WO2017049121A1 - Clés programmables et dispositifs de sécurité - Google Patents
Clés programmables et dispositifs de sécurité Download PDFInfo
- Publication number
- WO2017049121A1 WO2017049121A1 PCT/US2016/052191 US2016052191W WO2017049121A1 WO 2017049121 A1 WO2017049121 A1 WO 2017049121A1 US 2016052191 W US2016052191 W US 2016052191W WO 2017049121 A1 WO2017049121 A1 WO 2017049121A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- code
- key
- master key
- security
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/242—Tag deactivation
Definitions
- Embodiments of the present invention relate generally to programmable keys and security devices of the type commonly used to display an item of merchandise vulnerable to theft.
- Retailers commonly use security devices for displaying items of merchandise within a retail store and/or other establishment.
- the security device typically displays an item of merchandise so that a potential purchaser may examine the item when deciding to make a purchase.
- a shoplifter may attempt to detach an item of merchandise from a security device, or alternatively, may attempt to remove a security device from a display area along with the item of merchandise.
- Embodiments of the present invention are directed to a security system for protecting items of merchandise.
- the security system may include one or more security devices, a master key, and one or more user keys.
- Each security device may be configured to protect an item of merchandise from theft by communication with a master key and/or user key.
- the master key may include a code stored in a memory thereof, and the one or more user keys may be configured to communicate with the master key for receiving and storing the code.
- Each user key may be configured to operate (e.g., arm or disarm) the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.
- a method for protecting items of merchandise from theft may include providing a master key, one or more security devices and one or more user keys. The method may further include causing the master key and/or one or more of the user keys to communicate with the security device to receive and store a code for operating (e.g., arming or disarming) the security device upon a matching of the code stored by the user key with the code stored by the security device.
- a code for operating e.g., arming or disarming
- a security system for protecting items of merchandise from theft includes one or more security devices configured to protect an item of merchandise from theft; a master key comprising a code stored in a memory thereof; and one or more user keys.
- the user keys may be configured to communicate with the master key for receiving and storing the code.
- the one or more security devices are configured to communicate with the one or more user keys for receiving and storing the code, and each user key is configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.
- a security system for protecting items of merchandise from theft includes one or more security devices configured to protect an item of merchandise from theft, a master key and at least one user key.
- the one or more security devices include a code stored in a memory thereof, and the master key includes a code stored in a memory thereof.
- the at least one user key may be configured to electrically engage with the master key for communicating with the master key to receive and store the code, wherein the at least one user key may be configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the at least one user key with the code stored by the security device.
- a method for protecting items of merchandise from theft includes providing a master key comprising a code stored in memory; providing one or more security devices each configured to protect an item of merchandise from theft; providing at least one user key configured to communicate with the master key for receiving and storing the code; electrically engaging the master key with the at least one user key for communicating with the one or more security devices to receive and store the code; and causing the at least one user key to communicate with the one or more security devices for operating thereof upon a matching of the code stored by the at least one user key with the code stored by the one or more security devices.
- FIG. 1 illustrates a plurality of master keys and user keys according to one embodiment of the present invention.
- FIG. 2 illustrates a detailed view of a master key having electrical contacts and a user key having an opening and electrical contacts according to one embodiment of the present invention.
- FIG. 3 illustrates the master key of FIG. 2 engaged with the user key shown in FIG. 2.
- FIG. 4 illustrates a security device according to one embodiment of the present invention.
- the master keys and user keys described herein may be operable for use with a security device.
- the security device may be one of the type commonly used to display one or more items of merchandise within a display area of a retail store.
- the security device may be a conventional merchandise display hook for displaying relatively, small, expensive consumer products, for example compact discs (CDs), digital video discs (DVDs), battery packs, etc., on a display support.
- the display support could be any suitable support, such as wire grid, horizontal bar rack, slat wall (also known as slat board), wall, table, desk, countertop or other secure structure.
- a security device may include merchandise display fixtures, such as a cabinet, and merchandise safers for storing one or more items of merchandise.
- the security device may be a display module, a stand, a puck, or base that is mountable to a display surface, support, or the like, for displaying an item of merchandise.
- the security device may include an alarm (e.g., a piezo), a battery, a logic control circuit or circuit board, communications circuitry, and a memory (see, e.g., FIG. 4).
- embodiments of each security device may include a sensor configured to detect various security events associated with the item of merchandise, such as unauthorized removal of the item of merchandise from the security device.
- the security device may be similar to the Locking Hooks, Smart Locks, and POD devices manufactured by InVue Security Products Inc.
