Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ANTI-THEFT APPARATUS AND SYSTEM
Document Type and Number:
WIPO Patent Application WO/2023/164778
Kind Code:
A1
Abstract:
An apparatus and system for electronic detection of tampering or theft. This invention includes a host security device that triggers an alarm when a protected item is stolen and/or that supports geolocation transmission to enable recovery of the protected item. An aim of the invention is to solve the problem of property crime as it relates to property that is commonly left unattended in public settings and that therefore tends to be very mobile. In particular, the invention makes it impractical for a thief to circumvent the triggering of the alarm. Further, since triggering the alarm is not dependent on transmission of geolocation information while secured, privacy is enhanced, and battery power is preserved for tracking and recovery should the item be stolen.

Inventors:
LAWSON RICHARD (CA)
Application Number:
PCT/CA2023/050283
Publication Date:
September 07, 2023
Filing Date:
March 03, 2023
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LAWSON RICHARD (CA)
International Classes:
G08B13/00; B62H5/20; E05B45/06; E05B73/00; G08B13/14; G08B13/181
Foreign References:
US20150020558A12015-01-22
US20150204112A12015-07-23
US20120235816A12012-09-20
US9336673B12016-05-10
US20080001705A12008-01-03
US20060197658A12006-09-07
US6075443A2000-06-13
Attorney, Agent or Firm:
RAFFOUL, Natalie (CA)
Download PDF:
Claims:
We claim:

1. A system for securing an item of value, the system comprising:

- a detection trigger;

- a host device, said host device being configured to perform a series of specific actions when said system is in a triggered state, said series of specific actions relating to at least one of: alarms, communication with other devices, or item recovery; and

- a trigger switch contained within the host device; wherein:

- said item is attached to said host device;

- said detection trigger is coupled to a fixture;

- said detection trigger and said trigger switch cooperate to attach said item to said fixture;

- when said system is in an armed state, said detection trigger is coupled to said trigger switch; and

- an uncoupling of said detection trigger and said trigger switch when said system is in an armed state causes said system to transition to be in said triggered state.

2. The system according to claim 1, wherein tampering with said detection trigger causes said system to be in a triggered state.

3. The system according to claim 1, wherein said detection trigger is a bundled security wire carrying current such that interruption of said current causes said system to be in a triggered state.

4. The system according to claim 1, wherein said detection trigger is a network receiver receiving a wireless network signal from a specific transmitter and wherein loss of said wireless network signal causes said system to be in a triggered state.

5. The system according to claim 4, wherein said detection trigger loses said wireless network signal when said detection trigger is beyond a specified distance from said specific transmitter.

6. The system according to claim 1, wherein said system is disarmed by activating a key mechanism in said host device.

7. The system according to claim 1, wherein said series of specific actions comprises at least one of: an activation of an audible alarm; an activation of a visible alarm; an activation of a location beacon; an emission of a visible indicator light;

- relaying a signal to at least one other device connected to the item; and alerting a central registry that the item has been stolen.

8. The system according to claim 7, wherein the item has at least one wheel and said at least one other device disables motion of said at least one wheel.

Description:
ANTI-THEFT APPARATUS AND SYSTEM

TECHNICAL FIELD

[0001] The present invention relates to preventing theft of an item of value. More specifically, the present invention relates to an apparatus and system for electronic detection of tampering or theft.

BACKGROUND

[0002] In the field of security devices intended to impede theft of valuable items such as, but not limited to, bicycles, luggage, laptops and the like, there exist many different known solutions. Physically securing the item of value is a commonly understood feature of security devices such as chains, cables, U-bars, cages and the like. Normally, such devices use a physical keyed lock, combination-style lock, or even a card-reader type of locking mechanism. However, with such devices, a thief may defeat the physical security and thus be able to take the item of value to any location, without the owner having any ability to recover the stolen good or prevent its resale (except through often costly and ineffective investigation).

[0003] These known solutions include two states of operation which include a secured state and an open/uns ecured state. In terms of known bicycle locks, such locks may be cut and the lock left behind after the theft. This is also true in terms of known security devices related to retail security tags that are typically attached to any given retail item (e.g, clothing, appliances, electronic devices, etc.) within a retail establishment. As the item is purchased, a common tool, akin to a skeleton key, is used to remove the tag from the item or otherwise render the tag inert. Retail security tags may have button backs or keys to attach to the store item by a lanyard. Typically, the cutting of the lanyard in most cases only removes the security tag from the item. If the security tag has an alarm that is triggered by cutting a wire, a thief can often circumvent the wire, simply by separating the security tag and the item by cutting such a lanyard. The item is then in an unprotected state. As a further example, some types of known security tags include a cam to lock one end of the lanyard. The cam contains a pin, and removing the pin will trigger a tamper alarm. However, if the tamper alarm can be separated from the item without removing the pin, the item is left unprotected, and may be removed from the premises by the thief.

