WO2017049121A1 - Clés programmables et dispositifs de sécurité - Google Patents

Clés programmables et dispositifs de sécurité Download PDF

Info

Publication number
WO2017049121A1
WO2017049121A1 PCT/US2016/052191 US2016052191W WO2017049121A1 WO 2017049121 A1 WO2017049121 A1 WO 2017049121A1 US 2016052191 W US2016052191 W US 2016052191W WO 2017049121 A1 WO2017049121 A1 WO 2017049121A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
code
key
master key
security
Prior art date
Application number
PCT/US2016/052191
Other languages
English (en)
Inventor
Christopher J. Fawcett
Original Assignee
Invue Security Products, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Invue Security Products, Inc. filed Critical Invue Security Products, Inc.
Publication of WO2017049121A1 publication Critical patent/WO2017049121A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/242Tag deactivation

Definitions

  • Embodiments of the present invention relate generally to programmable keys and security devices of the type commonly used to display an item of merchandise vulnerable to theft.
  • Retailers commonly use security devices for displaying items of merchandise within a retail store and/or other establishment.
  • the security device typically displays an item of merchandise so that a potential purchaser may examine the item when deciding to make a purchase.
  • a shoplifter may attempt to detach an item of merchandise from a security device, or alternatively, may attempt to remove a security device from a display area along with the item of merchandise.
  • Embodiments of the present invention are directed to a security system for protecting items of merchandise.
  • the security system may include one or more security devices, a master key, and one or more user keys.
  • Each security device may be configured to protect an item of merchandise from theft by communication with a master key and/or user key.
  • the master key may include a code stored in a memory thereof, and the one or more user keys may be configured to communicate with the master key for receiving and storing the code.
  • Each user key may be configured to operate (e.g., arm or disarm) the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.
  • a method for protecting items of merchandise from theft may include providing a master key, one or more security devices and one or more user keys. The method may further include causing the master key and/or one or more of the user keys to communicate with the security device to receive and store a code for operating (e.g., arming or disarming) the security device upon a matching of the code stored by the user key with the code stored by the security device.
  • a code for operating e.g., arming or disarming
  • a security system for protecting items of merchandise from theft includes one or more security devices configured to protect an item of merchandise from theft; a master key comprising a code stored in a memory thereof; and one or more user keys.
  • the user keys may be configured to communicate with the master key for receiving and storing the code.
  • the one or more security devices are configured to communicate with the one or more user keys for receiving and storing the code, and each user key is configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.
  • a security system for protecting items of merchandise from theft includes one or more security devices configured to protect an item of merchandise from theft, a master key and at least one user key.
  • the one or more security devices include a code stored in a memory thereof, and the master key includes a code stored in a memory thereof.
  • the at least one user key may be configured to electrically engage with the master key for communicating with the master key to receive and store the code, wherein the at least one user key may be configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the at least one user key with the code stored by the security device.
  • a method for protecting items of merchandise from theft includes providing a master key comprising a code stored in memory; providing one or more security devices each configured to protect an item of merchandise from theft; providing at least one user key configured to communicate with the master key for receiving and storing the code; electrically engaging the master key with the at least one user key for communicating with the one or more security devices to receive and store the code; and causing the at least one user key to communicate with the one or more security devices for operating thereof upon a matching of the code stored by the at least one user key with the code stored by the one or more security devices.
  • FIG. 1 illustrates a plurality of master keys and user keys according to one embodiment of the present invention.
  • FIG. 2 illustrates a detailed view of a master key having electrical contacts and a user key having an opening and electrical contacts according to one embodiment of the present invention.
  • FIG. 3 illustrates the master key of FIG. 2 engaged with the user key shown in FIG. 2.
  • FIG. 4 illustrates a security device according to one embodiment of the present invention.
  • the master keys and user keys described herein may be operable for use with a security device.
  • the security device may be one of the type commonly used to display one or more items of merchandise within a display area of a retail store.
  • the security device may be a conventional merchandise display hook for displaying relatively, small, expensive consumer products, for example compact discs (CDs), digital video discs (DVDs), battery packs, etc., on a display support.
  • the display support could be any suitable support, such as wire grid, horizontal bar rack, slat wall (also known as slat board), wall, table, desk, countertop or other secure structure.
  • a security device may include merchandise display fixtures, such as a cabinet, and merchandise safers for storing one or more items of merchandise.
  • the security device may be a display module, a stand, a puck, or base that is mountable to a display surface, support, or the like, for displaying an item of merchandise.
  • the security device may include an alarm (e.g., a piezo), a battery, a logic control circuit or circuit board, communications circuitry, and a memory (see, e.g., FIG. 4).
  • embodiments of each security device may include a sensor configured to detect various security events associated with the item of merchandise, such as unauthorized removal of the item of merchandise from the security device.
