Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PROGRAMMABLE KEYS AND SECURITY DEVICES
Document Type and Number:
WIPO Patent Application WO/2017/049121
Kind Code:
A1
Abstract:
A security system is provided. The security system includes one or more security devices each configured to protect an item of merchandise from theft and a master key comprising a code stored in memory. The security system also includes one or more user keys configured to communicate with the master key for receiving and storing the code. The one or more security devices are configured to communicate with the master key and/or the one or more user keys for receiving and storing the code, and each user key is configured to communicate with the one or more security devices for arming or disarming thereof upon a matching of the code stored by the user key with the code stored by the security device.

Inventors:
FAWCETT CHRISTOPHER J (US)
Application Number:
PCT/US2016/052191
Publication Date:
March 23, 2017
Filing Date:
September 16, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
INVUE SECURITY PRODUCTS INC (US)
International Classes:
E05B45/06; E05B45/10; E05B45/14; G05B19/00; G05B19/02; G06F7/04
Foreign References:
US20140225733A12014-08-14
US20070146134A12007-06-28
US20080012684A12008-01-17
US20100175438A12010-07-15
Attorney, Agent or Firm:
KIRK, Trent, A. (US)
Download PDF:
Claims:
That which is claimed is:

1. A security system for protecting items of merchandise from theft comprising: one or more security devices each configured to protect an item of merchandise from theft;

a master key comprising a code stored in a memory thereof; and

one or more user keys configured to communicate with the master key for receiving and storing the code,

wherein the one or more security devices are configured to communicate with the master key and/or the one or more user keys for receiving and storing the code, and

wherein each user key is configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.

2. The security system of Claim 1, wherein the code is unique to the master key.

3. The security system of Claim 1, wherein the one or more security devices are configured to communicate with the master key for receiving and storing the code.

4. The security system of Claim 1, wherein the one or more security devices are configured to communicate with the one or more user keys for receiving and storing the code.

5. The security system of Claim 1, wherein the code is randomly generated prior to being stored by the master key.

6. The security system of Claim 1, wherein the code is unknown to users of the one or more user keys and the master key.

7. The security system of Claim 1, wherein each user key comprises an opening configured to receive a portion of the master key for communicating therewith.

8. The security system of Claim 1, further comprising a plurality of user keys having the same code as the master key.

9. The security system of Claim 1, further comprising a plurality of security devices having the same code as the master key and the one or more user keys.

10. The security system of Claim 1, wherein the master key is not configured to generate the code.

11. The security system of Claim 1, wherein the code is permanently stored in the memory of the master key.

12. The security system of Claim 1, wherein the master key and the one or more user keys each comprises one or more electrical contacts configured to align and mate with one another for facilitating communication between the master key and the one or more user keys.

13. The security system of Claim 1, wherein the one or more user keys are configured to wirelessly communicate with the one or more security devices.

14. The security system of Claim 1, wherein each user key is configured to communicate with the one or more security devices for arming or disarming the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.

15. The security system of Claim 1, wherein each of the one or more user keys is configured to remove the code from the security device when engaged with the master key and in communication with the security device.

16. The security system of Claim 1, wherein each of the one or more user keys is configured to be deactivated after a predetermined time period, and wherein the master key is configured to reactivate the one or more user keys that have been deactivated.

17. The security system of Claim 1, wherein the master key is configured to reprogram the one or more user keys.

18. The security system of Claim 1, wherein the master key is configured electrically engage each of the one or more user keys for communication therewith.

19. A method for protecting items of merchandise from theft comprising:

providing a master key comprising a code stored in memory;

providing one or more security devices each configured to protect an item of merchandise from theft;

providing one or more user keys configured to communicate with the master key for receiving and storing the code;

causing the master key and/or the one or more user keys to communicate with the one or more security devices for receiving and storing the code; and

causing the one or more user keys to communicate with the one or more security devices for operating thereof upon a matching of the code stored by the user key with the code stored by the one or more security devices.

20. The method of Claim 19, wherein causing the master key and/or the one or more user keys to communicate with the one or more security devices comprises causing the one or more user keys to communicate with the one or more security devices for receiving and storing the code.

21. The method of Claim 19, further comprising inserting a portion of the master key within an opening defined in the one or more user keys for communicating therewith.

22. The method of Claim 21, wherein inserting comprises inserting the portion of the master key within an opening defined in each of the one or more user keys.

23. The method of Claim 19, wherein causing the one or more user keys to communicate with the one or more security devices comprises causing the one or more user keys to communicate with the one or more security devices for arming or disarming thereof upon a matching of the code stored by the user key with the code stored by the one or more security devices.

