Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
COUNTER DETACHER SYSTEM AND METHOD
Document Type and Number:
WIPO Patent Application WO/2020/023366
Kind Code:
A1
Abstract:
A counter detacher system is provided. The counter detacher system may include an electronic key configured to control a merchandise security device. The counter detacher system may also include a charging base configured to removably support the electronic key and transfer power to the electronic key. The electronic key may be configured to be deactivated after a predetermined period of time when removed from the charging base, and the electronic key may be configured to be reactivated when subsequently returned onto the charging base.

Inventors:
GRANT JEFFREY A (US)
LYNCH LAURA ABBOT (US)
FAWCETT CHRISTOPHER J (US)
MOENING SEAN (US)
BOHON STEVEN R (US)
Application Number:
PCT/US2019/042796
Publication Date:
January 30, 2020
Filing Date:
July 22, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
INVUE SECURITY PRODUCTS INC (US)
International Classes:
G08B13/24; E05B47/00; G08B29/00; H04B5/00
Foreign References:
US20170372543A12017-12-28
US6384711B12002-05-07
US20070159328A12007-07-12
US20130009770A12013-01-10
US20120293330A12012-11-22
US20150061831A12015-03-05
Attorney, Agent or Firm:
KIRK, Trent, A. (US)
Download PDF:
Claims:
That which is claimed is:

1. A counter detacher system comprising:

an electronic key configured to control a merchandise security device; and

a charging base configured to removably support the electronic key and transfer power to the electronic key,

wherein the electronic key is configured to be deactivated after a predetermined period of time when removed from the charging base, and

wherein the electronic key is configured to be reactivated when subsequently returned onto the charging base.

2. The counter detacher system of Claim 1, wherein the electronic key is tethered to the charging base with a cable.

3. The counter detacher system of Claim 2, wherein the cable is electrically connected to the electronic key and the charging base.

4. The counter detacher system of Claim 1, wherein the charging base is configured to transfer power to the electronic key using one or more electrical contacts.

5. The counter detacher system of Claim 1, wherein the charging base is configured to transfer power to the electronic key using inductance.

6. The counter detacher system of Claim 1, further comprising a merchandise security device.

7. The counter detacher system of Claim 6, wherein the electronic key is configured to transfer power to the merchandise security device.

8. The counter detacher system of Claim 7, wherein the merchandise security device comprises a lock mechanism that is operated by electrical power transferred from the electronic key to the lock mechanism.

9. The counter detacher system of Claim 1, further comprising a manager key configured to communicate with the charging base for reactivating the electronic key.

10. A counter detacher system comprising:

an electronic key configured to control a merchandise security device;

a base configured to removably support the electronic key and communicate with the electronic key; and

a cable connecting the electronic key to the base,

wherein the electronic key is configured to be deactivated after a predetermined period of time when removed from the base such that the electronic key is unable to control the merchandise security device, and

wherein the electronic key is configured to be reactivated in response to communication with the base.

11. The counter detacher system of Claim 10, wherein the base is a charging base configured to transfer power to the electronic key when the electronic key is supported on the charging base.

12. The counter detacher system of Claim 10, wherein the electronic key is configured to be reactivated when subsequently returned onto the base.

13. The counter detacher system of Claim 10, wherein the cable is electrically connected to the electronic key and the charging base.

14. A counter detacher system comprising:

an electronic key configured to control a merchandise security device; a base configured to removably support the electronic key and communicate with the electronic key; and

a cable connecting the electronic key to the base,

wherein the electronic key is configured to be removed from the base for controlling the merchandise security device and to be subsequently deactivated such that the electronic key is unable to control the merchandise security device, and

wherein the electronic key is configured to be reactivated in response to communication with the base.

15. The counter detacher system of Claim 14, wherein the electronic key is configured to be deactivated after a predetermined period of time when removed from the base.

16. The counter detacher system of Claim 14, wherein the base is a charging base configured to transfer power to the electronic key when the electronic key is supported on the charging base.

17. The counter detacher system of Claim 14, wherein the electronic key is configured to be reactivated when subsequently returned onto the base.

18. The counter detacher system of Claim 14, wherein the cable is electrically connected to the electronic key and the charging base.

19. A method for removing a merchandise security device from an item of merchandise is provided, the method comprising:

removably supporting an electronic key on a charging base, the charging base configured to transfer power to the electronic key;

removing the electronic key from the charging base for controlling a merchandise security device, wherein the electronic key is configured to be deactivated after a predetermined period of time when removed from the charging base; and returning the electronic key to the charging base for reactivating the electronic key.