  • the security device may be similar to the Locking Hooks, Smart Locks, and POD devices manufactured by InVue Security Products Inc.
  • the item of merchandise may be a display model or an operational sample of electronic merchandise, such as mobile phones, portable computers (e.g., notebooks, laptops, tablets, etc.), e-readers, media players, and the like, for a customer to examine prior to deciding to purchase the item.
  • the item of merchandise may be displayed in a manner that permits a prospective purchaser to evaluate the operation and features of the merchandise, while protecting the merchandise from being stolen.
  • the item of merchandise may be a device used by employees within a retail store or other establishment (e.g., hospital, restaurant, etc.).
  • the security system 10 may include one or more master keys 12, one or more user keys 14 and one or more security devices 50 (see FIG. 4).
  • the one or more master keys 12, user keys 14 and security devices 50 may be programmed for operation with one another.
  • the security system 10 may include at least one master key 12 and one or more user keys 14.
  • the master key 12 may be configured to program each of the user keys 14.
  • the master key 12 may have a code stored in a memory. The code may take many forms, such as a security disarm code, and may be unique to the master key 12.
  • the code may be programmed into the master key 12 at the time of manufacture or otherwise assigned to the master key 12 by a manufacturer or other authorized person. In other embodiments, the code may be generated using an algorithm and may be randomly generated, although alternatively the code could be selected by a manufacturer or an authorized person.
  • the master key 12 may be configured to transfer the code to each of the user keys 14 and/or security devices 50.
  • the user keys 14 may be configured to operate with a security device 50, such as to arm or disarm the security device 50, as will be detailed herein below.
  • the master key 12 may be configured to communicate with a user key 14 using a variety of techniques, including wired or wireless technology (e.g., Bluetooth or Wi-Fi communication).
  • the master key 14 may be configured to engage the user key 12 for facilitating communication therewith.
  • each user key 14 may include a housing 14a having an opening 20 formed therein for at least partially receiving a master key 12.
  • the user key 14 may further include a transfer probe 14b located at an end of the housing 14a wherein the transfer probe 14b may be configured to facilitate communication with the security device 50.
  • the master key 12 may include a head portion 12a and a tail portion 12b extending therefrom.
  • the master key may 12 include one or more electrical contacts 16 formed on the tail portion 12b.
  • the opening 20 formed in the housing 14a of the user key 14 may also include one or more electrical contacts 18.
  • the electrical contacts 16 formed on the tail portion 12b of the master key 12 and the electrical contacts 18 formed in the opening 20 of the housing 14a of the user key 14 may facilitate communication between the master key 12 and the user key 14.
  • the tail portion 12b of the master key 12 is configured to be received or partially received within the opening 20 of the user key 14 wherein respective electrical contacts 16, 18 align and mate thereby facilitating communication with one another.
  • the master key 12 may be positioned within the opening 20 of the user key 14, wherein engagement of the respective electrical contacts 16, 18 may facilitate transmitting a code stored in a memory of the master key 12 such that the code is programmed into a memory of the user key 14.
  • the memory of each user key 14 may be configured to receive and store the code.
  • each security device 50 may be configured to communicate with a master key 12 and/or user key 14 to receive and store a code.
  • a user key 14 may be configured to transfer a code to the security device 50 after being programmed by the master key 12.
  • a user key 14 may be configured to erase or otherwise remove a code from a security device 50 after the security device has been programmed with the code.
  • the user key 14 may be configured to remove the code from the security device 50 while in engagement with the master key 12.
  • the security device 50 may be configured to be reprogrammed with a new code.
  • a retailer may request a new master key 12 from the manufacturer or authorized distributor.
  • the new master key 12 may then be used to reprogram each of the user keys 14 and/or security devices 50 in that retail store.
  • the user keys 14 and/or security devices 50 may be configured to store the new codes in addition to the previously used code(s), or the old code may be replaced by the new code in a memory of the user key 14 and/or security device 50.
  • the user key 14 may have a flash memory for storing more than one code; however, when the user key 14 is in communication with the security device 50, the security device 50 may be configured to recognize only the new code.
  • the code is unknown to any user, thereby preventing the codes from being easily decipherable, and preventing the user keys 14 from being easily duplicated.
  • a retailer or other authorized user may request a master key 12 with the previously used code from the manufacturer or authorized distributor.
  • a manufacturer or authorized distributor may keep a record of the codes created or may have a means for allowing a previously generated code to be determined.
  • the user key 14 may be reprogrammed by the master key 12 at any time, and users of the security system 10 may not be required to use a separate programming station for generating codes therefore providing a simpler and more streamlined approach for setting up, maintaining and operating the security system 10.
  • codes may be assigned to the master keys 12 and/or the user keys 14 using various techniques. For example, where a large volume of user keys 14 is necessary (e.g., more than 50), a single code may be used for all user keys 14. As another example, one or more master keys 12 with the same code may be used in the same retail store. In other embodiments, for example with lower volume users (e.g., less than 10), a master key 12 may be packaged with a plurality of user keys 14 (e.g., 10). Thus, the master key 12 may be used with each one of the plurality of user keys 14 packaged therewith. Additionally, in other embodiments, master keys 12 packaged with a plurality of user keys 14 may have different codes. In some embodiments, each package may optionally include one or more security devices 50. In other embodiments, security devices 50 may be provided separately since the master keys 12 and/or user keys 14 may be used to program the security devices 50.