24. The method of Claim 19, wherein causing the one or more user keys to communicate with the one or more security devices comprises causing the one or more user keys to wirelessly communicate with the one or more security devices.

25. A security system for protecting items of merchandise from theft comprising: one or more security devices each configured to protect an item of merchandise from theft;

a master key comprising a code stored in a memory thereof; and

one or more user keys configured to communicate with the master key for receiving and storing the code,

wherein the one or more security devices are configured to communicate with the one or more user keys for receiving and storing the code, and

wherein each user key is configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.

26. A security system for protecting items of merchandise from theft comprising: one or more security devices each configured to protect an item of merchandise from theft, the one or more security devices comprising a code stored in a memory thereof;

a master key comprising a code stored in a memory thereof; and

at least one user key configured to electrically engage with the master key for communicating with the master key to receive and store the code,

wherein the at least one user key is configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the at least one user key with the code stored by the security device.

27. The security system of Claim 26 wherein the one or more security devices are configured to communicate with the master key and/or the one or more user keys for receiving and storing the code.

28. The security system of Claim 26, wherein the at least one user key is configured to wirelessly communicate with the one or more security devices.

29. A method for protecting items of merchandise from theft comprising: providing a master key comprising a code stored in memory;

providing one or more security devices each configured to protect an item of merchandise from theft;

providing at least one user key configured to communicate with the master key for receiving and storing the code;

electrically engaging the master key with the at least one user key for communicating with the one or more security devices to receive and store the code; and

causing the at least one user key to communicate with the one or more security devices for operating thereof upon a matching of the code stored by the at least one user key with the code stored by the one or more security devices.

30. The method of Claim 29, wherein causing the at least one user key to communicate with the one or more security devices comprises causing the at least one user key to wirelessly communicate with the one or more security devices.

31. The method of Claim 29, wherein electrically engaging the master key with the at least one user key comprises inserting a portion of the master key within an opening defined in the at least one user key.

Description:
PROGRAMMABLE KEYS AND SECURITY DEVICES

CROSS REFERENCE TO RELATED APPLICATIONS

[0001] This application claims the benefit of priority to United States Provisional Application No. 62/220,343 filed on September 18, 2015, the entire disclosure of which is incorporated herein by reference.

FIELD OF THE INVENTION

[0002] Embodiments of the present invention relate generally to programmable keys and security devices of the type commonly used to display an item of merchandise vulnerable to theft.

BACKGROUND OF THE INVENTION

[0003] Retailers commonly use security devices for displaying items of merchandise within a retail store and/or other establishment. As such, the security device typically displays an item of merchandise so that a potential purchaser may examine the item when deciding to make a purchase. Often times, particularly smaller-sized items of merchandise make the items attractive targets for theft. A shoplifter may attempt to detach an item of merchandise from a security device, or alternatively, may attempt to remove a security device from a display area along with the item of merchandise.

BRIEF SUMMARY OF THE INVENTION

[0004] Embodiments of the present invention are directed to a security system for protecting items of merchandise. In one embodiment, the security system may include one or more security devices, a master key, and one or more user keys. Each security device may be configured to protect an item of merchandise from theft by communication with a master key and/or user key. The master key may include a code stored in a memory thereof, and the one or more user keys may be configured to communicate with the master key for receiving and storing the code. Each user key may be configured to operate (e.g., arm or disarm) the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.

[0005] According to another embodiment, a method for protecting items of merchandise from theft wherein the method may include providing a master key, one or more security devices and one or more user keys. The method may further include causing the master key and/or one or more of the user keys to communicate with the security device to receive and store a code for operating (e.g., arming or disarming) the security device upon a matching of the code stored by the user key with the code stored by the security device.

[0006] According to another embodiment, a security system for protecting items of merchandise from theft includes one or more security devices configured to protect an item of merchandise from theft; a master key comprising a code stored in a memory thereof; and one or more user keys. The user keys may be configured to communicate with the master key for receiving and storing the code. The one or more security devices are configured to communicate with the one or more user keys for receiving and storing the code, and each user key is configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the user key with the code stored by the security device.

[0007] According to another embodiment, a security system for protecting items of merchandise from theft includes one or more security devices configured to protect an item of merchandise from theft, a master key and at least one user key. The one or more security devices include a code stored in a memory thereof, and the master key includes a code stored in a memory thereof. The at least one user key may be configured to electrically engage with the master key for communicating with the master key to receive and store the code, wherein the at least one user key may be configured to communicate with the one or more security devices for operating the one or more security devices upon a matching of the code stored by the at least one user key with the code stored by the security device.

