54, and/or a power source.
Moreover, the base 58 may include a sensor 60 that is configured to be activated upon unauthorized removal of the base from a support surface 17, and the sensor may in electrical communication with an alarm circuit. For example, the sensor 60 may be a pressure or plunger switch. The pressure or plunger switch may be configured to engage a support surface 17 and to extend and retract relative to the base 54. The pressure or plunger switch may be biased to an extended position, such as with a spring. Thus, the alarm circuit may be configured to detect activation of the sensor 60 and to generate an audible and/or a visible alarm signal in response to the sensor being activated.
In some embodiments, the security device 50 is similar to that disclosed in U.S. Provisional Application No. 62/000,674, entitled Recoiler Sensor and filed on May 20, 2014, the disclosure of which is incorporated herein by reference in its entirety.
Based on the foregoing, it is apparent that any number of lock mechanisms 20, 82 may be employed, including in conjunction with various forms of power transfer for actuating a lock mechanism (e.g., inductive, capacitive, etc.). For example, where a shape memory material is utilized, a change in shape of the shape memory material may cause mechanical actuation (e.g., linear and/or rotary movement) of the lock mechanism. The shape memory material may be operably engaged with a lock mechanism 20, 82 in any number of configurations to facilitate such actuation. Moreover, the shape memory material may be any suitable material, such as a metal, a polymer, or a combination thereof, that is configured to change in shape (e.g., length, area, etc.) in response to a current or a change in temperature. In addition, other mechanisms may be utilized for actuating a lock mechanism, including mechanical, electrical, and/or chemical state changes. As such, the security devices 15, 50 and associated lock mechanisms 20, 82 should not be limited in light of the illustrated embodiments.
In some embodiments, the system 10 may further comprise an optional programming station that is operable for programming the key 12 with a security code, which is also referred to herein as a Security Disarm Code (SDC). A programming station and key 12 suitable for use with the present invention is shown and described in detail in U.S. Pat. No. 7,737,844, entitled Programming Station For a Security System For Protecting Merchandise, and U.S. Pat. No. 7,737,845, entitled Programmable Key for a Security System for Protecting Merchandise, the contents of which are incorporated herein by reference in its entirety. It is understood that in other embodiments, the electronic key 12 may be programmed without use of a programming station. For example, the key may be self-programming or could be pre-programmed with a particular security code.
In addition to programming station, the system 10 may further comprise an optional charging station that is operable for initially charging and/or subsequently recharging a power source disposed within the electronic key 12. The electronic key 12 may be provisioned with a single-use (e.g., non-rechargeable) power source, such as a conventional or extended-life battery, or alternatively, the key may be provisioned with a multiple-use (e.g., rechargeable) power source, such as a conventional capacitor or rechargeable battery. In either instance, the power source may be permanent, semi-permanent (e.g., replaceable), or rechargeable, as desired. In the latter instance, charging station is provided to initially charge and/or to subsequently recharge the power source provided within the electronic key.
In one embodiment, one or more components of the merchandise security device 15, 50 is a “passive” device. As used herein, the term passive is intended to mean that the security device does not have an internal power source (e.g., a battery) sufficient to lock and/or unlock a mechanical lock mechanism. Significant cost savings are obtained by a retailer when the merchandise security device 15, 50 is passive since the expense of an internal power source is confined to the electronic key 12, and one such key is able to operate multiple security devices. In addition, the security device 15, 50 may not require an electric motor, such as a DC stepper motor, solenoid, or the like, such as for locking or unlocking the lock mechanism. As such, the security device 15 may employ a simplified lock mechanism that does not require various components operated by its own source of electrical power.
