The present invention relates generally to merchandise security, and, more particularly, to systems and methods for protecting retail display merchandise from theft.
Displays for retail merchandise utilize different types of theft deterrent security systems and methods to discourage shoplifters. Many of these systems and methods include sensors and alarms that are mechanically attached, or sensors and alarms that are mechanically attached and electrically connected, to the item of merchandise to be protected. When the integrity of the display is compromised, such as by cutting or removing a cable that extends between the security system and the item of merchandise, or by separating the item of merchandise from the security system, an alarm is activated to alert store personnel of a potential theft situation. Thus, conventional security systems having mechanical or electro-mechanical cables tethered to an item of merchandise, and other security systems that are physically attached to an item of merchandise, provide visual security at the expense of restricting a potential purchaser's ability to interact freely with the merchandise. Consequently, conventional systems that provide visual security suffer from the disadvantage of providing a reduced “customer experience” for a potential purchaser of the merchandise.
Thus, a need exists for a security system and method that is not mechanically or electro-mechanically tethered to an item of merchandise, yet can be configured for protecting various items of retail display merchandise from theft. A further, and more specific, need exists for a security system and method that provides an improved customer experience for a potential purchaser of retail display merchandise.
Embodiments of the present invention are directed towards security systems and methods for protecting retail display merchandise from theft are provided. In one embodiment, a security system includes a sensor configured to be secured to an item of merchandise, and a monitoring component configured to wirelessly communicate with the sensor, wherein the monitoring component and the sensor are configured to communicate with one another to determine a proximity of the item of merchandise relative to the monitoring component, wherein the monitoring component and/or the sensor is configured to initiate a security signal when the proximity between the monitoring component and the sensor is within a predetermined range or distance.
In another embodiment, a method includes wirelessly communicating between a monitoring component and a sensor, the sensor being secured to an item of merchandise and determining a proximity of the sensor relative to the monitoring component. The method also includes initiating a security signal at the monitoring component and/or sensor when the proximity between the monitoring component and the sensor is within a predetermined range or distance.
In one embodiment, a security system includes a sensor configured to be secured to an item of merchandise and a monitoring component configured to wirelessly communicate with the sensor. The monitoring component and/or the sensor is configured to initiate a security signal when the proximity between the monitoring component and the sensor is within a predetermined range or distance.
In another embodiment, a method includes wirelessly communicating between a monitoring component and a sensor, the sensor being secured to an item of merchandise and initiating a security signal at the monitoring component and/or sensor when the proximity between the monitoring component and the sensor is within a predetermined range or distance.
In one embodiment a security system includes a sensor configured to be secured to an item of merchandise and a monitoring component configured to wirelessly communicate with the sensor. The sensor and the monitoring component are configured to wirelessly communicate to determine a signal strength of communication therebetween, and the sensor and/or the monitoring component is configured to initiate a security signal when the signal strength is greater than a predetermined threshold or range.
In another embodiment, a method includes wirelessly communicating between a monitoring component and a sensor, the sensor being secured to an item of merchandise and determining a signal strength of communication between the sensor and the monitoring component. The method also includes initiating a security signal at the monitoring component and/or sensor when the signal strength between the monitoring component and the sensor is greater than a predetermined threshold or range.
The detailed description of the invention provided hereafter may be better understood with reference to the accompanying drawing figures, which depict embodiments of merchandise security systems and methods for protecting retail display merchandise from theft.
The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which various embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout, and prime notation and multiple prime notations are used to indicate similar elements in alternative embodiments.
The item of merchandise 14 may be any portable electronic device, such as a mobile or cellular phone, a Smartphone, a tablet, notebook, laptop computer, or the like. One advantage of the security system 10 is that the item of merchandise 14 is not required to be mechanically tethered to a display stand, support or the like. Thus, a consumer is free to examine the item of merchandise 14 without any physical restraints. As will be explained in further detail below, the monitoring device 16 may be configured to communicate with the sensor 12 and/or the item of merchandise 14 to establish a “wireless tether,” such that although physical security is not provided, wireless security is provided. As a result, the security system 10 provides for an improved or increased “customer experience,” and thereby increases the likelihood of the customer purchasing the item of merchandise 14, while reducing the possibility of theft of the merchandise. In particular, mechanical and electromechanical tethered security devices that include cords, cables, etc. may interfere with the customer experience by restricting the ability of the potential purchaser to freely interact with the item of merchandise. Furthermore, although the security system 10 is described herein in relation to a merchandise display in a retail store, it is understood that a security system 10 according to the invention is applicable to any number of environments, such as in hospitals, restaurants, etc.
The sensor 12 of the security system 10 is configured to be engaged with and disengaged from the item of merchandise 14. As such, the sensor 12 may be removably engaged with the item of merchandise 14, for example, by being inserted within an input port of the item of merchandise. As such, the sensor 12 may include a connector (see, e.g.,
In some embodiments, the sensor 12 comprises a power source, such as a battery. In this case, the sensor 12 may be operable for detecting when it is removed from the item of merchandise 14. For example, the sensor 12 may establish a sense loop between the sensor and the item of merchandise 14, such that when the sensor is removed, the sense loop is interrupted. The sensor 12 may then be configured to communicate with the monitoring device 16 and/or the item of merchandise 14 to initiate or otherwise generate a security signal. In the instance where power is lost to the item of merchandise 14, the power source of the sensor 12 will reduce false alarms. In some embodiments, the sensor 12 may be configured to determine whether the loss of power to the item of merchandise 14 was authorized or unauthorized. A natural loss of power could be, for example, the item of merchandise 14 being powered down in an authorized manner, while an unnatural loss of power could be indicative of a battery being removed from the item of merchandise or the sensor 12 being removed from the item of merchandise. When engaged with the item of merchandise 14, the sensor 12 may be configured to monitor the data lines of the item of merchandise to determine whether the loss of power is natural (authorized) or unnatural (unauthorized). In one example, when an item of merchandise 14 is powered down naturally, the sensor 12 may monitor the data lines to confirm that a natural power loss has occurred. However, when power is abruptly lost, the sensor 12 may be configured to transmit a signal to the monitoring device 16 to initiate or otherwise generate a security signal. Because the sensor 12 includes a power source in this embodiment, the sensor may utilize its own power source to transmit a signal to the monitoring device 16.
