SECURITY SYSTEM AND SECURITY TAG ASSEMBLY
20170330435 · 2017-11-16
Inventors
Cpc classification
G08B13/246
PHYSICS
E05B73/0017
FIXED CONSTRUCTIONS
G08B13/2457
PHYSICS
International classification
Abstract
A security system and security tag assembly cooperatively operative to restrict unauthorized removal of an article from an area, wherein the security tag assembly is removably attached to the article and includes an RFID component/label configured to encode and retain data associated with the article to which it is attached. A deactivator assembly includes a read component structured to read the article data encoded in the security tag assembly, before or during removal of the tag assembly, wherein the read data is transmitted to a processor for display, storage and/or supplementary processing. One or more portable readers, not associated with the deactivator assembly or processor, are configured to access and display the article data for authorized article control. A review application may be downloaded on communication devices having short range technology and is configured to access the article data to obtain information relating thereto.
Claims
1. A security system to restrict unauthorized removal of an article from an area, said security system comprising: at least one security tag assembly structured for attachment to the article, said one security tag assembly including an RFID component structured for encoding the article data associated with the article to which it is attached, a deactivator assembly including a read component, said read component structured to read the article data encoded in said RFID component, and a processor including display facilities operatively associated with said deactivator assembly for display of article data read by and generated from said deactivator assembly.
2. The security system as recited in claim 1 wherein said deactivator assembly and said at least one security tag assembly are cooperatively structured to read the article data via proximity scanning of said at least one security tag assembly relative to said deactivator assembly.
3. The security system as recited in claim 2 wherein said deactivator assembly further comprises a release component operative to detach said at least one security tag assembly from the article substantially concurrent to said proximity scanning.
4. The security system as recited in claim 3 wherein said deactivator assembly further comprises on-off modes operative to define a restricted operation of said deactivator assembly, said restricted operation including deactivation of at least said release component when in said off mode.
5. A security system as recited in claim 4 further comprising at least one activator component structured for wireless communication with said deactivator assembly and operative to establish either said on mode or said off mode of said deactivator assembly.
6. A security system as recited in claim 2 wherein said deactivator assembly further includes erase capabilities structured to erase article data, via the proximity scan, encoded in said RFID component.
7. The security system as recited in claim 1 wherein said deactivator assembly further comprises data storage cooperative with said read component and operative to store article data read from said RFID component of said at least one security tag assembly.
8. The security system as recited in claim 7 wherein said processor and said deactivator assembly are cooperatively structured to load stored article data to said processor from said deactivator assembly.
9. The security system as recited in claim 8 wherein said processor is operative to display said loaded, stored article data on said display facilities.
10. The security system as recited in claim 9 wherein said processor is structured to retain said loaded, stored article data for supplementary processing, subsequent to display thereof on said display facilities.
11. The security system as recited in claim 10 wherein said supplementary processing comprises inventory control.
12. The security system as recited in claim 1 wherein said deactivator assembly further comprises a release component operative to detach said at least one security tag assembly from the article; said deactivator assembly further comprising data storage cooperative with said read component and operative to store article data read from said RFID component.
13. The security system as recited in claim 12 wherein said processor and said deactivator assembly are cooperatively structured to load stored article data to said processor from said deactivator assembly.
14. The security system as recited in claim 1 wherein said deactivator assembly further comprises on-off modes operative to define restricted operation of said deactivator assembly, said restricted operation including deactivation of at least said deactivator assembly when in an off mode.
15. The security system as recited in claim 14 further comprising at least one portable RFID device structured for wireless communication with said deactivator assembly and operative to establish at least an on mode of said deactivator assembly.
16. The security system as recited in claim 15 wherein said deactivator assembly is cooperatively structured to remain in said on-mode for a predetermined period of time and automatically reset into said off-mode upon expiration of said predetermined period of time, said portable RFID device disposable in scanning relation to said deactivator assembly to reestablish said on-mode in said deactivator assembly, said portable RFID device carried and intended for use by predetermined authorized personnel.
17. The security system as recited in claim 1 further comprising at least one portable reader structure for wireless communication with said RFID component, said at least one portable reader operative to access article data encoded in said RFID component, independent of said processor.
18. The security system as recited in claim 17 wherein said at least one portable reader includes a display structured to display article data accessed by said at least one portable reader from said RFID component.
19. The security assembly as recited in claim 1 further comprising a review application configured to access article data encoded on said RFID component and operative on a portable communication device having short range communication technology.
20. The security assembly as recited in claim 1 wherein said security tag assembly comprises a tag component structured for attachment to the article and comprising a housing; said RFID component comprising an RFID label secured overlying, substantially conforming relation to an interior surface of said housing.