20. A method for removing a merchandise security device from an item of merchandise is provided, the method comprising:

removably supporting an electronic key on a base, the electronic key connected to the base with a cable;

removing the electronic key from the base for controlling a merchandise security device, wherein the electronic key is configured to be to be subsequently deactivated such that the electronic key is unable to control the merchandise security device; and

returning the electronic key to the base for reactivating the electronic key.

Description:
COUNTER DETACHER SYSTEM AND METHOD

CROSS REFERENCE TO RELATED APPLICATIONS

[0001] This application claims the benefit of priority to U.S. Provisional Application No. 62/701,950, filed on July 23, 2018, the entire disclosure of which is incorporated herein by reference.

FIELD OF THE INVENTION

[0002] Embodiments of the present invention relate generally to counter detacher systems and methods for use in retail.

BACKGROUND OF THE INVENTION

[0003] It is common practice for retailers to store and/or display items of merchandise on or with a merchandise security device, such as a security display (e.g. alarming stand), security fixture (e.g. locking hook, shelf, cabinet, etc.) or security packaging (e.g. merchandise safer). Regardless, the merchandise security device displays and/or stores an item of merchandise so that a consumer may inspect, and in some instances, interact with the merchandise before making a decision whether to purchase the item. In some cases, a retailer may desire to remove the merchandise security device from the item of merchandise at the time the consumer purchases the item.

BRIEF SUMMARY

[0004] Embodiments of the present invention are directed towards a counter detacher system. The counter detacher system may include an electronic key configured to control a merchandise security device and a charging base configured to removably support the electronic key and transfer power to the electronic key. The electronic key is configured to be deactivated after a predetermined period of time when removed from the charging base, and the electronic key is configured to be reactivated when subsequently returned onto the charging base.

[0005] In another embodiment, a counter detacher system includes an electronic key configured to control a merchandise security device a base configured to removably support the electronic key and communicate with the electronic key. The counter detacher system also includes a cable connecting the electronic key to the base. The electronic key is configured to be deactivated after a predetermined period of time when removed from the base such that the electronic key is unable to control the merchandise security device, and the electronic key is configured to be reactivated in response to communication with the base.

[0006] In another embodiment, a counter detacher system includes an electronic key configured to control a merchandise security device and a base configured to removably support the electronic key and communicate with the electronic key. The counter detacher system also includes a cable connecting the electronic key to the base. The electronic key is configured to be removed from the base for controlling the merchandise security device and to be subsequently deactivated such that the electronic key is unable to control the merchandise security device, and the electronic key is configured to be reactivated in response to communication with the base.

[0007] In another embodiment a method for removing a merchandise security device from an item of merchandise is provided. The method includes removably supporting an electronic key on a charging base, wherein the charging base is configured to transfer power to the electronic key. The method also includes removing the electronic key from the charging base for controlling a merchandise security device, wherein the electronic key is configured to be deactivated after a predetermined period of time when removed from the charging base. The method further includes returning the electronic key to the charging base for reactivating the electronic key.

[0008] In another embodiment, a method includes removably supporting an electronic key on a base, wherein the electronic key is connected to the base with a cable. The method also includes removing the electronic key from the base for controlling a merchandise security device, wherein the electronic key is configured to be to be subsequently deactivated such that the electronic key is unable to control the merchandise security device. The method further includes returning the electronic key to the base for reactivating the electronic key.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009] FIG. 1 is a perspective view of a counter detacher system according to one embodiment of the present invention.

[0010] FIG. 2 is a perspective view of a counter detacher system according to another embodiment of the present invention.

[0011] FIG. 3 is a perspective view of a counter detacher system according to another embodiment of the present invention.

[0012] FIG. 4 is a perspective view of a manager key according to one embodiment of the present invention.

[0013] FIG. 5 is a perspective view of an electronic key and a cable according to one embodiment of the present invention.

[0014] FIG. 6 is a merchandise security device according to one embodiment of the present invention.

[0015] FIG. 7 is a perspective view of a counter detacher system use in conjunction with a point-of-sale system.

