CN110007640B - Grading control system and control device for commodity safety - Google Patents

Grading control system and control device for commodity safety Download PDF

Info

Publication number
CN110007640B
CN110007640B CN201811491694.8A CN201811491694A CN110007640B CN 110007640 B CN110007640 B CN 110007640B CN 201811491694 A CN201811491694 A CN 201811491694A CN 110007640 B CN110007640 B CN 110007640B
Authority
CN
China
Prior art keywords
controller
monitoring device
monitoring
control
main controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811491694.8A
Other languages
Chinese (zh)
Other versions
CN110007640A (en
Inventor
陈斌峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Langhong Kechuang Technology Co Ltd
Original Assignee
Hangzhou Langze Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Langze Security Technology Co ltd filed Critical Hangzhou Langze Security Technology Co ltd
Priority to CN201811491694.8A priority Critical patent/CN110007640B/en
Publication of CN110007640A publication Critical patent/CN110007640A/en
Priority to US16/706,732 priority patent/US10916084B2/en
Priority to US16/706,741 priority patent/US10922912B2/en
Application granted granted Critical
Publication of CN110007640B publication Critical patent/CN110007640B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/048Monitoring; Safety

Abstract

The invention provides a hierarchical control system and a control device for commodity safety, which comprise at least two controllers and a plurality of monitoring devices, wherein each controller comprises at least one main controller and at least one auxiliary controller; the monitoring device has an identifiable communication interface capable of communicating with the controller, configured to be capable of communicating with the controller through the identifiable communication interface, and initialized by the controller with which it is in communication. The monitoring device initialized by the secondary controller can be controlled by the primary controller and the secondary controller initializing it. In the system, the controller can respectively control the monitoring devices in the set range according to different authority/level settings, the range controlled by the controller in the same system can be divided into different levels of control, the control of hierarchical and regional areas can be realized, and the hierarchy of management is reflected.