[0008] According to one embodiment, a method for protecting items of merchandise from theft includes providing a master key comprising a code stored in memory; providing one or more security devices each configured to protect an item of merchandise from theft; providing at least one user key configured to communicate with the master key for receiving and storing the code; electrically engaging the master key with the at least one user key for communicating with the one or more security devices to receive and store the code; and causing the at least one user key to communicate with the one or more security devices for operating thereof upon a matching of the code stored by the at least one user key with the code stored by the one or more security devices.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009] FIG. 1 illustrates a plurality of master keys and user keys according to one embodiment of the present invention.

[0010] FIG. 2 illustrates a detailed view of a master key having electrical contacts and a user key having an opening and electrical contacts according to one embodiment of the present invention.

[0011] FIG. 3 illustrates the master key of FIG. 2 engaged with the user key shown in FIG. 2.

[0012] FIG. 4 illustrates a security device according to one embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

[0013] Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, the exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.

[0014] Reference will now be made to the accompanying drawing figures wherein identical reference numerals denote the same or similar elements throughout the various views. Referring to the accompanying drawing figures, embodiments of a security system according to the present invention including one or more master keys, user keys and security devices are shown.

[0015] According to some embodiments, the master keys and user keys described herein may be operable for use with a security device. In one embodiment, the security device may be one of the type commonly used to display one or more items of merchandise within a display area of a retail store. By way of example, and not by limitation, the security device may be a conventional merchandise display hook for displaying relatively, small, expensive consumer products, for example compact discs (CDs), digital video discs (DVDs), battery packs, etc., on a display support. Also by way of example, in some embodiments, the display support could be any suitable support, such as wire grid, horizontal bar rack, slat wall (also known as slat board), wall, table, desk, countertop or other secure structure. Other examples of a security device according to the present invention, without limitation, may include merchandise display fixtures, such as a cabinet, and merchandise safers for storing one or more items of merchandise. In some embodiments, the security device may be a display module, a stand, a puck, or base that is mountable to a display surface, support, or the like, for displaying an item of merchandise. In other embodiments, the security device may include an alarm (e.g., a piezo), a battery, a logic control circuit or circuit board, communications circuitry, and a memory (see, e.g., FIG. 4). Moreover, embodiments of each security device may include a sensor configured to detect various security events associated with the item of merchandise, such as unauthorized removal of the item of merchandise from the security device. In some embodiments, the security device may be similar to the Locking Hooks, Smart Locks, and POD devices manufactured by InVue Security Products Inc.

[0016] In one embodiment, the item of merchandise may be a display model or an operational sample of electronic merchandise, such as mobile phones, portable computers (e.g., notebooks, laptops, tablets, etc.), e-readers, media players, and the like, for a customer to examine prior to deciding to purchase the item. In some embodiments, the item of merchandise may be displayed in a manner that permits a prospective purchaser to evaluate the operation and features of the merchandise, while protecting the merchandise from being stolen. In other embodiments, the item of merchandise may be a device used by employees within a retail store or other establishment (e.g., hospital, restaurant, etc.).

[0017] In an exemplary embodiment, as shown in FIG. 1, the security system 10 may include one or more master keys 12, one or more user keys 14 and one or more security devices 50 (see FIG. 4). In some embodiments, the one or more master keys 12, user keys 14 and security devices 50 may be programmed for operation with one another. In general, and in some embodiments, the security system 10 may include at least one master key 12 and one or more user keys 14. The master key 12 may be configured to program each of the user keys 14. For example, the master key 12 may have a code stored in a memory. The code may take many forms, such as a security disarm code, and may be unique to the master key 12. In some embodiments, the code may be programmed into the master key 12 at the time of manufacture or otherwise assigned to the master key 12 by a manufacturer or other authorized person. In other embodiments, the code may be generated using an algorithm and may be randomly generated, although alternatively the code could be selected by a manufacturer or an authorized person. The master key 12 may be configured to transfer the code to each of the user keys 14 and/or security devices 50. The user keys 14 may be configured to operate with a security device 50, such as to arm or disarm the security device 50, as will be detailed herein below.