  • each master key 12 and/or user key 14 may house various components, such as a controller, a logic control circuit or a printed circuit board, a memory, a battery, and/or an Electronic Article Surveillance (EAS) tag.
  • each user key 14 may include a single-use (e.g., non-rechargeable) internal power source, such as a conventional or extended-life battery.
  • each user key 14 may include a multiple- use (e.g., rechargeable) internal power source, such as a conventional capacitor or rechargeable battery.
  • each user key 14 may have a permanent memory for storing one or more codes.
  • a master key 12 and/or a user key 14 may be configured to cooperate with a security device 50.
  • the security device 50 may include an opening 58 for receipt of a master key 12 therein. Similar to that described above with respect to the user key 14, the opening 58 of the security device may include one or more electrical contacts 62 configured to communicate with the one or more electrical contact 16 of the master key 12.
  • the master key 12 may be positioned within the opening 58 of the security device 50, wherein alignment and/or mating of the respective electrical contacts 16, 62 may facilitate the transfer of a code stored in a memory of the master key 12 to the security device 50.
  • the user key 14 may be configured to provide its code to a security device 50. For example, after receiving a code from the master key 12, the user may 14 may be used to program the security device 50 with the code.
  • the security device 50 may store the code.
  • the code stored in the user key 14 may be transmitted to the security device 50 for communicating with a logic control circuit 64 disposed within the security device 50 for arming or disarming the security device 50.
  • the user key 14 may be configured for various forms of wireless communication with a security device 50, such as optical (e.g., infrared), acoustical (e.g., ultrasonic), radiofrequency (RF), or magnetic pulse.
  • optical e.g., infrared
  • acoustical e.g., ultrasonic
  • RF radiofrequency
  • data for instance a code may be transferred from the master key 12 and/or user key 14 to the security device 50 by wireless communication, such as by infrared (IR) optical transmission, as shown and described in United States Patent No. 7,737,843 entitled Programmable Alarm Module And System For Protecting Merchandise, and United States Patent No. 8,890,691, entitled Programmable Security System and Method for Protecting Merchandise, the disclosures of which are incorporated herein by reference in its entirety.
  • IR infrared
  • communication of the user key 14 with the security device 50 may be facilitated by a user positioning the user key 14 within, proximate or adjacent to the security device 50.
  • a user having possession of the user key 14 presents the transfer probe 14b of the user key 14 proximate or adjacent to a transfer port 60 of the security device 50.
  • the user may then actuate a control button 22 (see Fig. 1) on the user key 14 wherein the control button 22 may be configured to operatively control certain functions of a logic circuit, memory, communication system, and in particular, a transmission of data and/or power.
  • actuation of the control button 22 may facilitate communication between a logic control circuit disposed within the user key 14 with a logic control circuit disposed within the security device 50.
  • the communication exchange may involve verifying that the security device 50 has a code, wherein the logic control circuit 64 disposed within the security device 50 then queries the user key 14 for the code and/or vice versa. If the codes match, the security device 50 may be disarmed. If the codes do not match, the security device 50 may remain armed.
  • the code may be wirelessly communicated between the security device 50 and the user key 14 by infrared (IR) optical transmission. Alternatively, in other embodiments, the code may be transmitted and received by electrical contacts, acoustic transmission (e.g., RF signals) or magnetic induction.
  • the user key 14 may then be permitted to transfer electrical power to the security device 50, for example, to operate a lock mechanism of the security device 50.
  • the user key 14 may transfer electrical power to the security device 50 in any suitable manner, such as by electrical contacts, acoustical transmission (e.g. RF signals), or magnetic induction. It is understood that in other embodiments, the user key 14 may only transfer a wireless signal to arm/disarm the security device 50 and does not transfer electrical power to the security device 50. In other embodiments, communication between the user key 14 and the security device 50 may result in unlocking a lock mechanism without the need for transferring electrical power to the security device 50.
  • each master key 12 and/or user key 14 may include a timeout function. More particularly, each user key 14 may be configured to be deactivated after a predetermined time period or number of activations.
  • a user key 14 may include a logic control circuit that is configured to be deactivated after about six to twelve hours (e.g., about eight hours) from the time the user key 14 was programmed by the master key 12. In this manner, a code is no longer capable of being communicated by the user key 14, and an authorized sales associate typically must reactivate, refresh, or otherwise reprogram the user key 14 assigned to him or her at the beginning of each work shift.
  • the user key 14 may be reactivated by a master key 12, which is typically monitored or maintained at a secure location, in order to reactivate the logic control circuit of the user key 14.
  • the master key 12 may include a similar time-out function, such as by limiting a certain number of user keys 14 and/or security devices 50 that are allowed to be programmed. For example, a master key 12 may be permitted to only program a limited number of user keys 14 before being deactivated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Electromagnetism (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