Moreover, in some embodiments the merchandise security device 15, 50 is not required to include a logic control circuit, while the electronic key 12 includes such a logic control circuit. In this regard, some security devices include a logic control circuit adapted to perform a handshake communication protocol with the logic control circuit of the key (e.g., using an SDC). Thus, the security device 15, 50 may not include a logic control circuit used to communicate with the electronic key 12 in order to determine whether the merchandise security device is an authorized device. Likewise, the electronic key 12 may also not include a logic control circuit. Regardless of whether the electronic key 12 includes a logic control circuit, an SDC may be unnecessary where the electronic key is configured to transmit power to the security device 15, 50 that is not readily duplicated by a potential thief. For example, where the electronic key 12 is configured to transmit power inductively, the inductive signature may provide increased security relative to conventional mechanical locks that utilize mechanical or magnetic actuators. For example, the electronic key 12 may be configured to transmit an inductive signature including a particular amplitude and/or frequency of a power signal that is not readily apparent to, or duplicated by, a potential thief.
In one embodiment, the electronic key 12 does not transmit an SDC to the security device 15, 50. However, in other embodiments, the electronic key 12 may be configured to transmit an SDC to the security device 15, 50, such as for arming and/or disarming an alarm circuit. In this example, the security device 15, 50 may include a corresponding SDC. Thus, the electronic key 12 may be configured to perform a handshake communication protocol with the security device 15, 50. Where the SDC of the electronic key 12 matches the SDC of the security device 15, 50, the electronic key may then be configured to transmit electrical power to the security device.
However in other embodiments, the security device 15, 50 may not recognize the SDC transmitted by the electronic key 12, such as where the lock mechanism 20, 82 does not include a logic control circuit or a component including an SDC. If the electronic key 12 does not receive a return signal from the lock mechanism 20, 82, the electronic key may then transmit electrical power to the lock mechanism as described in further detail below. Thus, although the electronic key 12 may transmit an SDC to the lock mechanism 20, 82, the lock mechanism may not recognize the SDC and the SDC will not affect the operation of the lock mechanism. As will be readily apparent to those skilled in the art, the SDC may be transmitted from the electronic key 12 to the merchandise security device 15, 50 by any suitable means, including without limitation, via one or more electrical contacts, or via optical, acoustic, electromechanical, electromagnetic or magnetic conductors, as desired. Furthermore, the SDC may be transmitted by inductive transfer of data from the electronic key 12 to the merchandise security device 15, 50.
In one embodiment, the logic control circuit of the key 12 is configured to cause the internal power source of the key to transfer electrical power to the security device 15, 50 to operate a lock mechanism 20, 82 of the security device. In one embodiment, electrical contacts disposed on the electronic key 12 electrically couple with cooperating electrical contacts on the merchandise security device 15, 50 to transfer power from the internal battery of the key to the merchandise security device. Power may be transferred directly to the lock mechanism 20, 82 via one or more conductors. For example, a conductor may be coupled to a mechanical lock mechanism 20, 82, and when electrical power is conducted through the conductor, a state change occurs thereby resulting in operation of the lock mechanism. In one example, the conductor is coupled to a shape memory material (e.g., Nitinol) such that electrical power transferred through the conductor results in a change in shape of the shape memory material. Such a change in shape may cause a mechanical actuation (e.g., linear or rotary) of the lock mechanism 20, 82 to thereby lock or unlock the lock mechanism. In other embodiments, the lock mechanism may cooperate with a motor or solenoid for operating the lock mechanism.
An available feature of a merchandise security system 10 according to an embodiment of the invention is that the electronic key 12 may include a time-out function. More particularly, the ability of the key 12 to transfer data and/or power to the merchandise security device 15, 50 is deactivated after a predetermined time period. By way of example, the logic control circuit of the key 12 may be deactivated after about six to twelve hours (e.g., about eight hours) from the time the key was fully charged or programmed or last refreshed by the programming station. In this manner, an authorized sales associate typically must program or refresh the key 12 assigned to him at the beginning of each work shift. Furthermore, the charging station may be configured to deactivate the logic control circuit of the key 12 when the key is positioned within the charging station. In this manner, the charging station can be made available to an authorized sales associate in an unsecured location without risk that a charged key could be removed from the charging station and used to maliciously disarm and/or unlock a merchandise security device 15. The electronic key 12 would then have to be charged, programmed or refreshed by the programming station, which is typically monitored or maintained at a secure location, in order to reactivate the logic control circuit of the key.