The sensor 12 may include communications circuitry for communicating with the monitoring device 16. For example, the communications circuitry of the sensor 12 may be configured to wirelessly communicate with the monitoring device 16 using any desired communications protocol such as, for example, Bluetooth wireless communication, Bluetooth Low Energy (“BLE”) wireless communication, WiFi wireless communication, cellular wireless communication, received signal strength indicator (“RSSI”), ultra-wideband time of flight, and/or ambient backscatter. Similarly, the monitoring device 16 may include complementary communications circuitry for communicating with the sensor 12. In one embodiment, the wireless communications circuitry carried by the sensor 12 and/or the monitoring device 16 may include, for example, one or more wireless transceivers for transmitting and receiving wireless communications.
The monitoring device 16, sometimes referred to as a “watch tower”, may be configured to communicate wirelessly with the sensor 12 and/or the item of merchandise 14. In addition, the monitoring device 16 may include a connector 24 that is configured to engage an input port provided on the charging device 20, as shown in
In some embodiments, the monitoring device 16 includes a controller and wireless communications circuitry coupled to the controller. The monitoring device 16 may be paired, for example, by wireless communication (e.g. Bluetooth, BLE, RF, IR, etc.), with the sensor 12 and/or the item of merchandise 14. As such, the sensor 12 and/or the item of merchandise 14 is configured to communicate, via its respective wireless communications circuitry, with the monitoring device 16 via its wireless communications circuitry. In other words, the sensor 12 and/or the item of merchandise 14 may be paired with a monitoring device 16 by way of wireless communications.
As previously mentioned, in some embodiments the monitoring device 16 may be conceptually thought of as a “watch tower.” As explained in further detail below, if the strength of communication between the monitoring device 16 and the sensor 12 decreases, or communication has been lost, the monitoring device may communicate with the alarm module 18, wherein the alarm module may generate a security signal that is indicative of an unsecured state or condition, for example, an audio, visual, and/or haptic alarm. The monitoring device 16 may also communicate, via the wireless communications circuitry, to the sensor 12 to activate a respective output device of the sensor and/or the item of merchandise 14 (i.e., a dual alarm condition) so that security personnel are able to identify the sensor of a particular item of merchandise communicating a security signal.
In one embodiment, the alarm module 18 is electrically connected to the monitoring device 16 and to an external power source. For example with reference to
The alarm module 18 may include an alarm that will generate a security signal, such as an audible and/or visual alarm. The alarm module 18 may include an alarm for generating a security signal in response to various security events (e.g., unplugging/cutting a cable, disconnecting the monitoring device 16, disconnecting the sensor 12, etc.). For example, the alarm module 18 may include a piezoelectric alarm to generate an audible alarm signal, as well as circuitry for detecting a security event. The alarm module 18 could also be configured to generate a visible alarm signal, or provide other visible indicators (e.g., armed or alarming), such as with a light-emitting diode (“LED”). The alarm module 18 may be further configured to detect a connection of either connector to the monitoring device 16 and/or the external power source. The alarm module 18 may further include an internal power source configured to provide power to the alarm module in the event that power from an external power source is interrupted or lost. In one embodiment, the internal power source is a rechargeable battery that is recharged by power supplied by the remote power source.
In some embodiments, the security system 10 includes a charging device 20 as illustrated in
The item of merchandise 14 may be “qi” compliant and include appropriate hardware for communicating with the charging device 20. Alternatively, the sensor 12 may be “qi” compliant such that the item of merchandise 14 is not required to be “qi” compliant, and further, no additional hardware is required for charging the item of merchandise in the retail display environment (e.g., a power adapter cable). For example, in the embodiment shown in
In some embodiments, the alarm module 18 and/or sensor 12 can be armed, disarmed, and/or silenced with a security key, which may utilize mechanical, wireless, and/or electrical communication between the component(s) of the security system 10 and the security key. For example, the security key may be configured to wirelessly communicate a security code to the alarm module 18 and/or sensor 12, such as by infrared (“IR”), optical, acoustic, or inductive communication. For example, the alarm module 18 may include a port 32, window, or the like (e.g.,
As noted above, the sensor 12 may be configured to utilize power from the item of merchandise 14 for performing one or more functions according to some embodiments. Thus, the sensor 12 may not require an internal power source for performing various security functions. In one example, the sensor 12 may be configured to toggle between transmitting and receiving power. For instance, the sensor 12 may utilize a battery as discussed above for performing one or more security functions. Additionally or alternatively, the sensor 12 may be configured to transmit power from an external power source to the item of merchandise 14, such as power provided from a charging device 20, display stand, base, or the like. For instance, the sensor 12 may simply pass power from the charging device 20 through to the item of merchandise 14 for charging the battery of the item of merchandise. In addition, the sensor 12 may be configured to receive power from the battery of the item of merchandise 14. The sensor 12 may utilize the power provided from the battery to perform one or more security functions (e.g., communicating with monitoring device 16 or other monitoring unit). Thus, unlike a conventional sensor that utilizes its own power source, the sensor 12 may be configured to toggle between transmitting and receiving power to an item of merchandise 14. In another example, the item of merchandise 14 may utilize USB “on-the-go” or like functionality for facilitating power transfer from the item of merchandise to and from the sensor. In some embodiments, the sensor 12 may include a capacitor to aid in the transition between a position where the item of merchandise 14 and/or the sensor are being charged to a position where the item of merchandise 14 and/or the sensor 12 are no longer being charged. Thus, a false alarm may be avoided in the event that power is lost momentarily when power to the sensor 12 is transitioned between power sources.
