WO2023164778A1 - Appareil et système antivol - Google Patents

Appareil et système antivol Download PDF

Info

Publication number
WO2023164778A1
WO2023164778A1 PCT/CA2023/050283 CA2023050283W WO2023164778A1 WO 2023164778 A1 WO2023164778 A1 WO 2023164778A1 CA 2023050283 W CA2023050283 W CA 2023050283W WO 2023164778 A1 WO2023164778 A1 WO 2023164778A1
Authority
WO
WIPO (PCT)
Prior art keywords
trigger
item
host device
detection trigger
wire
Prior art date
Application number
PCT/CA2023/050283
Other languages
English (en)
Inventor
Richard Lawson
Original Assignee
Richard Lawson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Richard Lawson filed Critical Richard Lawson
Publication of WO2023164778A1 publication Critical patent/WO2023164778A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • E05B45/005Chain-locks, cable-locks or padlocks with alarms
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B73/00Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
    • E05B73/0005Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices using chains, cables or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B73/00Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
    • E05B73/0082Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices for office machines, e.g. PC's, portable computers, typewriters, calculators
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62HCYCLE STANDS; SUPPORTS OR HOLDERS FOR PARKING OR STORING CYCLES; APPLIANCES PREVENTING OR INDICATING UNAUTHORIZED USE OR THEFT OF CYCLES; LOCKS INTEGRAL WITH CYCLES; DEVICES FOR LEARNING TO RIDE CYCLES
    • B62H5/00Appliances preventing or indicating unauthorised use or theft of cycles; Locks integral with cycles
    • B62H5/14Appliances preventing or indicating unauthorised use or theft of cycles; Locks integral with cycles preventing wheel rotation
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62HCYCLE STANDS; SUPPORTS OR HOLDERS FOR PARKING OR STORING CYCLES; APPLIANCES PREVENTING OR INDICATING UNAUTHORIZED USE OR THEFT OF CYCLES; LOCKS INTEGRAL WITH CYCLES; DEVICES FOR LEARNING TO RIDE CYCLES
    • B62H5/00Appliances preventing or indicating unauthorised use or theft of cycles; Locks integral with cycles
    • B62H5/20Appliances preventing or indicating unauthorised use or theft of cycles; Locks integral with cycles indicating unauthorised use, e.g. acting on signalling devices
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0261System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0269System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS

Definitions

  • the present invention relates to preventing theft of an item of value. More specifically, the present invention relates to an apparatus and system for electronic detection of tampering or theft.
  • a thief can often circumvent the wire, simply by separating the security tag and the item by cutting such a lanyard. The item is then in an unprotected state.
  • some types of known security tags include a cam to lock one end of the lanyard. The cam contains a pin, and removing the pin will trigger a tamper alarm. However, if the tamper alarm can be separated from the item without removing the pin, the item is left unprotected, and may be removed from the premises by the thief.
  • a more recent class of solutions employs continual geo-tracking to secure an item. These devices are constantly polling for GNSS location data and transmitting a location signal. (Note that GNSS refers to “Global Navigation Satellite Systems”, including without limitation, GPS, GLONASS, Galileo, BeiDou, and any other suitable system.) Items are secured, using such devices, by detecting unexpected motion via an accelerometer or by detecting unexpected change in GPS location. However, the detection function can consume considerable power over a period of time, leaving less power remaining for tracking and recovery. As well, the continual location transmission also gives rise to privacy concerns and can be exploited for surveillance.
  • the present invention provides an apparatus and system for electronic detection of tampering or theft.
  • This invention includes a host security device that triggers an alarm when a protected item is stolen and/or that supports geolocation transmission to enable recovery of the protected item.
  • An aim of the invention is to solve the problem of property crime as it relates to property that is commonly left unattended in public settings and that therefore tends to be very mobile.
  • the invention makes it impractical for a thief to circumvent the triggering of the alarm.
  • triggering the alarm is not dependent on transmission of geolocation information while secured, privacy is enhanced and battery power is preserved for tracking and recovery should the item be stolen.
  • this document discloses a system for securing an item of value, the system comprising: - a detection trigger;
  • said host device being configured to perform a series of specific actions when said system is in a triggered state, said series of specific actions relating to at least one of: alarms or item recovery; and
  • said detection trigger is coupled to a fixture
  • said detection trigger is coupled to said trigger switch
  • this document discloses a system wherein tampering with said detection trigger causes said system to be in a triggered state.
  • this document discloses a system wherein said detection trigger is a bundled security wire carrying current such that interruption of said current causes said system to be in a triggered state.
  • this document discloses a system wherein said detection trigger is a network receiver receiving a wireless network signal from a specific transmitter and wherein loss of said wireless network signal causes said system to be in a triggered state.
  • this document discloses a system wherein said detection trigger loses said wireless network signal when said detection trigger is beyond a specified distance from said specific transmitter.
  • this document discloses a system wherein said system is disarmed by activating a key mechanism in said host device.
  • this document discloses a system wherein said series of specific actions comprises at least one of: an activation of an audible alarm; an activation of a visible alarm; an activation of a location beacon; an emission of a visible indicator light; relaying a signal to at least one other device connected to the item; and alerting a central registry that the item has been stolen.
  • this document discloses a system wherein the item has at least one wheel and said at least one other device disables motion of said at least one wheel.
  • FIGURES 1A to IB are general schematics in accordance with an embodiment of the present invention.
  • FIGURE 2 is an implementation in accordance with the first embodiment of the invention utilizing a trigger wire as detection trigger;
  • FIGURE 3 is an implementation in accordance with another embodiment of the invention utilizing a network tether as detection trigger;
  • FIGURE 4 is a schematic illustrating an overlapping configuration of wire element forming a detection trigger wire in accordance with an embodiment of the invention
  • FIGURES 5A and 5B illustrate a manner of forming a trigger wire in accordance with an embodiment of the invention
  • FIGURE 6A shows one type of formed trigger wire in accordance with an embodiment of the invention
  • FIGURE 6B shows the formed trigger wire of Figure 6 A
  • FIGURES 7A, 7B, and 7C show three possible use case scenarios for the present invention
  • FIGURE 8 illustrates an armed trigger switch’s circuit connection state with respect to the host device in accordance with the invention
  • FIGURE 9 illustrates the disconnected energy pathway while in a triggered state of a trigger switch’s circuit connection state with respect to the host device in accordance with the invention
  • FIGURE 10A illustrates arming by connecting a security wire in accordance with an embodiment of the invention