The security device 15, 50 may include a transfer port 16, 30, 76 sized and shaped to receive a transfer probe of the electronic key. At least one, and sometimes, a plurality of magnets may be disposed within the transfer port 16, 30, 76 for securely positioning and retaining the transfer probe of the key 12 in electrical contact with electrical contacts of the mechanical lock mechanism 20. Power is transferred from the electronic key 12 to the security device 15, 50 through electrical contacts disposed on the transfer probe of the key and corresponding electrical contacts disposed within the transfer port 16, 30, 76 of the security device.
In another embodiment of a merchandise display security system, the system comprises an electronic key 12 with inductive transfer, and a merchandise security device 15, 50 that is operated by the key. However, the electronic key 12 is useable with any security device 12 or lock mechanism 20, 82 with inductive transfer capability that requires power transferred from the key to the device by induction, or alternatively, requires data transferred between the key and the device and power transferred from the key to the device by induction.
In one embodiment, the security device 15, 50 comprises an internal lock mechanism. A transfer port 16, 30, 76 may be formed in the security device 15, 50 that is sized and shaped to receive a transfer probe of the electronic key 12. If desired, the transfer port 16, 30, 76 may comprise mechanical or magnetic means for properly positioning and securely retaining the key 12 within the transfer port. In one embodiment, it is only necessary that the inductive transceiver of the electronic key 12 is sufficiently aligned or proximate to the corresponding inductive transceiver of the security device 15 or proximate to the transfer port 16, 30, 76. Therefore, magnets are not required to position, retain and/or maintain electrical contacts provided on the electronic key 12 in electrical contact with corresponding electrical contacts provided on the security device 15, 50. In the particular embodiment shown and described herein, data and/or power is transferred from the electronic key 12 to the security device 15, 50 by wireless communication, such as infrared (IR) optical transmission as discussed above. Power may be transferred from the electronic key 12 to the security device 15 by induction across the transfer port 16, 30, 76 of the security device using an inductive transceiver disposed within a transfer probe of the key that is aligned with a corresponding inductive transceiver disposed within the security device. For example, the transfer probe of the electronic key 12 may comprise an inductive transceiver coil that is electrically connected to the logic control circuit of the key to provide electrical power from the internal battery of the key to an inductive transceiver coil disposed within the security device 15, 50. The inductive transceiver coil of the security device 15, 50 may then transfer the electrical power from the internal battery of the key 12 to the lock mechanism 20, 82. Thus, the security device 15, 50 may include at least one conductor configured as a coil having a plurality of continuous windings. As previously mentioned, the power transferred from the key 12 may be used to unlock the lock mechanism 20 without the need for various other electrically powered mechanisms, for example, an electric motor, DC stepper motor, solenoid, or the like.
In some embodiments generally discussed above, a shape memory material may be employed, such as for use in conjunction with inductive power transfer. The shape memory material may be in electrical communication with the inductive coil and is configured to change in shape in response to electrical current being transmitted through the shape memory material. A change in shape of the shape memory material may, in turn, result in actuation of the lock mechanism. As such, the security device 15, 50 may also not require a rectifier for converting the alternating current into direct current for operating the lock mechanism 20, 82. In this regard, some security devices require that the alternating current induced in an inductive coil be transformed into a direct current, such as via a bridge rectifier or a logic control circuit, to provide direct current (DC) power to the security device. Such a conversion is not required by embodiments of the present invention, as the alternating current may be used to actuate the lock mechanism 20, 82. Indeed, the security device 15, 50 may also not require a battery, motor, solenoid, and/or any other electrical component as discussed above. Therefore, the lock mechanism 20, 82 is simplified for use with a variety of security devices.