As discussed above, various means may be used to provide power to the sensor 12 and/or the item of merchandise 14, such as by contact charging.
Regardless, the base 58′ functions as a standalone display stand that communicates wirelessly with the sensor 52′ and/or an attached item of merchandise. Wireless communication occurs when the sensor 52′ is proximate to (e.g., “near field”) or placed on the base 58′. As previously described, the wireless communications may be utilized to initially identify the sensor for pairing the sensor to the particular base. The pairing may include, for instance, associating a specific identifier of the base 58′ and/or the sensor 52′ with one another. In some embodiments, once a sensor 52′ is paired with a specific base 58′, the sensor cannot be paired with another base without first disarming the sensor and/or the base. Should a sensor 52′ be placed on a wrong base 58′, the sensor and/or base may be configured to generate an audible and/or visible signal to indicate that the sensor has been placed on the wrong base. The wireless communications may also be utilized to indicate when the base 58′ should begin contact charging with the sensor 52′ and/or the attached item of merchandise. A slight electrical current may be supplied, via contact or wireless communications, prior to pairing the sensor 52′ with the base 58′ in order to activate, or “wake up,” the sensor and initiate IR wireless communications with the base 58′. In one embodiment, the IR port 53 of the sensor 52′ and the IR port 57 of the base 58′ are configured for transmitting and receiving the IR wireless communications. The same IR ports 53, 57 utilized for wireless communications between the sensor 52′ and the base 58′ may also be utilized for communications with a security key, as discussed above. The security key may communicate wirelessly via the IR ports 53, 57 to arm and/or disarm an alarm provided on either the sensor 52′ or the base 58′, or both. The security key may arm and/or disarm arm the sensor 52′ and/or base 58′ independently or in cooperation with one another. For example, disarming the sensor 52′ with a security key may also disarm the base ‘58’. However, the security key may be required to silence or disarm each of the sensor 52′ and the base 58′ in some instances. The wireless communications between the sensor 52′ and the base 58′ allow for a lower maintenance security system 50′ and increased flexibility, as well as anonymity given that any sensor may be placed on any desired display stand or base without the need for intervention, for example by an authorized sales person. If desired, the base 58′ may also include a proximity mechanism (e.g., a pressure or plunger switch) 59A that is operable for detecting if the base has been removed from a fixture, support, display surface, or the like, and a piezoelectric alarm 59B for generating a security signal when the display stand has been tampered with or removed.
In some embodiments, the item of merchandise may be configured to determine its location relative to the security system using positioning functionality, which may be referred to as “inertial navigation” or “trusted positioning.” Thus, the item of merchandise may utilize various components carried thereby to determine a location of the item of merchandise. The location information determined by the item of merchandise may be used independently to determine the distance between the item of merchandise and a “home” position, for example, a display fixture, display stand, alarm module, etc. Alternatively, the item of merchandise may be used in conjunction with communications between the item of merchandise and a monitoring device, or between a sensor and a monitoring device. According to one embodiment, trusted positioning may be implemented using similar techniques as that described in U.S. Patent Publication No. 2012/0293330, entitled Systems and Methods for Protecting Retail Display Merchandise From Theft, the content of which is incorporated by reference herein in its entirety.
In some embodiments, the security system includes an inertial navigation system (INS) as a self-contained “add-on” security module that is affixed to, or otherwise integrated with, an item of merchandise, for example, a retail display item of merchandise being displayed for sale in a display area of a retail store. In another embodiment, an item of merchandise may include a software application for “smart” electronic merchandise including inertial navigation system (INS) functionality that is capable of executing a third-party software application. In this manner, the security system leverages the sensors, controller, audio components and capabilities of the item of merchandise, in particular, the host “smart” consumer electronics device. As will be appreciated by those skilled in the art, the term “smart” consumer electronics device as used herein refers to any device that is capable of executing a software application, for example, a cellular telephone, e-Reader, I-Pad, I-Pod, Tablet computer, tablet device, laptop computer, notebook computer, digital camera, SLR, media (audio/video) player, or other electronics device including processing capability and an executable memory.
As used herein, the term “inertial navigation system (INS)” means a navigation aid that uses a computer, motion sensors (e.g. accelerometers) and rotation sensors (e.g. gyroscopes) for processing motion without external references. The inertial navigation system (INS) advantageously determines, for example via dead reckoning, the position, orientation, and velocity (direction and speed of movement) of a moving object without reliance on external references. Indeed, one particular embodiment of the present invention is a security system including an inertial navigation system (INS) in the form of a software application and associated hardware, or a security system configured for operation with such an item of merchandise, that does not rely on an external reference for determining the position of the item of merchandise relative to a predetermined “home” position.
In one embodiment of an item of merchandise 14 according to the invention illustrated in
In one embodiment illustrated schematically in
In one embodiment, the item of merchandise includes communications circuitry 141, and in particular, wireless communication circuitry. The item of merchandise 14 may also include a controller 14J operably coupled to the wireless communications circuitry 141, the accelerometer 14F, the orientation sensor 14D, and/or the output device 14B. The controller 14J may be configured to cooperate with the wireless communications circuitry 141 to coordinate and control operations of the item of merchandise 14, namely wireless communications functions and capabilities thereof. Operations may include mobile voice and data operations, including email and Internet data, for example. In additional embodiments, the item of merchandise 14 may include near field communication (NFC) functionality and be configured to communicate via the NFC tag 14H with a security key or other security device having NFC functionality to arm and/or disarm a security signal, or to lock and/or unlock the item of merchandise.
