1. Field of the Invention
This invention relates to theft deterrent security tags in general, and in particular to Electronic Article Surveillance (EAS) security tags that are coupled with articles without altering or damaging the article.
2. Description of Related Art
It is a common practice for retail stores to tag articles to prevent theft of the article by shoplifters. There are several methods of tagging articles, most common of which are coupling an EAS tag or markers (e.g., EAS labels) using adhesive, pins, lanyards or straps to trigger the EAS security system resulting in an alarm. The label markers are easy to remove while the cables or strapped tags are sometimes bulky or obtrusive to the person handling the article, making product placement of the article inconvenient and marketing thereof ineffective. As to pin type EAS tags, they are coupled with an article by the pin of the EAS tag puncturing the article, which may not be suitable or possible with most articles, such as shoes, skateboards, snowboards, framed art, etc.
Accordingly, there remains a long standing and continuing need for an advance in the art of EAS and theft deterrent tags that makes the tags more difficult to defeat, simpler in both design and use, more economical and efficient in their construction and use, and provide a more secure and reliable engagement of the article to be monitored without damaging or altering the article. Further, there also remains a long standing and continuing need for an advance in the art of EAS and theft deterrent tags that would enable a user to comfortably tryout or use an article for testing without the detachment or removal of the tag from the article.
A non-liming, exemplary optional aspect of the present invention provides a theft-deterrent tag, comprising:
a main member coupled with an article by a coupling mechanism;
the coupling mechanism is configured to allow comfortable trial of the article without detachment and removal of the theft deterrent tag from the article.
Another non-liming, exemplary optional aspect of the present invention provides a theft-deterrent tag, comprising:
a main member that includes an alarm system is coupled with an article by a coupling mechanism;
the coupling mechanism is configured to allow comfortable trial of the article without detachment and removal of the theft deterrent tag from the article;
the coupling mechanism includes:
a first coupling element;
a second coupling element; and
an adjustable piece that is looped around the article and manipulated for a tight engagement of the main member with the article connecting the first and the second coupling elements, with the adjustable piece comprised of a sense loop cable.
Such stated advantages of the invention are only examples and should not be construed as limiting the present invention. These and other features, aspects, and advantages of the invention will be apparent to those skilled in the art from the following detailed description of preferred non-limiting exemplary embodiments, taken together with the drawings and the claims that follow.
It is to be understood that the drawings are to be used for the purposes of exemplary illustration only and not as a definition of the limits of the invention. Throughout the disclosure, the word “exemplary” is used exclusively to mean “serving as an example, instance, or illustration.” Any embodiment described as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments.
Referring to the drawings in which like reference character(s) present corresponding part(s) throughout:
The detailed description set forth below in connection with the appended drawings is intended as a description of presently preferred embodiments of the invention and is not intended to represent the only forms in which the present invention may be constructed and or utilized.
For purposes of illustration, programs and other executable program components are illustrated herein as discrete blocks, although it is recognized that such programs and components may reside at various times in different storage components, and are executed by the data processor(s) of the computers. Further, each block within a flowchart (if a flowchart is used) may represent both method function(s), operation(s), or act(s) and one or more elements for performing the method function(s), operation(s), or act(s). In addition, depending upon the implementation, the corresponding one or more elements may be configured in hardware, software, firmware, or combinations thereof.
As illustrated in
As best illustrated in the
As detailed below, the main member 104 accommodates a reel or winder consisting of a revolving spool with a handle 120, an internal alarm system with a power source and electronics that constitute the theft-deterrent tag 100 as an EAS tag, and an alarm switch 202 that actuates upon securing the article within the coupling mechanism 110. The alarm switch 202 is actuated when a side of the article is pressed against the alarm switch 202, and the theft-deterrent tag 100 is tightly secured on the article 102.