[0004] A more recent class of solutions employs continual geo-tracking to secure an item. These devices are constantly polling for GNSS location data and transmitting a location signal. (Note that GNSS refers to “Global Navigation Satellite Systems”, including without limitation, GPS, GLONASS, Galileo, BeiDou, and any other suitable system.) Items are secured, using such devices, by detecting unexpected motion via an accelerometer or by detecting unexpected change in GPS location. However, the detection function can consume considerable power over a period of time, leaving less power remaining for tracking and recovery. As well, the continual location transmission also gives rise to privacy concerns and can be exploited for surveillance.

[0005] Thus, there is a need for systems and devices that overcome the deficiencies of the prior art.

SUMMARY

[0006] The present invention provides an apparatus and system for electronic detection of tampering or theft. This invention includes a host security device that triggers an alarm when a protected item is stolen and/or that supports geolocation transmission to enable recovery of the protected item. An aim of the invention is to solve the problem of property crime as it relates to property that is commonly left unattended in public settings and that therefore tends to be very mobile. In particular, the invention makes it impractical for a thief to circumvent the triggering of the alarm. Further, since triggering the alarm is not dependent on transmission of geolocation information while secured, privacy is enhanced and battery power is preserved for tracking and recovery should the item be stolen.

[0007] In one aspect, this document discloses a system for securing an item of value, the system comprising: - a detection trigger;

- a host device, said host device being configured to perform a series of specific actions when said system is in a triggered state, said series of specific actions relating to at least one of: alarms or item recovery; and

- a trigger switch contained within the host device; wherein:

- said item is attached to said host device;

- said detection trigger is coupled to a fixture;

- said detection trigger and said trigger switch cooperate to attach said item to said fixture;

- when said system is in an armed state, said detection trigger is coupled to said trigger switch; and

- an uncoupling of said detection trigger and said trigger switch when said system is in an armed state causes said system to transition to be in said triggered state.

[0008] In another embodiment, this document discloses a system wherein tampering with said detection trigger causes said system to be in a triggered state.

[0009] In another embodiment, this document discloses a system wherein said detection trigger is a bundled security wire carrying current such that interruption of said current causes said system to be in a triggered state.

[0010] In another embodiment, this document discloses a system wherein said detection trigger is a network receiver receiving a wireless network signal from a specific transmitter and wherein loss of said wireless network signal causes said system to be in a triggered state.

[0011] In another embodiment, this document discloses a system wherein said detection trigger loses said wireless network signal when said detection trigger is beyond a specified distance from said specific transmitter.

[0012] In another embodiment, this document discloses a system wherein said system is disarmed by activating a key mechanism in said host device.

[0013] In another embodiment, this document discloses a system wherein said series of specific actions comprises at least one of: an activation of an audible alarm; an activation of a visible alarm; an activation of a location beacon; an emission of a visible indicator light; relaying a signal to at least one other device connected to the item; and alerting a central registry that the item has been stolen.

[0014] In another embodiment, this document discloses a system wherein the item has at least one wheel and said at least one other device disables motion of said at least one wheel.

BRIEF DESCRIPTION OF THE DRAWINGS

[0015] The present invention will now be described by reference to the following figures, in which identical reference numerals refer to identical elements and in which:

FIGURES 1A to IB are general schematics in accordance with an embodiment of the present invention;

FIGURE 2 is an implementation in accordance with the first embodiment of the invention utilizing a trigger wire as detection trigger;

FIGURE 3 is an implementation in accordance with another embodiment of the invention utilizing a network tether as detection trigger;

FIGURE 4 is a schematic illustrating an overlapping configuration of wire element forming a detection trigger wire in accordance with an embodiment of the invention;

FIGURES 5A and 5B illustrate a manner of forming a trigger wire in accordance with an embodiment of the invention;

FIGURE 6A shows one type of formed trigger wire in accordance with an embodiment of the invention;

FIGURE 6B shows the formed trigger wire of Figure 6 A;