Description

Grading control system and control device for commodity safety
Technical Field
The invention relates to the field of commodity security, in particular to control systems in the field of commodity security, which can be used in retail or sales places with exhibited commodities, can effectively protect retail goods and exhibited commodities, prevent the commodities from being stolen or damaged, and can also have a certain protection effect.
Background
With the development of commodity experience type services, the display and experience functions of commodities are more opened to purchasers or potential purchasers, and meanwhile, the requirement on commodity safety is continuously increased. On the one hand, the various requirements of the experience person are met as much as possible, all functions of the commodity and the side which is the most good and convenient are displayed to the experience person as much as possible, on the other hand, the possible stealing behaviors of the person who is in good care are prevented, and the hidden danger that the commodity is possibly stolen in the displaying and experiencing process is reduced or even eliminated as much as possible.
At present, most commodity sales places with experience and display functions usually have a plurality of commodities, even commodities of different classifications, each commodity may be distributed to different shop staff for protection and management, in such a case, the managed store personnel may only be responsible for the goods within the jurisdiction, for goods in other jurisdictions, if the goods also have the same control authority, hidden danger may exist, for example, the controller of the adjacent cabinet can control the burglar alarm of the cabinet by communicating the adjacent cabinet with the controller of the cabinet, so that the salesperson of the adjacent cabinet is provided with great possibility and convenience to unlock the commodities of the adjacent cabinet by using the controller of the salesperson, thereby causing safety risk to the commodities of the adjacent cabinet/the cabinet, and in reality, theft in some markets is one of the biggest safety hazards, and therefore, authorities need to be set to the controller.
In the prior art, each controller is generally programmed once, so that each controller has a built-in security code (code), the security code is unique for each controller, when the controller needs to be controlled, the controller needs to perform code matching with the controller first, the controller can perform control/unlocking only if the code matching succeeds, the controller refuses to accept the failed code, the code matching is used as a prerequisite for control and control, and the control which is not performed is limited in a security code mode, so that the security is improved. However, this method is also a point-to-point mode, and a corresponding management chain for area management cannot be formed, which is obviously inconvenient in operation and use, and once the security code is written in, it is not possible to change, if the position of the commodity needs to be adjusted or the display area needs to be changed, a new set of controller system needs to be changed, or if a newly added commodity enters a certain area, under a good condition, the original security code can be written in the burglar alarm of the new commodity, and there may be a case that the code needs to be updated for the whole system, which is poor in expansibility and limited in application range.
Disclosure of Invention
The invention aims to solve the technical problem that the prior art provides a hierarchical control system for commodity safety, wherein a controller can respectively control monitoring devices in a set range according to different authority/level settings, the range controlled by the controller in the same system can be divided into different levels of control, hierarchical and regional control can be realized, and management hierarchy is reflected; in addition, in the system, the controller can initialize the monitoring device and supply power to the initialized monitoring device, so that the problem of power supply and data unification in the system is solved.
Therefore, the invention adopts the following technical scheme:
in a first aspect thereof, the present invention provides a hierarchical control system for merchandise security, comprising:
at least two controllers and a plurality of monitoring devices,
the controller comprises at least one main controller and at least one auxiliary controller;
the monitoring device has an identifiable communication interface capable of communicating with a controller, is configured to be capable of communicating with the controller through the identifiable communication interface, and is initialized by the controller with which it is in communication;
the monitoring device initialized by the auxiliary controller can be controlled by the main controller and the auxiliary controller for initializing the main controller;
the controller is configured to enable operations to lock, unlock, place in an operable state, and/or place in an inoperable state, the monitoring device.
The monitoring device is a security system, which controls and manages the goods to be protected against theft so that the goods to be protected against theft are in a safe or security considered state, and the controller can operate the monitoring device to lock or unlock the monitoring device (such as an article lock), or manage the state of the monitoring device, whether the monitoring device is operable or inoperable, and whether the latter is operable or inoperable, is the control of the monitoring device itself.
Further, the main controller is configured to have a control range not smaller than that of the subordinate controller, and in general, the control range of the main controller is larger than that of the subordinate controller, or, when there is only one controller, the main controller and the subordinate controller are the same, and their control ranges are the same; in some preferred modes, the main controller is often controlled by staff with a whole-store management level, such as a merchant supervisor or a store manager, at this time, the main controller can control all controllers of the whole sales/display place, and has the widest control authority, the auxiliary controller can be allocated to each area or each different brand or a certain type of goods, such as a mobile phone/notebook/tablet, so that the control authority of the auxiliary controller is limited to goods/exhibits placed in a certain area, or goods/exhibits of a certain brand, or goods of a certain type, and at this time, the control authority of the auxiliary controller is smaller than that of the main controller.
Further, the control range includes the number of controllable monitoring devices and/or the category of controllable monitoring devices. Since each sales location may be separately managed by different persons according to brands, regions or types of goods, controllers of different control levels are required. In some preferred modes, the control range refers to the range of the monitoring devices under control, such as the number of the monitoring devices, and for the main controller, the number of the monitoring devices which can be controlled is more than that of the monitoring devices which can be controlled by the auxiliary controller; or the type of monitoring device, the secondary controller may control a certain type of monitoring device, and the primary controller may control multiple types of monitoring devices. In some preferred modes, the control authority of the main controller in the same safety system is larger than that of the auxiliary controller.
Further, different secondary controllers are configured to have the same, different or partially same control range, as mentioned above, each secondary controller may control different ranges (regions, brands or categories), and of course, may control the same ranges, or the secondary controllers may perform cross control, in some preferred manners, the control range of the controller may be distinguished according to the monitoring device controlled by the controller or the arrangement of the commodities corresponding to the monitoring device in the sales place, for example, in some sales places, the arrangement of the commodities is classified according to the brand, the monitoring device for preventing burglary of the commodities may be classified according to the brand, some secondary controllers are used to control the monitoring devices corresponding to the commodities of different brands respectively, one or some primary controllers are used, all equipment or a plurality of brands in the place are controlled, and the function of hierarchical management can be achieved; in other preferred embodiments, the articles may be classified according to their types, and in some preferred embodiments, the same article may be covered by a plurality of different categories, for example, an article may belong to a brand and belong to a category of electronic products, in which case, there may be two categories of different secondary controllers capable of controlling the article, and therefore, the rights of the secondary controllers may be crossed and overlapped, and the anti-theft management of the article in the overlapped range may be shared by the two secondary controllers. In some preferred embodiments, this overlapping may be avoided or used as desired when the controllers are hierarchically arranged.
Further, each controller can independently control at least one monitoring device, the controller can communicate and control with at least one monitoring device, and the controller can also communicate and control a plurality of monitoring devices.
Further, the controller includes a power module configured to be connected to and receive power from an external power source, and the controller may be directly powered from the external power source, although it is not excluded that the controller may use a built-in power source or other external power source.
Further, the main controller is configured to be able to communicate with the terminal device and to be able to be set by the terminal device, and the main controller can set its control range and the auxiliary controllers within its range by the terminal device.
Further, the auxiliary controller is configured to be capable of communicating with the terminal device through the main controller and being capable of being set through the terminal device, in some preferred modes, the main controller is directly set through the terminal device, the auxiliary controller is connected with the terminal device through the main controller, and after the main controller is set, the terminal device can set the auxiliary controller within the range of the main controller.
Further, the controller is configured to have a power transmission module and to provide power to the monitoring device controlled by the controller, as mentioned above, the controller may be a built-in or external power source, in this case, for the whole hierarchical control system, the controller may be an internal power source, and power may be supplied to other devices, such as the monitoring device, through a power transmission module to realize internal power supply, so that the external power source is not needed for the monitoring device, and for the whole system, the number of external power sources may be omitted.
Under the situation, the invention provides a safety system, which can be configured with two controllers with different authorities, namely a main controller and an auxiliary controller, can control safety anti-theft equipment at different levels, each level can form an effectively controlled integral area, different levels can have a common upper level, and each different upper level can also form an effectively controlled integral area, thereby realizing a flexible multi-level control mode. In addition, the multilevel control of the invention is based on the authority of the controller, and does not place a security code or set the controlled authority for each controlled object, thus, for newly added commodities or changed areas, the integral authority change is not needed, the controlled object can be allowed to be added or deleted at any time, the operability and the expansibility are very strong, and the application range is wide.
In a second aspect of the present invention, there is provided a hierarchical control apparatus for merchandise security, comprising at least one main controller and at least one auxiliary controller,
the main controller is configured to be capable of communicating with the monitoring device, initializing the monitoring device, and controlling the monitoring device initialized by the main controller;
the auxiliary controller is configured to be capable of communicating with the monitoring device, initializing the monitoring device, and controlling the monitoring device initialized by the auxiliary controller;
the primary controller is configured to have a control range greater than the secondary controller.
Under the condition, the invention provides a control device which can be configured in a set in a system, at least two control devices are arranged in the set, and different control devices have different control ranges, so that a system control layout with authority and hierarchy is formed, and the control of the system is safer and more reliable.
In a third aspect of the present invention, a touch control system for preventing theft of a commodity includes:
a controller and a monitoring device, wherein the controller is connected with the monitoring device,
the monitoring device has an identifiable communication interface capable of communicating with a controller, is configured to be capable of communicating with the controller through the identifiable communication interface, and is initialized by the controller with which it is in communication;
the controller further comprises a touch communication interface for communicating with the monitoring device, and is configured to be capable of controlling the monitoring device initialized by the touch communication interface;
the control includes operations to lock, unlock, place in an operable state, and/or place in an inoperable state.
Further, the identifiable communication interface is a wireless communication interface. In some preferred modes, the monitoring device is initialized in a wireless manner.
Further, the touch communication interface is a wired communication interface. In some preferred forms, the monitoring device is controlled by wire. In some preferred modes, the monitoring device initialized in a wireless mode can be controlled in a wired mode, and the wired mode can be electrical contact formed by touch or signal transmission.
Further, the touch-sensitive communication interface is configured to enable communication by non-directional contact of an outer surface or a portion of an outer surface. In some preferred forms, the touch-sensitive communication interface is configured to have a surface for touching, the surface being exposed to the exterior of the controller, and when the surface is in contact, the surface can form an electrical or signal connection. In some preferred embodiments, non-directional contact means that such communication requires only surface contact, and does not require rotation to a suitable direction. In some preferred forms, the touch-sensitive communication interfaces on the controller and the monitoring device may be of matching shapes, for example one projecting outwardly and one recessed inwardly, to facilitate alignment of the two. Of course, such recesses or protrusions may be interchangeable, for example recesses on the controller, protrusions on the monitoring device, or vice versa.
Further, the touch-sensitive communication interface comprises at least two contact points. In some preferred forms, the two contacts can be brought into and out of a loop, in some preferred forms the loop is a signal loop, in some preferred forms the loop is an electrical loop, and in some preferred forms the loop is a combination of a signal loop and an electrical loop. In some preferred forms, further contact points may be included. In some preferred forms, the contact point is merely a representation that, in fact, the area of contact is not merely a range of points, and may be a fraction of the area or a small fraction of the area, sufficient to form a communication.
Further, at least one of the two contact points is an annular or circular contact point. In some preferred forms one of the two contact points is a circular contact point, which has the advantage that communication can be achieved without rotation, regardless of the direction in which the contact is made. In some preferred forms, at least one of the two contact points is a circular contact point, and the circular contact point may be complementary to the annular contact point, for example, a circular shape sleeved inside the annular shape.
Further, the controller is configured to be able to supply power to the monitoring device via the touch-sensitive communication interface. As mentioned above, the controller may be a built-in or external power source, in this case, for the whole touch control system, the controller may be an internal power source, and the power transmission module may transmit power to other devices, such as the monitoring device, to realize internal power supply, so that the monitoring device does not need an external power source, and when the controller and the monitoring device are in contact, the monitoring device is directly powered, and for the whole system, the number of external power sources may be omitted.
Further, the controller also includes logic control circuitry configured to establish a power and/or communication connection between the power supply module and the secure communication interface and/or the terminal communication interface.