- the item of merchandise may be a display model or an operational sample of electronic merchandise, such as mobile phones, portable computers (e.g., notebooks, laptops, tablets, etc.), e-readers, media players, and the like, for a customer to examine prior to deciding to purchase the item.
- the item of merchandise may be displayed in a manner that permits a prospective purchaser to evaluate the operation and features of the merchandise, while protecting the merchandise from being stolen.
- the item of merchandise may be a device used by employees within a retail store or other establishment (e.g., hospital, restaurant, etc.).
- the security system 10 may include one or more master keys 12, one or more user keys 14 and one or more security devices 50 (see FIG. 4).
- the one or more master keys 12, user keys 14 and security devices 50 may be programmed for operation with one another.
- the security system 10 may include at least one master key 12 and one or more user keys 14.
- the master key 12 may be configured to program each of the user keys 14.
- the master key 12 may have a code stored in a memory. The code may take many forms, such as a security disarm code, and may be unique to the master key 12.
- the code may be programmed into the master key 12 at the time of manufacture or otherwise assigned to the master key 12 by a manufacturer or other authorized person. In other embodiments, the code may be generated using an algorithm and may be randomly generated, although alternatively the code could be selected by a manufacturer or an authorized person.
- the master key 12 may be configured to transfer the code to each of the user keys 14 and/or security devices 50.
- the user keys 14 may be configured to operate with a security device 50, such as to arm or disarm the security device 50, as will be detailed herein below.
- the master key 12 may be configured to communicate with a user key 14 using a variety of techniques, including wired or wireless technology (e.g., Bluetooth or Wi-Fi communication).
- the master key 14 may be configured to engage the user key 12 for facilitating communication therewith.
- each user key 14 may include a housing 14a having an opening 20 formed therein for at least partially receiving a master key 12.
- the user key 14 may further include a transfer probe 14b located at an end of the housing 14a wherein the transfer probe 14b may be configured to facilitate communication with the security device 50.
- the master key 12 may include a head portion 12a and a tail portion 12b extending therefrom.
- the master key may 12 include one or more electrical contacts 16 formed on the tail portion 12b.
- the opening 20 formed in the housing 14a of the user key 14 may also include one or more electrical contacts 18.
- the electrical contacts 16 formed on the tail portion 12b of the master key 12 and the electrical contacts 18 formed in the opening 20 of the housing 14a of the user key 14 may facilitate communication between the master key 12 and the user key 14.
- the tail portion 12b of the master key 12 is configured to be received or partially received within the opening 20 of the user key 14 wherein respective electrical contacts 16, 18 align and mate thereby facilitating communication with one another.
- the master key 12 may be positioned within the opening 20 of the user key 14, wherein engagement of the respective electrical contacts 16, 18 may facilitate transmitting a code stored in a memory of the master key 12 such that the code is programmed into a memory of the user key 14.
- the memory of each user key 14 may be configured to receive and store the code.
- each security device 50 may be configured to communicate with a master key 12 and/or user key 14 to receive and store a code.
- a user key 14 may be configured to transfer a code to the security device 50 after being programmed by the master key 12.
- a user key 14 may be configured to erase or otherwise remove a code from a security device 50 after the security device has been programmed with the code.
- the user key 14 may be configured to remove the code from the security device 50 while in engagement with the master key 12.
- the security device 50 may be configured to be reprogrammed with a new code.
- a retailer may request a new master key 12 from the manufacturer or authorized distributor.
- the new master key 12 may then be used to reprogram each of the user keys 14 and/or security devices 50 in that retail store.
- the user keys 14 and/or security devices 50 may be configured to store the new codes in addition to the previously used code(s), or the old code may be replaced by the new code in a memory of the user key 14 and/or security device 50.
- the user key 14 may have a flash memory for storing more than one code; however, when the user key 14 is in communication with the security device 50, the security device 50 may be configured to recognize only the new code.
- the code is unknown to any user, thereby preventing the codes from being easily decipherable, and preventing the user keys 14 from being easily duplicated.
- a retailer or other authorized user may request a master key 12 with the previously used code from the manufacturer or authorized distributor.
- a manufacturer or authorized distributor may keep a record of the codes created or may have a means for allowing a previously generated code to be determined.
- the user key 14 may be reprogrammed by the master key 12 at any time, and users of the security system 10 may not be required to use a separate programming station for generating codes therefore providing a simpler and more streamlined approach for setting up, maintaining and operating the security system 10.