FIGURES 7A, 7B, and 7C show three possible use case scenarios for the present invention; FIGURE 8 illustrates an armed trigger switch’s circuit connection state with respect to the host device in accordance with the invention;

FIGURE 9 illustrates the disconnected energy pathway while in a triggered state of a trigger switch’s circuit connection state with respect to the host device in accordance with the invention;

FIGURE 10A illustrates arming by connecting a security wire in accordance with an embodiment of the invention;

FIGURES 10B and IOC illustrate arming from within the host device, according to an embodiment of the invention;

FIGURES 10D, 10E, and 10F illustrate disarming from within the host device, according to an embodiment of the invention;

FIGURE 11 illustrates arming and securing property via a network trigger in in accordance with the invention;

FIGURE 12 illustrates one possible use of the invention in the context of laptop security;

FIGURE 13 illustrates another possible use of the invention in the context of animal range monitoring;

FIGURE 14 is a schematic showing the activation of sub triggers in accordance with an embodiment of the invention; and

FIGURE 15 is a flow diagram of the arming, disarming, and triggering process.

DETAILED DESCRIPTION

[0016] With regard to FIGURES 1A to IB, which show general schematics in accordance with a first embodiment of the present invention, the apparatus and system for electronic detection of tampering or theft in accordance with the present invention includes three primary components: a detection trigger 10 and a trigger switch 12 that is contained within a host device 13. The detection trigger and trigger switch are connected by way of a male/female connection Ila, 11b in a manner consistent with standard electrical connections.

[0017] The host device provides an alarm and, optionally, geolocation transmission circuitry to enable recovery of a protected item once stolen. The apparatus has three states of operation: a disarmed state, an armed state, and a triggered state. The detection trigger preferably comprises a specialized wire cable (i.e., “trigger wire”), or a network proximity pairing (i.e., “network tether”).

[0018] With regard to FIGURE 2, there is shown an implementation in accordance with the first embodiment of the invention, wherein a trigger wire comprises the detection trigger. Here, the host device 21 includes an indicator light 22 and female receptacle 23 for accepting a male contact 24 of the security wire 25.

[0019] Alternatively, FIGURE 3 shows an implementation in accordance with the first embodiment of the invention, wherein a network tether comprises the detection trigger. In this instance, the host device 31 again includes an indicator light 32 and female receptacle 33 for accepting a male contact 34 which is now shown as a network receiver 35.

[0020] With regard to the general operation of the embodiments as shown in FIGURES 1 through 3, upon tampering or cutting of the specialized wire cable or movement of the network tether out of range of the host device, the alarm is activated. In general, it is assumed that the host device, with alarm activated, remains physically with the stolen item. In this manner, the apparatus in accordance with the invention deters theft of property left unattended in a public setting. The specialized wire cable is configured and manufactured in such a manner so as to effectively render circumvention of the trigger switch impractical, as will be further described below.

[0021] It should be understood that many different types of valuable items may benefit from protection by the present invention. Examples of such items may include, without limitation, bicycles, luggage, pets, skis, laptops, briefcases, hotel valuables, and the like. The invention may also be implemented in the context of motorized vehicles including, without limitation, motorcycles, scooters, golf carts, all terrain vehicles, and the like. The present invention may further be used to secure all individual members of shipment of valuable items, for example a shipment of e-bikes. For purposes of illustrating one possible implementation of the present invention, the discussion below shall apply the invention to the everpresent problem of bicycle theft. Further, the alarm indication will be discussed in terms of a simple audible buzzer-type alarm. However, it should be understood that any suitable alarm may be used including, without limitation, an audible alarm, a silent alarm, and/or a visual alarm, with or without an accompanying geo-tracking aspect.

[0022] As mentioned, the three primary components that comprise the system include the detection trigger, the trigger switch, and the host device. The system secures the article to a fixed location (i.e., a permanent fixture in a physical location, such as a pole, fence, wall, etc.). This securing is accomplished through either the trigger wire, or through the network tether’s network proximity pairing. It should be understood that the invention will not physically stop a thief from being able to remove the item from its fixed location. Rather, the invention provides an alert (by audible or silent alarm) that the security of the item has been compromised.