[0018] In one embodiment, the master key 12 may be configured to communicate with a user key 14 using a variety of techniques, including wired or wireless technology (e.g., Bluetooth or Wi-Fi communication). In some embodiments, the master key 14 may be configured to engage the user key 12 for facilitating communication therewith. For example, as shown in FIGS. 2-3, each user key 14 may include a housing 14a having an opening 20 formed therein for at least partially receiving a master key 12. The user key 14 may further include a transfer probe 14b located at an end of the housing 14a wherein the transfer probe 14b may be configured to facilitate communication with the security device 50. The master key 12 may include a head portion 12a and a tail portion 12b extending therefrom. In some embodiments, for example, the master key may 12 include one or more electrical contacts 16 formed on the tail portion 12b. The opening 20 formed in the housing 14a of the user key 14 may also include one or more electrical contacts 18. The electrical contacts 16 formed on the tail portion 12b of the master key 12 and the electrical contacts 18 formed in the opening 20 of the housing 14a of the user key 14 may facilitate communication between the master key 12 and the user key 14.

[0019] In some embodiments, the tail portion 12b of the master key 12 is configured to be received or partially received within the opening 20 of the user key 14 wherein respective electrical contacts 16, 18 align and mate thereby facilitating communication with one another. The master key 12 may be positioned within the opening 20 of the user key 14, wherein engagement of the respective electrical contacts 16, 18 may facilitate transmitting a code stored in a memory of the master key 12 such that the code is programmed into a memory of the user key 14. In some embodiments, the memory of each user key 14 may be configured to receive and store the code. Similarly, in some embodiments and explained in further detail below, each security device 50 may be configured to communicate with a master key 12 and/or user key 14 to receive and store a code. In other embodiments, a user key 14 may be configured to transfer a code to the security device 50 after being programmed by the master key 12. In some embodiments, a user key 14 may be configured to erase or otherwise remove a code from a security device 50 after the security device has been programmed with the code. For example, the user key 14 may be configured to remove the code from the security device 50 while in engagement with the master key 12. Thus, while the master key 12 is in engagement with the user key 14, communication between the user key and the security device 50 removes any code that had been previously stored by the security device. Once the code is removed, the security device 50 may be configured to be reprogrammed with a new code.

[0020] In other embodiments, for instance where a user key 14 is lost or stolen, a retailer may request a new master key 12 from the manufacturer or authorized distributor. The new master key 12 may then be used to reprogram each of the user keys 14 and/or security devices 50 in that retail store. The user keys 14 and/or security devices 50 may be configured to store the new codes in addition to the previously used code(s), or the old code may be replaced by the new code in a memory of the user key 14 and/or security device 50. In some embodiments, the user key 14 may have a flash memory for storing more than one code; however, when the user key 14 is in communication with the security device 50, the security device 50 may be configured to recognize only the new code. In some embodiments, the code is unknown to any user, thereby preventing the codes from being easily decipherable, and preventing the user keys 14 from being easily duplicated. However, in other embodiments, a retailer or other authorized user may request a master key 12 with the previously used code from the manufacturer or authorized distributor. Thus, a manufacturer or authorized distributor may keep a record of the codes created or may have a means for allowing a previously generated code to be determined. Moreover, the user key 14 may be reprogrammed by the master key 12 at any time, and users of the security system 10 may not be required to use a separate programming station for generating codes therefore providing a simpler and more streamlined approach for setting up, maintaining and operating the security system 10.

[0021] In some embodiments, codes may be assigned to the master keys 12 and/or the user keys 14 using various techniques. For example, where a large volume of user keys 14 is necessary (e.g., more than 50), a single code may be used for all user keys 14. As another example, one or more master keys 12 with the same code may be used in the same retail store. In other embodiments, for example with lower volume users (e.g., less than 10), a master key 12 may be packaged with a plurality of user keys 14 (e.g., 10). Thus, the master key 12 may be used with each one of the plurality of user keys 14 packaged therewith. Additionally, in other embodiments, master keys 12 packaged with a plurality of user keys 14 may have different codes. In some embodiments, each package may optionally include one or more security devices 50. In other embodiments, security devices 50 may be provided separately since the master keys 12 and/or user keys 14 may be used to program the security devices 50.

[0022] In one embodiment, each master key 12 and/or user key 14 may house various components, such as a controller, a logic control circuit or a printed circuit board, a memory, a battery, and/or an Electronic Article Surveillance (EAS) tag. In other embodiments, each user key 14 may include a single-use (e.g., non-rechargeable) internal power source, such as a conventional or extended-life battery. Alternatively, each user key 14 may include a multiple- use (e.g., rechargeable) internal power source, such as a conventional capacitor or rechargeable battery. In some embodiments, each user key 14 may have a permanent memory for storing one or more codes.