21. The security system is recited in claim 20 wherein said tag component further comprises a base removably connected to said housing, said base and said housing cooperatively structured for collective, removable attachment to the article when connected to one another.
22. A security system to restrict unauthorized removal of an article from an area, said security system comprising: a security tag assembly comprising a tag component structured for attachment to the article and including a housing; said RFID component comprising an RFID label secured in overlying, substantially conforming relation to an interior surface of said housing; said tag component including a cover member disposed in overlying relation to said RFID label and in at least partially covering relation to said interior surface of said housing; and said security tag assembly further comprising a base removably connectable to said housing, each of said base and said housing cooperatively structured for removable attachment to the article when connected to one another.
23. The security system as recited in claim 22 further comprising an elongated pins secured to said housing and extending outwardly from said interior surface into a connectable disposition with said base.
24. The security system as recited in claim 23 wherein said pin extends through said RFID label in predetermined spaced relation thereto, said predetermined spaced relation being sufficient to reduce electrical interference between said pin and said RFID label.
25. The security system as recited in claim 24 wherein said pin extends through said cover into said connectable disposition with said RFID label.
26. The security system as recited in claim 23 wherein said pin extends through said cover into said connectable disposition with said RFID label.
27. The security system is recited in claim 22 wherein said RFID label comprises a flexible material sheet including an integrated circuit disposed thereon.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] For a fuller understanding of the nature of the present invention, reference should be had to the following detailed description taken in connection with the accompanying drawings in which:
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038] Like reference numerals refer to like parts throughout the several views of the drawings.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0039] The present invention is directed to a security system, generally indicated as 100 in
[0040] For purposes of clarity, the structural and operational features of the security tag assembly 10 will be described herein and subsequently its use in the system 100. With primary reference to
[0041] When so disposed within the housing 14, the RFID component or label 24 is disposed in overlying relation to the inner surface 14′ and due to the flexibility of the film 26 on which it is disposed, the RFID component/label 24 substantially conforms to at least a portion of the shape of the interior surface 14′. The connector pin 18 has a sufficiently elongated configuration to extend outwardly from the interior of the housing 14 and be connected to the locking assembly 27 associated with the base 20.
[0042] The locking assembly 27 may be structurally and operationally similar and/or equivalent to that disclosed in U.S. Pat. No. 8,590,034, to the inventor herein. As such, the locking assembly 27 may include a plurality of balls or like locking members, as described in the above noted U.S. patent, disposed in a secured, retained orientation by biasing spring 29. Authorized release of the security tag assembly 10 can be accomplished by utilization of an externally applied detachment assembly of the type described in above referenced patent. More specifically, the external detachment assembly includes at least one or more detachment members (not shown herein) which pass through appropriately disposed and aligned apertures 20′ in the base 20 and into a detaching engagement with portions of the locking assembly 27. As a result the tag member 12 and the connecting pin 18 are separable from the base 20 and the locking assembly 27.
[0043] With primary reference to
[0044] Additional features of the tag member 12 includes the aforementioned cover member 16 being disposed in overlying, covering relation to the RFID component and label 24 and in covering relation to a portion and/or majority of the inner surface 14′ of the housing 14, as represented in greater detail in
[0045] Yet additional features associated with the security tag assembly 10 may include a freely rotational connection between the housing 14 of the tag member 12 and the base 20. This will restrict the ability to “unscrew” and/or otherwise detach the housing 14 from the base 14, such as by unauthorized personnel. Also, additional strength may be added to the security tag assembly 10 by forming at least portions thereof from a zinc material in order to enhance the strength thereof while concurrently reducing the possibility of electrical and/or magnetic interference between operative portions thereof and a deactivator assembly generally indicated as 30 in
[0046] For purposes of clarity and
[0047] As used and as represented in
[0048] It is further noted that once deactivated and disconnected from the article 101, the activation assembly 30 may be reprogrammed for reuse with different article data. As such the RFID label 34 remains active/powered to facilitate such reprogramming and reuse.
[0049] With primary reference to
[0050] More specifically, and as collectively represented in
[0051] Moreover, the memory and transmission facilities associated with the processor/POS terminal 44 may facilitate the transmission, as at 47, of memorized or retained article data received from each of the one or more security tag assemblies 10 to supplementary processing facilities such as, but not limited to, inventory control or the like. In the alternative, such “supplementary processing” may take place in the processing facilities associated with the processor/POS terminal 44. In addition, when a security tag assembly 10, attached to an article 101 is ready for checkout or authorized removal, a proximity scan thereof is accomplished by the deactivator assembly 30 as also represented in
[0052] In yet another embodiment the deactivator assembly 30 utilizes additional ones of the operative features to the extent that the encoded data within the security tag assembly 10 is read, by reader function 32, 34 and is stored by reader function 37 and is substantially concurrently deleted from the security tag assembly 10 by the delete function 36. Thereafter, locking assembly 27 of the security tag assembly 10 acted upon as set forth above and as represented in
[0053] Additionally, the deactivator assembly 30 may include on-off modes as schematically represented by the on/off mode function 40 in
[0054] Such portable RFID devices 50 could be in the form of labels, plastic tags, or other RFID operative devices capable of accomplishing the “off-mode” and “on-mode” of the deactivator assembly by serving to lock and unlock its use or operability. More specifically the portable RFID device 50, carried by authorized personnel, will be passed over and/or brought into a predetermined, operative proximity to an RFID antenna associated with the deactivator assembly 30. As a result, assuming that the deactivator assembly 30 has not been used for a predetermined or preset period of time, it will automatically assume it's “off-mode” by being locked. In order to proceed with a checkout procedure, authorized personnel, in the possession of or having access to the portable reading device 50, access the antenna of the deactivator assembly 30 with the portable reading device 50 as set forth above. This will unlock or place the deactivator assembly 30 in the “on-mode” at least for a preset or preprogrammed time period, as set forth above. Therefore, when the deactivator assembly is not used for the preset or preprogrammed period of time, it will automatically turn off or be disposed in a locked state of operation, in the “off-mode”. As a result, the next authorized individual intending to complete a checkout procedure will again have to expose or access that individual's portable RFID device 50 to the antenna of the deactivator assembly 30 in order to unlock the deactivator assembly 30 and render it operable in the “on-mode”.
[0055] Therefore, the authorized portable RFID devices 50 are structured to place the deactivator assembly and/or processor/POS terminal in an “on-mode” for the predetermined or preset period of time and subsequently upon expiration thereof the deactivator assembly 30 will automatically be disposed in an “off-mode”. In the “on-mode”, the deactivator assembly 30 and/or processor/POS terminal 44 is capable of performing the checkout procedure and/or the deactivation of the RFID component associated with a given security tag assembly 10, in an intended manner. However, in the “off-mode”, operation of the deactivator assembly is restricted to the extent that a security tag assembly cannot be “deactivated” and/or removed until the deactivator assembly 30 is again placed in the “on-mode” such as through utilization by authorized personnel of the portable RFID device 50. This will prevent customers or any unauthorized personnel from utilizing the deactivator assembly to deactivate and/or remove a security tag assembly, facilitate its detachment from the article and/or otherwise facilitate the unauthorized removal of the article from the secured area.
[0056] In a practical application, the portable RFID reading devices 50 may be in the form of labels, plastic tags, or variety of other structures having RFID capabilities and which may be carried on the person of authorized personnel. In use, an authorized individual may wirelessly access the deactivator assembly 30 and/or processor to complete a checkout procedure or article data review. This will prevent customers or any unauthorized personnel from utilizing the deactivator assembly 30 to deactivate a security tag assembly, facilitate its detachment from the article 101 and/or otherwise facilitate the unauthorized removal of the article from the secured area. It is also noted that the plurality of security tag assemblies 10 associated with the security system 100 of the present invention may also be equipped with electronic article surveillance (EAS) of conventional design and operation, to facilitate monitoring and prevention of articles passing through monitoring stations located at exit ways of the secured area, without removal and/or deactivation of the security tag assembly 10. As an alternative and or in addition to EAS surveillance the security tag assembly 10 may include ink cartridges as at 15 in
[0057] Additional operative and structural features associated with the security system of the present invention is the ability of authorized personnel to periodically or on a predetermined basis check the status of articles 101 and/or article data by wirelessly monitoring any of the security tag assemblies 10. More specifically, authorized personnel may include portable RFID readers 60, as represented in
[0058] Yet additional features of the security system 100 of the present invention includes a review application configured to access article data encoded on the RFID component 24 associated with the different security tag assemblies 10. As such, the review application 70 is configured to be downloaded on and operative with a communication device 72 carried by customers or other non-employees visiting the secured area. Such a communication device 72 may be a smart phone or the like having short range communication facilities such as, but not limited to Bluetooth, NFC, etc. In use, a customer may thereby position his or her smart phone 72, or other device, in relatively close proximity to a given security tag. This will result in at least some of the article data being accessed and displayed on the display function of the smart phone 72. The customer may thereby be informed of pricing and/or other information relating to the purchase or features associated with the article intended to be purchased.
[0059] Since many modifications, variations and changes in detail can be made to the described preferred embodiment of the invention, it is intended that all matters in the foregoing description and shown in the accompanying drawings be interpreted as illustrative and not in a limiting sense. Thus, the scope of the invention should be determined by the appended claims and their legal equivalents.
[0060] Now that the invention has been described,