[0023] When implementing the invention, it should be understood that a compromised item which therefore triggers an alarm will require that the host device be either embedded or securely attached to the item. For example, in the context of a bicycle implementation, the host device may be discreetly attached anywhere outside, or unobtrusively within, the bicycle frame. Preferably, further, the detection trigger is not usable to disable the security behavior of the host device. In particular, the specialized wire cable, when provided as the detection trigger, cannot be practically bypassed by a thief by using a jumper wire.

[0024] In contrast to prior art devices, the inventive apparatus differs in that the trigger wire or network tether does not prevent the protected item from being used because the wire may be easily cut. Instead, the trigger wire or network tether acts as a trigger for an alarm and beacon. Accordingly, if the trigger wire is cut or the network tether moves out of range of the host device, the apparatus provides an alarm and stays with the stolen item. [0025] As mentioned, the inventive host device would be affixed to the protected item and it is not necessary or even desirable to remove the host device. The host device may support any key (e.g., physical metal key, radio frequency key, etc.). In some embodiments, each host device has a unique key. In other embodiments, for example for use in commercial, retail and/or group settings, a single key is employable to control disarming operation of a group of items.

[0026] In terms of the trigger wire as illustrated in various stages of manufacture in FIGURES 4, 5A, 5B, 6A, and 6B, it should be understood that the trigger wire is a specialised wire cable that conducts current.

[0027] As shown in FIGURE 4, the security wire is actually a single strand with ends 41, 43 and that is folded (fold shown at 42) to resemble a wire bundle of overlapping strands. The security wire conducts the current applied at the ends 41, 43 through a single path. Therefore, any break will cause the circuit to open. The purpose of this design is to present what appears to be a wire bundle to a potential thief should they try to clip a bypass. Because all the wires cannot be cut together instantaneously, any cutting attempt (even if only one strand) will cause the circuit to break and therefore cause the trigger to fire.

[0028] The manner of fabricating the security wire is illustrated in FIGURES 5A and 5B. The security wire in the pre-formed state 51 has a clip with an opening for the two wire ends 52 and a small post that forms a clip post 53 to act as a jig at the terminating end. The clip post is used with another jig post 54 to wrap the wire in a loop until the desired number of folds is reached. Once the number of folds is reached and the other end is laid across the clip 56, the clip is completed and the post and wirefolds 55 are enclosed with the two wire ends available for any manner of terminal. Where the jig post is removed, the wire folds are now available to form a loop 58. This allows the security wire in the resultant wire bundle 57 to act as a noose for more flexibility in securing to fixed objects.

[0029] As shown in FIGURE 6A, the wire appears as a wire bundle to a person opening the sheath 62 and attempting a splice. However, it is really one continuous wire formed in a loop with connection ends 61 and an apex 64 of the loop. If a would- be thief were to open two sections of the sheath, exposing a single given wire 63 in one opening, they would be unable to discern by eye which strand in the other opening corresponded to the ‘single wire’ 63. As noted above, if any of what appear to be individual wires are cut, then the wire as a whole will stop conducting, as there is in fact only a single wire. If, somehow, the thief knew the multi-wind design, they would still need to know the correct order of the windings to bridge all wires simultaneously. This implies that they would need to make a single sheath opening large enough to splice all presented wire sections of the loop and also would need to splice each in two sections one at a time. This is impractical given the time constraints of most theft operations.

[0030] Cutting the trigger wire of the invention will not remove the alarm but will instead trigger an alarm. Should a thief attempt to use a current-conducting jumper cable to bypass the trigger wire defined in the invention, this will cause the wire's current to be interrupted and thus will trigger the alarm. Unlike the prior art, the trigger wire used in the invention is not intended to be used to attach a tag (e.g, radio frequency identification (RFID) tag) to the protected item of value. Instead, the trigger wire in accordance with the present invention is used to physically secure the item of value to a fixed location to physically dissuade and hinder, though not prevent, removal of the protected item from the fixed location. It should be understood that the alarm of the host device and associated geo-locating feature aim to thwart successful retention of the item by the thief. FIGURE 6B shows the wire of Figure 6A from a different view, with a male connectors 61 and two terminals 611, 612 (i.e., positive and negative terminals).

[0031] FIGURES 7 A, 7B, and 7C shows various use case scenarios in terms of attempting to defeat the security aspect of the invention.