As best illustrated in
As best illustrated in
As best illustrated in
As stated above, the adjustable piece 116 is comprised of one or more insulated inner conductors 303 enclosed within and inside one or more insulated outer conductors 301. The inner conductors 303 are longitudinally insulated from one another and from the insulated outer conductors 301 by one or more inner dielectric layers. A transparent outer dielectric layer further longitudinally insulates the outermost outer conductor. In other words, all conductors are independently insulated from one another. The first distal end of the adjustable piece 116 is generally encapsulated and is comprised of short-circuited first ends 305 of the inner and outer conductors, with the short-circuited encapsulating first ends coupled with the reel of the main member 104. That is, the first end 305 of the inner conductors 303 are mechanically and electrically connected (“pinched” together) with the first end of the outer conductors, forming a short-circuited return wire, and encapsulated and coupled with the reel.
The second distal end 307 of the adjustable piece 116 is comprised of second ends of the inner and outer conductors 303 and 301, which are coupled to printed circuit board of the internal alarm system housed with the main member 104, resulting in a sense loop cable. As further illustrated (in
The power actuator switch 118 is comprised of an elongated body housed within the actuator housing 404, and includes a transversally oriented clutch aperture 410 at a distal end that accommodates a clutch 412 housed in the clutch housing 122 within the handle 120. Near clutch aperture 410, the power switch actuator 118 is curved, with a convex portion actuating a power switch plunger 416 to supply power to the internal alarm system. That is, when the power actuator switch 118 is moved along the reciprocating path 210 within the switch housing 404, the clutch 412 locks the actuator switch 118 in the active (or closed) position, against the push of the biasing mechanism 406. The clutch 412, which is biased by its own biasing mechanism 414, contacts the “upper” edge of the actuator switch 118, and is eventually released into the transversally oriented clutch aperture 410 to lock the actuator switch 118 in its active (or closed) position, against the biasing mechanism 414. Accordingly, the mechanical biasing and interlocking interplay between the various components generates a holding strength for the power switching actuator 118 that is increased under tensile forces that attempt to separate them from their interlocking positions. As further illustrated, the actuator switch 118 further includes the curved section 408, the convex section of which actuates a power plunger switch 416, which supplies power to the internal alarm system. Accordingly, the actuation switch 118 activates the power switch to power the alarm system of the tag 100, and maintains the activations as a result of the action (or interlocking) of the clutch 412.
A magnetic detacher may be used to release and pull back the clutch 412 from its biased position, and out and away from the transversally oriented clutch aperture 410. This releases the actuator switch 118 (by the force of the basing mechanism 406), with the biasing mechanism 406 pushing the actuator switch 118 to its open position along the path 210, which shuts power to the alarm device. That is, the movement of the actuator switch 118 along the path 210 to an open position will move the curved section 408 away from the power switch plunger 416, releasing the plunger to an open position to cutoff power to the internal alarm system. The unlock movement of the actuator switch 118 would also deactivate the alarm. As stated above, the main member 104 accommodates a an alarm switch 202 that actuates upon securing the article within the coupling mechanism 110. That is, the alarm switch 202 is actuated when the article is inserted within the “clips” and the body of the article is pressed against the alarm switch 202. Actuation of the alarm switch 202 sets the alarm of the alarm system.
As illustrated in
In
As stated above, the main member 104 accommodates an alarm switch 202 that actuates upon securing the article within the coupling mechanism 110. That is, the alarm switch 202 is actuated when a portion of the article is inserted within the “clips” and the body of the article is pressed against the alarm switch 202 that is protruded from the main member 104. Actuation of the alarm switch 202 sets the alarm of the alarm system. Therefore, the switch S3 closes upon securing the article within the coupling mechanism 110. When the switch S3 is closed by the push of the article within the coupling mechanism 110, the output of the switch S3 is pulled low or ground and set to “0” from a high VCC via the current limiting resistor R30, and inputted to a first input line 714 of one or more input lines of a microprocessor 626 for activation (or arming) of the alarm tag 100. In general, output of the various modules pulled low or ground and set to “0” instruct the microprocessor 626 to arm the alarm. Therefore, when fully closed, the power switch S1 enables supply of power from the power source to the alarm system, and the output of the alarm switch S3 pulled low and set to “0” instructs the microprocessor 626 to arm the alarm.