In some embodiments, the controller 14J is configured to cooperate with the orientation sensor 14D to determine a reference direction of the item of merchandise 14. For example, when the item of merchandise 14 is held by a potential purchaser in an operational position with the display 14B and input device(s) 14C facing the customer, the orientation sensor may cooperate with the controller 14J to determine the direction that the customer and the item of merchandise are facing, for example, North. The controller 14J may also cooperate with the accelerometer 14F to measure and monitor an acceleration of the item of merchandise.
Based upon the orientation and measured accelerations of the item of merchandise 14, as well as the elapsed time of any movements of the merchandise, the controller 14J may be configured to determine a distance from a given location, such as a designated retail display “home” position. The “home” position may, for example, be established by the item of merchandise 14 being in contact with, or in close proximity to, a display position, surface, stand, holder, platform, charging device, or the like. More particularly, the controller 14J may be programmed directly, for example, via the input device(s) 14C, or alternatively, may be programmed indirectly by an external system or device, so that the location of the display surface is the “home” position of the item of merchandise. The controller 14J may determine the distance the item of merchandise 14 is moved from the “home” position, when the item of merchandise is removed from the “home” position by a customer considering whether to purchase the merchandise.
It should be noted that the “home” position need not be the same location each time. Additionally, or alternatively, there may be more than one “home” position. For example a “home” position may be a display stand, a charging device or station (e.g., charging station 20), or any number of a plurality of “power hotspots,” such as inductive power transfer charging stations. Alternatively, or additionally, the “home” position may be a location at which the item of merchandise 14 remains motionless for a period of time and the wireless communications circuitry 141 indicates a minimum threshold power signal. In other words, a “home” position may be established when the electronic item of merchandise 14 is motionless and charging for a predetermined period of time. Alternatively, or in conjunction with establishing one or more “home” positions, the controller 14J may use one or more motion sensors (e.g., accelerometer 14F, orientation sensor 14D, etc.) and motion processing algorithms to establish (i.e. map) a “safe” zone (also boundary, perimeter or area) with or without reference to one or more “home” positions. The controller 14J can then determine, based on subsequent motion processing, whether an item of merchandise 14 is moved from a location within the “safe” zone to a location outside or beyond the established “safe” zone.
In some embodiments, the controller 14J is configured to determine the distance traveled from the “home” position based upon inertial navigation system (INS) techniques, for example, dead reckoning, as will be appreciated by those skilled in the art. As such, no external references, for example, a GPS determined position or RF communication, are required to determine the distance traveled by the item of merchandise 14 from the “home” position. As a result, a security system configured for operation with an item of merchandise in accordance with this embodiment of the invention may be advantageous for use in an indoor environment, for example, a display area of a retail store, where a GPS position cannot always be determined and where RF communications can be obstructed.
The item of merchandise 14 may further include a memory, for example, as a subcomponent of controller 14J, for storing computer-executable instructions and data for processing. The controller 14J may cooperate with the computer-executable instructions in the memory, for example, an algorithm embodied in a software application, to perform the functions described herein. As will be appreciated by those skilled in the art, the controller 14J may be embodied as a hardware component or as a combination of hardware and application software.
As discussed above, the monitoring component 16, 58, 58′ (e.g., monitoring device or display stand) and the corresponding sensor 12, 52, 52′ may be configured to wirelessly communicate with one another. In some embodiments, the signal strength of communication between the monitoring component 16, 58, 58′ and the corresponding sensor 12, 52, 52′ may be used to provide security (e.g., via RSSI). One embodiment of a method utilizing signal strength is shown in
The determined proximity range 72 could be based on any number of factors, such as the environment, the position of the item of merchandise 14 or the consumer when the merchandise is initially picked up, the size of the consumer's hand, etc. For example, the monitoring component 16, 58, 58′ may create a range that is defined by upper and lower bounds or set points that are used to determine whether the consumer, and thus, the item of merchandise 14, is within an acceptable proximity to the monitoring component. The proximity range 72 may be a range between an established home position 70 and a position that would initiate a security signal. The proximity range 72 may be determined dynamically, such that the home position 70 and a maximum position from the home position are determined dynamically and may be unique for each item of merchandise 14. The proximity range 72 may utilize the home position 70 and other data when a user initially picks up the item of merchandise 14 (e.g., within 1-2 seconds). This data could be used to determine the maximum value of the proximity range 72. For example, a user with larger hands may hinder the wireless communication more than a user with smaller hands, and thus the user with the larger hands may have a greater proximity range 72. Alternatively, the proximity range 72 need not be determined based on communications between the monitoring component 16, 58, 58′ and the item of merchandise 14 and/or sensor 12, 52, 52′. For example, the maximum value of the proximity range 72 may be defined by the retailer and manually input to the security system, such as when the sensor 52, 52′ is first positioned on the display stand 58, 58′. The retailer may establish a maximum value of the proximity range to 2 feet, 3 feet, 5 feet, or any desired distance from the home position that is within the field of communications. In some cases, the retailer is able to select a desired range from a plurality of ranges. Furthermore, the proximity range 72 may be based on various assumptions, such as an assumption that the item of merchandise 14 is near to the home position 70 at a particular time, or that the item of merchandise is moving, but is not indicative of a security event.