Further, the touch communication interface comprises at least one identification circuit for identifying the monitoring device. In some preferred modes, the identification circuit is used for matching with the monitoring device, for example, after communication is established, the identification circuit sends matching information to the monitoring device, and the monitoring device capable of matching (for example, an initialized device) can identify the matching information.
Further, the monitoring device comprises at least one characteristic circuit which can be recognized by the recognition circuit. In some preferred manners, the monitoring device is matched with the identification circuit in the controller through the characteristic circuit, that is, the matching process is the process of identifying the characteristic circuit in the monitoring device by the identification circuit in the controller.
Further, the controller is configured to be capable of communicating with the terminal device and capable of being set by the terminal device. For the controller, the controller may be connected to a terminal device, such as a mobile phone or other intelligent devices, through a certain communication mode, such as WIFI, bluetooth, and the like, and after the connection is established, the controller may be set through an application on the terminal device, for example, the controller is set to be in an on or off state, or a control range of the controller is selected, for example, the controller may be set to control a certain brand of goods.
Under the condition, the controller can identify and control the monitoring device in a touch mode, even supply power, the touch mode is simple and convenient to use, the touch of the controller is non-directional surface contact, direction adjustment is not needed, the controller can operate by position alignment, and interfaces matched with each other are designed for convenience in alignment. In addition, the invention can also supply power to the monitoring device which is successfully matched through the controller, thereby reducing the number of external power supplies and ensuring that the system layout is more reasonable and concise.
In a fourth aspect of the present invention, there is provided a touch control device for merchandise theft prevention, comprising:
the controller comprises at least one controller, a first communication interface and a second communication interface, wherein the controller is configured to be provided with a touch communication interface, is configured to be capable of identifying and initializing a monitoring device through the touch communication interface, and controls the initialized monitoring device; the touch-sensitive communication interface is configured to enable communication by non-directional contact of an outer surface or a portion of an outer surface.
In a fifth aspect of the present invention, there is provided a touch control device for merchandise theft prevention, comprising:
at least one controller configured to have a touch communication interface, and configured to identify and initialize a monitoring device through the touch communication interface, and to supply power to the initialized monitoring device: the touch-sensitive communication interface is configured to enable communication by non-directional contact of an outer surface or a portion of an outer surface.
In a sixth aspect of the present invention, the present invention provides a touch type monitoring device for merchandise theft prevention, comprising:
a touch-sensitive communication interface configured to be identifiable and/or initiatable by a controller through the touch-sensitive communication interface; the touch-sensitive communication interface is configured to enable communication by non-directional contact of an outer surface or a portion of an outer surface.
In a seventh aspect of the present invention, the present invention provides a touch type monitoring device for merchandise theft prevention, including:
a touch-sensitive communication interface configured to be identifiable and/or controllable by a controller via the touch-sensitive communication interface, the touch-sensitive communication interface being configured to enable communication via non-directional contact of an outer surface or a portion of the outer surface; the control includes operations to lock, unlock, place in an operable state, and/or place in an inoperable state.
The invention has the beneficial effects that:
(1) the invention is provided with two controllers with different authorities, namely a main controller and an auxiliary controller, can control the safety anti-theft equipment at different levels, each level can form an effectively controlled integral area, different levels can have a common upper level, and each different upper level can also form an effectively controlled integral area, thereby realizing a flexible multi-level control mode.
(2) The multi-level control of the invention is based on the authority setting of the controller, and does not place a security code or set the controlled authority for each controlled object, thus, for newly added commodities or changed areas, the integral authority change is not needed, the controlled object can be allowed to be added or deleted at any time, the operability and expansibility are very strong, and the application range is wide.
(3) The controller can be connected with an external power supply in a direct or indirect mode, the power can be supplied to the inside of the controller, meanwhile, the power can be supplied to the monitoring device controlled by the controller, the monitoring device can be configured to be directly supplied with power by the controller without an external power supply, the use of the external power supply and an adapter is reduced, the integral structure of the anti-theft system is more compact, and the combination of the components is tighter.
(4) The invention is provided with a monitoring device, the monitoring device not only executes some functions of the existing anti-theft equipment, for example, the alarm can receive the safety signal of the sensor and alarm, but also has other functional modules, for example, a detection module, the detection module can detect whether the sensor sends the safety signal; the sensing module can sense whether the commodity is experienced (picked up and/or put down); the control module receives a control signal and an initialization signal of the controller; a communication interface for communicating with other devices; in addition, the monitoring device further comprises a memory, the memory can record events related to the received information of the modules for the acquisition equipment to call at any time, and the acquisition equipment can upload the information of the monitoring device to the cloud server through connection with the cloud equipment, so that a basis is provided for big data of the security system.
(5) The controller can be connected with the terminal equipment, the terminal equipment is used for controlling and setting, the terminal equipment only needs to be connected with the controller, and each monitoring device does not need to be set respectively, so that the operation is convenient and fast, the use is convenient, in addition, the main controller is directly set by the terminal equipment, and the auxiliary controller is set by the main controller, so that the clear authority is ensured on one hand, and the communication safety in the system is ensured on the other hand.
(6) Under the condition, the controller can identify and control the monitoring device in a touch mode, even supply power, the touch mode is simple and convenient to use, the touch of the controller is non-directional surface contact, direction adjustment is not needed, the controller can operate by position alignment, and interfaces matched with each other are designed for convenience in alignment. In addition, the invention can also supply power to the monitoring device which is successfully matched through the controller, thereby reducing the number of external power supplies and ensuring that the system layout is more reasonable and concise.
Drawings
FIG. 1 is a schematic diagram of the hierarchical control system of the present invention.
Fig. 2 is a block diagram of the controller of the present invention.
Fig. 3 is an internal structural view of the controller of the present invention.
Fig. 4 is a cross-sectional view of the controller of the present invention.
Fig. 5 is a diagram of one electrical connection of the controller of the present invention.
Fig. 6 is a schematic diagram of a connector for one electrical connection of the controller of the present invention.
Fig. 7 is a schematic diagram of a controller of the present invention.
Fig. 8 is a schematic diagram of another controller of the present invention.
Fig. 9 is a schematic diagram of a monitoring device of the present invention.
Fig. 10 is a control pattern diagram of the controller of the present invention.
Fig. 11 is a schematic diagram of a connection mode of the controller and the terminal device of the present invention.
Fig. 12 is a schematic diagram of the setting of the controller in the terminal device of the present invention.
Fig. 13 is a schematic diagram of an electrical connection of the controller of the present invention.
Fig. 14 is a schematic diagram of the controller of the present invention charging a monitoring device.
Fig. 15 is a schematic view of the monitoring device of the present invention applied to a commercial product.
Fig. 16 is a schematic view of the monitoring device of the present invention applied to another commercial product.
Fig. 17 is a schematic diagram of the controller managing/controlling the monitoring device in the application commodity of fig. 16.
FIG. 18 is a schematic of the hierarchical control of the present invention.
Fig. 19 is a schematic view of the monitoring and sensing of the present invention.
Fig. 20 is a process flow diagram of the monitoring device of the present invention.
Fig. 21 is a schematic diagram illustrating the determination of the normal state and the abnormal state by the monitoring circuit.
Fig. 22 is a graph of steady state sample frequency and normal distribution.
Fig. 23 is a graph showing the frequency of sampling values in an unstable state and a normal distribution.
FIG. 24 is a graph comparing the frequency of steady state and non-steady state samples with a normal distribution curve.
FIG. 25 is a flow chart of system ID generation in the present invention.
Fig. 26 is a flowchart of channel number generation in the present invention.
Fig. 27 is a flowchart of address code generation in the controller.
Fig. 28 is a diagram of the communication scheme of M2M between the controller and the security device.
Fig. 29 is a schematic diagram of system broadcast communication between a controller and a security device.
Fig. 30 is a schematic diagram of rights broadcast communication between a controller and a secure device.
Fig. 31 is a structural diagram of the system identification code of the present invention.
Fig. 32 is a diagram illustrating a packet format according to the present invention.
Fig. 33 is a schematic format diagram of the payload of the present invention.
Fig. 34 is an exemplary diagram of communication address setting in the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in conjunction with the accompanying drawings, and it should be noted that the embodiments are merely illustrative of the present invention and should not be construed as limiting the present invention.
First, technical terms related to the present invention are explained with reference to examples, and the terms are explained to enable those skilled in the art to more accurately understand the technical solution of the present invention, and are not construed as limiting the scope of the present invention.
Commodity security
The commodity safety referred in the invention can be used in some commodities that need to be functionally displayed to a buyer or a potential buyer, such as electronic products, some functions of these commodities need to be known by a user in a use situation, these commodities usually have some man-machine interactive interfaces, a displayed person can contact and exemplarily or exponentively use all or part of the functions of these commodities in a certain range, so as to know the performance of the commodities, in the industry, this commodity with functional display requirement is sometimes referred to as a commodity with experience requirement, i.e. the displayed person can operate and experience the commodities displayed in a limited condition and range, therefore, these commodities can be directly contacted by an experiencer, the experiencer can be in a limited range by a seller or a commodity owner, for example, the articles can not be taken out of the sales site, and due to the ownership of the displayed articles, the articles belong to the seller or the article holder, so that the articles need to be taken out of the sales site, and the anti-theft measures do not limit the use of the experience and only limit the experience to be taken out of the sales site, and even in some cases, the anti-theft measures need to consider not to obstruct the use of the experience as much as possible, so that the experience can be better used, which is different from the carry-on anti-theft of articles in the mass sales. The commodity safety in the invention can also be used in some ways which do not need experience and are only displayed or sold, such as the hanging rack shown in fig. 15, and can also be covered by the commodity safety in the invention, and in addition, the commodity safety in the invention can also comprise fields which do not need experience or display, such as the storage field of commodities, such as the cabinet body shown in fig. 16-17, wherein if the commodities are stored, the commodities can also be the objects covered by the commodity safety lock in the invention. The anti-theft devices are not provided with a commodity lock on the commodity, but can be used for preventing the commodity from being stolen in a mode of integral layout and remote or close unlocking through some controllable anti-theft systems or anti-theft devices, and in a certain sense, the anti-theft device can be an in-site anti-theft concept.
Sensor with a sensor element
The sensor is usually used for sensing a certain signal or sensing a certain state, the sensor in the invention is specially used for the theft prevention of the commodities, namely the displayed commodities, the sensor in the invention can be an induction line, also can be a device with an induction element, and also can be an element with an induction function integrated on a charging interface or an adapter or a theft prevention host, and the function of the sensor is that the sensor can sense the signal and judge whether the displayed commodities are in a safe state or not through the signal. In the present invention, the sensor may be attached to the article of merchandise. In some preferred embodiments, the sensor may be placed on the monitoring device 400 together with the product, and when the sensor is not detached from the product but is detached from the monitoring device 400, the product may be considered to be in a picked-up state, but since the sensor is not detached from the product, the product may still be considered to be in a safe state, in which case, in some preferred embodiments, the product may be judged to be in an experienced state.
Safe/non-safe states
The state of security or non-security in the present invention refers to the state of the displayed merchandise, especially refers to the state of the relationship between the displayed merchandise and the anti-theft device when the anti-theft device is installed, generally speaking, the merchandise is in the state that we believe it will not be stolen, called the security state, we believe it is possible to be stolen, called the non-security state, whether the anti-theft measure is intact, whether the displayed merchandise is under the protection of the anti-theft measure, if it is, we consider it is the security state, if it is not, we consider it is the non-security state, that is, this security or non-security state may be relative to the anti-theft measure, for example, the anti-theft measure is to keep the displayed merchandise connected with the charging interface all the time, then the sensor detects the charging interface, whether it is connected with the merchandise all the time, if it is, the state is in a safe state, and if the connection is disconnected, the state is in a non-safe state; or if the anti-theft measure is to keep the commodity in a charging state all the time, the sensor detects whether the charging cable of the commodity keeps power transmission, if so, the charging cable is in a safe state, and if not, the charging cable is in a non-safe state; or, if the anti-theft measure is that the commodity is clamped by the clamping device, the sensor detects whether the commodity is in the clamping space or whether the commodity is in contact with or installed on the clamping device, if so, the commodity is in a safe state, and if not, the commodity is in a non-safe state; and so on.
Unauthorized removal
In the present invention, non-authorization is relative to authorization, since in the field of merchandise security, there are two ways of locking and unlocking, it should generally be in a locked state during the time the merchandise is being displayed, in which state the merchandise is not stolen, in addition to theft, however, it is possible that an item may be actively removed from the anti-theft device by the merchant, for example, when an item has been released from the market and is no longer sold, the corresponding exhibit is also taken down, which involves the replacement of the goods, or when the exhibit has quality problems, which require maintenance, and may also need to be removed from the anti-theft device, when the displayed merchandise is replaced or repaired, the merchandise may be removed from the anti-theft device by a staff (merchant) with authority, such removal is referred to as removal with authorization, whereas removal is considered unauthorized.