- codes may be assigned to the master keys 12 and/or the user keys 14 using various techniques. For example, where a large volume of user keys 14 is necessary (e.g., more than 50), a single code may be used for all user keys 14. As another example, one or more master keys 12 with the same code may be used in the same retail store. In other embodiments, for example with lower volume users (e.g., less than 10), a master key 12 may be packaged with a plurality of user keys 14 (e.g., 10). Thus, the master key 12 may be used with each one of the plurality of user keys 14 packaged therewith. Additionally, in other embodiments, master keys 12 packaged with a plurality of user keys 14 may have different codes. In some embodiments, each package may optionally include one or more security devices 50. In other embodiments, security devices 50 may be provided separately since the master keys 12 and/or user keys 14 may be used to program the security devices 50.
- each master key 12 and/or user key 14 may house various components, such as a controller, a logic control circuit or a printed circuit board, a memory, a battery, and/or an Electronic Article Surveillance (EAS) tag.
- each user key 14 may include a single-use (e.g., non-rechargeable) internal power source, such as a conventional or extended-life battery.
- each user key 14 may include a multiple- use (e.g., rechargeable) internal power source, such as a conventional capacitor or rechargeable battery.
- each user key 14 may have a permanent memory for storing one or more codes.
- a master key 12 and/or a user key 14 may be configured to cooperate with a security device 50.
- the security device 50 may include an opening 58 for receipt of a master key 12 therein. Similar to that described above with respect to the user key 14, the opening 58 of the security device may include one or more electrical contacts 62 configured to communicate with the one or more electrical contact 16 of the master key 12.
- the master key 12 may be positioned within the opening 58 of the security device 50, wherein alignment and/or mating of the respective electrical contacts 16, 62 may facilitate the transfer of a code stored in a memory of the master key 12 to the security device 50.
- the user key 14 may be configured to provide its code to a security device 50. For example, after receiving a code from the master key 12, the user may 14 may be used to program the security device 50 with the code.
- the security device 50 may store the code.
- the code stored in the user key 14 may be transmitted to the security device 50 for communicating with a logic control circuit 64 disposed within the security device 50 for arming or disarming the security device 50.
- the user key 14 may be configured for various forms of wireless communication with a security device 50, such as optical (e.g., infrared), acoustical (e.g., ultrasonic), radiofrequency (RF), or magnetic pulse.
- optical e.g., infrared
- acoustical e.g., ultrasonic
- RF radiofrequency
- data for instance a code may be transferred from the master key 12 and/or user key 14 to the security device 50 by wireless communication, such as by infrared (IR) optical transmission, as shown and described in United States Patent No. 7,737,843 entitled Programmable Alarm Module And System For Protecting Merchandise, and United States Patent No. 8,890,691, entitled Programmable Security System and Method for Protecting Merchandise, the disclosures of which are incorporated herein by reference in its entirety.
- IR infrared
- communication of the user key 14 with the security device 50 may be facilitated by a user positioning the user key 14 within, proximate or adjacent to the security device 50.
- a user having possession of the user key 14 presents the transfer probe 14b of the user key 14 proximate or adjacent to a transfer port 60 of the security device 50.
- the user may then actuate a control button 22 (see Fig. 1) on the user key 14 wherein the control button 22 may be configured to operatively control certain functions of a logic circuit, memory, communication system, and in particular, a transmission of data and/or power.
- actuation of the control button 22 may facilitate communication between a logic control circuit disposed within the user key 14 with a logic control circuit disposed within the security device 50.
- the communication exchange may involve verifying that the security device 50 has a code, wherein the logic control circuit 64 disposed within the security device 50 then queries the user key 14 for the code and/or vice versa. If the codes match, the security device 50 may be disarmed. If the codes do not match, the security device 50 may remain armed.
- the code may be wirelessly communicated between the security device 50 and the user key 14 by infrared (IR) optical transmission. Alternatively, in other embodiments, the code may be transmitted and received by electrical contacts, acoustic transmission (e.g., RF signals) or magnetic induction.
- the user key 14 may then be permitted to transfer electrical power to the security device 50, for example, to operate a lock mechanism of the security device 50.
- the user key 14 may transfer electrical power to the security device 50 in any suitable manner, such as by electrical contacts, acoustical transmission (e.g. RF signals), or magnetic induction. It is understood that in other embodiments, the user key 14 may only transfer a wireless signal to arm/disarm the security device 50 and does not transfer electrical power to the security device 50. In other embodiments, communication between the user key 14 and the security device 50 may result in unlocking a lock mechanism without the need for transferring electrical power to the security device 50.
- each master key 12 and/or user key 14 may include a timeout function. More particularly, each user key 14 may be configured to be deactivated after a predetermined time period or number of activations.