In another embodiment, a calibration routine may be used to initially set the proximity range or other predetermined range. In this example, the sensor 12, 52, 52′ is configured to communicate with the monitoring component 16, 58, 58′ to set a proximity range. In particular, a user may activate a security key, similar to that described above, to communicate with the monitoring component 16, 58, 58′ to initiate the calibration routine (e.g., a predetermined number of key button presses). An audible and/or a visible signal may be emitted to indicate the calibration routine has been initiated. Following the security key activation, the user may be provided a predetermined period of time to set the proximity range (e.g., about 30 seconds to 1 minute). In this case, the user may move the sensor 12, 52, 52′ to a desired distance from the monitoring component 16, 58, 58′ and activate the security key to communicate with the sensor. Communication between the key and the sensor 12, 52, 52′ sets a flag in a message to be transmitted to the monitoring component 16, 58, 58′ indicating that the proximity range is to be determined. The monitoring component 16, 58, 58′ receives the flagged message from the sensor 12, 52, 52′ and calculates the distance. Thus, the monitoring component 16, 58, 58′ and the sensor 12, 52, 52′ may be configured to exchange data and/or messages containing various data. Following the predetermined period of time, the proximity range is set and any movement of the sensor 12, 52, 52′ relative to the monitoring component 16, 58, 58′ will be based on the proximity range set during the calibration routine. Thus, the calibration routine allows for added flexibility in setting the proximity range and provides the user with the ability to dynamically set the proximity range based on his or her own preferences.
In one embodiment, the proximity range 72 may be determined by the signal strength between the monitoring component 16, 58, 58′ and the sensor 12, 52, 52′, and the monitoring component may be configured to monitor the signal strength therebetween, as indicated in
In some embodiments, the monitoring component 16, 58, 58′ and the sensor 12, 52, 52′ are not required to be paired to one another. For example, the sensor 12, 52, 52′ may be configured to transmit identifying information when the item of merchandise 14 and sensor are separated from the monitoring component 16, 58, 58′, and the consumer interacts with the item of merchandise. The identifying information may be the same or similar information typically transmitted by a Bluetooth enabled device. The sensor 12, 52, 52′ may be configured to transmit the identifying information to the monitoring component 16, 58, 58′ at a predetermined frequency that is significantly higher than conventional Bluetooth enabled devices. For example, the transmission frequency may be about 20 Hz. In some cases, the monitoring component 16, 58, 58′ may be pre-programmed with the identification of the sensor 12, 52, 52′ and/or the item of merchandise 14 so that the monitoring component may then detect the RSSI of the desired sensor and/or item of merchandise. In addition, the monitoring component 16, 58, 58′ may be configured to filter specific RSSI values or otherwise smooth the received values into meaningful data. In this regard, a filtering algorithm may be employed for smoothing the data.
In another embodiment of a method according to the invention illustrated in
In one embodiment, the item of merchandise 14, sensor 12, 52, 52′, and/or the monitoring component 16, 58, 58′ are configured to be paired with one another. In one example, the sensor 12, 52, 52′ and the monitoring component 16, 58, 58′ may be paired and configured to communicate with one another (e.g., via Bluetooth communication). The sensor 12, 52, 52′ may be configured to communicate with the item of merchandise 14 using the connection between the sensor and the item of merchandise (e.g., a USB connection). Thus, two-way communication between the sensor 12, 52, 52′ and the item of merchandise 14 may occur. In this embodiment, the monitoring component 16, 58, 58′ may be configured to be paired with any desired item of merchandise 14, such that pre-programming of the identification of the item of merchandise into the monitoring component is not required. In one example, once the sensor 12, 52, 52′ is coupled to the item of merchandise 14, the monitoring component 16, 58, 58′ may automatically be paired with the sensor in order to exchange data therebetween. In this embodiment, the monitoring component 16, 58, 58′ is configured to filter out other data being transmitted by surrounding sensors 12, 52, 52′ and items of merchandise 14 in order to be paired with the desired sensor. Thus, where the monitoring component 16, 58, 58′ is capable of detecting a plurality of sensors, the monitoring component is able to filter out all other sensors except for the sensor 12, 52, 52′ desired to be monitored. In one embodiment, the sensor 12, 52, 52′ may be configured to control certain features of the item of merchandise 14, such as, for example, flashing LEDs, generating audible signals, etc. In a further embodiment, the monitoring component 16, 58, 58′ may be configured to be simultaneously paired with the sensor 12, 52, 52′ and the item of merchandise 14. As such, the monitoring component 16, 58, 58′ may be configured to communicate directly with the item of merchandise 14 and the sensor 12, 52, 52′. For example, the monitoring component 16, 58, 58′ could exchange data directly with the item of merchandise 14, such as via text and/or audio messages.
Using any one or combination of the aforementioned techniques, the monitoring component 16, 58, 58′ may be configured to determine whether the proximity of the item of merchandise 14 relative to the monitoring component has exceeded at least one threshold value based upon the distance traveled by the item of merchandise from the home position 70. For example, the monitoring component 16, 58, 58′ may determine whether the item of merchandise 14 has been moved more than a predetermined distance in any radial direction from the home position 70 based on the signal strength and/or data being communicated between the monitoring component and the item of merchandise and/or the sensor 12, 52, 52′. Of course, the threshold proximity may be set to any desired value, or alternatively, to another variable, such as distance, time, acceleration, orientation, etc. In particular, the threshold variable may be set to any desired value of any suitable variable via programming using the input device(s) 14C, or wirelessly via the wireless communications circuitry 141 (see, e.g.,
Regardless, when the threshold proximity has been exceeded, the monitoring component 16, 58, 58′ may be configured to communicate with the alarm component 18, 58, 58′ to generate a security signal, such as a visual, an audible, and/or a haptic alarm. For example, the security signal may be an audible voice message requesting that the item of merchandise 14 be returned to the home position 70 within a specified period of time. The voice message may be customizable in that it may be set to be a male or female voice, and/or may be set to speak in a predetermined language or to speak in one or more of multiple languages. The monitoring component 16, 58, 58′ alternatively or additionally may activate other output devices 14E, for example, a haptic (e.g. vibration) device or a visual (e.g. flashing LED) device. The monitoring component 16, 58, 58′ may also be configured to communicate with the sensor 12, 52, 52′ and/or the item of merchandise 14 to cause the sensor and/or the item of merchandise to initiate or otherwise generate a security signal.