Security signal
Security signals are also a well-known concept in the field of merchandise security, and when merchandise is in an unsecured state, some components in the merchandise security system will send out security signals, and the security signals may be a sensing signal or an electrical signal or a digital signal, which can be triggered by many methods/events in the prior art, for example, the event may be physical connection disconnection or circuit disconnection, the triggering method may be sensing by the sensing component, the sensing signal is transmitted to the corresponding device, the corresponding device can send out security signals according to the most basic logic judgment (yes/no) after receiving the sensing signal, in the field of merchandise security, the general triggering method may be disconnection, disconnection charging, detachment from some installed component, or destruction in a certain set manner, may trigger the generation of a security signal, which is conventional in the art.
Cable with a flexible connection
The cable is a concept of connection and/or transmission in the present invention, in some cases, the cable may be a purely mechanical connection, connecting two objects, in some cases, power transmission (strong current) may be provided in the cable, power connection may be established for two parties connected by the cable, one party may provide power to the other party, or both parties may have power to transmit each other, in some cases, data transmission (including weak current) may be provided in the cable, power and data connection may be provided for two parties connected by the cable simultaneously, one party may provide power to the other party or transmit data signals, or both parties may have power and data signals to transmit each other, in some cases, a power transmission line in the cable may be used as an inductive loop, i.e. a determining factor for detecting whether the cable is on or off, for example, when power transmission is provided in the cable, the sensing loop can be considered to be smooth, the cable is in a normal connection state, at the moment, if the cable is connected with the commodity and the anti-theft host machine, the commodity can be considered to be in a safe state, or when signals are transmitted in the cable, the sensing loop can also be considered to be smooth, the cable is in a normal connection state, at the moment, if the cable is connected with the commodity and the anti-theft host machine, the commodity can be considered to be in a safe state, under the condition, the cable can play a sensing role and equivalently play a part of a sensor, and the cable at the moment can be used as a part of the sensor.
Terminal device
In a general sense, a terminal device refers to an electronic device that inputs or outputs to other devices via a communication facility. The terminal equipment is usually set in a convenient place where it can be connected with remote computer by means of communication equipment, and is mainly formed from communication interface control device and special-purpose or selected input and output device.
In the present invention, the terminal device may have an operation interface capable of performing human-computer interactive control, which is convenient for a user to set and operate, and in other preferred modes, the terminal device may also take the form of a control button. Software can be installed in the terminal equipment to start and close the controller and set a control area. For example, as shown in fig. 12, a connected/communicable controller is displayed on a display screen of a terminal device, and the controller connected to the terminal device can be set by the terminal device, for example, on a control interface shown in fig. 12, a main controller a and a plurality of auxiliary controllers B1, B2, B3, B4, and B5 are set in total, wherein the auxiliary controllers B2 and B3 are in a closed state, and the other controllers are in an open state. In some preferred modes, the control range of the controller can be set. In some preferred manners, after the terminal device 300 is connected to the controller 100, the monitoring apparatus 400 may be partially controlled through an interface of the terminal device 300, for example, the alarm volume in the monitoring apparatus may be controlled, and the alarm volume of the monitoring apparatus 400 may be adjusted through an operation interface of the terminal device.
Controller
In the field of commodity security, the controller is unlocking device to some extent, when anti-theft equipment such as an alarm gives an alarm, the alarm can be closed through the controller to stop alarming, and the controller is a function of the controller. Most controllers can function as both an unlock and a switch. In the present invention, the controller may not only include some of the above functions, but also have some other functions, for example, in some embodiments, the controller may include a power module, and the power module may receive external charging, as shown in fig. 13, which is a charging mode of the controller in the present invention, and may be connected to the interface of the controller through a power adapter. In some preferred modes, the controller can also comprise a module for supplying power to the outside, and the module supplies the power to the monitoring device controlled by the module. In some preferred modes, the power supply of the controller can be realized by the form of an electric contact or by the mode of wireless charging, which are optional modes of the present invention, but the present invention is not limited to which mode the controller supplies power, but the controller provided by the present invention can include a function of supplying power, and in some preferred modes, the controller can be provided with a power conversion or power control module, and the power conversion and power control module converts the externally input electric energy into the electric energy which can be used inside the controller, or uses the converted electric energy to supply power to the monitoring device controlled by the controller. As shown in fig. 14 and 17, the controller may be electrically connected to the monitoring device by electrical contacts that contact mating electrical contacts on the monitoring device to power the monitoring device. In other preferred modes, the controller can also supply power to the monitoring device in a wireless charging mode, so that the monitoring device does not need to be connected with an external power supply.
The controller may be a hardware device, for example, in the form shown in fig. 2, and the controller 100 may be provided with at least one button 101, and the button 101 may be used to turn on or off the controller 100 itself, and may also be used to turn on or off the control of the monitoring device by the controller 100. In some preferred manners, the controller 100 may further have a charging interface 102, as shown in fig. 13, power can be supplied to the controller through the power adapter 200, the power adapter 200 may be connected to a cable 201, and the cable 201 is connected to the charging interface 102 of the controller 100 through a power supply interface 202 to supply power to the controller. In some preferred manners, the charging interface 102 may also serve as a data interface for the controller to communicate with the outside. In some preferred modes, a pull ring or a hanging ring 103 can be further arranged on the controller 100, a nesting part 104 capable of allowing the hanging ring 103 to be arranged on the controller 100, and the hanging ring 103 can rotate in the nesting part 104.
In some preferred forms, the controller 100 may have one electrical connector 105, and the electrical connector 105 may include at least two electrical contacts 1051 and 1052. In some preferred embodiments, as shown in fig. 6, electrical contact 1051 is a circular portion in the middle, and can be used as a positive electrode portion, and electrical contact 1052 is a circular portion at the periphery of electrical contact 1051, and can be used as a negative electrode portion, although the positive and negative electrodes may be interchanged; also can set up corresponding electrical contact on the monitoring device, two electrical contact 1051 and 1052 can contact with the electrical contact who corresponds on the monitoring device respectively and realize the electricity and be connected, thereby put through power supply circuit, realize controller 100 to monitoring device's power supply, the benefit of adopting ring and circular as electrical contact is, need not go the position to electrical contact on the circumference, as long as find the electrical contact who matches on the monitoring device, if punctiform or banding, after having found the electrical contact, probably still need rotation controller 100 can realize the matching of electricity connection. In some preferred forms, the electrical connector 105 may be disposed at one end of the controller 100, for example, the end opposite the suspension loop 103, for ease of operation. In some preferred forms, the controller 100 may also be provided with a square shape, which may further facilitate the alignment of the positions. In some preferred forms, the electrical contacts may take other shapes or be located elsewhere on the controller.
Fig. 14 and 17 show a manner in which the controller 100 performs contact charging to the monitoring apparatus 400. In fig. 14, the article of merchandise 500 is a cell phone and the monitoring device 400 is a security base electrically connected to or supporting the cell phone, the security base having electrical contacts 401 for mating with the electrical contacts 105 of the controller. In some preferred forms, the electrical contact 401 is recessed to facilitate mating and alignment of the electrical contacts 105, and in some preferred forms, the electrical connection is made by merely aligning the electrical contacts 105 with the electrical contact 401, as previously described, due to the annular electrical contacts 1051 and 1052. Fig. 16-17 illustrate another application of the controller 100, in the scenario illustrated in fig. 16-17, where the controller 100 is implemented on a merchandiser and the monitoring device 400 is a lock of the merchandiser, and likewise the lock is provided with an electrical contact 401 that cooperates with the electrical connector 105 of the controller to enable power, unlock and other control of the lock by way of electrical contact. In the scenario shown in fig. 14, unlocking and control may also be performed by means of contact.
In other preferred forms, as shown in fig. 2-3, the controller 100 may include at least two housings 106 that fit together, with the housings 106 enclosing the other components of the controller 100. In other preferred forms, a logic control circuit board 107 is provided within the controller 100, and the electrical connector 105 may be electrically connected to the logic control circuit board 107. In other preferred manners, an energy storage module 108 for storing electric energy may be further disposed in the controller 100, and the energy storage module 108 may also be electrically connected to the logic control circuit board 107. In some preferred manners, charging interface 102 and logic control circuit board 107 are electrically connected, and electric power accessed from charging interface 102 is transmitted to energy storage module 108 and electric connector 105 via logic control circuit board 107. In some preferred embodiments, the energy storage module 108 may not be provided, in which case the controller 100 must be always powered. In some preferred forms, the electrical connector 105 may be secured to the controller 100 by a fastener 109.
Fig. 8 is a schematic diagram of a controller of the present invention, and the controller of fig. 8 can implement the power supply control. As shown in fig. 8, the controller 100 includes a first power module a102 for connecting and receiving an external power, and the first power module a102 is configured to convert the external power into the controller power. In some preferred ways, the first power module a102 may be connected to the power adapter 200. In some preferred manners, the controller 100 further includes a secure communication interface a103 for communicating with the monitoring apparatus 400, and is configured to be able to communicate with the monitoring apparatus 400 through the secure communication interface a103 and/or to supply power to the monitoring apparatus 400 capable of establishing communication. In some preferred manners, the controller 100 further includes a logic control circuit a104 configured to establish power connection and communication for the first power module a102 and the secure communication interface a 103. In some preferred modes, the secure communication interface a103 isWired Or wireless communicationAnd (4) a signal interface.
In some preferred manners, the secure communication interface a103 includes at least one identification circuit a1031 configured to connect the logic control circuit a104 and the monitoring apparatus 400 respectively and identify the monitoring apparatus 400. In some preferred manners, the monitoring apparatus 400 includes at least one feature circuit 4021 that can be identified by the identification circuit, and the identification circuit a1031 and the feature circuit 4021 perform feature matching to identify them, and if the feature matching is successful, the monitoring apparatus 400 may receive management and power supply of the controller 100, considering that the identification is successful.
In some preferred manners, the secure communication interface a103 includes at least one power control circuit a1032 configured to connect the logic control circuit a104 and the monitoring apparatus 400 respectively and capable of providing power to the monitoring apparatus 400. In some preferred forms, the monitoring device 400 includes at least one second power module 4022 capable of receiving and supplying power internally.
In some preferred manners, the secure communication interface a103 includes at least one communication circuit a1033 configured to be connected to the logic control circuit a104 and the recognizable communication interface 402 of the monitoring apparatus 400, respectively, for establishing a communication connection between the controller 100 and the monitoring apparatus 400. In some preferred ways, the communication interface 402 may include a communication circuit 4023 of the monitoring apparatus, and the communication circuit 4023 may be connected to a communication circuit a1033 in the secure communication interface a103 of the controller 100 to communicate therewith.
In some preferred manners, the monitoring device 400 may further include a logic control circuit 403 of the monitoring device and an operating device 404. In some preferred forms, the operating device 404 may be a device that is used directly for alarming or theft prevention, such as an alarm. In some preferred forms, the communication interface 402 of the monitoring device is connected to the operating device 404 via the logic control circuit 403 of the monitoring device, so as to supply power, control and manage the operating device 404, for example, to control an alarm, as described above.
Main controller and auxiliary controller
The invention adopts a hierarchical control mode to manage the whole commodity safety system or the commodity safety system in a certain area, and the hierarchical control mode brings that the hierarchy difference may exist, and in some preferred modes, the hierarchy difference can be realized by classifying the controllers. The main controller and the auxiliary controller are a classification method for the controllers. The main controller is a controller with a higher management level, and can control and manage the monitoring devices in a larger range as described in the above paragraph, and the auxiliary controller is a controller with a lower level, and can control and manage the monitoring devices in a smaller range as described in the above paragraph with respect to the main controller. In some preferred modes, the main controller is configured to have a control range not smaller than that of the auxiliary controller, and in general, the control range of the main controller is larger than that of the auxiliary controller, or when there is only one controller, the main controller and the auxiliary controller are the same, and the control ranges are the same; in some preferred modes, the main controller is often controlled by staff with a whole-store management level, such as a merchant manager or a store manager, at this time, the main controller can control all controllers of the whole sales/display place, and has the widest control authority, the auxiliary controller can be allocated to each area or each different brand or a certain type of goods, such as a mobile phone/notebook/tablet, then the control authority of the auxiliary controller is limited to the goods/exhibits placed in a certain area, or the goods/exhibits of a certain brand, or a certain type of goods, at this time, the control authority of the auxiliary controller is smaller than that of the main controller, because each sales place may be managed in a partition mode according to the brand, the area or the type of goods, the management is performed by different persons, and controllers with different control levels are needed.