As stated above, the dashed-line box indicated as reference 780 generally represents the adjustable piece 116 and its interconnections with the alarm system of the theft-deterrent tag 100. As further illustrated in
Referring back to
As exemplarily illustrated in
As illustrated, a first output of the EAS connector CON 11 is coupled with ground, and a second output of the EAS connector CON 12 is coupled with an amplifier 710 to generate an amplified signal from the EAS tag 502a. The amplifier 710 increases the signal strength from the EAS tag 502a sufficiently for further processing by the alarming circuit. The amplifier 710 is comprised of a current limiting resistor R1 that limits the current input to the base of the transistor Q1, with the transistor Q1 functioning to amplify the signal from EAS connector CON 1. The transistor Q1 is comprised of an exemplary NPN Bipolar Junction Transistor (BJT), with the collector coupled to power supply Vcc and the emitter coupled to ground via a resistor-capacitor filter. It should be noted that present invention should not be limited to the amplifier illustrated, and other conventional amplifiers may also be used. Further, the amplification need not be performed by the BJT, but can be done by other transistors, such as Metal Oxide Semiconductors (MOS) or MOS field effect transistors (MOSFETS), operational amplifiers, transformers, or the like, other passive or active devices, or any combination thereof.
The output of the EAS tag is amplified by the amplifier 710, and the amplified signal (form the emitter of the transistor Q1) is input to the microprocessor 626 via the input line 716 as one of one or more input signals, where the microprocessor 626 converts the analog amplified signal into a digital signal for processing. This signal is translated by the instructions (algorithm) within the EEPROM of the microprocessor 626 to determine if the signal came from the transmitters (pedestals); if so, the microprocessor 626 will trigger the alarm (e.g., an audio and or visual indicator). It should be noted that one or more of the one or more processed output signals may be pulsed output signals on output line (pin 8) to one of the one or more periphery output devices, for example, for actuation of a transducer unit 740 to generate an audio alarm signal.
The transducer unit 740 is actuated by an amplified pulsed output signal that is output from the microprocessor 626 via line (pin 8), and further amplified by an output amplifier 752. The output amplifier 752 is comprised of a BJT transistor Q3 with an emitter coupled to ground, a collector coupled to a transformer T2 of the transducer 740, and a base that is coupled with a current limiting resistor R9. The transistor Q3 amplifies the pulsed output signal from line (pin 8) to alternately drive the transformer from high Vcc to ground and vice versa, with the transformed pulse driving a ceramic transducer 742 to generate an audible alarm. It should be noted that a software routine within the microprocessor generates this pulsed output, which is amplified by the transistor Q3. In addition to the generation of an audible alarm, as further illustrated, other output periphery devices may include the use of a visual indicator D1 that use LEDs 124 to notify users of an occurrence. The visual indicator D1 is coupled with line pin 9 of the microprocessor 626. As indicated above, other output periphery devices not illustrated may also easily be accommodated and connected with the microprocessor 626.
As further illustrated, pins 1 and 14 of the microprocessor 626 are coupled to Vcc and ground via a filter capacitor C4, which power the microprocessor 626. The microprocessor 626 is further coupled via its pin 2 to ground through another filter capacitor C3. The crystal X1 coupled to pin 13 is used to facilitate a clocking signal to the microprocessor 626. That is, it stabilizes the frequency of the clock in the microprocessor 626. Pins 10 and 11 are respectively for reset and test of the microprocessor 626, which is through a connector CON 3 that enables the testing and reset of the microprocessor 626. The testing and reset enable determination of signaling of the microprocessor 626, for example, to determine if the microprocessor 626 functions based on “0” or “1” input signal level to trigger a device. In this exemplary instance, the microprocessor 626 will trigger an output periphery device when the input is pulled to high (or “1”). For example, when the cable 102 is cut, the switch 782 is opened, pulling the line 758 to Vcc (high or “1”), which triggers an alarm. The reset pin 10 is coupled with the reset circuit 732, which includes a current limiting resistor 734 that is coupled at one end to Vcc and other end to a capacitor 736, with the other end of the capacitor 736 coupled to ground. The reset pin 10 is coupled with at the junction of the resistor 734 and capacitor 736.