Cette invention concerne un système de sécurité. Ledit système de sécurité comprend un ou plusieurs dispositif(s) de sécurité dont chacun est configuré pour protéger un article de marchandise contre le vol et une clé maîtresse comprenant un code stocké dans la mémoire. Le système de sécurité comprend également une ou plusieurs clé(s) utilisateur configurée(s) pour communiquer avec la clé maîtresse pour recevoir et stocker le code. Ledit/lesdits dispositif(s) de sécurité est/sont configuré(s) pour communiquer avec la clé maîtresse et/ou ladite/lesdites clé(s) utilisateur destinée(s) à recevoir et stocker le code, et chaque clé utilisateur est configurée pour communiquer avec ledit/lesdits dispositif(s) de sécurité pour le/les armer ou désarmer suite à une correspondance du code stocké par la clé utilisateur avec le code stocké par le dispositif de sécurité.
PCT/US2016/052191 2015-09-18 2016-09-16 Clés programmables et dispositifs de sécurité WO2017049121A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562220343P 2015-09-18 2015-09-18
US62/220,343 2015-09-18

Publications (1)

Publication Number Publication Date
WO2017049121A1 true WO2017049121A1 (fr) 2017-03-23

Family

ID=58289641

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2016/052191 WO2017049121A1 (fr) 2015-09-18 2016-09-16 Clés programmables et dispositifs de sécurité

Country Status (1)

Country Link
WO (1) WO2017049121A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109914991A (zh) * 2019-03-22 2019-06-21 杭州知天电子商务有限公司 一种防盗报警门

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070146134A1 (en) * 2005-12-23 2007-06-28 Alpha Security Products, Inc. Programmable alarm module and system for protecting merchandise
US20080012684A1 (en) * 2005-12-23 2008-01-17 Alpha Security Products, Inc. Programmable key for a security system for protecting merchandise
US20100175438A1 (en) * 2009-01-13 2010-07-15 Invue Security Products Inc. Combination non-programmable and programmable key for security device
US20140225733A1 (en) * 2005-12-23 2014-08-14 Invue Security Products Inc. Programmable security system and method for protecting merchandise

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070146134A1 (en) * 2005-12-23 2007-06-28 Alpha Security Products, Inc. Programmable alarm module and system for protecting merchandise
US20080012684A1 (en) * 2005-12-23 2008-01-17 Alpha Security Products, Inc. Programmable key for a security system for protecting merchandise
US20140225733A1 (en) * 2005-12-23 2014-08-14 Invue Security Products Inc. Programmable security system and method for protecting merchandise
US20100175438A1 (en) * 2009-01-13 2010-07-15 Invue Security Products Inc. Combination non-programmable and programmable key for security device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109914991A (zh) * 2019-03-22 2019-06-21 杭州知天电子商务有限公司 一种防盗报警门

Similar Documents

Publication Publication Date Title
US11015373B2 (en) Key and security device
US11295585B2 (en) Systems and methods for remotely controlling security devices
US11253087B2 (en) Systems and methods for acquiring data from articles of merchandise on display
AU2011295868B2 (en) Electronic key for merchandise security device
JP6574851B2 (ja) 商品ディスプレイセキュリティシステム及び方法
EP3018641B1 (fr) Système de sécurité et procédé de protection de marchandises
US20150061831A1 (en) Key and security device
US20230186739A1 (en) Systems and methods for acquiring data from articles of merchandise on display
WO2017049121A1 (fr) Clés programmables et dispositifs de sécurité
WO2015038201A1 (fr) Clé multifonctions pour dispositifs de sécurité
WO2017112749A1 (fr) Contenant de sécurité pour marchandise
EP4233020A1 (fr) Dispositif intelligent destiné à l'autorisation de clés de sécurité de marchandise

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16847414

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16847414

Country of ref document: EP

Kind code of ref document: A1