EP3539098B1 - Hard tag locking clamp with energy harvesting element - Google Patents

Hard tag locking clamp with energy harvesting element Download PDF

Info

Publication number
EP3539098B1
EP3539098B1 EP16822761.9A EP16822761A EP3539098B1 EP 3539098 B1 EP3539098 B1 EP 3539098B1 EP 16822761 A EP16822761 A EP 16822761A EP 3539098 B1 EP3539098 B1 EP 3539098B1
Authority
EP
European Patent Office
Prior art keywords
securement mechanism
security tag
energy harvester
energy
tool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP16822761.9A
Other languages
German (de)
French (fr)
Other versions
EP3539098A1 (en
Inventor
Justin Stewart
David Torrecilla
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sensormatic Electronics LLC
Original Assignee
Sensormatic Electronics LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sensormatic Electronics LLC filed Critical Sensormatic Electronics LLC
Publication of EP3539098A1 publication Critical patent/EP3539098A1/en
Application granted granted Critical
Publication of EP3539098B1 publication Critical patent/EP3539098B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2448Tag with at least dual detection means, e.g. combined inductive and ferromagnetic tags, dual frequencies within a single technology, tampering detection or signalling means on the tag
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B73/00Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
    • E05B73/0017Anti-theft devices, e.g. tags or monitors, fixed to articles, e.g. clothes, and to be removed at the check-out of shops
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B73/00Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
    • E05B73/0017Anti-theft devices, e.g. tags or monitors, fixed to articles, e.g. clothes, and to be removed at the check-out of shops
    • E05B73/0047Unlocking tools; Decouplers
    • E05B73/0064Unlocking tools; Decouplers of the mechanical type
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0057Feeding
    • E05B2047/0062Feeding by generator
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2434Tag housing and attachment details