  • FIGURES 10B and IOC illustrate arming from within the host device, according to an embodiment of the invention
  • FIGURES 10D, 10E, and 10F illustrate disarming from within the host device, according to an embodiment of the invention
  • FIGURE 11 illustrates arming and securing property via a network trigger in in accordance with the invention
  • FIGURE 12 illustrates one possible use of the invention in the context of laptop security
  • FIGURE 13 illustrates another possible use of the invention in the context of animal range monitoring
  • FIGURE 14 is a schematic showing the activation of sub triggers in accordance with an embodiment of the invention.
  • FIGURE 15 is a flow diagram of the arming, disarming, and triggering process.
  • the apparatus and system for electronic detection of tampering or theft in accordance with the present invention includes three primary components: a detection trigger 10 and a trigger switch 12 that is contained within a host device 13.
  • the detection trigger and trigger switch are connected by way of a male/female connection Ila, 11b in a manner consistent with standard electrical connections.
  • the host device provides an alarm and, optionally, geolocation transmission circuitry to enable recovery of a protected item once stolen.
  • the apparatus has three states of operation: a disarmed state, an armed state, and a triggered state.
  • the detection trigger preferably comprises a specialized wire cable (i.e., “trigger wire”), or a network proximity pairing (i.e., “network tether”).
  • a trigger wire comprises the detection trigger.
  • the host device 21 includes an indicator light 22 and female receptacle 23 for accepting a male contact 24 of the security wire 25.
  • FIGURE 3 shows an implementation in accordance with the first embodiment of the invention, wherein a network tether comprises the detection trigger.
  • the host device 31 again includes an indicator light 32 and female receptacle 33 for accepting a male contact 34 which is now shown as a network receiver 35.
  • the three primary components that comprise the system include the detection trigger, the trigger switch, and the host device.
  • the system secures the article to a fixed location (i.e., a permanent fixture in a physical location, such as a pole, fence, wall, etc.). This securing is accomplished through either the trigger wire, or through the network tether’s network proximity pairing. It should be understood that the invention will not physically stop a thief from being able to remove the item from its fixed location. Rather, the invention provides an alert (by audible or silent alarm) that the security of the item has been compromised.
  • the host device When implementing the invention, it should be understood that a compromised item which therefore triggers an alarm will require that the host device be either embedded or securely attached to the item.
  • the host device may be discreetly attached anywhere outside, or unobtrusively within, the bicycle frame.
  • the detection trigger is not usable to disable the security behavior of the host device.
  • the specialized wire cable when provided as the detection trigger, cannot be practically bypassed by a thief by using a jumper wire.
  • the inventive apparatus differs in that the trigger wire or network tether does not prevent the protected item from being used because the wire may be easily cut. Instead, the trigger wire or network tether acts as a trigger for an alarm and beacon. Accordingly, if the trigger wire is cut or the network tether moves out of range of the host device, the apparatus provides an alarm and stays with the stolen item.
  • the inventive host device would be affixed to the protected item and it is not necessary or even desirable to remove the host device.
  • the host device may support any key (e.g., physical metal key, radio frequency key, etc.).
  • each host device has a unique key. In other embodiments, for example for use in commercial, retail and/or group settings, a single key is employable to control disarming operation of a group of items.
  • the trigger wire is a specialised wire cable that conducts current.
  • the security wire is actually a single strand with ends 41, 43 and that is folded (fold shown at 42) to resemble a wire bundle of overlapping strands.
  • the security wire conducts the current applied at the ends 41, 43 through a single path. Therefore, any break will cause the circuit to open.
  • the purpose of this design is to present what appears to be a wire bundle to a potential thief should they try to clip a bypass. Because all the wires cannot be cut together instantaneously, any cutting attempt (even if only one strand) will cause the circuit to break and therefore cause the trigger to fire.
  • FIGURES 5A and 5B The manner of fabricating the security wire is illustrated in FIGURES 5A and 5B.
  • the security wire in the pre-formed state 51 has a clip with an opening for the two wire ends 52 and a small post that forms a clip post 53 to act as a jig at the terminating end.
  • the clip post is used with another jig post 54 to wrap the wire in a loop until the desired number of folds is reached.
  • the clip is completed and the post and wirefolds 55 are enclosed with the two wire ends available for any manner of terminal. Where the jig post is removed, the wire folds are now available to form a loop 58. This allows the security wire in the resultant wire bundle 57 to act as a noose for more flexibility in securing to fixed objects.