In some embodiments, there may be more than one threshold, for example a first threshold and a second threshold. When the monitoring component 16, 58, 58′ determines a first threshold proximity has been exceeded, the monitoring device may initiate an initial “warning” via the sensor 12, 52, 52′ and/or the item of merchandise (see, e.g., 76 in
Still further, the monitoring component 16, 58, 58′ may cooperate with the sensor 12, 52, 52′ and/or the item of merchandise 14 to wirelessly transmit instructions to activate another output device 14E, such as a store alarm remote from the item of merchandise and the display area. As will be appreciated by those skilled in the art, the monitoring component 16, 58, 58′ may likewise communicate instructions to other security systems and/or devices to perform additional operations. In one example, the monitoring component 16, 58, 58′ may instruct adjacent monitoring components in communication with other sensors 12, 52, 52′ and/or items of merchandise 14 to enter a “lockdown mode” so that the other items of merchandise cannot be removed and stolen. Lockdown may be achieved by mechanical, magnetic, electrical, electromechanical or electromagnetic locks, as will be understood by those skilled in the art.
The monitoring component 16, 58, 58′ may be configured to deactivate a security signal upon the item of merchandise 14 being returned within the first or second threshold proximity, for example. Alternatively or additionally, the monitoring component 16, 58, 58′ may disable the security signal based upon an input from an input device 14C, for example, a security code entered into the item of merchandise 14, or presenting a key to the alarm component 18, 58, 58′, sensor 12, 52, 52′, and/or the item of merchandise. The monitoring component 16, 58, 58′ may also deactivate the security signal wirelessly via the wireless communications circuitry, or via a key, such as a mechanical, magnetic, electrical, optical or infrared key fob device. Of course, the monitoring component 16, 58, 58′ may perform additional and/or other communications functions upon an alarm condition, as will be appreciated by those skilled in the art including, for example, disabling one or more functions, capabilities, or operations of the item of merchandise.
In another embodiment of a method according to the invention illustrated in
In some embodiments, one or more sensors 12, 52, 52′ are configured to communicate with one or more monitoring components 18, 58, 58′. For example, a plurality of the sensors 12, 52, 52′ may be configured to communicate with a monitoring component 18, 58, 58′. Thus, in some cases, the monitoring component 18, 58, 58′ is configured to be paired and communicate with a plurality of sensors 12, 52, 52′. In one embodiment, the monitoring component 18, 58, 58′ may not be a base or display stand for supporting the sensor 12, 52, 52′ thereon, but may rather be located at one or more locations remote from the home or display position of the sensor. For instance, a sensor 12, 52, 52′ may be located at a home or display location within a retail store, and a consumer may be free to move about with the sensor and attached item of merchandise 14 within the store. The monitoring component 18, 58, 58′ may be configured to communicate with the sensor 12, 52, 52′ during this time. The monitoring component 18, 58, 58′ may be configured to communicate with the sensor 12, 52, 52′ continuously or once the sensor moves within a predetermined distance or range from the monitoring component. In one case, the monitoring component 18, 58, 58′ may be located near or at an exit of the retail store, and may be configured to communicate with the sensor and determine that the sensor is within the predetermined distance or range. Distance could be determined using any one or combination of techniques described above, such as via signal strength. If the monitoring component 18, 58, 58′ determines that the sensor 12, 52, 52′ is within the predetermined distance or range, the sensor and/or the monitoring component may be configured to generate a security signal. In some cases, where the signal strength exceeds a predetermined threshold or range, the sensor 12, 52, 52′ and/or monitoring component 18, 58, 58′ may be configured to generate a security signal. Thus, as the sensor 12, 52, 52′ gets closer to the monitoring component 18, 58, 58′, the signal strength may increase, which may indicate a security event. Therefore, only when the sensor 12, 52, 52′ is moved close to the monitoring component 18, 58, 58′ will a security event result. In the case where the sensor 12, 52, 52′ alarms when moved within the predetermined distance or range of the monitoring component, retail associates are alerted to a potential theft and can readily identify the merchandise attached to the sensor. In one example, the sensor 12, 52, 52′ and/or monitoring component 18, 58, 58′ may be configured to cease generating a security signal when the sensor is moved from within the predetermined distance or range to outside the predetermined distance or range. In some cases, the sensor 12, 52, 52′ and/or monitoring component 18, 58, 58′ may be configured to generate a security signal if a potential thief attempts to conceal the sensor 12, 52, 52′, such as in a bag or pocket. Because communication between the sensor 12, 52, 52′ and monitoring component 18, 58, 58′ is lost when concealed in such a manner, the sensor and/or monitoring component may be configured to detect the loss and generate a security signal.
It is understood that any number of monitoring components 18, 58, 58′ may be positioned at desired locations, such as near various exits within a retail store. In one embodiment, the monitoring components 18, 58, 58′ and sensors 12, 52, 52′ may be paired using a security key, similar to the security key discussed above. Thus, during a setup procedure, the security key may communicate with each monitoring component 18, 58, 58′ and each sensor 12, 52, 52′ to associate particular monitoring components and sensors together. In some instances, each sensor 12, 52, 52′ may be configured to communicate with more than one monitoring component 18, 58, 58′. In addition, a calibration routine, also similar to that described above, may be used to set the predetermined distance or range that will result in a security signal being generated. Thus, a user may be able to set a user-defined range or distance relative to the monitoring component 18, 58, 58′.