[0016] FIG. 8 is another perspective view of the counter detacher system of FIG. 7 showing a terminal and the counter detacher system.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

[0017] Referring now to the accompanying drawing figures wherein like reference numerals denote like elements throughout the various views, one or more embodiments of a counter detacher system 10 are shown. In the embodiments shown and described herein, the counter detacher system 10 includes an electronic key 12 and a charging base 14 configured for use with the electronic key. The electronic key 12 may be configured to be used with a variety of merchandise security devices 16 such as, for example, a security display (e.g. alarming stand or module), security fixture (e.g. locking hook, shelf, cabinet, etc.), security wraps or cables, garment tags, or security packaging or enclosure (e.g. merchandise safer) for securing an item of merchandise from theft. For example, FIG. 6 shows an example of a merchandise security device 16 in the form of a cable wrap that is configured to be secured to an item of merchandise and removed from the item prior to being purchased by a consumer. The electronic key 12 may be useable with any security device 16 that utilizes power transferred from the key to operate a mechanical lock mechanism associated with the security device, and/or utilizes data transferred from the key to authorize the operation of a mechanical lock mechanism or an electronic alarm circuit. In other words, an electronic key 12 according to embodiments of the invention is useable with any security device or lock mechanism that requires power transferred from the key to the device and/or data transferred between the key and the device. Further examples of security devices 16 include, but are not limited to, a door lock, a drawer lock or a shelf lock, as well as any device that prevents an unauthorized person from accessing, removing or detaching an item from a secure location or position.

[0018] It should be noted that embodiments of the invention include an electronic key 12 for transferring both data and power to a merchandise security device 16 to operate a mechanical lock mechanism, as well as an electronic key for transferring only data or power to a merchandise security device to operate any component of the merchandise security device (e.g., a lock mechanism, alarm circuit, etc.), whether or not the security device includes an internal or external power source for operating another component of the device.

[0019] One embodiment of an electronic key 12 and charging base 14 for use with a counter detacher system 10 according to the invention is shown in FIG. 1 and will be described in greater detail hereinafter. The counter detacher system 10 comprises the electronic key 12 and a charging base 14 that is configured to be operated with the key. The system 10 may further comprise an optional programming station that is operable for programming the electronic key with a security code. A programming station suitable for use with the electronic key is shown and described in United States Patent No. 7,737,844 entitled Programming Station For a Security System For Protecting Merchandise, the disclosure of which is incorporated herein by reference in its entirety. It is to be understood that in other embodiments the electronic key 12 may be programmed without the use of a programming station. For example, the key may be self programming, programmed by a user, or may be pre-programmed with a predetermined SDC.

[0020] In certain embodiments, the merchandise security device 16 is a passive device. As used herein, the term“passive” is intended to mean that the security device 16 does not have an internal power source (e.g., a battery) sufficient to lock and/or unlock a mechanical lock mechanism. Significant cost savings are obtained by a retailer when the merchandise security device 16 is passive since the expense of an internal power source is confined to the electronic key 12, and one such key is able to operate multiple security devices. In addition, the security device 16 may not require an electric motor, such as a DC stepper motor, solenoid, or the like, that is configured to lock or unlock the lock mechanism. As such, the security device 16 may employ a simplified lock mechanism that does not require various components operated by its own source of electrical power. Accordingly, the electronic key 12 may be an active device. The term“active” is used herein to mean that an electronic key has an internal power source sufficient to cause operation of the lock mechanism of the merchandise security device. However, it is understood that both the electronic key 12 and/or security device 16 may obtain power from other sources. For example, the security device 16 may be an active device in some cases. In another example, the electronic key 12 may receive power from the charging base 14 for operating the security device 16.

[0021] Moreover, in certain embodiments the merchandise security device 16 is not required to include a logic control circuit, while the electronic key 12 includes such a logic control circuit. In this regard, some security devices 16 include a logic control circuit adapted to perform a handshake communication protocol and/or exchange a security code with the logic control circuit of the electronic key 12. Thus, the security device 16 may or may not include a logic control circuit used to communicate with the electronic key 12 in order to determine whether the merchandise security device is an authorized device. Likewise, the electronic key 12 may or may not include a logic control circuit. Regardless of whether the electronic key 12 includes a logic control circuit, a security code may be unnecessary where the electronic key is configured to transmit power to the security device 16 is not readily duplicated by a potential thief. For example, where the electronic key 12 is configured to transmit power inductively, the inductive signature may provide increased security relative to conventional lock mechanisms that utilize mechanical or magnetic actuators. For instance, the electronic key 12 may be configured to transmit an inductive signature including a particular amplitude and/or frequency of a power signal that is not readily apparent to, or is not readily able to be duplicated by, a potential thief.