  • the wire appears as a wire bundle to a person opening the sheath 62 and attempting a splice. However, it is really one continuous wire formed in a loop with connection ends 61 and an apex 64 of the loop. If a would- be thief were to open two sections of the sheath, exposing a single given wire 63 in one opening, they would be unable to discern by eye which strand in the other opening corresponded to the ‘single wire’ 63. As noted above, if any of what appear to be individual wires are cut, then the wire as a whole will stop conducting, as there is in fact only a single wire.
  • the trigger wire used in the invention is not intended to be used to attach a tag (e.g, radio frequency identification (RFID) tag) to the protected item of value.
  • RFID radio frequency identification
  • the trigger wire in accordance with the present invention is used to physically secure the item of value to a fixed location to physically dissuade and hinder, though not prevent, removal of the protected item from the fixed location.
  • FIGURE 6B shows the wire of Figure 6A from a different view, with a male connectors 61 and two terminals 611, 612 (i.e., positive and negative terminals).
  • FIGURES 7 A, 7B, and 7C shows various use case scenarios in terms of attempting to defeat the security aspect of the invention.
  • FIGURE 7A a theft attempt is illustrated showing a thief s attempt to steal the item 74 by creating a bridge splice to bypass the security wire’s 72 loop around the fixed object 71.
  • the thief is attempting to not trigger the security wire, by creating a parallel circuit in the wire 75 and then cutting 77 the part of the original wire that surrounds the fixed object.
  • the most common tool for this is a piercing jaw clamp 76.
  • this attempt would fail with the wire 72, because the splice requires all wires in the bundle to be cut and spliced simultaneously. This is highly impractical in the typical theft context.
  • the trigger switch within the host device 73 would detect the circuit interruption and, in turn, causes a trigger action. In this case, the behavior of the host device is that of sounding an audible alarm and causing a beacon to begin transmitting 78.
  • FIGURE 7B if a thief attempts to unplug or disable the network detection trigger 771, which is plugged into the trigger switch within the host device (HD) 772, the network receiver detection trigger will stop conducting current when it no longer detects the transmitter’s 773 signal 774. This will cause a break in the current and so the system will be triggered. In FIGURE 7B, this behavior results in a sounding of the audible alarm 775 and a starting of the location beacon 776.
  • a fixed transmitting station 7771 with a transmitting antennae 7772 is used to establish a signal 7773 with a limited range 7777.
  • this may be a single station or a network topology such as Bluetooth Mesh, for example.
  • a piece of property with a host device 7774 uses a trigger switch 7775 with a network detection trigger that, when armed, is expecting to receive the signal 7773. More than one detection trigger 7776 can listen for the signal 7773. Once the range is near a limit but with a signal still established, the detection trigger can emit a warning sound (or other warning). Once past the range 7777 and not receiving the signal 7773, the armed trigger triggers the host device.
  • the detection trigger in accordance with the present invention preferably comprises a specialized wire cable (i.e., trigger wire), or a network proximity pairing (i.e., network tether).
  • the main function of the trigger wire is to be able to conduct a small current so as to complete a circuit in conjunction with the trigger switch.
  • the detection trigger is a form of wire cable lanyard specific to this invention that is impractical to defeat with a jumper cable.
  • the detection trigger is a radio signal receiver that monitors a specific broadcasting signal (e.g., WiFi, Bluetooth, ... etc.).
  • the detection trigger is a network receiver
  • the radio signal receiver while the radio signal receiver maintains a detection of the signal, the detection trigger will conduct current.
  • An interruption in the radio signal will cause the detection trigger to interrupt or otherwise stop the flow of current.
  • the detection trigger in either the form of a trigger wire or network tether is configured to be physically inserted into a receptacle of the trigger switch by the end user. Upon insertion into the receptable of the trigger switch, the apparatus switches from the disarmed state of operation to the armed state of operation.
  • the function of the trigger switch is to monitor the current from the detection trigger in the case where the apparatus is in the armed state of operation.
  • the trigger switch is configured to be impervious to moisture and resistant to tampering by, for example, a thief applying a shock or high current.
  • the trigger switch includes suitable circuitry that selectively provides a signal to the host device indicative of armed states of operation (i.e., when a triggering event has occurred).
  • the host device uses the trigger switch and detection trigger combination to secure the apparatus to a geographic location.