[0032] With regard to FIGURE 7A, a theft attempt is illustrated showing a thief s attempt to steal the item 74 by creating a bridge splice to bypass the security wire’s 72 loop around the fixed object 71. The thief is attempting to not trigger the security wire, by creating a parallel circuit in the wire 75 and then cutting 77 the part of the original wire that surrounds the fixed object. The most common tool for this is a piercing jaw clamp 76. However, this attempt would fail with the wire 72, because the splice requires all wires in the bundle to be cut and spliced simultaneously. This is highly impractical in the typical theft context. As such, the trigger switch within the host device 73 would detect the circuit interruption and, in turn, causes a trigger action. In this case, the behavior of the host device is that of sounding an audible alarm and causing a beacon to begin transmitting 78.

[0033] With regard to FIGURE 7B, if a thief attempts to unplug or disable the network detection trigger 771, which is plugged into the trigger switch within the host device (HD) 772, the network receiver detection trigger will stop conducting current when it no longer detects the transmitter’s 773 signal 774. This will cause a break in the current and so the system will be triggered. In FIGURE 7B, this behavior results in a sounding of the audible alarm 775 and a starting of the location beacon 776.

[0034] With regard to FIGURE 7C, instead of a fixed object such as a light pole or bike rack, a fixed transmitting station 7771 with a transmitting antennae 7772 is used to establish a signal 7773 with a limited range 7777. It should be noted that this may be a single station or a network topology such as Bluetooth Mesh, for example. A piece of property with a host device 7774 uses a trigger switch 7775 with a network detection trigger that, when armed, is expecting to receive the signal 7773. More than one detection trigger 7776 can listen for the signal 7773. Once the range is near a limit but with a signal still established, the detection trigger can emit a warning sound (or other warning). Once past the range 7777 and not receiving the signal 7773, the armed trigger triggers the host device.

[0035] As previously mentioned, the detection trigger in accordance with the present invention preferably comprises a specialized wire cable (i.e., trigger wire), or a network proximity pairing (i.e., network tether). The main function of the trigger wire is to be able to conduct a small current so as to complete a circuit in conjunction with the trigger switch. If embodied as a trigger wire, the detection trigger is a form of wire cable lanyard specific to this invention that is impractical to defeat with a jumper cable. If embodied as a network tether, the detection trigger is a radio signal receiver that monitors a specific broadcasting signal (e.g., WiFi, Bluetooth, ... etc.). [0036] In the case where the detection trigger is a network receiver, while the radio signal receiver maintains a detection of the signal, the detection trigger will conduct current. An interruption in the radio signal will cause the detection trigger to interrupt or otherwise stop the flow of current. The detection trigger in either the form of a trigger wire or network tether is configured to be physically inserted into a receptacle of the trigger switch by the end user. Upon insertion into the receptable of the trigger switch, the apparatus switches from the disarmed state of operation to the armed state of operation.

[0037] In terms of the trigger switch, the function of the trigger switch is to monitor the current from the detection trigger in the case where the apparatus is in the armed state of operation. The trigger switch is configured to be impervious to moisture and resistant to tampering by, for example, a thief applying a shock or high current. The trigger switch includes suitable circuitry that selectively provides a signal to the host device indicative of armed states of operation (i.e., when a triggering event has occurred).

[0038] In terms of the host device, the host device uses the trigger switch and detection trigger combination to secure the apparatus to a geographic location. The host device may include features such that the rightful owner of the protected item may be authenticated after the alarm is activated. Such features may be any known type of user authentication, including specific mechanisms such as, but not limited to, digital signature matching between the host device and an external RFID dongle that is in the possession of the owner or any similar such mechanism known in the field of digital authentication.

[0039] The host device is intended to be securely affixed to the protected item in any known manner in the mechanical art. The host device houses a suitable power supply and related electronics that support the component functions discussed herein. The specifics of the electronic circuitry are considered to be well within the standard knowledge of one skilled in the circuitry art and are not discussed further herein. The suitable power supply may be a battery such as a long-life lithium-ion battery or the like and provides power to the trigger switch and powers the signal through the detection trigger. [0040] The host device receives and processes the signal from the trigger switch. Such processing circuitry (not discussed in detail herein) functions to change the state of the apparatus from disarmed to armed, and functions as a control that changes the state of the trigger switch from armed to disarmed and from triggered to disarmed. If the host device is armed and receives the signal from the trigger switch, the host device will change to a triggered state (from an armed state) and will begin a pre-defined behavior for which the processing circuitry is configured. Such pre-defined behavior may include activating an audible alarm, activating a silent alarm (which may take the form of a wireless signalling beacon), activating an onboard global positioning system (GPS) device to thereby geo-locate the host device, or any other suitable pre-defined behavior. It should be understood that only the host device may change the operating state of the apparatus from triggered to disarmed.