[0022] In some embodiments, the electronic key 12 does not transmit a security code to the security device 16. However, in other embodiments, the electronic key 12 may be configured to transmit a security code to the security device 16. In the latter embodiments, the security device 16 may include a corresponding security code. In some cases, the electronic key 12 may be configured to perform a handshake communication protocol with the security device 16 prior to exchanging a security code or the electronic key and security device may exchange security codes without a handshake communication protocol. In the event that the security code of the electronic key 12 matches the security code of the security device 16, the electronic key may then be configured to transmit electrical power to the security device, or the security device may be operated using power previously transferred by the electronic key to the security device to initiate the handshake communication.

[0023] As will be readily apparent to those skilled in the art, the security code may be transmitted from the electronic key 12 to the merchandise security device 16 by any suitable means, including without limitation, via one or more electrical contacts or wirelessly, or via optical, infrared, acoustic, electromechanical, electromagnetic or magnetic conductors, as desired. In certain embodiments, the security code may be transmitted by inductive transfer of data from the electronic key 12 to the merchandise security device 16.

[0024] In one embodiment, the electronic key 12 is configured to cause the internal power source of the key to transfer electrical power to the security device 16 to operate a lock mechanism of the security device. In one example, electrical contacts disposed on the electronic key 12 are configured to electrically couple with cooperating electrical contacts on the merchandise security device 16 to transfer power from the internal battery of the key to the merchandise security device. As such, electrical power may be transferred directly to the lock mechanism via one or more conductors. In other embodiments, power may be transferred from the electronic key 12 to the security device 16 by induction using an inductive transceiver disposed within the key that cooperates with a corresponding inductive transceiver disposed within the security device. For example, the electronic key 12 may comprise an inductive transceiver coil that is electrically connected to the logic control circuit of the key to provide electrical power from the internal battery of the key to an inductive transceiver coil disposed within the security device 16. The inductive transceiver coil of the security device 16 may then transfer the electrical power from the internal battery of the key to the lock mechanism disposed within the security device. Thus, the security device 16 may include at least one conductor configured as a coil having a plurality of continuous windings. [0025] The electronic key 12 may be actuated by a control button 24 provided on the exterior of the key. Control button 24 is configured to control certain operations of the electronic key 12, such as for example, transmission of power and/or data between the key and a merchandise security device 16. In one embodiment, actuation of the electronic key 12 via the control button 24 results in the transfer of power for a predetermined duration (e.g., about 1-3 seconds) before power ceases being transferred.

[0026] In one embodiment, the merchandise security device 16 includes a lock mechanism having a shape memory material (e.g., Nitinol) such that electrical power transferred from the electronic key 12 results in a change in shape of the shape memory material. Such a change in shape may cause a mechanical actuation (e.g., linear, rotary, etc.) of the lock mechanism to lock or unlock the lock mechanism. In other embodiments, the lock mechanism may include a motor or solenoid for operating the lock mechanism. A lock mechanism suitable for use with the electronic key is shown and described in United States Patent No. 9,133,649 entitled Merchandise Security Devices for Use with an Electronic Key, the disclosure of which is incorporated herein by reference in its entirety.

[0027] Therefore, it is apparent that any number of security devices 16 may be employed in conjunction with various forms of power transfer for actuating a lock mechanism (e.g., electrical, inductive, capacitive, etc.). For example, where a shape memory material is utilized, a change in shape of the shape memory material may cause mechanical actuation (e.g., linear and/or rotary movement) of the lock mechanism. The shape memory material may be operably engaged with a lock mechanism in any number of configurations to facilitate such actuation. Moreover, the shape memory material may be any suitable material, such as a metal, a polymer, or a combination thereof, that is configured to change its shape (e.g., length, area, etc.) in response to an electric current or a change in temperature and to return to its original shape after the electric current is no longer transferred therethrough. For example, transferring current through the shape memory material may cause the material to be heated and thereby contract. Upon removal of the current, the shape memory material may return to its original shape. In addition, other mechanisms may be utilized for actuating a lock mechanism, including mechanical, electrical, and/or chemical state changes. As such, the security devices and associated lock mechanisms should not be limited in light of the exemplary embodiments shown and described herein.

[0028] In some embodiments, the security device and the electronic key are similar to those disclosed in U.S. Patent No. 8,994,497, entitled Cabinet Lock for Use with Programmable Electronic Key and filed September 28, 2012, U.S. Patent Publication No. 2012/0047972, entitled Electronic Key for Merchandise Security Device and filed August 31, 2011, and U.S. Patent No. 9,858,778, entitled Programmable Security System and Method for Protecting Merchandise and filed June 27, 2011, and U.S. Patent No. 9,953,498, entitled Wrap for a an Item of Merchandise, each of the disclosures of which is incorporated herein by reference in its entirety. In other embodiments, the security devices are similar to those manufactured by InVue Security Products Inc. of Charlotte, North Carolina, USA.