For example, fig. 10 shows a manner of hierarchical management, as shown in fig. 10, within a certain control range, there may be one main controller a, a plurality of sub-controllers B1, B2, C1, C2, and a plurality of monitoring devices 1-11, wherein, the main controller A can respectively and independently control all the monitoring devices 1-11, the auxiliary controllers can have the same or different control authorities, for example, the auxiliary controllers B1 and B2, which have the same control authority, can independently control the monitoring devices 1-5, this approach may be useful when an area requires more than one administrator to manage, for example, two shop assistants are arranged in an exhibition area of a certain brand, the two shop assistants can respectively hold auxiliary controllers B1 and B2, and the shop owner holds a main controller A, so that multi-level control is realized; the auxiliary controllers C1 and C2 have different control authority, the auxiliary controller C1 can control the monitoring devices 6-8 independently and the auxiliary controller C2 can control the monitoring devices 9-11 independently, in this way, the auxiliary controllers C1 and C2 may correspond to two separately managed areas, for example, two brands, which are managed separately, in this case, the auxiliary controllers with completely different authority can be used, the store manager still holds the main controller a, and multi-level control is realized.
As another example, fig. 18 shows another hierarchical management manner, one controller a may be disposed in the largest range, the controller a may control all monitoring devices in the range shown in fig. 18, the user C of the controller a may be a manager having the highest authority in the range, such as a store leader, and correspondingly, there may be one or more controllers in a small range, such as the scenario shown in fig. 18, having two controllers B1 and B2 in a small range, the controllers B1 and B2 respectively control a portion of the area, the area of the portion may be a portion of the range controlled by the controller a, the ranges controlled by the controllers B1 and B2 may be overlapping portions, i.e., completely independent portions, the ranges shown in fig. 18 are completely independent portions, the controllers B1 and B2 respectively control an area, in this manner, controllers B1 and B2 have independent control rights to the respective zones. In other approaches, controllers B1 and B2 may have zones of cross control.
Fig. 7 is a schematic diagram of a controller of the present invention, and the controller in fig. 7 can implement the hierarchical control, as shown in fig. 7, the controller 100 includes a first power module a102 for connecting and receiving an external power supply, and the first power module a102 is configured to convert the external power supply into the controller power supply. In some preferred ways, the first power module a102 may be connected to the power adapter 200. In some preferred manners, the controller 100 further includes a secure communication interface a103 for communicating with the monitoring apparatus 400, and is configured to be able to communicate with the monitoring apparatus 400 through the secure communication interface a103 and/or to supply power to the monitoring apparatus 400 capable of establishing communication. In some preferred manners, the controller 100 further includes a logic control circuit a104 configured to establish power connection and communication for the first power module a102 and the secure communication interface a 103. In some preferred modes, the secure communication interface a103 isWired Or wireless communicationAnd (4) a signal interface. In some preferred ways, the secure communication interface a103 is an electrical contact. In some preferred manners, the controller 100 shown in fig. 7 may be connected to one or more monitoring devices through the secure communication interface a103, and when the controller 100 in fig. 7 controls different ranges respectivelyThe apparatus 400 may be monitored to form a main controller and/or an auxiliary controller, thereby implementing hierarchical control.
In some preferred manners, the controller shown in fig. 7 has a terminal communication interface a101 capable of communicating with the terminal device 300, is configured to be capable of communicating with the terminal device 300 through the terminal communication interface a101, and is capable of setting through the terminal device 300, and the setting may include settings such as access, on, off, and control range. In some preferred manners, the terminal communication interface a101 may be a wireless communication interface, and the wireless communication interface may include two modes, namely bluetooth and WIFI.
In some preferred modes, if the terminal communication interface a101 is a bluetooth interface, then in the bluetooth mode, the controller 100 is a slave device, and the terminal device 300 is a master device, so that one terminal device 300 can establish connection with a plurality of controllers 100. In some preferred forms, the controller 100 may include a main controller and a sub-controller. As shown in fig. 12, in some preferred manners, the controller 100 after the connection is established may be displayed on the interactive interface of the terminal device 300 for control. If the terminal communication interface a101 is a WIFI interface, in the WIFI mode, one terminal device 300 may establish a connection with multiple controllers 100 through a wireless network. In some preferred forms, the controller 100 may include a main controller and a sub-controller. In some preferred modes, the main controller is directly connected with the terminal device 300, and the auxiliary controller is connected with and set in the terminal device through the main controller, and in some preferred modes, the main controller is set in the terminal device 300, and then the auxiliary controller is set in the setting range of the main controller through the terminal device 300.
Monitoring device
The monitoring device is a device provided for safety as the name implies. In the present invention, the monitoring device 400 is mainly some devices used in the field of merchandise security, which can play a certain role in merchandise security, or play a certain role in a certain link of merchandise security, such as an alarm, wherein when the merchandise is in an unsafe state or is considered to be in an unsafe state, the alarm can give an alarm sound or sound and light prompt and other alarm signals; as another example, the sensor may be used to sense whether the merchandise is in a safe state; for another example, the locking device of the article may directly act on the article to restrict it to a state considered safe. In summary, the monitoring device is a security system that controls, manages and the like the article to be protected from theft so that the article to be protected from theft is in a safe or security considered state, and the controller can operate the monitoring device to lock or unlock the monitoring device (e.g., article lock), or manage the state of the monitoring device, whether operable or inoperable, and whether operable or inoperable later, is the control of the monitoring device itself.
Fig. 9 provides a schematic diagram of the internal structure of a typical monitoring device. In some preferred forms, the monitoring device 400 may include a base upon which the sensor 600 and/or the merchandise may be placed, possibly with the merchandise in an experienced state (picked up by the experiencer) when the sensor 600 and/or the merchandise are removed from the base, the sensor 600 being configured to be directly or indirectly attached and/or affixed to the merchandise, and being operatively placed and/or mounted on the monitoring device, for example, being picked up and put down from the monitoring device. In some preferred manners, if it is satisfied that the connection between the sensor 600 and the article is not cut, but at the same time the sensor 600 and/or the article is off the base of the monitoring device 400, it may be determined that the article is in an experienced state.
Fig. 14-15 illustrate two exemplary implementations of a monitoring device. In some preferred manners, the monitoring device 400 includes a charging interface, and in case that the monitoring device 400 can receive the charging of the controller 100, it can also supply power to the goods loaded on it, for example, as shown in fig. 14, the monitoring device 400 includes a lighting connector or a mobile phone type c connector capable of supplying power to the mobile phone. In some preferred embodiments, the monitoring device 400 may be a padlock, and in this case, the merchandise 500 carried by the monitoring device 400 may be an accessory with a hanging interface, such as a mobile phone shell, a mobile phone film, and the like. In some preferred forms, as shown in fig. 15, the monitoring device 400 has an electrical connector 407 that mates with the electrical connector 105 of the controller, and the monitoring device 400 can be controlled, managed, and powered by the controller 100 through the electrical connector 407. In some preferred forms, the mating of the electrical connector 407 and the electrical connector 105 is an electrical contact mating to make an electrical connection.
Fig. 9 is a schematic structural diagram of the monitoring apparatus of the present invention, and as shown in the figure, the monitoring apparatus 400 includes a monitoring circuit 401, which is configured to receive a sampling value and perform an operation on the sampling value, so as to determine whether a monitored object is in a normal state, an abnormal state, a stable state, or an unstable state.
In some preferred forms, the monitoring circuit 401 may include a central processor 4011 operable to process the sampled signal input to the monitoring apparatus 400; in some preferred manners, the monitoring circuit 401 may include a memory 4012, which may be used to store preset values of the monitoring device; in some preferred manners, the monitoring circuit 401 may further include a control circuit 4015, and the control circuit 4015 may be connected to the central processor 4011 and receive a signal of the central processor 4011 for internal control. In some preferred forms, the monitoring circuit 401 may further include a communication interface 4017, which may be used in some cases to monitor internal communications of the apparatus 400; in some preferred manners, the monitoring circuit 401 may further include a filter circuit 4013, a signal amplifier 4014 and a detection circuit 4016, and the detection circuit 4016 may be used to detect the stability and integrity of the sampled data.
In some preferred manners, the monitoring apparatus 400 may include a power module 403 for supplying power to the monitoring circuit 401 and the central processing unit 4011; in some preferred manners, the power module 403 may also supply power to other functional modules in the monitoring device 400; in some preferred manners, the power module 403 may receive power from the controller 100 to supply power to the internal modules of the monitoring device 400; in some preferred manners, the power module 403 may be external to the monitoring device 400.
In some preferred manners, the monitoring device 400 may include a sensing circuit 404, the sensing circuit 404 may be used to be directly or indirectly connected and/or attached to the merchandise for sensing information thereof and sampling by means of sensing, or the sensing circuit 404 may sample the environment; in some preferred forms, the sensing circuit 404 samples through the sensing element 4041, and the sensing element 4041 can be any of a variety of sensors, such as a temperature sensor, a voltage sensor, a current sensor, a humidity sensor, a vibration sensor, a pressure sensor, a magnetic field sensor, an infrared sensor, a light sensor, and the like.
In some preferred manners, the monitoring device 400 may include the identifiable communication interface 405, in some preferred manners, the monitoring device 400 may be configured/preset through the identifiable communication interface 405, and in some preferred manners, the monitoring device 400 may be controlled by the controller 100 through the identifiable communication interface 405.
In some preferred manners, the monitoring device 400 can be connected to the alarm circuit 402, and in some preferred manners, the monitoring device 400 can directly alarm through the alarm circuit 402; in some preferred manners, the monitoring device 400 can transmit an alarm signal to the outside through the alarm circuit 402.
Fig. 19 is a schematic diagram illustrating monitoring and sensing of the monitoring device of the present invention, and as shown in the figure, the sensing circuit may include various sensing sampling elements/circuits, for example, a vibration sensing element is used for vibration sampling, a movement sensing element is used for sampling whether to move, a magnetic field sensing element is used for magnetic field strength sampling, a pressure sensing element is used for pressure value sampling, a connection sensing element is used for sampling connection status, a current sensing element is used for sampling current value, a voltage sensing element is used for sampling voltage value, a light sensing element is used for sampling light intensity, an infrared sensing element is used for sampling infrared signal, and a temperature sensing element is used for sampling ambient temperature or temperature of an attached article.
In some preferred modes, a vibration sensing element, a movement sensing element or a magnetic field sensing element or a pressure sensing element can be used for sampling the surface of the commodity; in some preferred modes, the pressure sensing element, the connection sensing element or the light sensing element can be used for sampling the supporting surface; in some preferred modes, an induction element is connected, and a current induction element or a voltage induction element can be used for sampling a charging interface; in some preferred forms, a current sensing element or a voltage sensing element may be used to sample the power adapter; in some preferred embodiments, a light-sensitive element, an infrared-sensitive element or a temperature-sensitive element can be used to sample the retail environment or the environment in which the goods are located.
In some preferred modes, the magnetic field sensing element, the pressure sensing element, the connection sensing element or the light sensing element can perform sensing sampling on the connection state; in some preferred manners, the vibration sensing element, the movement sensing element, the light sensing element or the infrared sensing element may perform sensing sampling on the experience state of the commodity, for example, whether the commodity is in the experienced state, the number of times the commodity is experienced, the duration of the experience, and the like; in some preferred modes, the current sensing element can perform inductive sampling on the charging current of the charging interface and the input current of the power adapter; in some preferred modes, the voltage sensing element can perform inductive sampling on the charging voltage of the charging interface and the input voltage of the power adapter; in some preferred forms, the temperature sensing element may be adapted to sense a sample of ambient temperature.
Fig. 20 is a process flow diagram of the monitoring device of the present invention, as shown,
the operation and determination process of the monitoring device 400 on the sampling value is as follows:
first, sampling values of the sensing circuit are acquired in real time, and a sampling value queue X1, X2, X3..
A. And (3) judging the normal state and the abnormal state:
calculating an arithmetic mean value of the sampling value queues X1, X2, X3.
Figure BDA0001895855130000222
Figure BDA0001895855130000221
And obtaining the average value of the sampling queue.
As shown in fig. 21, the monitoring apparatus may be initialized by the peripheral device to have a preset state, that is, a normal state, and set a preset state threshold upper and lower thresholds, and after performing arithmetic average operation on the sampling queue, obtain a sampling queue average value, and compare the sampling queue average value with the preset state threshold:
if the upper limit of the preset state threshold value is abnormal, the monitoring device operates to an abnormal state;
if the lower limit of the threshold value of the preset state is abnormal, the monitoring device operates to an abnormal state;
and (4) if the lower limit of the preset state threshold value is less than the average value of the sampling queue is less than the upper limit of the preset state threshold value, the monitoring device is normal.
B. Judging the stable state and the unstable state:
calculating an arithmetic mean value of the sampling value queues X1, X2, X3.
Figure BDA0001895855130000233
The variance σ 2, the standard deviation σ,
Figure BDA0001895855130000231
obtaining the arithmetic mean of the sampling queue
Figure BDA0001895855130000232
The variance σ 2, standard deviation σ, and normal distribution curves as shown in fig. 22 to 24 are plotted.
The monitoring device may be initialized with a steady state threshold by a peripheral device, comprising: the arithmetic mean threshold value mu, the threshold interval of the deviation degree of the normal distribution [ mu-5, mu +5 ]. And (3) analyzing and processing data of the sampling queue to obtain an arithmetic mean mu 1 and an interval [ A1, A2] where the maximum value of the probability density of the normal distribution is located, and comparing the interval with a steady state threshold value:
Figure BDA0001895855130000234
and when the | mu-mu 1| is less than or equal to 3, the sampled induction circuit is in a stable state.
When A2 < mu-5 or | mu-mu 1| is greater than 3, the sampled sensing circuit is in an unstable state.
When A1 is greater than mu +5 or | mu-mu 1| is greater than 3, the sampled sensing circuit is in an unstable state.
Detailed description of the preferred embodiments