[0041] With regard to FIGURE 8, the figure illustrates an armed trigger connection state in accordance with the invention. Here, the connection from the trigger switch to the detection trigger is illustrated as two separate connections to more clearly show the circuit path, but may well be housed in a single jack type connection. Here, illustrated is a cross section of the system at the connection points for the cathode 85 and anode 81 when armed, and the host device internal trigger switch component 83 contained in the housing of the host device. This includes the closed switch 82, 86 as shown that forms an electrical loop through the security wire 84 as well as the closed switch 87 between the trigger switch and host device. It should be noted that micro controller unit 88 is assumed to be resident in the host device.

[0042] FIGURE 9 illustrates a triggered state of a trigger connection in accordance with the invention. Here, the circuit connections are shown between the system components after a triggering event has occurred. In this case, the security wire has been cut 94. It should be noted that the circuit switches 92 and 96 are now open and not conducting. The trigger is now finished with sending the signal to the host device to change the device’s state to the triggered state and so the connection switch 97 between the trigger component and the device is now open as well. The reason that after a trigger all these connections are open is to prevent a thief from disabling the host device by connecting a power source to the connections and shorting the connections and thereby disabling the security behavior of the host device. Once triggered, the micro controller unit within the host device is isolated from the connections and exterior casing and so is resistant to disabling via shock.

[0043] FIGURE 10A illustrates arming the device by connecting a security wire in accordance with the invention. Here, the device is armed by the action of connecting the security wire or network trigger. In this instance, a trigger switch with a single two contact connection is shown. The security wire 102 is attached through its loop to a fixed object 101. The male connection plug 103 is inserted into a female trigger switch connection such that the host device 104 is connected to an item of value (not shown). It should be noted that the indicator light 105 showing whether the device is armed or not is visible as a visual deterrent to potential thieves.

[0044] FIGURES 10B and 10C illustrate one implementation of the arming process within the host device. Initially, the detection trigger (DT) is not inserted in the host device. The owner of the item then presses the DT male connection end into the trigger switch’s female connection receiver. As shown in Figure 10B, as the male connection is pressed into the female receiver, a spring is compressed. On the side of the female connection, a latch slides along the shaft of the male connection until a notch in the male connection is reached, at which point the latch clicks into the notch. The DT is now fastened to the trigger switch (TS). This action is similar to that of a common padlock mechanism. In some embodiments, once the latch is secured, an indicator light flashes red and/or an audible indicator beep is sounded, to confirm the operation for the user. Further, in some embodiments, the indicator light continues to flash on a user- configurable schedule, to indicate to the user that the system is in the armed state.

[0045] FIGURES 10D to 10F illustrate disarming the system according to the above implementation. When the user applies the correct key to the host device, the TS signals to a solenoid. The solenoid moves the latch out of the notch in the shank of the DT male connection. The removal of the latch removes the resistance against the spring and plate at the bottom of the female half of the connection, thus ejecting the male component of the connection from the TS. Again, this action is similar to that of a common padlock mechanism. In some embodiments, when the system is disarmed, an indicator light flashes yellow and/or an audible warning beep will sound. These serve to remind the user to completely remove the DT. The system is thus in the disarmed state.

[0046] FIGURE 11 illustrates arming via a network trigger in accordance with the invention. Here, a system is armed by way of a detection trigger, realized as either a conducting security wire or a conducting network receiver trigger. This diagram shows a network detection trigger 113 that is within range of its configured signal 112 from the fixed base station. When the trigger connection 114 is inserted into the female connection 115, the indicator light 107 on the host device 106 indicates that the system is armed.

[0047] FIGURE 12 illustrates one possible use of the invention in the context of laptop security. As can be seen, the system of the present invention is secured between a laptop and a pole.

[0048] FIGURE 13 illustrates another possible use of the invention. In Figure 13, the system is used in the context of animal range monitoring. This is an application of the embodiment shown in Figure 7C and would require a secure method of attaching the host device to the animal (e.g., wire banded collar). The detection trigger is tuned to a transmitter that is transmitting within the desired range. If the detection trigger move close to the range limit, or out of range, in some embodiments, it emits a sound to warn the animal. If the signal is lost, the detection trigger would open its circuit, causing the trigger switch to signal the host device. Depending on the embodiment, the host device can perform some action to turn the animal around, and/or transmit location information to alert a human responsible for the animal.