  • the host device may include features such that the rightful owner of the protected item may be authenticated after the alarm is activated.
  • Such features may be any known type of user authentication, including specific mechanisms such as, but not limited to, digital signature matching between the host device and an external RFID dongle that is in the possession of the owner or any similar such mechanism known in the field of digital authentication.
  • the host device is intended to be securely affixed to the protected item in any known manner in the mechanical art.
  • the host device houses a suitable power supply and related electronics that support the component functions discussed herein.
  • the specifics of the electronic circuitry are considered to be well within the standard knowledge of one skilled in the circuitry art and are not discussed further herein.
  • the suitable power supply may be a battery such as a long-life lithium-ion battery or the like and provides power to the trigger switch and powers the signal through the detection trigger.
  • the host device receives and processes the signal from the trigger switch.
  • Such processing circuitry functions to change the state of the apparatus from disarmed to armed, and functions as a control that changes the state of the trigger switch from armed to disarmed and from triggered to disarmed. If the host device is armed and receives the signal from the trigger switch, the host device will change to a triggered state (from an armed state) and will begin a pre-defined behavior for which the processing circuitry is configured. Such pre-defined behavior may include activating an audible alarm, activating a silent alarm (which may take the form of a wireless signalling beacon), activating an onboard global positioning system (GPS) device to thereby geo-locate the host device, or any other suitable pre-defined behavior. It should be understood that only the host device may change the operating state of the apparatus from triggered to disarmed.
  • GPS global positioning system
  • FIGURE 8 the figure illustrates an armed trigger connection state in accordance with the invention.
  • the connection from the trigger switch to the detection trigger is illustrated as two separate connections to more clearly show the circuit path, but may well be housed in a single jack type connection.
  • illustrated is a cross section of the system at the connection points for the cathode 85 and anode 81 when armed, and the host device internal trigger switch component 83 contained in the housing of the host device.
  • micro controller unit 88 is assumed to be resident in the host device.
  • FIGURE 9 illustrates a triggered state of a trigger connection in accordance with the invention.
  • the circuit connections are shown between the system components after a triggering event has occurred.
  • the security wire has been cut 94.
  • the circuit switches 92 and 96 are now open and not conducting.
  • the trigger is now finished with sending the signal to the host device to change the device’s state to the triggered state and so the connection switch 97 between the trigger component and the device is now open as well.
  • the reason that after a trigger all these connections are open is to prevent a thief from disabling the host device by connecting a power source to the connections and shorting the connections and thereby disabling the security behavior of the host device.
  • the micro controller unit within the host device is isolated from the connections and exterior casing and so is resistant to disabling via shock.
  • FIGURE 10A illustrates arming the device by connecting a security wire in accordance with the invention.
  • the device is armed by the action of connecting the security wire or network trigger.
  • a trigger switch with a single two contact connection is shown.
  • the security wire 102 is attached through its loop to a fixed object 101.
  • the male connection plug 103 is inserted into a female trigger switch connection such that the host device 104 is connected to an item of value (not shown).
  • the indicator light 105 showing whether the device is armed or not is visible as a visual deterrent to potential thieves.
  • FIGURES 10B and 10C illustrate one implementation of the arming process within the host device.
  • the detection trigger (DT) is not inserted in the host device.
  • the owner of the item then presses the DT male connection end into the trigger switch’s female connection receiver.
  • a spring is compressed.
  • a latch slides along the shaft of the male connection until a notch in the male connection is reached, at which point the latch clicks into the notch.
  • the DT is now fastened to the trigger switch (TS). This action is similar to that of a common padlock mechanism.
  • an indicator light flashes red and/or an audible indicator beep is sounded, to confirm the operation for the user. Further, in some embodiments, the indicator light continues to flash on a user- configurable schedule, to indicate to the user that the system is in the armed state.
  • FIGURES 10D to 10F illustrate disarming the system according to the above implementation.
  • the TS signals to a solenoid.
  • the solenoid moves the latch out of the notch in the shank of the DT male connection.
  • the removal of the latch removes the resistance against the spring and plate at the bottom of the female half of the connection, thus ejecting the male component of the connection from the TS.
  • this action is similar to that of a common padlock mechanism.
  • an indicator light flashes yellow and/or an audible warning beep will sound. These serve to remind the user to completely remove the DT. The system is thus in the disarmed state.
  • FIGURE 11 illustrates arming via a network trigger in accordance with the invention.
  • a system is armed by way of a detection trigger, realized as either a conducting security wire or a conducting network receiver trigger.
  • This diagram shows a network detection trigger 113 that is within range of its configured signal 112 from the fixed base station.
  • the trigger connection 114 is inserted into the female connection 115, the indicator light 107 on the host device 106 indicates that the system is armed.
  • FIGURE 12 illustrates one possible use of the invention in the context of laptop security. As can be seen, the system of the present invention is secured between a laptop and a pole.
  • FIGURE 13 illustrates another possible use of the invention.
  • the system is used in the context of animal range monitoring. This is an application of the embodiment shown in Figure 7C and would require a secure method of attaching the host device to the animal (e.g., wire banded collar).
  • the detection trigger is tuned to a transmitter that is transmitting within the desired range. If the detection trigger move close to the range limit, or out of range, in some embodiments, it emits a sound to warn the animal. If the signal is lost, the detection trigger would open its circuit, causing the trigger switch to signal the host device.
  • the host device can perform some action to turn the animal around, and/or transmit location information to alert a human responsible for the animal.
  • the triggering of the system into a triggered state also causes subtriggers to execute one or more actions (i.e., in addition or alternatively to generating alarm signals and/or transmitting location information).
  • the secured property is a bicycle
  • the activation of a subtrigger immobilizes the bicycle, making the bicycle difficult to steal.
  • Many other subtriggers can be activated, having different effects as desired.
  • FIGURE 15 is a flow diagram of the arming, disarming, and triggering process.
  • the main precondition is that the trigger switch and the host device must both be in a disarmed state.
  • the detection trigger can then be secured to a fixed location/position. This can be done either by way of a security wire (as explained above) or by the use of a network receiver that detects/connects to a predefined network transmitter (again as explained above). As can be imagined, the network received is previously tuned/ coupled to the transmitter’s signal/frequency.
  • a male connector is used to connect the host device to the trigger switch.
  • the host device has a female connector/receptacle and the male connector is either on the receiver trigger or on the security wire.
  • the male connector is inserted into the female connector on the trigger switch. Inserting the detection trigger into the trigger switch arms the device.
  • the concept is that the wire is attached/ wrapped around a fixed point such as a lamp post or some other (preferably) non-movable fixture. Then, by inserting the male end of the detection trigger is inserted into the female connection, the item of value is thus fixed/attached to the fixture. Removing the item of value from its attachment to the fixture, without disarming the system, causes the system to be triggered.
  • the host device is used. In one implementation, a key mechanism is used on the host device to disarm the system. The key mechanism uses a key that the user applies to the host device to thereby change the system’s status from armed to disarmed.
  • the detection trigger can be removed from the trigger switch and the item of value can be removed/uncoupled from the fixture.
  • the system can be used to tether/couple a bicycle to, for example, a lamp post/fixture.
  • the user applies a key to the host device to disarm the system and, once disarmed, the detection trigger can be removed from the trigger switch and the detection trigger can be uncoupled from the fixture. The user can then use the bicycle.
  • the key mechanism can be any mechanism that is capable of sending a signal or a status change that causes the host device to change its status from armed to disarmed.
  • the key mechanism includes any common means of authenticating that the user of the key is authenticated and authorized to perform the disarming action.
  • a key includes, without limitation, a magnetic key fob, a code or codes entered on a code pad, a master key, a physical key, etc.
  • the system will cause the system state to change to TRIGGERED.
  • the system will cause circuits between trigger switch and the host device to be open so as to prevent a disabling of the system. This is done to ensure that a current surge to the system through the TS’s female receptacle will not disable the triggered system.
  • the host device When in the triggered state, the host device will begin whatever deterrent/detection behavior it is designed to perform/operate. As an example, the host device may activate an audible alarm, activate a location beacon, etc. Other programmed/designed behaviours of the host device may, of course, occur (e.g, immobilizing the item, as discussed above).