Definitions

  • This document relates generally to hard tags. More particularly, this document relates to hard tag locking clamps with an energy harvesting element.
  • Hard tags are typically passive devices that contain some element that responds to an external power source when operated properly.
  • the hard tags are incapable of communicating information indicating that they have been detached or unlocked to an external device.
  • US5367289 discloses a hard tag comprising means for harvesting mechanical energy.
  • the present disclosure concerns implementing systems and methods for harvesting mechanical energy in a security tag.
  • the methods comprise: applying by a tool a pushing force so as to cause a securement mechanism disposed within the security tag to deform; transferring mechanical energy to a spring sleeve when the securement mechanism deforms due to loading applied by the tool; using an energy harvester (e.g., a piezo element, a magnet/solenoid element and/or a Micro-Electro-Mechanical-Systems ("MEMS”) device) to harness the mechanical energy applied by the tool; and converting the mechanical energy to electrical energy.
  • the energy harvester is at least partially coupled to the securement mechanism.
  • the energy harvester may be disposed between the securement mechanism and an Electronic Article Surveillance (“EAS”) or Radio Frequency IDentification (“RFID”) component of the security tag.
  • EAS Electronic Article Surveillance
  • RFID Radio Frequency IDentification
  • the energy harvester comprises a piezo element attached to the spring sleeve of the securement mechanism.
  • the energy harvester detects distortion of the spring sleeve when the securement mechanism is engaged by the tool. Positive and negative leads are attached to the energy harvester.
  • the energy harvester transmits an electrical signal to an electronic component of the security tag (e.g., an EAS component and/or an RFID component).
  • the energy harvester comprises a coil and a permanent magnet that is coupled to the securement mechanism.
  • the permanent magnet moves past the coil so as to induce an electrical charge when the securement mechanism rotates as a result of the pushing force being applied thereto.
  • the electrical charge is transferred to an electronic component of the security tag as to indicate that the securement mechanism has been engaged by the tool.
  • the present disclosure concerns a hard tag.
  • the hard tag comprises an electro-mechanical element incorporated with a locking mechanism.
  • the locking mechanism facilitates the attachment and detachment of the hard tag to an article (e.g., a piece of clothing).
  • the electro-mechanical element provides an electrical response in the event of the hard tag's detachment from the article.
  • the electro-mechanical element deforms (i.e., bends) when engaged.
  • the deformation causes the generation of a signal.
  • the signal is sent from the hard tag to an external device. At the external device, the signal is processed so as to provide feedback to a user or data acquisition system indicating that the hard tag has been detached from the article.
  • the security tag 100 includes a housing 104 with an upper housing member 106 joined to a lower housing member 108.
  • the housing members 106, 108 can be joined together via an adhesive, a mechanical coupling means (e.g., snaps, screws, etc.), or a weld (e.g., an ultrasonic weld).
  • the housing 104 can be made from a rigid or semi-rigid material, such as plastic.
  • the housing 104 has an opening 204 formed therein such that at least a portion of a tack assembly 110 (or attachment element) can be inserted into the security tag for facilitating the attachment of the security tag to an article 114 (e.g., a piece of clothing).
  • EAS and/or RFID components 306 are contained within the housing 104. EAS and RFID components of security tags are well known in the art, and therefore will not be described herein.
  • Tack assembly 110 has a tack head 112 and an elongate tack body 202 extending down and away from the tack head.
  • the tack body 202 is sized and shaped for insertion into opening 204 and removal from opening 204.
  • a plurality of grooves may be formed along a length of the tack body 202 for engagement with a securement mechanism 206 disposed within the housing 104. When the grooves are engaged by the securement mechanism 206, the security tag 100 is secured to the article 114. Thereafter, unauthorized removal of the article 114 from a controlled area can be detected by a monitoring device of an EAS system. Such monitoring devices are well known in the art, and therefore will not be described herein.
  • At least one sensor is disposed within the housing 104.
  • the sensor includes, but is not limited to, an acoustically resonant magnetic sensor. In all cases, the sensor generates signals which can be detected by the monitoring device.
  • Such detection occurs when the security tag is present within a surveillance zone established by the monitoring device.
  • the surveillance zone is usually established at an access point for the controlled area (e.g., adjacent to a retail store entrance and/or exit). If the article 114 enters the surveillance zone with the security tag 100, then an alarm may be triggered to indicate possible unauthorized removal thereof from the controlled area. In contrast, if the article 114 is authorized for removal from the controlled area, then the security tag 100 thereof can be deactivated and/or detached therefrom using a detachment mechanism 102 (or external tool). Consequently, the article 114 can be carried through the surveillance zone without being detected by the monitoring system and/or without triggering the alarm.
  • the detachment mechanism 102 is sized and shaped to at least be partially slidingly inserted into and removed from an insert space 116 formed in the housing 104. When inserted into insert space 116, the detachment mechanism 102 travels through an arcuate channel 302 so as to be guided towards the securement mechanism 206. In this regard, the detachment mechanism 102 has a generally arcuate shape matching that of the arcuate channel 302. Upon engagement with the securement mechanism 206, the detachment mechanism 102 releases the tack body 202 therefrom. Next, the tack body 202 can be removed from the housing, so as to decouple the security tag 100 from the article 114.
  • FIG. 5 A schematic illustration of the securement mechanism 206 is provided in FIG. 5 .
  • the securement mechanism 206 is specifically adapted to accommodate release of the tack body 202 via the detachment mechanism 102 (or arcuate probe) moving in the arcuate channel 302.
  • the securement mechanism 206 is generally in the form of a spring clamp securely disposed within the housing 104 of the security tag so as to be pivotable (or rotatable) about an axis 208.
  • the spring clamp comprises a clamp body 502 and jaws 504, 506.
  • the clamp body 502 includes a mounting part 508 extending laterally of jaw 506 and a release part 510 extending laterally of jaw 504.
  • the mounting part 508 includes a mounting aperture 512 facilitating the pivotable movement of the securement mechanism 206 within the housing of the security tag.
  • the pivotable movement allows the securement mechanism 206 to be transitioned by the detachment mechanism 102 (or arcuate probe) from a first position in which the tack assembly is locked thereto (as shown in FIG 3 ) and a second position in which the tack assembly is released or unlocked therefrom (as shown in FIG. 4 ).
  • Each of the jaws 504, 506 extends outwardly of the plane of the clamp body 502 and then inwardly toward the other jaw.
  • the jaws 504, 506 terminate in facing edges 514, 516. These edges extend from a common edge 518 of the clamp body 502 inwardly toward each other, then curve outwardly away from each other to define an aperture 520 (typically, circular or elliptical) for receiving the tack body 202.
  • the edges 514, 516 then continue in aligned fashion and end in an elongated, lateral slot 522 in the clamp body 502.
  • the lateral slot lies inward of a further clamp body edge 524 which opposes the clamp body edge 518.
  • a further laterally extending elongated spring sleeve 526 is attached by a joint area 528 to the side 530 of the edge 524 bordering the mounting part 508.
  • the sleeve 526 extends along the length of the edge 524 and is also out of the plane of the clamp body 502.
  • the lower housing member 108 of the security tag 100 includes a circular mount 402.
  • the spring clamp 302 is mounted, via aperture 312 of the mounting part 308, on the circular mount 402. In this way, the mounting part 508 can be rotated about the circular mount 402.
  • the spring clamp 502 is thus able to pivot about the mounting part 508.
  • the tack body 204 When an end of the tack assembly 110 is introduced in the downward direction through the opening 204 in the upper housing member 106, the tack body 204 is directed to aperture 520 of the securement mechanism 206. This causes the jaws 504, 506 to spread open and allow the tack body 204 to pass there through.
  • the jaws 504, 506 retract and clutch the tack body 204. In this position, the jaws 504, 506 prevent upward movement of the tack assembly 110. As such, the security tag 100 becomes securely coupled to the article 114.
  • the detachment mechanism 102 In order to release the tack body 204 from the jaws 504-306, the detachment mechanism 102 is introduced into the insert space 116 formed in the housing 104 of the security tag 100. Rotation of the detachment mechanism 102 causes it to be moved in and guided by the arcuate channel 302 until the end 118 abuts portion 532 of the securement mechanism 206. Continued rotational movement of the detachment mechanism 102 causes force to be applied to portion 532 of the securement mechanism 206. This force, in turn, causes the clamp body 502 to rotate about the support area 508. The jaw 504 is thus enabled to spread away from jaw 506 due to the force of the tack body 204, which is being held stationary by jaw 506. As a result, aperture 520 expands, releasing the tack body 204 from the clutch of the jaws. The tack assembly 110 can now be moved in the upward direction past the jaws, via an upward force on the tack head 112.
  • the spring sleeve 526 at the joint area 528 is compressed.
  • the detachment mechanism 102 is rotated in the reverse direction. This reverse rotation disengages the detachment mechanism 102 from the securement mechanism 206. Consequently, the spring sleeve 526 rotates in an opposite direction so as to be brought back to its original position. Thereafter, the detachment mechanism 102 is guided out of the arcuate channel 302 and is removed from insert space 116 formed in the housing 104.
  • the detachment mechanism 102 is provided to deflect the securement mechanism 206 so as to allow the tack assembly 110 to be removed from the housing 104.
  • the detachment mechanism 102 may be part of an external detacher. Detachers are well known in the art, and therefore will not be described herein.
  • the security tag 100 can be decoupled from an article 114 (e.g., a piece of clothing).
  • the deflection of the securement mechanism 206 results from an application of mechanical energy by the detachment mechanism 102.
  • the present invention provides a means for harnessing the applied mechanical energy.
  • the means includes an additional element disposed between the securement mechanism and EAS/RFID component(s).
  • the additional element can include, but is not limited to, a piezo (or piezoelectric) element, a magnet/solenoid element, and/or a MEMS device.
  • securement mechanism 600 is similar to or the same as securement mechanism 206 of FIG. 5 . As such, the discussion provided above in relation to securement mechanism 206 is sufficient for understanding securement mechanism 600. Unlike securement mechanism 206, securement mechanism has an energy harvester 602 coupled thereto for harnessing the applied mechanical energy.
  • the energy harvester 602 includes, but is not limited to, a piezo or piezoelectric element that is able to generate an electric charge in response to applied mechanical stress.
  • the energy harvester 602 is attached to the spring sleeve 604 of the securement mechanism 600.
  • a detachment mechanism e.g., detachment mechanism 102 of FIG. 1
  • mechanical energy is transferred to the spring sleeve 604.
  • the energy harvester 602 detects distortion of the spring sleeve 604 when the securement mechanism 600 is engaged by the detachment mechanism.
  • the mechanical energy provided by the detected distortion of the spring sleeve 604 can be converted to electrical energy.
  • the spring sleeve's distortion is shown in FIGS. 4 and 8 .
  • This distortion comprises a bending of at least a portion of the spring sleeve.
  • the spring sleeve may remain perfectly elastic. In both cases, the behavior of the spring sleeve is analyzed for generating an electrical signal.
  • the spring sleeve may be configured for a one time use event or a multiple use event.
  • positive and negative leads 702, 704 can be attached to the energy harvester 602 as shown in FIG. 7 .
  • the energy harvester 602 can transmit an electrical signal to another object, such as a microprocessor of the EAS/RFID component(s) 802 shown by arrows 804 and 806 of FIG. 8 .
  • the leads 702, 704 are electrically coupled to the EAS/RFID component(s) 802 via wires and/or traces disposed on or in a circuit board 804. The wires and/or traces are not visible in FIG. 8 .
  • the electrical signal When the electrical signal is applied to the EAS/RFID component(s) 802, it generates and transmits a notification signal to an external device (e.g., an EAS pedestal, RFID reader and/or a user or data acquisition system).
  • an external device e.g., an EAS pedestal, RFID reader and/or a user or data acquisition system.
  • This notification provides an indication that the hard tag has been detached from the article.
  • the notification may also comprise information specifying an area or zone within a facility where the hard tag resides after being detached from the article.
  • a user e.g., retail personnel
  • a MEMS device 706 is provided in addition to the piezo element.
  • the MEMS device 706 may be coupled to the spring sleeve 604 as shown in FIG. 7 or disposed on a circuit board 804. In both cases, the MEMS device 706 is connected in series between the energy harvester 602 and the EAS/RFID component(s) 802.
  • the MEMS device 706 is generally configured to process the electrical signal generated by the piezo element for increasing or converting power so as to increase the efficiency of electric power transfer.
  • the present solution is not limited to the particulars of FIGS. 6-8 .
  • Means other than the piezo element may be employed for harnessing the applied mechanical energy.
  • the piezo element 602 may be replaced with a MEMS device.
  • the MEMS device would detect deformation of the spring sleeve and generate an electrical signal in response to the detected deformation.
  • the electrical signal would be provided from the MEMS device to the EAS/RFID component(s) 802.
  • MEMS devices are well known in the art, and therefore will not be described herein. Any known or to be known MEMS sensor can be used here without limitation provided that it can: (a) process the electrical signal generated by the piezo element for increasing or converting power so as to increase the efficiency of electric power transfer; or (b) detect deformation of the spring sleeve and generate an electrical signal in response to the detected deformation.
  • FIG. 9 there is provided an illustration of another exemplary security tag 900 having an energy harvester 902 for harnessing the applied mechanical energy.
  • the energy harvester 902 comprises a coil 904 and a permanent magnet 906.
  • the permanent magnet 906 is coupled to the securement mechanism 908.
  • the securement mechanism 908 rotates, the permanent magnet 906 moves past the coil 904, thereby inducing a small electrical charge.
  • the electrical charge can then be transferred to the EAS/RFID component(s) (not shown in FIG. 9 for clarity of the energy harvester's illustration) so as to indicate that the securement mechanism 908 has been engaged by a detachment mechanism 910 or other detachment tool.
  • the EAS/RFID component(s) When the electrical charge is transferred to the EAS/RFID component(s), it generates and transmits a notification signal to an external device (e.g., an EAS pedestal, RFID reader and/or a user or data acquisition system).
  • an external device e.g., an EAS pedestal, RFID reader and/or a user or data acquisition system.
  • This notification provides an indication that the security tag 900 has been detached from the article.
  • the notification may also comprise information specifying an area or zone within a facility where the security tag 900 resides after being detached from the article.
  • a user e.g., retail personnel
  • the security tag 900 also comprises a MEMS device (not shown in FIG. 9 for clarity of the energy harvester's illustration) for improving the efficiency of electrical charge.
  • the MEMS device is disposed on a circuit board (not shown in FIG. 9 for clarity of energy harvester's illustration) so as to be connected in series between the energy harvester 902 and the EAS/RFID component(s).
  • the MEMS device is generally configured to process the electrical signal generated by the energy harvester 902 for increasing or converting power so as to increase the efficiency of electric power transfer.
  • a MEMS device may replace the coil 904.
  • the MEMS device generates an electrical signal when the spring sleeve deforms (i.e., bends) and transfers the electrical signal to the EAS/RFID component(s).
  • MEMS devices are well known in the art, and therefore will not be described herein. Any known or to be known MEMS sensor can be used here without limitation provided that it can: (a) process the electrical signal generated by the energy harvester for increasing or converting power so as to increase the efficiency of electric power transfer; or (b) generates an electrical signal when the spring sleeve deforms (i.e., bends) and transfers the electrical signal to another device.