In some embodiments, the security device and the electronic key are similar to those disclosed in U.S. Patent Publ. No. 2013/0081434, entitled Cabinet Lock for Use with Programmable Electronic Key and filed Sep. 28, 2012, U.S. Patent Publ. No. 2012/0047972, entitled Electronic Key for Merchandise Security Device and filed Aug. 31, 2011, and U.S. Patent Publ. No. 2011/0254661, entitled Programmable Security System and Method for Protecting Merchandise and filed Jun. 27, 2011, U.S. patent application Ser. No. 14/328,051, entitled Merchandise Security Devices for Use with an Electronic Key and filed on Jul. 10, 2014, each of which is incorporated herein by reference in its entirety. In other embodiments, the security device and the electronic key are similar to those manufactured by InVue Security Products Inc., including the Plunger Locks, Smart Locks, and IR2 and IR2-S Keys.
The foregoing has described one or more embodiments of a merchandise display security device for use with an electronic key. Embodiments of a merchandise display security system have been shown and described herein for purposes of illustrating and enabling the best mode of the invention. Those of ordinary skill in the art, however, will readily understand and appreciate that numerous variations and modifications of the invention may be made without departing from the spirit and scope of the invention. Accordingly, all such variations and modifications are intended to be encompassed by the appended claims.
This application is a continuation of and claims priority to U.S. application Ser. No. 15/036,112, filed on May 12, 2016, which is a 371 National Phase Entry of International Application No. PCT/US2014/065359, filed on Nov. 13, 2014, which is a nonprovisional of and claims the benefit to priority of U.S. Provisional Patent Application No. 61/904,986 filed on Nov. 15, 2013, the entire disclosure of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5400246 | Wilson | Mar 1995 | A |
5912619 | Vogt | Jun 1999 | A |
6799994 | Burke | Oct 2004 | B2 |
7053774 | Sedon et al. | May 2006 | B2 |
7209038 | Deconinck et al. | Apr 2007 | B1 |
7327276 | Deconinck et al. | Feb 2008 | B1 |
7350645 | Sills | Apr 2008 | B1 |
7385522 | Belden, Jr. et al. | Jun 2008 | B2 |
7406846 | Chu | Aug 2008 | B2 |
7629895 | Belden, Jr. et al. | Dec 2009 | B2 |
8171761 | Kidd | May 2012 | B2 |
8453937 | Kolton et al. | Jun 2013 | B2 |
8537012 | Rapp et al. | Sep 2013 | B2 |
8596595 | Devito | Dec 2013 | B2 |
8604927 | Sisney | Dec 2013 | B2 |
10140824 | Schultz et al. | Nov 2018 | B2 |
20050073413 | Sedon et al. | Apr 2005 | A1 |
20070194918 | Rabinowitz et al. | Aug 2007 | A1 |
20100155265 | Kidd | Jun 2010 | A1 |
20110309928 | Henson et al. | Dec 2011 | A1 |
20110309934 | Henson et al. | Dec 2011 | A1 |
20120019383 | Fawcett et al. | Jan 2012 | A1 |
20120103031 | Grant et al. | May 2012 | A1 |
20120205325 | Richter et al. | Aug 2012 | A1 |
20120217371 | Abdollahzadeh et al. | Aug 2012 | A1 |
20120268103 | Henson et al. | Oct 2012 | A1 |
20140027390 | Reynolds et al. | Jan 2014 | A1 |
20140159898 | Wheeler et al. | Jun 2014 | A1 |
Number | Date | Country |
---|---|---|
202650163 | Jan 2013 | CN |
1027514 | Apr 2002 | EP |
2011035302 | Mar 2011 | WO |
Entry |
---|
=First Office Action from corresponding Chinese Patent Application No. 201480062228.1, dated Mar. 20, 2017 (10 pages). |
Extended European Search Report from corresponding EP Application No. 14861589.1, dated Oct. 6, 2016 (11 pages). |
PCT/US2014/065359, International Search Report and Written Opinion, dated Mar. 26, 2015, 9 pages. |
Number | Date | Country | |
---|---|---|---|
20190096204 A1 | Mar 2019 | US |
Number | Date | Country | |
---|---|---|---|
61904986 | Nov 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15036112 | US | |
Child | 16199787 | US |