- a user key 14 may include a logic control circuit that is configured to be deactivated after about six to twelve hours (e.g., about eight hours) from the time the user key 14 was programmed by the master key 12. In this manner, a code is no longer capable of being communicated by the user key 14, and an authorized sales associate typically must reactivate, refresh, or otherwise reprogram the user key 14 assigned to him or her at the beginning of each work shift.
- the user key 14 may be reactivated by a master key 12, which is typically monitored or maintained at a secure location, in order to reactivate the logic control circuit of the user key 14.
- the master key 12 may include a similar time-out function, such as by limiting a certain number of user keys 14 and/or security devices 50 that are allowed to be programmed. For example, a master key 12 may be permitted to only program a limited number of user keys 14 before being deactivated.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Automation & Control Theory (AREA)
- Electromagnetism (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Cette invention concerne un système de sécurité. Ledit système de sécurité comprend un ou plusieurs dispositif(s) de sécurité dont chacun est configuré pour protéger un article de marchandise contre le vol et une clé maîtresse comprenant un code stocké dans la mémoire. Le système de sécurité comprend également une ou plusieurs clé(s) utilisateur configurée(s) pour communiquer avec la clé maîtresse pour recevoir et stocker le code. Ledit/lesdits dispositif(s) de sécurité est/sont configuré(s) pour communiquer avec la clé maîtresse et/ou ladite/lesdites clé(s) utilisateur destinée(s) à recevoir et stocker le code, et chaque clé utilisateur est configurée pour communiquer avec ledit/lesdits dispositif(s) de sécurité pour le/les armer ou désarmer suite à une correspondance du code stocké par la clé utilisateur avec le code stocké par le dispositif de sécurité.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562220343P | 2015-09-18 | 2015-09-18 | |
US62/220,343 | 2015-09-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017049121A1 true WO2017049121A1 (fr) | 2017-03-23 |
Family
ID=58289641
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/052191 WO2017049121A1 (fr) | 2015-09-18 | 2016-09-16 | Clés programmables et dispositifs de sécurité |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2017049121A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109914991A (zh) * | 2019-03-22 | 2019-06-21 | 杭州知天电子商务有限公司 | 一种防盗报警门 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070146134A1 (en) * | 2005-12-23 | 2007-06-28 | Alpha Security Products, Inc. | Programmable alarm module and system for protecting merchandise |
US20080012684A1 (en) * | 2005-12-23 | 2008-01-17 | Alpha Security Products, Inc. | Programmable key for a security system for protecting merchandise |
US20100175438A1 (en) * | 2009-01-13 | 2010-07-15 | Invue Security Products Inc. | Combination non-programmable and programmable key for security device |
US20140225733A1 (en) * | 2005-12-23 | 2014-08-14 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
-
2016
- 2016-09-16 WO PCT/US2016/052191 patent/WO2017049121A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070146134A1 (en) * | 2005-12-23 | 2007-06-28 | Alpha Security Products, Inc. | Programmable alarm module and system for protecting merchandise |
US20080012684A1 (en) * | 2005-12-23 | 2008-01-17 | Alpha Security Products, Inc. | Programmable key for a security system for protecting merchandise |
US20140225733A1 (en) * | 2005-12-23 | 2014-08-14 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
US20100175438A1 (en) * | 2009-01-13 | 2010-07-15 | Invue Security Products Inc. | Combination non-programmable and programmable key for security device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109914991A (zh) * | 2019-03-22 | 2019-06-21 | 杭州知天电子商务有限公司 | 一种防盗报警门 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11015373B2 (en) | Key and security device | |
US11295585B2 (en) | Systems and methods for remotely controlling security devices | |
US11253087B2 (en) | Systems and methods for acquiring data from articles of merchandise on display | |
AU2011295868B2 (en) | Electronic key for merchandise security device | |
JP6574851B2 (ja) | 商品ディスプレイセキュリティシステム及び方法 | |
EP3018641B1 (fr) | Système de sécurité et procédé de protection de marchandises | |
US20150061831A1 (en) | Key and security device | |
US20230186739A1 (en) | Systems and methods for acquiring data from articles of merchandise on display | |
WO2017049121A1 (fr) | Clés programmables et dispositifs de sécurité | |
WO2015038201A1 (fr) | Clé multifonctions pour dispositifs de sécurité | |
WO2017112749A1 (fr) | Contenant de sécurité pour marchandise | |
EP4233020A1 (fr) | Dispositif intelligent destiné à l'autorisation de clés de sécurité de marchandise |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16847414 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16847414 Country of ref document: EP Kind code of ref document: A1 |