Description

    FIELD OF THE INVENTION
  • This document relates generally to hard tags. More particularly, this document relates to hard tag locking clamps with an energy harvesting element.
  • BACKGROUND
  • Hard tags are typically passive devices that contain some element that responds to an external power source when operated properly. The hard tags are incapable of communicating information indicating that they have been detached or unlocked to an external device.
  • US5367289 discloses a hard tag comprising means for harvesting mechanical energy.
  • SUMMARY
  • The present disclosure concerns implementing systems and methods for harvesting mechanical energy in a security tag. The methods comprise: applying by a tool a pushing force so as to cause a securement mechanism disposed within the security tag to deform; transferring mechanical energy to a spring sleeve when the securement mechanism deforms due to loading applied by the tool; using an energy harvester (e.g., a piezo element, a magnet/solenoid element and/or a Micro-Electro-Mechanical-Systems ("MEMS") device) to harness the mechanical energy applied by the tool; and converting the mechanical energy to electrical energy. The energy harvester is at least partially coupled to the securement mechanism. The energy harvester may be disposed between the securement mechanism and an Electronic Article Surveillance ("EAS") or Radio Frequency IDentification ("RFID") component of the security tag.
  • In some scenarios, the energy harvester comprises a piezo element attached to the spring sleeve of the securement mechanism. The energy harvester detects distortion of the spring sleeve when the securement mechanism is engaged by the tool. Positive and negative leads are attached to the energy harvester. The energy harvester transmits an electrical signal to an electronic component of the security tag (e.g., an EAS component and/or an RFID component).
  • In some scenarios, the energy harvester comprises a coil and a permanent magnet that is coupled to the securement mechanism. The permanent magnet moves past the coil so as to induce an electrical charge when the securement mechanism rotates as a result of the pushing force being applied thereto. The electrical charge is transferred to an electronic component of the security tag as to indicate that the securement mechanism has been engaged by the tool
    The present invention is defined by the independent claims. Preferred embodiments are set out in the dependent claims.
  • DESCRIPTION OF THE DRAWINGS
  • The present disclosure will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures.
    • FIG. 1 is a perspective view of an exemplary security tag and detachment mechanism that is useful for understanding the present solution.
    • FIG. 2 is a cross sectional side view of the exemplary security tag shown in FIG. 1 that is useful for understanding the present solution.
    • FIG. 3 is an illustration of an exemplary security tag in a locked position.
    • FIG. 4 is an illustration of an exemplary security tag in an unlocked position.
    • FIG. 5 is a perspective view of a securement mechanism of the security tag shown in FIG. 1.
    • FIG. 6 is an illustration of a securement mechanism having an energy harvester coupled thereto.
    • FIG. 7 is an illustration of showing the energy harvester of FIG. 6 coupled to positive and negative electrical leads.
    • FIG. 8 is an illustration of another exemplary security tag having an energy harvester for harnessing the applied mechanical energy.
    • FIG. 9 is an illustration of another exemplary security tag having an energy harvester for harnessing the applied mechanical energy.
    DETAILED DESCRIPTION
  • It will be readily understood that the components of the present solution as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various implementations of the present solution, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various implementations. While the various aspects of the present solution are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
  • The present solution may be embodied in other specific forms without departing from its essential characteristics. The described solution is to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by this detailed description.
  • Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
  • Furthermore, the described features, advantages and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
  • Reference throughout this specification to "one embodiment", "an embodiment", or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present invention. Thus, the phrases "in one embodiment", "in an embodiment", and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
  • As used in this document, the singular form "a", "an", and "the" include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term "comprising" means "including, but not limited to".
  • The present disclosure concerns a hard tag. The hard tag comprises an electro-mechanical element incorporated with a locking mechanism. The locking mechanism facilitates the attachment and detachment of the hard tag to an article (e.g., a piece of clothing). The electro-mechanical element provides an electrical response in the event of the hard tag's detachment from the article. In this regard, the electro-mechanical element deforms (i.e., bends) when engaged. The deformation causes the generation of a signal. The signal is sent from the hard tag to an external device. At the external device, the signal is processed so as to provide feedback to a user or data acquisition system indicating that the hard tag has been detached from the article.
  • Many times a thief or perpetrator will attempt to unlock the hard tag in an authorized manner, defeating the security and purpose of the hard tag. If the thief or perpetrator is successful, (s)he will detach the hard tag from the article, hide the hard tag within a facility, and leave the facility with the article. Consequently, the retailer unknowingly loses this article of inventory. Knowledge of such theft is obtained when the hidden hard tag is later discovered by an employee. By adding a smart element to the hard tag, the hard tag is able to record or notify an external system in the event of a detachment thereof from an article. As such, retailers are able to detect when a thief is maliciously attempting to defeat a hard tag.
  • Referring now to FIGS. 1-5, there is provided schematic illustrations useful for understanding an exemplary security tag 100. As shown in FIGS. 1-5, the security tag 100 includes a housing 104 with an upper housing member 106 joined to a lower housing member 108. The housing members 106, 108 can be joined together via an adhesive, a mechanical coupling means (e.g., snaps, screws, etc.), or a weld (e.g., an ultrasonic weld). The housing 104 can be made from a rigid or semi-rigid material, such as plastic. The housing 104 has an opening 204 formed therein such that at least a portion of a tack assembly 110 (or attachment element) can be inserted into the security tag for facilitating the attachment of the security tag to an article 114 (e.g., a piece of clothing). EAS and/or RFID components 306 are contained within the housing 104. EAS and RFID components of security tags are well known in the art, and therefore will not be described herein.
  • Tack assembly 110 has a tack head 112 and an elongate tack body 202 extending down and away from the tack head. The tack body 202 is sized and shaped for insertion into opening 204 and removal from opening 204. A plurality of grooves (not shown in FIGS. 1-5) may be formed along a length of the tack body 202 for engagement with a securement mechanism 206 disposed within the housing 104. When the grooves are engaged by the securement mechanism 206, the security tag 100 is secured to the article 114. Thereafter, unauthorized removal of the article 114 from a controlled area can be detected by a monitoring device of an EAS system. Such monitoring devices are well known in the art, and therefore will not be described herein. Still, it should be understood that at least one sensor (not shown in FIGS. 1-5) is disposed within the housing 104. The sensor includes, but is not limited to, an acoustically resonant magnetic sensor. In all cases, the sensor generates signals which can be detected by the monitoring device.
  • Such detection occurs when the security tag is present within a surveillance zone established by the monitoring device. The surveillance zone is usually established at an access point for the controlled area (e.g., adjacent to a retail store entrance and/or exit). If the article 114 enters the surveillance zone with the security tag 100, then an alarm may be triggered to indicate possible unauthorized removal thereof from the controlled area. In contrast, if the article 114 is authorized for removal from the controlled area, then the security tag 100 thereof can be deactivated and/or detached therefrom using a detachment mechanism 102 (or external tool). Consequently, the article 114 can be carried through the surveillance zone without being detected by the monitoring system and/or without triggering the alarm.
  • The detachment mechanism 102 is sized and shaped to at least be partially slidingly inserted into and removed from an insert space 116 formed in the housing 104. When inserted into insert space 116, the detachment mechanism 102 travels through an arcuate channel 302 so as to be guided towards the securement mechanism 206. In this regard, the detachment mechanism 102 has a generally arcuate shape matching that of the arcuate channel 302. Upon engagement with the securement mechanism 206, the detachment mechanism 102 releases the tack body 202 therefrom. Next, the tack body 202 can be removed from the housing, so as to decouple the security tag 100 from the article 114.
  • A schematic illustration of the securement mechanism 206 is provided in FIG. 5. As noted above, the securement mechanism 206 is specifically adapted to accommodate release of the tack body 202 via the detachment mechanism 102 (or arcuate probe) moving in the arcuate channel 302. The securement mechanism 206 is generally in the form of a spring clamp securely disposed within the housing 104 of the security tag so as to be pivotable (or rotatable) about an axis 208. In this regard, the spring clamp comprises a clamp body 502 and jaws 504, 506. The clamp body 502 includes a mounting part 508 extending laterally of jaw 506 and a release part 510 extending laterally of jaw 504. The mounting part 508 includes a mounting aperture 512 facilitating the pivotable movement of the securement mechanism 206 within the housing of the security tag. The pivotable movement allows the securement mechanism 206 to be transitioned by the detachment mechanism 102 (or arcuate probe) from a first position in which the tack assembly is locked thereto (as shown in FIG 3) and a second position in which the tack assembly is released or unlocked therefrom (as shown in FIG. 4).
  • Each of the jaws 504, 506 extends outwardly of the plane of the clamp body 502 and then inwardly toward the other jaw. The jaws 504, 506 terminate in facing edges 514, 516. These edges extend from a common edge 518 of the clamp body 502 inwardly toward each other, then curve outwardly away from each other to define an aperture 520 (typically, circular or elliptical) for receiving the tack body 202. The edges 514, 516 then continue in aligned fashion and end in an elongated, lateral slot 522 in the clamp body 502. The lateral slot lies inward of a further clamp body edge 524 which opposes the clamp body edge 518.
  • A further laterally extending elongated spring sleeve 526 is attached by a joint area 528 to the side 530 of the edge 524 bordering the mounting part 508. The sleeve 526 extends along the length of the edge 524 and is also out of the plane of the clamp body 502.
  • For mounting and supporting the spring clamp 502, the lower housing member 108 of the security tag 100 includes a circular mount 402. The spring clamp 302 is mounted, via aperture 312 of the mounting part 308, on the circular mount 402. In this way, the mounting part 508 can be rotated about the circular mount 402. The spring clamp 502 is thus able to pivot about the mounting part 508.
  • When an end of the tack assembly 110 is introduced in the downward direction through the opening 204 in the upper housing member 106, the tack body 204 is directed to aperture 520 of the securement mechanism 206. This causes the jaws 504, 506 to spread open and allow the tack body 204 to pass there through.
  • When the downward movement of the tack assembly 110 is stopped, the jaws 504, 506 retract and clutch the tack body 204. In this position, the jaws 504, 506 prevent upward movement of the tack assembly 110. As such, the security tag 100 becomes securely coupled to the article 114.
  • In order to release the tack body 204 from the jaws 504-306, the detachment mechanism 102 is introduced into the insert space 116 formed in the housing 104 of the security tag 100. Rotation of the detachment mechanism 102 causes it to be moved in and guided by the arcuate channel 302 until the end 118 abuts portion 532 of the securement mechanism 206. Continued rotational movement of the detachment mechanism 102 causes force to be applied to portion 532 of the securement mechanism 206. This force, in turn, causes the clamp body 502 to rotate about the support area 508. The jaw 504 is thus enabled to spread away from jaw 506 due to the force of the tack body 204, which is being held stationary by jaw 506. As a result, aperture 520 expands, releasing the tack body 204 from the clutch of the jaws. The tack assembly 110 can now be moved in the upward direction past the jaws, via an upward force on the tack head 112.
  • During rotation of the clamp body 502, the spring sleeve 526 at the joint area 528 is compressed. After the tack assembly 110 is separated from the housing 104, the detachment mechanism 102 is rotated in the reverse direction. This reverse rotation disengages the detachment mechanism 102 from the securement mechanism 206. Consequently, the spring sleeve 526 rotates in an opposite direction so as to be brought back to its original position. Thereafter, the detachment mechanism 102 is guided out of the arcuate channel 302 and is removed from insert space 116 formed in the housing 104.
  • As evident from the above discussion, the detachment mechanism 102 is provided to deflect the securement mechanism 206 so as to allow the tack assembly 110 to be removed from the housing 104. The detachment mechanism 102 may be part of an external detacher. Detachers are well known in the art, and therefore will not be described herein. When the tack assembly 110 is removed from the housing 104, the security tag 100 can be decoupled from an article 114 (e.g., a piece of clothing).
  • The deflection of the securement mechanism 206 results from an application of mechanical energy by the detachment mechanism 102. The present invention provides a means for harnessing the applied mechanical energy. The means includes an additional element disposed between the securement mechanism and EAS/RFID component(s). The additional element can include, but is not limited to, a piezo (or piezoelectric) element, a magnet/solenoid element, and/or a MEMS device.