Fig. 1 is a schematic diagram of an exemplary implementation of the present invention. The figures show the interrelationship between the various modules and devices. In general, a security system of the present invention may comprise at least one primary controller a and at least one secondary controller B, and as an exemplary embodiment, comprises two secondary controllers B, each capable of independently controlling a plurality of monitoring devices 400, the monitoring devices 400 being in direct or indirect operative connection/attachment/load/support relationship with the merchandise, which is also typically attached/supported/connected with sensors, as shown, in the exemplary embodiment of the present invention, the monitoring devices 400 controlled by different subordinate controllers B are partially the same and partially different, that is, the control ranges of different subordinate controllers B may be the same, different or cross-overlapped, and the main controller a is capable of controlling all the monitoring devices 400 in its area. As a typical embodiment, the present embodiment may further include a terminal device 300, where the terminal device 300 is connected to each of the main controller a and the auxiliary controller B, and can set the on/off/range of all the controllers through one device/one operation interface. In some preferred manners, the terminal device 300 can operate the monitoring apparatus 400, such as unlocking, setting an alarm range, and the like, while maintaining a connection relationship with the controller.
In the invention, the monitoring device and the controller can communicate through the existing mode and also can communicate through the specific system identification code, obviously, the specific system identification code can ensure that the communication in the control system is safer and more reliable.
The system identification code is a communication code set for communication by devices in the security system in the present invention. In some preferred forms, the system identification code may be embedded in the security device and/or the controller. In some preferred forms, the system identification code may be used directly for communication within the security system. As shown in fig. 31, in some preferred embodiments, the system identification code (SID) of the present invention may include a Channel Number (Channel Number) and an address Number (address Number), where the Channel Number refers to a Channel Number for communication between devices in the security system, and in wireless communication, selecting an appropriate Channel for communication can avoid possible interference factors. In some preferred modes, when the controller initializes the safety equipment, the controller selects a channel with less interference for communication, and records a channel number as a part of a system identification code for subsequent communication. In some preferred embodiments, the same security system uses a unique channel number, and if there are multiple security systems in the same wireless network, the controllers in different security systems may select different wireless communication channels from other security systems when initializing the security device, so as to avoid mutual interference of wireless communication in the same network, and also to ensure the security of communication in each security system, for example, 3 security systems may select 3 different channel numbers respectively when sharing the same wireless network for communication.
In some preferred manners, the Address Code (Address Number) may include a Communication Code (Communication Code), a Device Code (Device Code), and a Privilege Code (Privilege Code). In some preferred forms, the Channel Number (Channel Number) is a communication code for communication between devices in the security system, and devices in the same security system can identify the communication address of the controller in the security system by the communication code, and by the communication address, it can be further ensured that devices in the security system do not establish anti-theft communication with a controller outside the security system and are controlled by a controller outside the security system. Because the communication of the anti-theft device needs to be limited in a certain system, the devices in the same system can allow all or part of the communication, but the cross control is not allowed in different safety systems, for the communication system, a unique communication address is set, and the devices in the system are identified through the communication address, so that the safety in the safety system can be effectively ensured.
In some preferred forms, the communication is encoded as a low 2Bytes of the serial number built into the controller. In some preferred approaches, the device is encoded as a low 2Bytes of the device serial number. In some preferred modes, the authority is coded as a system preset value. In some preferred modes, the authority in the invention comprises regional authority, commodity category authority, control personnel authority and the like. In some preferred modes, the authority is set for different safety devices and/or controllers through different authority codes. In some preferred forms, the address code of the present invention may comprise a multi-level address code. In some preferred modes, the address code classification of the present invention can be classified according to the degree of distinction between systems, devices and devices, and regions. In a preferred embodiment, the system address code of the present invention may comprise a three-level address code: a system broadcast address code, a rights broadcast address code, and an M2M address code. In some preferred approaches, the M2M address code may be used for point-to-point communication. In some preferred approaches, the rights broadcast address code may be used to communicate with security devices in a certain area. In some preferred approaches, the rights broadcast address code may be used to communicate with a security device associated with a certain class/brand of merchandise. In some preferred ways, the rights broadcast address code may be used to communicate with a secure device belonging to a certain administrative right. In some preferred approaches, the system broadcast address code may be used to communicate with all security devices in the overall security system.
In some preferred manners, as shown in fig. 26, the channel number is generated by the controller, the default channel number when the controller leaves the factory is the default broadcast channel number, and when the system channel number needs to be generated, the controller first sets the initial channel number, writes the initial channel number into the wireless module in the controller, and then performs carrier detection to detect whether there is carrier interference in the current channel; if no carrier interference exists, the channel number is used as the channel number of the system; if carrier interference exists, the system is converted to the next adjacent channel for carrier detection until a channel without carrier interference or with less interference is detected, and the channel number of the channel is used as the channel number of the system.
In some preferred modes, the address code of the controller is generated as shown in fig. 27, and the controller has a default initial address code of all 0. The default initial address code is used in a default broadcast for communication between the uninitialized controller and uninitialized devices.
In some preferred modes, when generating the address code, the controller takes the low 2Bytes of the self serial number as the communication code of the system, and sets the device code and the authority code to 0, namely, the address code is broadcast by the system. The system broadcast address code may broadcast data to devices throughout the system.
In some preferred modes, when generating the address code, the controller takes the low 2Bytes of the self serial number as the communication code of the system, and simultaneously sets the device code to 0 and the authority code to the preset authority value, namely, the authority code is the authority broadcast address code. The permission broadcast address code has certain permission and can broadcast data to equipment within a certain range.
In some preferred modes, when generating the address code, the controller takes the low 2Bytes of the self serial number as the communication code of the system, and simultaneously sets the device code and the authority code to all 1, namely, the M2M address code which is not initialized. The M2M address code that is not initialized can not be used normally, and the M2M address code can only be used normally after the relevant information of the equipment is acquired and perfected. The controller needs to send the M2M address code which is not initialized and is completed together with the authority broadcast address code to the device through the default broadcast channel, and the device returns the self serial number of the device. The controller takes the serial number lower than 2Bytes as the equipment code according to the equipment serial number, and the communication code and the authority code are kept unchanged, namely the M2M address code. In some preferred approaches, as previously described, the M2M address code may be used for controller-to-device communication.
In some preferred modes, the generating process of the safety device identification code comprises the following steps: when the safety equipment is not initialized, the address code is a default initial address code, namely the address code of all 0, and is in a default broadcast channel at the same time, and the information of the controller is received. When the safety equipment receives information such as uninitialized M2M address codes, authority broadcast address codes, channel numbers and the like sent by the controller, the equipment completes the uninitialized M2M address codes firstly, and the equipment codes are filled by using low 2Bytes with self serial numbers, so that the information can be completed. At this time, the M2M address code is generated, and the permission broadcast address code is also sent by the controller, only the system broadcast address code is left unset. The system broadcast address code can be obtained by changing the authority code into 0, so that the authority code of the authority broadcast address code is cleared to obtain the system broadcast address code. After obtaining 3 address codes, the device needs to set 3 corresponding wireless receiving channels. Setting a channel 0 address by using an M2M address code to obtain an M2M channel; setting the address of the channel 1 by using the authority broadcast address code to obtain an authority broadcast channel; and setting the address of the channel 2by using the system broadcast address code to obtain a system broadcast channel. The security device uses these 3 channels to receive controller information or to send data information to the controller. Generally, the broadcast information of the controller is received using a system broadcast channel and a rights broadcast channel. The M2M channel is used to receive commands from the controller or to send data to the controller. Then, the controller is answered with its own serial number so that the controller completes the M2M address code which is not initialized to completion. Finally, the channel is converted into the channel pointed by the channel number established by the controller.
In some preferred modes, the channel number, the communication code of the controller, the device code of the safety device and the authority code form a system identification code together after being generated.
In some preferred modes, the whole generation process of the system identification code is shown in fig. 25, and comprises the following processes: setting a security device within a security system to be in a paired broadcast channel; adjusting a security device in the security system to be in a receiving state; the controller sends the paired broadcast information, judges whether the equipment can receive the paired broadcast information, if so, continues, and if not, returns to the previous step; the safety equipment judges whether uninitialized address codes can be received or not, if so, the next step is continued, and if not, other information is fed back, and the receiving state of the safety equipment is readjusted; filling low 2Bytes of the device serial number of the security device receiving the uninitialized address code into the device code; recording the communication code of the controller; setting the permission code to all 1; setting the M2M communication address to an M2M address code; sending back the equipment serial number of the safety equipment to the controller; generating an M2M address code of the security device; acquiring a permission broadcast address; setting the address of the permission broadcast channel as a permission broadcast address code; generating an authority broadcast address code; clearing the authority codes in the authority broadcast address codes; reserving communication codes and equipment codes in the permission broadcast address code; copying the code into a system broadcast address; setting a system broadcast address as a system broadcast address code; generating a system broadcast address code; converting the communication channel according to the channel number; the system identification code is generated from the channel number, the M2M address code, the broadcast authority address code, and the system authority address code.
In some preferred modes, the M2M communication mode between the controller and the security device is as shown in fig. 28, when the controller communicates with the device M2M, the controller channel address needs to be set to be the M2M address code, and the communication is performed in the channel with the channel number being the system channel number. In some preferred modes, the controller initiates a connection request in the M2M channel, and the secure device responds to the controller after receiving the connection request in the M2M channel, so that the connection establishment is completed. The controller and security device may then transmit commands and exchange information in the M2M channel. The security devices with different channel numbers cannot establish a connection with the controller. The security devices with different M2M channel address codes cannot receive the related information sent by the controller in the M2M channel. In some preferred modes, the M2M communication mode is suitable for peer-to-peer communication between the security devices and the controller, for example, in some cases, the controller can independently control a security device according to the requirements of the security system.
In some preferred embodiments, as shown in fig. 29, when the controller and the security device perform system broadcast communication, the controller needs to set a channel address of the controller as a system broadcast address code, and perform system broadcast in a channel with a channel number of the system channel number. The safety device receives the system broadcast sent by the controller in the system broadcast channel and then performs corresponding operation. The security devices with different channel numbers cannot receive the system broadcast information. The security devices with different address codes of the system broadcast channel cannot receive the system broadcast information in the system broadcast channel. In some preferred modes, the system broadcast address codes are the same, but the security devices with different authority broadcast address codes or different M2M address codes can receive the system broadcast information in the system broadcast channel. In some preferred aspects, the communication scheme of the system broadcast is applicable to a wide range of communication schemes (e.g., one-to-many, point-to-face, etc.) between the security devices and the controller, e.g., in some cases, the controller may control multiple security devices simultaneously, depending on the requirements of the security system.
In some preferred modes, the authority broadcast communication mode between the controller and the security device, as shown in fig. 30, when the controller and the security device perform authority broadcast communication, it is necessary to set a controller channel address as an authority broadcast address code, and perform authority broadcast in a channel whose channel number is a system channel number. The security device receives the authority broadcast sent by the controller in the authority broadcast channel and then performs corresponding operation. The security devices with different channel numbers cannot receive the authority broadcast information. The security devices with different authority broadcast channel address codes cannot receive the authority broadcast information in the authority broadcast channel. In some preferred modes, the authority broadcast address codes are the same, but the security devices with different M2M address codes can receive the authority broadcast information in the authority broadcast channel, and in some preferred modes, the communication mode of the authority broadcast is suitable for the communication mode with the authority between the security device and the controller.
In some preferred manners, as shown in fig. 31, a communication data Packet of the controller and the security device in the present invention may include a Preamble (Preamble), an Address code (Address), a Packet Control code (Packet Control), a Payload (Payload), and a Check (Check). In some preferred manners, as shown in fig. 33, the Payload (Payload) in the Data packet of the present invention may include Source Device Code (Source Device Code), Command word (Command), and Data (Data). In some preferred modes, the communication between the controller and the security device is realized by the above-mentioned data packet packaging, sending, receiving and unpacking.