[0049] Additionally, in some embodiments, as shown in the schematic image in FIGURE 14, the triggering of the system into a triggered state also causes subtriggers to execute one or more actions (i.e., in addition or alternatively to generating alarm signals and/or transmitting location information). For example, if the secured property is a bicycle, in some embodiments, the activation of a subtrigger immobilizes the bicycle, making the bicycle difficult to steal. Many other subtriggers can be activated, having different effects as desired.

[0050] FIGURE 15 is a flow diagram of the arming, disarming, and triggering process.

[0051] Operation of device and system of the invention

[0052] To arm or lock the system, the main precondition is that the trigger switch and the host device must both be in a disarmed state. The detection trigger can then be secured to a fixed location/position. This can be done either by way of a security wire (as explained above) or by the use of a network receiver that detects/connects to a predefined network transmitter (again as explained above). As can be imagined, the network received is previously tuned/ coupled to the transmitter’s signal/frequency.

[0053] It should be clear that, whether the security wire is used or whether a network receiver is used, the function of these tethers is to fix the host device and the associated item of value (IV) to a fixed location. In a number of implementations, a male connector is used to connect the host device to the trigger switch. The host device has a female connector/receptacle and the male connector is either on the receiver trigger or on the security wire. The male connector is inserted into the female connector on the trigger switch. Inserting the detection trigger into the trigger switch arms the device.

[0054] Thus, to arm the system, the following steps may be taken:

• 1. Confirm that the Detection Trigger can conduct current.

• 2. Insert the detection trigger connection into the trigger switch

[0055] Of course, as described above, prior to the system being armed, the concept is that the wire is attached/ wrapped around a fixed point such as a lamp post or some other (preferably) non-movable fixture. Then, by inserting the male end of the detection trigger is inserted into the female connection, the item of value is thus fixed/attached to the fixture. Removing the item of value from its attachment to the fixture, without disarming the system, causes the system to be triggered. [0056] To unlock/disarm the system, the host device is used. In one implementation, a key mechanism is used on the host device to disarm the system. The key mechanism uses a key that the user applies to the host device to thereby change the system’s status from armed to disarmed. Once disarmed, the detection trigger can be removed from the trigger switch and the item of value can be removed/uncoupled from the fixture. As an example, the system can be used to tether/couple a bicycle to, for example, a lamp post/fixture. When the user is ready to leave and use the bicycle, the user applies a key to the host device to disarm the system and, once disarmed, the detection trigger can be removed from the trigger switch and the detection trigger can be uncoupled from the fixture. The user can then use the bicycle.

[0057] It should be clear that the key mechanism can be any mechanism that is capable of sending a signal or a status change that causes the host device to change its status from armed to disarmed. As described above, the key mechanism includes any common means of authenticating that the user of the key is authenticated and authorized to perform the disarming action. Such a key includes, without limitation, a magnetic key fob, a code or codes entered on a code pad, a master key, a physical key, etc.

[0058] When the host device changes its status from ARMED or TRIGGERED to DISARMED, this will send a signal to change the trigger switch state to DISARMED. The male connection of the detection trigger will now also be ejected from the trigger switch’s female connection port. Once this has occurred, the user can move their now unprotected item of value.

[0059] Regarding the triggering of the alarm, once the system is armed, removing or otherwise attempting to remove, bypass, or cut the detection trigger will cause the system state to change to TRIGGERED. Once in the TRIGGERED state, the system will cause circuits between trigger switch and the host device to be open so as to prevent a disabling of the system. This is done to ensure that a current surge to the system through the TS’s female receptacle will not disable the triggered system. When in the triggered state, the host device will begin whatever deterrent/detection behavior it is designed to perform/operate. As an example, the host device may activate an audible alarm, activate a location beacon, etc. Other programmed/designed behaviours of the host device may, of course, occur (e.g, immobilizing the item, as discussed above).

[0060] If the item has been recovered or if the TRIGGERED state was triggered by a false alarm, disarming the system requires the key mechanism. Once the item of value has been recovered or, in the case of a false alarm, the user must apply/activate the host device’s key mechanism to disable the system. Use of the key mechanism would change the system state back to DISARMED.

[0061] A person understanding this invention may now conceive of alternative structures and embodiments or variations of the above all of which are intended to fall within the scope of the invention as defined in the claims that follow.