  • Referring now to FIG. 6, there is provided a schematic illustration of a securement mechanism 600. The securement mechanism 600 is similar to or the same as securement mechanism 206 of FIG. 5. As such, the discussion provided above in relation to securement mechanism 206 is sufficient for understanding securement mechanism 600. Unlike securement mechanism 206, securement mechanism has an energy harvester 602 coupled thereto for harnessing the applied mechanical energy.
  • The energy harvester 602 includes, but is not limited to, a piezo or piezoelectric element that is able to generate an electric charge in response to applied mechanical stress. The energy harvester 602 is attached to the spring sleeve 604 of the securement mechanism 600. When the securement mechanism 600 deforms due to loading applied by a detachment mechanism (e.g., detachment mechanism 102 of FIG. 1), mechanical energy is transferred to the spring sleeve 604. As such, the energy harvester 602 detects distortion of the spring sleeve 604 when the securement mechanism 600 is engaged by the detachment mechanism. The mechanical energy provided by the detected distortion of the spring sleeve 604 can be converted to electrical energy. The spring sleeve's distortion is shown in FIGS. 4 and 8. This distortion comprises a bending of at least a portion of the spring sleeve. In other scenarios, the spring sleeve may remain perfectly elastic. In both cases, the behavior of the spring sleeve is analyzed for generating an electrical signal. The spring sleeve may be configured for a one time use event or a multiple use event.
  • In this regard, positive and negative leads 702, 704 can be attached to the energy harvester 602 as shown in FIG. 7. When the leads 702, 704 are attached to the energy harvester 602, the energy harvester 602 can transmit an electrical signal to another object, such as a microprocessor of the EAS/RFID component(s) 802 shown by arrows 804 and 806 of FIG. 8. The leads 702, 704 are electrically coupled to the EAS/RFID component(s) 802 via wires and/or traces disposed on or in a circuit board 804. The wires and/or traces are not visible in FIG. 8.
  • When the electrical signal is applied to the EAS/RFID component(s) 802, it generates and transmits a notification signal to an external device (e.g., an EAS pedestal, RFID reader and/or a user or data acquisition system). This notification provides an indication that the hard tag has been detached from the article. The notification may also comprise information specifying an area or zone within a facility where the hard tag resides after being detached from the article. In effect, a user (e.g., retail personnel) is able to make a quick and informed decision as to whether a potential theft is taking place.
  • In some scenarios, a MEMS device 706 is provided in addition to the piezo element. The MEMS device 706 may be coupled to the spring sleeve 604 as shown in FIG. 7 or disposed on a circuit board 804. In both cases, the MEMS device 706 is connected in series between the energy harvester 602 and the EAS/RFID component(s) 802. The MEMS device 706 is generally configured to process the electrical signal generated by the piezo element for increasing or converting power so as to increase the efficiency of electric power transfer.
  • The present solution is not limited to the particulars of FIGS. 6-8. Means other than the piezo element may be employed for harnessing the applied mechanical energy. For example, the piezo element 602 may be replaced with a MEMS device. In this case, the MEMS device would detect deformation of the spring sleeve and generate an electrical signal in response to the detected deformation. The electrical signal would be provided from the MEMS device to the EAS/RFID component(s) 802.
  • MEMS devices are well known in the art, and therefore will not be described herein. Any known or to be known MEMS sensor can be used here without limitation provided that it can: (a) process the electrical signal generated by the piezo element for increasing or converting power so as to increase the efficiency of electric power transfer; or (b) detect deformation of the spring sleeve and generate an electrical signal in response to the detected deformation.
  • Referring now to FIG. 9, there is provided an illustration of another exemplary security tag 900 having an energy harvester 902 for harnessing the applied mechanical energy. The energy harvester 902 comprises a coil 904 and a permanent magnet 906. The permanent magnet 906 is coupled to the securement mechanism 908. When the securement mechanism 908 rotates, the permanent magnet 906 moves past the coil 904, thereby inducing a small electrical charge. The electrical charge can then be transferred to the EAS/RFID component(s) (not shown in FIG. 9 for clarity of the energy harvester's illustration) so as to indicate that the securement mechanism 908 has been engaged by a detachment mechanism 910 or other detachment tool.
  • When the electrical charge is transferred to the EAS/RFID component(s), it generates and transmits a notification signal to an external device (e.g., an EAS pedestal, RFID reader and/or a user or data acquisition system). This notification provides an indication that the security tag 900 has been detached from the article. The notification may also comprise information specifying an area or zone within a facility where the security tag 900 resides after being detached from the article. In effect, a user (e.g., retail personnel) is able to make a quick and informed decision as to whether a potential theft is taking place.
  • In some scenarios, the security tag 900 also comprises a MEMS device (not shown in FIG. 9 for clarity of the energy harvester's illustration) for improving the efficiency of electrical charge. The MEMS device is disposed on a circuit board (not shown in FIG. 9 for clarity of energy harvester's illustration) so as to be connected in series between the energy harvester 902 and the EAS/RFID component(s). The MEMS device is generally configured to process the electrical signal generated by the energy harvester 902 for increasing or converting power so as to increase the efficiency of electric power transfer.
  • The present solution is not limited to the particulars of FIG. 9. For example, a MEMS device may replace the coil 904. In this case, the MEMS device generates an electrical signal when the spring sleeve deforms (i.e., bends) and transfers the electrical signal to the EAS/RFID component(s).
  • MEMS devices are well known in the art, and therefore will not be described herein. Any known or to be known MEMS sensor can be used here without limitation provided that it can: (a) process the electrical signal generated by the energy harvester for increasing or converting power so as to increase the efficiency of electric power transfer; or (b) generates an electrical signal when the spring sleeve deforms (i.e., bends) and transfers the electrical signal to another device.
  • All of the apparatus, methods, and algorithms disclosed and claimed herein can be made and executed without undue experimentation in light of the present disclosure. While the invention has been described in terms of preferred embodiments, it will be apparent to those having ordinary skill in the art that variations may be applied to the apparatus, methods and sequence of steps of the method without departing from the concept and scope of the invention. More specifically, it will be apparent that certain components may be added to, combined with, or substituted for the components described herein while the same or similar results would be achieved. All such similar substitutes and modifications apparent to those having ordinary skill in the art are deemed to be within the scope of the invention as claimed.