To continue with the flowchart of
Although the invention has been described in considerable detail in language specific to structural features and or method acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary preferred forms of implementing the claimed invention. Stated otherwise, it is to be understood that the phraseology and terminology employed herein, as well as the abstract, are for the purpose of description and should not be regarded as limiting. Therefore, while exemplary illustrative embodiments of the invention have been described, numerous variations and alternative embodiments will occur to those skilled in the art. For example, instead of coupling the theft-deterrent tag 100 to a shoe, the same tag 100 may be detectably coupled with frame of a pricy artwork. Detachably mounting the theft-deterrent tag 100 onto an article 102 such as a frame of a painting would include positioning one of the first and the second coupling mechanisms 110 and 112 onto a first side of the frame, maneuvering the theft-deterrent tag 100 from behind the painting, and positioning the other of the second and first coupling mechanism 112 and 110 onto an opposite side of the frame (opposite the first coupling mechanism). The arrangement would enable the adjustable piece 116 to be routed via the back of the painting rather than from a front. Routing the adjustable piece along the back of the painting is beneficial in that the adjustable piece 116 will not obstruct the view of the painting (or be in the way thereof), enabling enjoyment of the painting without seeing the adjustable piece 116. Upon coupling the first and second coupling mechanism 110 and 112 with respective opposite sides of the frame, the handle 102 of the main member 104 is rotated to reel-in and contract the adjustable piece 116, which decreases the separation span between the main member 104 and the second coupling mechanism 112. The contraction of the adjustable piece 16 tightly secures with the theft-deterrent tag 100 onto the frame.
As another example of an alternative embodiment, the theft-deterrent tag 100 illustrated would be fully functional without the adjustable piece 116 and or the second coupling mechanism 112. That is, the theft-deterrent tag 100 may only comprise of the main member 104 and its connected coupling mechanism 110. Alternatively, the theft-deterrent tag 100 may only comprise of the main member 104, its coupling mechanism 110, and the adjustable piece 116. As still another example, the microprocessor 626 and the circuit topography illustrated in
It should further be noted that throughout the entire disclosure, the labels such as left, right, front, back, top, bottom, forward, reverse, clockwise, counter clockwise, up, down, or other similar terms such as upper, lower, aft, fore, vertical, horizontal, oblique, proximal, distal, parallel, perpendicular, transverse, longitudinal, etc. have been used for convenience purposes only and are not intended to imply any particular fixed direction or orientation. Instead, they are used to reflect relative locations and/or directions/orientations between various portions of an object.
In addition, reference to “first,” “second,” “third,” and etc. members throughout the disclosure (and in particular, claims) is not used to show a serial or numerical limitation but instead is used to distinguish or identify the various members of the group.
In addition, any element in a claim that does not explicitly state “means for” performing a specified function, or “step for” performing a specific function, is not to be interpreted as a “means” or “step” clause as specified in 35 U.S.C. Section 112, Paragraph 6. In particular, the use of “step of,” “act of,” “operation of,” or “operational act of” in the claims herein is not intended to invoke the provisions of 35 U.S.C. 112, Paragraph 6.