[0029] The electronic key 12 may be configured to be supported by or docked in the charging base 14. As explained in further detail below, the electronic key 12 may be removable from the charging base 14 for controlling a merchandise security device 16. In one embodiment, the charging base 14 is operable for initially charging and/or subsequently recharging an internal power source disposed within the electronic key 12. The electronic key 12 may be provisioned with a single-use (e.g., non-rechargeable) power source, such as a conventional or extended-life battery, or alternatively, the key may be provisioned with a multiple-use (e.g., rechargeable) power source, such as a conventional capacitor or rechargeable battery. In either instance, the internal power source may be permanent, semi-permanent, or rechargeable, as desired. In the latter instance, the charging base 14 is configured to initially charge and/or to subsequently recharge the internal power source disposed within the electronic key 12. In some embodiments, the charging base 14 is not configured to generate security codes or transfer any data to the electronic key 12.

[0030] The charging base 14 may be configured to charge the internal power source of the electronic key 12 using any suitable means, such as contact charging or inductive charging. Thus, similar to that discussed above in conjunction with the merchandise security device 16, the charging base 14 may include one or more electrical contacts configured to electrically couple with cooperating electrical contacts on the electronic key to transfer power from the charging base to the electronic key 12. As such, electrical power may be transferred directly to the electronic key via one or more conductors. In other embodiments, power may be transferred from the charging base 14 to the electronic key 12 by induction using an inductive transceiver disposed within the charging base that cooperates with a corresponding inductive transceiver disposed within the key. In either case, the charging base 14 may include an internal power source (e.g., permanent, semi-permanent, or rechargeable), while in other cases the charging base may be electrically connected to an external power source (e.g., an electrical outlet). Thus, the charging base 14 may be configured to transfer power to the electronic key 12 using its own internal power source or transfer power to the electronic key from an external power source.

[0031] In other embodiments, the charging base 14 may not charge the electronic key 12 but is configured to reactivate the electronic key, as explained in further detail below. The charging base 14 could transfer power to the electronic key 12, such as from an external power source, but may not include means (e.g., electrical contacts or inductance) to charge the electronic key in response to the key being placed on the base.

[0032] In some cases, the charging base 14 may be kept near a check-out aisle in a retail store and be used to remove a merchandise security device 16 from an item of merchandise. In this way, an authorized sales associate may be able to remove the electronic key 12 from the charging base 14 and communicate with a security device 16 prior to, or at the time of, a consumer purchasing the item of merchandise. In some embodiments, the electronic key 12 is tethered to the charging base 14 with a cable 20. The cable 20 may be used to ensure that the electronic key 12 is kept in close proximity to the charging base 14. The charging base 14 may include an alarm in some embodiments in the event that the charging base is removed from a support surface in an unauthorized manner. For example, the charging base 14 may include a proximity or pressure switch on its bottom surface that makes contact with the support surface when attached thereto. Should the charging base 14 be removed, the proximity or pressure switch will be activated thereby resulting an alarm being generated. It is understood that the charging base 14 may be attached to a support surface using any desired technique, such as with an adhesive and/or fasteners. In other embodiments, unauthorized removal of the charging base 14 may result in automatically timing out the electronic key 12.

[0033] The cable 20 may be hardwired to the electronic key 12 and/or the charging base 14 (see, e.g., FIG. 2), or one or more both ends of the cable may be removably attached to the electronic key and/or the charging base. For instance, FIG. 5 illustrates that both ends of the cable 20 may have a clip or the like for attaching to the electronic key 12 and the charging base 14. The cable 20 may be purely mechanical or may be electrically connected to the electronic key 12 and/or the charging base 14. For instance, the cable 20 may include electrical conductors for transferring power to the electronic key 12. As shown in FIGS. 1-2, the cable 20 may be a coiled cable in some cases, while in other embodiments the cable may be coupled to a recoiler 26 housed within the charging base 14 to facilitate retraction of the cable within the charging base when the key is seated on the charging base (see, e.g., FIG. 3). Thus, the electronic key 12 coupled to the cable 20 may be configured to be extended and retracted relative to the charging base 14.