Claims (15)

  1. A method for harvesting mechanical energy in a security tag (100, 900), comprising:
    applying by a tool a pushing force so as to cause a securement mechanism (206, 908) disposed within the security tag (100, 900) to deform;
    transferring mechanical energy to a spring sleeve (604) when the securement mechanism (206, 908) deforms due to loading applied by the tool;
    using an energy harvester (602, 902) to harness the mechanical energy applied by the tool, wherein the energy harvester is at least partially coupled to the securement mechanism (206, 908); and
    converting the mechanical energy to electrical energy.
  2. The method according to claim 1, wherein the energy harvester (602, 902) is disposed between the securement mechanism (206, 908) and an Electronic Article Surveillance ("EAS") or Radio
    Frequency Identification ("RFID") component of the security tag (100, 900).
  3. The method according to claim 1, wherein the energy harvester (602, 902) comprises at least one of a piezo element, a magnet/solenoid element and a Micro-Electro-Mechanical-Systems ("MEMS") device (706).
  4. The method according to claim 1, wherein the energy harvester (602, 902) comprises a piezo element attached to the spring sleeve (604) of the securement mechanism (206, 908).
  5. The method according to claim 1, wherein the energy harvester (602, 902) detects distortion of the spring sleeve (604) when the securement mechanism (206, 908) is engaged by the tool.
  6. The method according to claim 1, wherein positive and negative leads (702, 704) are attached to the energy harvester (602, 902); wherein the energy harvester (602, 902) optionally transmits an electrical signal to an electronic component of the security tag (100, 900).
  7. The method according to claim 1, wherein the energy harvester (602, 902) comprises a coil (904) and a permanent magnet (906) that is coupled to the securement mechanism (206, 908).
  8. The method according to claim 8, wherein the permanent magnet (906) moves past the coil (904) so as to induce an electrical charge when the securement mechanism (206, 908) rotates as a result of the pushing force being applied thereto; wherein the electrical charge is optionally transferred to an electronic component of the security tag (100, 900) as to indicate that the securement mechanism (206, 908) has been engaged by the tool.
  9. A security tag (100, 900), comprising:
    a securement mechanism (206, 908) disposed within the security tag (100, 900) so that the securement mechanism (206, 908) deforms when a pushing force is applied thereto by a tool, the securement mechanism (206, 908) comprising a spring sleeve (604) to which mechanical energy is transferred when the securement mechanism (206, 908) deforms; and
    an energy harvester (602, 902) at least partially coupled to the securement mechanism (206, 908) so that the mechanical energy applied by the tool is harnessed and converted into electrical energy.
  10. The security tag according to claim 9, wherein the energy harvester (602, 902) is disposed between the securement mechanism (206, 908) and an Electronic Article Surveillance ("EAS") or Radio Frequency Identification ("RFID") component of the security tag (100, 900).
  11. The security tag according to claim 9, wherein the energy harvester (602, 902) comprises at least one of a piezo element, a magnet/solenoid element and a Micro-Electro-Mechanical-Systems ("MEMS") device (706).
  12. The security tag according to claim 9, wherein the energy harvester (602, 902) comprises a piezo element attached to the spring sleeve (604) of the securement mechanism (206, 908).
  13. The security tag according to claim 9, wherein the energy harvester (602, 902) is adapted to detect distortion of the spring sleeve (604) when the securement mechanism (206, 908) is engaged by the tool.
  14. The security tag according to claim 9, wherein positive and negative leads (702, 704) are attached to the energy harvester (602, 902); wherein optionally the energy harvester (602, 902) is adapted to transmit an electrical signal to an electronic component of the security tag (100, 900).
  15. The security tag according to claim 9, wherein the energy harvester (602, 902) comprises a coil (904) and a permanent magnet (906) that is coupled to the securement mechanism (206, 908); wherein optionally the permanent magnet is adapted to move past the coil (904) so as to induce an electrical charge when the securement mechanism (206, 908) rotates as a result of the pushing force being applied thereto; wherein further optionally the electrical charge is transferred to an electronic component of the security tag (100, 900) as to indicate that the securement mechanism (206, 908) has been engaged by the tool.
EP16822761.9A 2016-11-11 2016-11-11 Hard tag locking clamp with energy harvesting element Active EP3539098B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2016/061630 WO2018089017A1 (en) 2016-11-11 2016-11-11 Hard tag locking clamp with energy harvesting element