This application claims the benefit of priority of U.S. Provisional Utility Patent Application No. 61/492,090, filed Jun. 1, 2011, the entire disclosure of which is expressly incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
639196 | Fehling | Dec 1899 | A |
673612 | Appleby | May 1901 | A |
886905 | Ward | May 1908 | A |
895403 | Jackson | Aug 1908 | A |
1083612 | Hooker | Jan 1914 | A |
1124130 | Grant | Jan 1915 | A |
1141245 | Gillespie | Jun 1915 | A |
1165320 | Clary | Dec 1915 | A |
1165816 | Tichenor | Dec 1915 | A |
1657190 | Ballou | Jan 1928 | A |
1992868 | Krause | Feb 1935 | A |
2002946 | Jacobs | May 1935 | A |
2574967 | Gossner et al. | Nov 1951 | A |
3395555 | Hickman | Aug 1968 | A |
3397849 | Hansen | Aug 1968 | A |
3466668 | Ochiai | Sep 1969 | A |
3568902 | Highberger | Mar 1971 | A |
3611760 | Muther | Oct 1971 | A |
3831407 | Coleman | Aug 1974 | A |
3906758 | Hurwitt | Sep 1975 | A |
3929300 | Lindqvist | Dec 1975 | A |
4004440 | Dreyer | Jan 1977 | A |
4071023 | Gregory | Jan 1978 | A |
4086795 | Foster et al. | May 1978 | A |
4418551 | Kochackis | Dec 1983 | A |
4665724 | Sakai | May 1987 | A |
4756171 | Homar | Jul 1988 | A |
4827577 | Vaux | May 1989 | A |
4896517 | Ling | Jan 1990 | A |
4930324 | Meier | Jun 1990 | A |
4949679 | Wolfer | Aug 1990 | A |
5140836 | Hogan et al. | Aug 1992 | A |
5144821 | Ernesti et al. | Sep 1992 | A |
5156028 | Jiang | Oct 1992 | A |
5193368 | Ling | Mar 1993 | A |
5345947 | Fisher | Sep 1994 | A |
5379496 | Krauss | Jan 1995 | A |
5517836 | Hong | May 1996 | A |
5524463 | Schenkel et al. | Jun 1996 | A |
5551447 | Hoffman et al. | Sep 1996 | A |
5581853 | Miller et al. | Dec 1996 | A |
5598727 | White | Feb 1997 | A |
5610587 | Fujiuchi et al. | Mar 1997 | A |
5647106 | Hogan | Jul 1997 | A |
5671506 | Eliasson | Sep 1997 | A |
5687455 | Alexander | Nov 1997 | A |
5687456 | Chang | Nov 1997 | A |
5722266 | Yeager et al. | Mar 1998 | A |
5794464 | Yeager et al. | Aug 1998 | A |
5832752 | Zeller | Nov 1998 | A |
5856782 | Sasagawa et al. | Jan 1999 | A |
5959532 | Fujiuchi et al. | Sep 1999 | A |
5960652 | Marmstad | Oct 1999 | A |
6040764 | Crisci | Mar 2000 | A |
6092401 | Sankey et al. | Jul 2000 | A |
6128932 | Mainetti et al. | Oct 2000 | A |
6188320 | Kolton et al. | Feb 2001 | B1 |
6237375 | Wymer | May 2001 | B1 |
6404341 | Reid | Jun 2002 | B1 |
6550293 | Delegato et al. | Apr 2003 | B1 |
6681603 | Yu | Jan 2004 | B1 |
D492215 | Lu | Jun 2004 | S |
6755055 | Sedon et al. | Jun 2004 | B2 |
7129841 | Feibelman | Oct 2006 | B2 |
7162899 | Fawcett et al. | Jan 2007 | B2 |
7168275 | Fawcett et al. | Jan 2007 | B2 |
D543590 | Feibelman | May 2007 | S |
7221274 | Fawcett et al. | May 2007 | B2 |
7227467 | Feibelman | Jun 2007 | B2 |
7251966 | Fawcett et al. | Aug 2007 | B2 |
7272962 | Benda et al. | Sep 2007 | B2 |
7481086 | Fawcett et al. | Jan 2009 | B2 |
7518521 | Feibelman et al. | Apr 2009 | B2 |
7626501 | Feibelman | Dec 2009 | B2 |
20030182763 | Jeffries | Oct 2003 | A1 |
20050270155 | Sayegh | Dec 2005 | A1 |
20060220848 | Tropper | Oct 2006 | A1 |
20070012772 | Cooper | Jan 2007 | A1 |
20080157979 | Sayegh | Jul 2008 | A1 |
20080165014 | Sayegh | Jul 2008 | A1 |
20080284601 | Sayegh et al. | Nov 2008 | A1 |
20090033497 | Wyatt et al. | Feb 2009 | A1 |
20100060455 | Frabasile | Mar 2010 | A1 |
20100101283 | Xiaobin | Apr 2010 | A1 |
20100103025 | Schantz et al. | Apr 2010 | A1 |
20100315237 | Yang | Dec 2010 | A1 |
20110283754 | Ezzo et al. | Nov 2011 | A1 |
20120285206 | Favier | Nov 2012 | A1 |
Number | Date | Country |
---|---|---|
WO 9408115 | Apr 1994 | WO |
WO 0032487 | Jun 2000 | WO |
WO 2005001787 | Jan 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20120304710 A1 | Dec 2012 | US |
Number | Date | Country | |
---|---|---|---|
61492090 | Jun 2011 | US |