[0034] An available feature of a counter detacher system 10 according to an embodiment of the invention is that the electronic key 12 may include a“time-out” function. More particularly, the ability of the electronic key 12 to control (e.g., transfer power and/or data to) the merchandise security device 16 is deactivated after a predetermined time period or in response to some unauthorized action taken on the counter detacher system 10. By way of example, the electronic key 12 may be deactivated after about 10 seconds to about 5 minutes from the time that the key was last removed from the charging base 14. In one example, the key 12 may be configured to time out after only about 20 to 45 seconds to enable a sales associate to remove the merchandise security device 16 at the time an item of merchandise is purchased. Due to the short time period before the electronic key 12 is deactivated, an authorized sales associate would typically be required to dock the electronic key in the charging base 14 between each activation of the electronic key to reset the time-out and reactivate the electronic key. In one embodiment, the charging base 14 may be made available to an authorized sales associate in an unsecured location without risk that an electronic key 12 could be removed from the charging station and used to disarm and/or unlock multiple merchandise security devices 16 in an unauthorized manner. In other embodiments, the electronic key 12 may be configured to time out upon disconnection or cutting of the cable 20 and/or as a result of loss of power in the cable or charging base 14. For example, should the cable 20 be disconnected from the electronic key or the charging base 14, the electronic key may immediately time out. In further embodiments, the electronic key 12 may be configured to time out after a predetermined number of activations of the key.

[0035] In some embodiments, the electronic key 12 is reset upon the key being redocked in the charging base 14. In some instances, the charging base 14 may include a transfer port 18 configured to facilitate communication with a manager key 22. It is understood that any desired communication technique may be used to enable communication between a manager key 22 and the charging base 14, including without limitation, via one or more electrical contacts or wirelessly, or via optical, acoustic, electromechanical, electromagnetic or magnetic conductors, as desired. The transfer port 18 may allow a manager or other authorized person to reset an electronic key 12 docked in the charging base 14 after the electronic key was timed out. The manager key 22 may be configured to exchange a security code with the charging base 14 similar to that described above before the time out of the electronic key 12 can be reset. In some embodiments, the merchandise security device 16 may also have a transfer port 18 for communicating with the electronic key 12 (see, e.g., FIG. 6).

[0036] In other embodiments, a counter detacher system 50 may be used as a means for self- check-out at a point-of-sale system (see, e.g., FIGS. 7-8). Thus, in some embodiments, a customer may be authorized to use a counter detacher system 50 in order to remove a security device 16 from an item of merchandise at the time of purchasing the item. In this way, a customer does not have to wait for a sales associate to remove the security device 16, and the presence of security devices may deter customers from otherwise using self-check-out lanes. In some instances, the electronic key 12 may be authorized to remove a security device 16 at check out after the customer makes the purchase. For instance, after purchasing the item of merchandise, such as by scanning the item (e.g., scanning a QR barcode), the point of sale terminal 52 may either automatically recognize that this particular item of merchandise includes a security device 16 (such as in response to scanning a barcode on the item of merchandise, security device, or sales receipt), or the customer could be prompted to indicate whether a security device is present. If a security device 16 is detected or present (either before or after purchasing the item of merchandise), the point of sale terminal 52 could authorize the electronic key 12 for removing the security device. Upon removal of the security device 16, the customer may be instructed to discard the security device or place the security device in an appropriate receptacle 54, such as for reuse by the retailer.

[0037] In one embodiment, a counter detacher system 50 may be electrically connected to a point of sale terminal 52. In other cases, the cable 20 may electrically connect to a point of sale terminal 52 such that a charging base 14 is not required in some embodiments. In this example, the point of sale terminal 52 may include the same or similar functionality of the charging base 14 as discussed above, such as for example, a base that is configured to charge, reactivate, and/or removably support the electronic key. Various prompts may be provided on the point of sale terminal 52 for guiding the customer through the process of removing the security device 16 from the item of merchandise. Upon activation of the electronic key 12 by the customer, the key may be configured to immediately time out (e.g., only a single activation of the key is authorized), or the key could time out after some period of time that would typically be needed to remove the security device. Thus, in some embodiments, the electronic key 12 is only authorized at the time of purchasing the item of merchandise.

[0038] The foregoing has described one or more embodiments of a counter detacher system for use with an electronic key and merchandise security device. Embodiments of a counter detacher system have been shown and described herein for purposes of illustrating and enabling one of ordinary skill in the art to make, use and practice the invention. Those of ordinary skill in the art, however, will readily understand and appreciate that numerous variations and modifications of the invention may be made without departing from the spirit and scope thereof. Accordingly, all such variations and modifications are intended to be encompassed by the appended claims.