In another embodiment, one or more annunciators may be configured to communicate with one or more sensors 12, 52, 52′. For example, a plurality of annunciators may be located throughout a retail store and be configured to communicate with one or more sensors 12, 52, 52′ that are located proximate to each annunciator. Each annunciator may be configured to communicate with sensors 12, 52, 52′ proximate thereto. Moreover, each annunciator may be configured to determine a distance to the sensor 12, 52, 52′, and if communication is lost after determining that the sensor is within a predetermined distance or range from the annunciator, the annunciator may cause the sensor and/or monitoring component 18, 58, 58′ to generate a security signal, which may be indicative of the sensor being removed from the item of merchandise. Where the sensor 12, 52, 52′ is moved beyond the predetermined distance or range, the annunciator may no longer be capable of communicating with the sensor or otherwise be able to initiate a security signal, and the sensor will be configured to communicate with another annunciator that is within a predetermined distance or range thereof. Therefore, there may be a number of annunciators located within a retail store or other location that are positioned between the sensor's 12, 52, 52′ display position and the monitoring component(s) 18, 58, 58′.
In some embodiments, the security system is similar to that described in U.S. Publication No. 2015/0091729, entitled Systems and Methods for Protecting Retail Display Merchandise From Theft, filed on Sep. 24, 2014, and U.S. Application No. 62/117,573, entitled System and Method for Calibrating a Wireless Security Range, filed on Feb. 18, 2015, the contents of which are incorporated by reference herein in its entirety.
It should be noted that the operations executed by the sensor 12, 52, 52′, the monitoring component 16, 58, 58′, the alarm component 18, 58, 58′, and/or the item of merchandise 14 for any of the embodiments disclosed herein may be provided by a computer-readable medium, memory, or other storage medium. Many modifications and other embodiments of the invention will be readily apparent to one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is understood and appreciated that the invention is not to be limited to the specific embodiments disclosed herein, and that modifications to the disclosed embodiments and other undisclosed embodiments are intended to be included within the scope of the appended claims.
The present application is a 371 national stage entry of International Application No. PCT/US2016/038927, filed Jun. 23, 2016, which claims priority to U.S. Provisional Application No. 62/184,686, filed Jun. 25, 2015, the contents of each of which are incorporated by reference herein in their entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2016/038927 | 6/23/2016 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2016/210069 | 12/29/2016 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4293852 | Rogers | Oct 1981 | A |
4962369 | Close | Oct 1990 | A |
5051725 | Caccitolo | Sep 1991 | A |
5485163 | Singer et al. | Jan 1996 | A |
5515419 | Sheffer | May 1996 | A |
5661460 | Sallen et al. | Aug 1997 | A |
5796338 | Mardirossian | Aug 1998 | A |
5963131 | D'Angelo et al. | Oct 1999 | A |
6072393 | Todd | Jun 2000 | A |
6133830 | D'Angelo et al. | Oct 2000 | A |
6255958 | Haimovich et al. | Jul 2001 | B1 |
6265974 | D'Angelo et al. | Jul 2001 | B1 |
6529131 | Wentworth | Mar 2003 | B2 |
6577239 | Jespersen | Jun 2003 | B2 |
6992585 | Saleh et al. | Jan 2006 | B2 |
7009512 | Cordoba | Mar 2006 | B2 |
7061385 | Fong et al. | Jun 2006 | B2 |
7190264 | Brown et al. | Mar 2007 | B2 |
7218226 | Wehrenberg | May 2007 | B2 |
7312711 | Fong et al. | Dec 2007 | B2 |
7375638 | Light et al. | May 2008 | B2 |
7535369 | Fong et al. | May 2009 | B2 |
7667601 | Rabinowitz et al. | Feb 2010 | B2 |
7701339 | Irmscher et al. | Apr 2010 | B2 |
7778649 | Sharony et al. | Aug 2010 | B2 |
7944359 | Fong et al. | May 2011 | B2 |
7961092 | Freathy et al. | Jun 2011 | B2 |
8106772 | Irmscher et al. | Jan 2012 | B2 |
8115623 | Green | Feb 2012 | B1 |
8212672 | Brenner | Jul 2012 | B2 |
8368546 | Fong et al. | Feb 2013 | B2 |
8451115 | Imukai et al. | May 2013 | B2 |
8452868 | Shafer et al. | May 2013 | B2 |
RE44433 | Fong et al. | Aug 2013 | E |
8508367 | Shafer | Aug 2013 | B2 |
8521134 | Huckins | Aug 2013 | B2 |
8525688 | Chatterjee et al. | Sep 2013 | B2 |
8542120 | Brenner | Sep 2013 | B2 |
8577294 | Causey et al. | Nov 2013 | B2 |
8643486 | Hess | Feb 2014 | B2 |
8830061 | Malhotra | Sep 2014 | B2 |
8878673 | Grant et al. | Nov 2014 | B2 |
9437088 | Phillips et al. | Sep 2016 | B2 |