Publications (2)

Publication Number Publication Date
EP3539098A1 EP3539098A1 (en) 2019-09-18
EP3539098B1 true EP3539098B1 (en) 2020-09-23

Family

ID=62109327

Family Applications (1)

Application Number Title Priority Date Filing Date
EP16822761.9A Active EP3539098B1 (en) 2016-11-11 2016-11-11 Hard tag locking clamp with energy harvesting element

Country Status (2)

Country Link
EP (1) EP3539098B1 (en)
WO (1) WO2018089017A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5367289A (en) * 1991-11-27 1994-11-22 Sensormatic Electronics Corporation Alarm tag for an electronic article surveillance system
US7564360B2 (en) * 2006-03-03 2009-07-21 Checkpoint Systems, Inc. RF release mechanism for hard tag
US8648721B2 (en) * 2010-08-09 2014-02-11 Tyco Fire & Security Gmbh Security tag with integrated EAS and energy harvesting magnetic element

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
EP3539098A1 (en) 2019-09-18
WO2018089017A1 (en) 2018-05-17

Similar Documents

Publication Publication Date Title
EP1563471B1 (en) Electronic article surveillance tag detachable by a transmitted signal
EP2724327B1 (en) Security system tag magnetic clutch and method
EP3132103B1 (en) Security tag with a magnetic gate
US10417889B2 (en) Hard tag locking clamp with energy harvesting element
CN114174617B (en) Security tag with vertically releasable 3-ball clutch
US8624739B2 (en) Electronic article surveillance system including low-cost EAS tag
CN113574237B (en) System and method for operating a security tag
US20150061872A1 (en) Security tag with an anti-defeat mechanism
US20180197391A1 (en) Security Tag
EP2853663A2 (en) Mobile detacher and hard tag
EP3539098B1 (en) Hard tag locking clamp with energy harvesting element
WO2018089016A1 (en) Hard tag locking clamp with energy harvesting element
WO2012155989A1 (en) Antitheft device and unlocking device for the antitheft device
US10431062B1 (en) Systems and methods for automated security tag detachment
CN114174619B (en) Security tag with 3-ball clutch and rotary actuated release
EP3652397B1 (en) Adjustable clamp product security device

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20190604

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20200514

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602016044666

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1317172

Country of ref document: AT

Kind code of ref document: T

Effective date: 20201015

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201223

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201223

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201224

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1317172

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20200923

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210125

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210123

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602016044666

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201111

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20201130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201130

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201130

26N No opposition filed

Effective date: 20210624

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201111

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200923

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200923

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231121

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20231123

Year of fee payment: 8

Ref country code: DE

Payment date: 20231127

Year of fee payment: 8