[0023] In another embodiment, as mentioned above and as shown in FIG. 4, a master key 12 and/or a user key 14 may be configured to cooperate with a security device 50. In one embodiment, the security device 50 may include an opening 58 for receipt of a master key 12 therein. Similar to that described above with respect to the user key 14, the opening 58 of the security device may include one or more electrical contacts 62 configured to communicate with the one or more electrical contact 16 of the master key 12. The master key 12 may be positioned within the opening 58 of the security device 50, wherein alignment and/or mating of the respective electrical contacts 16, 62 may facilitate the transfer of a code stored in a memory of the master key 12 to the security device 50.

[0024] In some embodiments, the user key 14 may be configured to provide its code to a security device 50. For example, after receiving a code from the master key 12, the user may 14 may be used to program the security device 50 with the code. The security device 50 may store the code. In one embodiment, the code stored in the user key 14 may be transmitted to the security device 50 for communicating with a logic control circuit 64 disposed within the security device 50 for arming or disarming the security device 50. In some embodiments, the user key 14 may be configured for various forms of wireless communication with a security device 50, such as optical (e.g., infrared), acoustical (e.g., ultrasonic), radiofrequency (RF), or magnetic pulse. In one embodiment, data, for instance a code may be transferred from the master key 12 and/or user key 14 to the security device 50 by wireless communication, such as by infrared (IR) optical transmission, as shown and described in United States Patent No. 7,737,843 entitled Programmable Alarm Module And System For Protecting Merchandise, and United States Patent No. 8,890,691, entitled Programmable Security System and Method for Protecting Merchandise, the disclosures of which are incorporated herein by reference in its entirety.

[0025] In some embodiments, communication of the user key 14 with the security device 50 may be facilitated by a user positioning the user key 14 within, proximate or adjacent to the security device 50. Particularly, in one embodiment, a user having possession of the user key 14 presents the transfer probe 14b of the user key 14 proximate or adjacent to a transfer port 60 of the security device 50. The user may then actuate a control button 22 (see Fig. 1) on the user key 14 wherein the control button 22 may be configured to operatively control certain functions of a logic circuit, memory, communication system, and in particular, a transmission of data and/or power. As such, actuation of the control button 22 may facilitate communication between a logic control circuit disposed within the user key 14 with a logic control circuit disposed within the security device 50. In some embodiments, the communication exchange may involve verifying that the security device 50 has a code, wherein the logic control circuit 64 disposed within the security device 50 then queries the user key 14 for the code and/or vice versa. If the codes match, the security device 50 may be disarmed. If the codes do not match, the security device 50 may remain armed. The code may be wirelessly communicated between the security device 50 and the user key 14 by infrared (IR) optical transmission. Alternatively, in other embodiments, the code may be transmitted and received by electrical contacts, acoustic transmission (e.g., RF signals) or magnetic induction.

[0026] In one embodiment, in the event where the code of the user key 14 matches the code of the security device 50 and/or vice versa, the user key 14 may then be permitted to transfer electrical power to the security device 50, for example, to operate a lock mechanism of the security device 50. The user key 14 may transfer electrical power to the security device 50 in any suitable manner, such as by electrical contacts, acoustical transmission (e.g. RF signals), or magnetic induction. It is understood that in other embodiments, the user key 14 may only transfer a wireless signal to arm/disarm the security device 50 and does not transfer electrical power to the security device 50. In other embodiments, communication between the user key 14 and the security device 50 may result in unlocking a lock mechanism without the need for transferring electrical power to the security device 50.

[0027] In some embodiments, each master key 12 and/or user key 14 may include a timeout function. More particularly, each user key 14 may be configured to be deactivated after a predetermined time period or number of activations. For example, a user key 14 may include a logic control circuit that is configured to be deactivated after about six to twelve hours (e.g., about eight hours) from the time the user key 14 was programmed by the master key 12. In this manner, a code is no longer capable of being communicated by the user key 14, and an authorized sales associate typically must reactivate, refresh, or otherwise reprogram the user key 14 assigned to him or her at the beginning of each work shift. Thus, the user key 14 may be reactivated by a master key 12, which is typically monitored or maintained at a secure location, in order to reactivate the logic control circuit of the user key 14. In some embodiments, the master key 12 may include a similar time-out function, such as by limiting a certain number of user keys 14 and/or security devices 50 that are allowed to be programmed. For example, a master key 12 may be permitted to only program a limited number of user keys 14 before being deactivated.

[0028] The foregoing has described one or more embodiments of a security system of the type commonly used to display an item of merchandise. Embodiments of a security system have been shown and described herein for purposes of illustration. Those of ordinary skill in the art, however, will readily understand and appreciate that numerous variations and modifications of the invention may be made without departing from the spirit and scope of the invention.