Claims (8)

1. A hierarchical control system for merchandise security, comprising:
at least two controllers and a plurality of monitoring devices,
the controller comprises at least one main controller and at least one auxiliary controller;
the monitoring device has an identifiable communication interface capable of communicating with a controller, is configured to be capable of communicating with the controller through the identifiable communication interface, and is initialized by the controller with which it is in communication;
the monitoring device initialized by the auxiliary controller can be controlled by the main controller and the auxiliary controller for initializing the main controller;
the controller is configured to be capable of locking, unlocking, placing in an operable state, and/or placing in an inoperable state, a monitoring device initialized by the controller;
the monitoring device comprises a monitoring circuit, a monitoring circuit and a control circuit, wherein the monitoring circuit is used for receiving a sampling value and calculating the sampling value so as to judge whether a monitored object is in a normal state, an abnormal state, a stable state or an unstable state;
the main controller is configured to have a control range not smaller than the auxiliary controller;
the control authority of the auxiliary controller is smaller than that of the main controller;
the main controller is a controller with a high management level, and the auxiliary controller is a controller with a low management level;
the auxiliary controller is configured to be able to communicate with the terminal device through the main controller and to be able to be set through the terminal device.
2. A hierarchical control system for merchandise security according to claim 1, wherein different secondary controllers are configured to have the same, different or partially the same control range.
3. A hierarchical control system for merchandise security according to claim 1 or 2, wherein the control range includes the number of controllable monitoring devices and/or the category of controllable monitoring devices.
4. A hierarchical control system for merchandise security according to claim 1, wherein each controller is capable of independently controlling at least one monitoring device.
5. The hierarchical control system for merchandise security of claim 1, wherein the monitoring device initialized by the main controller is configured to be uncontrollable by the supplementary controller.
6. The hierarchical control system for merchandise security of claim 1, wherein the main controller is configured to be capable of communicating with and being set by a terminal device.
7. The hierarchical control system for merchandise security of claim 1, wherein the controller includes a power module configured to be connectable to and powered by an external power source.
8. A hierarchical control device for merchandise security, comprising:
comprising at least one main controller and at least one auxiliary controller,
the main controller is configured to be capable of communicating with the monitoring device, initializing the monitoring device, and controlling the monitoring device initialized by the main controller;
the auxiliary controller is configured to be capable of communicating with the monitoring device, initializing the monitoring device, and controlling the monitoring device initialized by the auxiliary controller;
the primary controller is configured to have a control range greater than the secondary controller;
the control authority of the auxiliary controller is smaller than that of the main controller;
the main controller is a controller with a high management level, and the auxiliary controller is a controller with a low management level;
the monitoring device comprises a monitoring circuit which is used for receiving the sampling value and calculating the sampling value so as to judge whether the monitored object is in a normal state, an abnormal state, a stable state or an unstable state.
CN201811491694.8A 2018-12-07 2018-12-07 Grading control system and control device for commodity safety Active CN110007640B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811491694.8A CN110007640B (en) 2018-12-07 2018-12-07 Grading control system and control device for commodity safety
US16/706,732 US10916084B2 (en) 2018-12-07 2019-12-07 Touch-type control system, control device and monitor device for merchandise security
US16/706,741 US10922912B2 (en) 2018-12-07 2019-12-07 Grading control system and control device for merchandise security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811491694.8A CN110007640B (en) 2018-12-07 2018-12-07 Grading control system and control device for commodity safety