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention concerne un appareil et un système de détection électronique d'altération ou de vol. La présente invention comprend un dispositif de sécurité hôte qui déclenche une alarme lorsqu'un article protégé est volé et/ou qui prend en charge une transmission de géolocalisation pour permettre la récupération de l'article protégé. Un objectif de l'invention est de résoudre le problème de crime contre les propriétés, car il se rapporte à une propriété qui est souvent laissée sans surveillance dans des lieux publics et qui a donc tendance à être très mobile. En particulier, l'invention empêche un voleur de contourner le déclenchement de l'alarme. En outre, comme le déclenchement de l'alarme ne dépend pas de la transmission d'informations de géolocalisation lors de la protection, la confidentialité est améliorée, et l'énergie de la batterie est préservée pour le suivi et la récupération si l'article est volé.
PCT/CA2023/050283 2022-03-03 2023-03-03 Appareil et système antivol WO2023164778A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202263316101P 2022-03-03 2022-03-03
US63/316,101 2022-03-03

Publications (1)

Publication Number Publication Date
WO2023164778A1 true WO2023164778A1 (fr) 2023-09-07

Family

ID=87882776

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2023/050283 WO2023164778A1 (fr) 2022-03-03 2023-03-03 Appareil et système antivol

Country Status (1)

Country Link
WO (1) WO2023164778A1 (fr)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6075443A (en) * 1998-07-31 2000-06-13 Sarnoff Corporation Wireless tether
US20060197658A1 (en) * 2000-06-09 2006-09-07 Light Elliott D Electronic tether for portable objects
US20080001705A1 (en) * 2006-06-14 2008-01-03 Barry Alan Kritt Method and system for disabling an electronic device upon theft
US20120235816A1 (en) * 2011-03-17 2012-09-20 Luis Estrada Item location and theft prevention system
US20150020558A1 (en) * 2012-07-02 2015-01-22 Donald S. Williams Mobile lock with retractable cable
US20150204112A1 (en) * 2012-07-20 2015-07-23 Velolock Ltd. Locking device for a bicycle
US9336673B1 (en) * 2014-09-08 2016-05-10 Alex Schulte Bluetooth wireless electronic tether

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6075443A (en) * 1998-07-31 2000-06-13 Sarnoff Corporation Wireless tether
US20060197658A1 (en) * 2000-06-09 2006-09-07 Light Elliott D Electronic tether for portable objects
US20080001705A1 (en) * 2006-06-14 2008-01-03 Barry Alan Kritt Method and system for disabling an electronic device upon theft
US20120235816A1 (en) * 2011-03-17 2012-09-20 Luis Estrada Item location and theft prevention system
US20150020558A1 (en) * 2012-07-02 2015-01-22 Donald S. Williams Mobile lock with retractable cable
US20150204112A1 (en) * 2012-07-20 2015-07-23 Velolock Ltd. Locking device for a bicycle
US9336673B1 (en) * 2014-09-08 2016-05-10 Alex Schulte Bluetooth wireless electronic tether

Similar Documents

Publication Publication Date Title
US20020113704A1 (en) Wireless transmitting security cable
US8373565B2 (en) Security apparatus with conductive ribbons
US8269631B2 (en) Anti-theft device
US7855642B2 (en) Portable motion-detecting alarm with remote notification
US9472073B2 (en) EAS tag for bottles
US6043733A (en) Vehicle lock having an integral alarm and signal transmission means
US20120299755A1 (en) Security cable monitoring system
US7187284B2 (en) Active anti-theft device for securing property
US20110050419A1 (en) Remote Intrusion Signaling Security System
CN105196965A (zh) 一种电动车的报警方法、系统及电动车
US20180313111A1 (en) Passive continuity monitoring device with active features
US7253733B2 (en) Cable lock system
GB2582535A (en) Locking device
WO2023164778A1 (fr) Appareil et système antivol
CN202736256U (zh) 配电房安全管理系统
US20230306830A1 (en) A Tamper Alert System
US20220220773A1 (en) An Electric Lock
CN110211350B (zh) 一种基于nb-iot的移动锁保护系统及方法
KR200425972Y1 (ko) 전시물품 도난 방지시스템
RU2297670C1 (ru) Портативная охранная система на основе беспроводной радиосвязи и способ ее функционирования
CN201707745U (zh) 一种笔电防窃装置
GB2425239A (en) Dog lead
AU2021221390A1 (en) A security system
CN202153382U (zh) 一种通信设备安全联防系统
WO2024126993A1 (fr) Dispositif de sécurité

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23762649

Country of ref document: EP

Kind code of ref document: A1