20010038330 | Garcia | Nov 2001 | A1 |
20030043036 | Merrem et al. | Mar 2003 | A1 |
20030206106 | Deconinck et al. | Nov 2003 | A1 |
20040145471 | Lawrenson et al. | Jul 2004 | A1 |
20050040229 | Andrews et al. | Feb 2005 | A1 |
20050062604 | Fong et al. | Mar 2005 | A1 |
20050195101 | Stevens et al. | Sep 2005 | A1 |
20050237185 | Brown et al. | Oct 2005 | A1 |
20060097875 | Ott | May 2006 | A1 |
20070035391 | Hamzy | Feb 2007 | A1 |
20070080806 | Lax et al. | Apr 2007 | A1 |
20070146133 | Wehrenberg | Jun 2007 | A1 |
20070229259 | Irmscher et al. | Oct 2007 | A1 |
20080060241 | Molinaro | Mar 2008 | A1 |
20080204239 | Marszalek et al. | Aug 2008 | A1 |
20090011713 | Abusubaih et al. | Jan 2009 | A1 |
20090033492 | Rapp et al. | Feb 2009 | A1 |
20090079566 | Goldstein et al. | Mar 2009 | A1 |
20090156126 | Willis | Jun 2009 | A1 |
20090174544 | Allen et al. | Jul 2009 | A1 |
20100156624 | Hounsell | Jun 2010 | A1 |
20100191651 | Irmscher et al. | Jul 2010 | A1 |
20100241857 | Okude et al. | Sep 2010 | A1 |
20110068906 | Shafer et al. | Mar 2011 | A1 |
20110074582 | Alexis | Mar 2011 | A1 |
20110084838 | Fawcett | Apr 2011 | A1 |
20110215060 | Niederhuefner | Sep 2011 | A1 |
20110254661 | Fawcett et al. | Oct 2011 | A1 |
20110279252 | Carter et al. | Nov 2011 | A1 |
20120019383 | Fawcett et al. | Jan 2012 | A1 |
20120038456 | Pikkarainen et al. | Feb 2012 | A1 |
20120077513 | Rizzello et al. | Mar 2012 | A1 |
20120126981 | Bawamia et al. | May 2012 | A1 |
20120192600 | Johnston et al. | Aug 2012 | A1 |
20120218109 | Tatsumi et al. | Aug 2012 | A1 |
20120268103 | Henson et al. | Oct 2012 | A1 |
20120293330 | Grant et al. | Nov 2012 | A1 |
20130029661 | Fong et al. | Jan 2013 | A1 |
20130029694 | Fong et al. | Jan 2013 | A1 |
20130106592 | Morgan et al. | May 2013 | A1 |
20130135803 | Johnson et al. | May 2013 | A1 |
20130154843 | Lan | Jun 2013 | A1 |
20130169434 | McCown et al. | Jul 2013 | A1 |
20130225127 | Cavacuiti et al. | Aug 2013 | A1 |
20130241731 | Fawcett et al. | Sep 2013 | A1 |
20130257616 | Taylor et al. | Oct 2013 | A1 |
20140073262 | Gutierrez et al. | Mar 2014 | A1 |
20140118145 | Wawrzyniak et al. | May 2014 | A1 |
20140173439 | Guiterrez et al. | Jun 2014 | A1 |
20140300467 | Ho | Oct 2014 | A1 |
20150009034 | Grant et al. | Jan 2015 | A1 |
20150091729 | Phillips et al. | Apr 2015 | A1 |
Number | Date | Country |
---|---|---|
1020070088852 | Aug 2007 | KR |
2011094676 | Aug 2011 | WO |
2012159102 | Nov 2012 | WO |
2013023091 | Feb 2013 | WO |
Entry |
---|
International Search Report and Written Opinion from corresponding International Application No. PCT/US2016/038927, dated Sep. 7, 2016 (10 pages). |
Extended European Search Report from related European Patent Application No. 14848491.8, dated Jul. 5, 2017 (8 pages). |
Alexandra Voyé-Piccoli, “The International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2012/038764 filed on May 21, 2012”, dated Oct. 31, 2012, 20 pages, European Patent Office, Rijswijk, Netherlands. |
Chris Griffith, “Light on the till—the future of shopping with Beacons and Bluetooth”, Sep. 26, 2013, pp. 1-3, The Australian, http://www.theaustralian.com.au. |
“Estimote Beacon is a tiny computer”, Oct. 2, 2013, pp. 1-7, Estimote, Inc., http://estimote.com. |
Simon Hay and Robert Harle, “Bluetooth Tracking without Discoverability”, University of Cambridge Computer Laboratory, Location and Contex Awareness, 2009, pp. 120-137. |
Masataka Kikawa, et al., “A Presence-detection Method using RSSI of a Bluetooth Device”, International Journal of Informatics Society, vol. 2, No. 1, 2010, pp. 23-31. |
Chuan-Chin Pu, et al., “Indoor Location Tracking using Received Signal Strength Indicator”, Engineering Communications for Wireless Sensor Networks, www.intechopen.com, 2011, pp. 229-256. |
Silke Feldmann, et al., “An indoor Bluetooth-based positioning system: concept, Implementation and experimental evaluation”, Institute of Communications Engineering, International Conference on Wireless Networks, 5 pages, 2003. |
Ana Zapater, et al., “Development and Implementation of a Bluetooth Networking Infrastructure for the a Notebook-University Scenario”, Institute of Communications Engineering, University of Hanover, 8 pages, 2003. |
Yapeng Wang, et al., “Bluetooth Indoor Positioning using RSSI and Least Square Estimation”, International Conference on Future Computer and Communications, 5 pages, 2010. |
Elaine R. Copenheaver, “Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US2014/057197 filed on Sep. 24, 2014”, dated Dec. 24, 2014, 10 pages, Commissioner for Patents, Alexandria, Virginia, USA. |
Number | Date | Country | |
---|---|---|---|
20180182216 A1 | Jun 2018 | US |
Number | Date | Country | |
---|---|---|---|
62184686 | Jun 2015 | US |