Publications (2)

Publication Number Publication Date
CN110007640A CN110007640A (en) 2019-07-12
CN110007640B true CN110007640B (en) 2020-11-03

Family

ID=67165071

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811491694.8A Active CN110007640B (en) 2018-12-07 2018-12-07 Grading control system and control device for commodity safety

Country Status (1)

Country Link
CN (1) CN110007640B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101887256A (en) * 2010-05-11 2010-11-17 深圳绿拓科技有限公司 Concentrated-distributed wireless control system and controller
EP2286393B1 (en) * 2008-06-03 2011-11-23 Cedes AG Safety apparatus and method for monitoring a monitoring area
CN102541031A (en) * 2012-02-10 2012-07-04 四川钟顺太阳能开发有限公司 Fieldbus-based large tracking photovoltaic plant distributed control system and control method thereof
CN103019220A (en) * 2012-12-26 2013-04-03 首航节能光热技术股份有限公司 Heliostat zone control system for tower solar thermal plants
CN103080987A (en) * 2010-09-17 2013-05-01 株式会社日思科安防 Security system
CN205692300U (en) * 2013-09-29 2016-11-16 Invue安全产品公司 A kind of for guaranteeing the security system that commodity are the most stolen
CN106970579A (en) * 2017-04-19 2017-07-21 杭州朗鸿科技股份有限公司 A kind of article anti-theft protection system and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2286393B1 (en) * 2008-06-03 2011-11-23 Cedes AG Safety apparatus and method for monitoring a monitoring area
CN101887256A (en) * 2010-05-11 2010-11-17 深圳绿拓科技有限公司 Concentrated-distributed wireless control system and controller
CN103080987A (en) * 2010-09-17 2013-05-01 株式会社日思科安防 Security system
CN102541031A (en) * 2012-02-10 2012-07-04 四川钟顺太阳能开发有限公司 Fieldbus-based large tracking photovoltaic plant distributed control system and control method thereof
CN103019220A (en) * 2012-12-26 2013-04-03 首航节能光热技术股份有限公司 Heliostat zone control system for tower solar thermal plants
CN205692300U (en) * 2013-09-29 2016-11-16 Invue安全产品公司 A kind of for guaranteeing the security system that commodity are the most stolen
CN106970579A (en) * 2017-04-19 2017-07-21 杭州朗鸿科技股份有限公司 A kind of article anti-theft protection system and device

Also Published As

Publication number Publication date
CN110007640A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN110009843B (en) Interactive warning system for commodity safety
CN107113992B (en) Gang charger, cover and cradle for portable electronic devices
WO2017028380A1 (en) System for charging digital device
WO2017193803A1 (en) Intelligent suitcase and usage method
CN110009850A (en) A kind of monitoring device that can remotely export for commercial articles safety
KR20120006922A (en) Portable apparatus for robbery protection
US10916084B2 (en) Touch-type control system, control device and monitor device for merchandise security
GB2379834A (en) Protection of wireless data storage devices
CN110007621B (en) Touch control system, control device and monitoring device for commodity safety
CN110007640B (en) Grading control system and control device for commodity safety
US20080150680A1 (en) Remote Portable Access System
US20150370745A1 (en) System and method for communication port based asset management
CN110009844B (en) Warning system for commodity safety
CN110009845B (en) Warning system for commodity safety
CN110009852B (en) Monitoring device for commodity safety
CN109348429B (en) Safety system and method for commodity burglary prevention
US11217075B2 (en) Interactive warning system and warning device for merchandise security
KR101948195B1 (en) Smart nfc lock device
CN110009847B (en) A monitoring device can be predetermine for commodity safety
CN110009854B (en) A warning system can be predetermine for commodity safety
CN110009851A (en) A kind of warning system for commercial articles safety
CN214202346U (en) Data storage system of big data
CN212460731U (en) Warning device for commodity theft prevention
CN111028458A (en) Safety system, safety equipment and control device for commodity anti-theft
CN212675661U (en) Safety device for commodity anti-theft

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 310000 Room 203, 2nd floor, building 2, 99 Xinting Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou langhong science and Technology Co.,Ltd.

Address before: 310000 Room 203, 2nd floor, building 2, 99 Xinting Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: HANGZHOU LANGZE SECURITY TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder