Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PIN-LOCKING TAG AND METHODS FOR RELEASING PIN-LOCKING TAG
Document Type and Number:
WIPO Patent Application WO/2024/042478
Kind Code:
A1
Abstract:
Disclosed are methods and pin-locking tags allowing unlocking the pin-locking mechanism of a pin-locking tag using wireless communication. Some embodiments allow at least partial replacement of physical checkout counters, for example, checkout counters found in retail stores.

Inventors:
SHAISH NIR ROI (IL)
MESHULAMI DAVID (IL)
SELA YARON (IL)
DVASH NIR (IL)
Application Number:
PCT/IB2023/058391
Publication Date:
February 29, 2024
Filing Date:
August 24, 2023
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
FREE SESAME LTD (IL)
International Classes:
E05B73/00; G08B13/24
Foreign References:
CN110512964A2019-11-29
US11205106B22021-12-21
Attorney, Agent or Firm:
GUR, Erez (IL)
Download PDF:
Claims:
CLAIMS

1. A pin-locking tag, comprising: a. a shell with a pin-accepting port; b. inside said shell, a pin-accepting channel accessible through said pin-accepting port; c. a pin-locking mechanism having at least two states: i. a locking state where said pin-locking mechanism engages a portion of a pin a part of which shaft is positioned inside said pin-accepting channel, which engagement prevents removal of the pin from said pin-accepting channel; and ii. an unlocked state where said pin-locking mechanism does not prevent removal of the pin from said pin-accepting channel; d. an antenna configured to receive information transmitted by a radio frequency transmitter; and e. a controller functionally-associated with said pin-locking mechanism and said antenna, said controller configured to receive information from said antenna and, if the received information corresponds to a valid unlock command and said pin-locking mechanism is in said locking state, said controller activates said pin-locking mechanism to change from said locking state to said unlocked state.

2. The pin-locking tag of claim 1, further comprising a power supply for providing electrical power to said pin-locking mechanism and to said controller.

3. The pin-locking tag of any one of claim 1 to 2, further comprising a RF label.

4. The pin-locking tag of claim 3, wherein said RF label comprises an EAS label.

5. The pin-locking tag of any one of claims 3 to 4, wherein said RF label comprises an

RFID

6. The pin-locking tag of claim 5, wherein said RFID comprises a unique identifier (UID) and said unique identifier allows specifically addressing said controller.

7. The pin-locking tag of any one of claims 1 to 6, wherein said antenna and said controller are together configured as a transceiver to both receive information transmitted by a radio frequency transmitter and to transmit information to a radio frequency receiver.

8. The pin-locking tag of any one of claims 1 to 7, wherein said antenna is an NFC antenna.

9. The pin-locking tag of any one of claims 1 to 8, further comprising an alarm module configured, when activated, to: monitor the receipt of a radio frequency signal indicating that an alarm should not be generated; and if no such radio frequency signal is received, generate an alarm.

10. The pin-locking tag of any one of claims 1 to 9, said shell is clamp-shaped, comprising: a rigid lower arm with a proximal end and a distal end, said distal end of said lower arm having an inner face bearing said pin-accepting channel; a rigid upper arm with a proximal end and a distal end, said distal end of said upper arm having an inner face bearing a pin; said lower arm and said upper arm mutually connected with a moveable j oint through the respective said proximal ends allowing a pincer movement of said shell so that: in an open state of said shell, said pin of said upper arm is outside of said pinaccepting channel, and from said open state of said shell, closing forces applied to said upper arm and said lower arm bring the respective said distal ends closer together, with said pin of said upper arm entering said pin-accepting channel of said lower arm, bringing the shell to a closed state..

11. The pin-locking tag of any one of claims 1 to 7, said pin-locking mechanism comprising at least one of an electrical motor and a solenoid.

12. The pin-locking tag of any one of claims 1 to 9, said pin-locking mechanism having: a vertical axis coaxial with said pin-accepting channel; a locking cap mounted inside said shell coaxial with said vertical axis, having: - a proximal end with a through-hole close to said pin-accepting port,

- an open distal end, and

- an inner volume defined by a convergently sloping inner wall so that said inner volume has a larger cross section perpendicular to said vertical axis at said distal end and a smaller cross section perpendicular to said vertical axis at said proximal end; a locking body having an axial channel that constitutes said pin-accepting channel, said ball-locking body having:

- an open apex defining a proximal end of said pin-accepting channel,

- an axi ally-convergent upper portion having a larger cross section perpendicular to said vertical axis further from said apex and a smaller cross section perpendicular to said vertical axis closer to said apex, said upper portion configured to enter said inner volume of said locking cap,

- at least two locking-body channels providing fluid communication from said pin-accepting channel to an outer surface of said upper portion, and

- movably-confined inside each said locking-body channel, a locking body, each said locking body configured to reversibly move from a locking position where a portion of said locking body extends into said pin-accepting channel to make intimate contact with the shaft of a pin present therein and to an unlocked position wherein no portion of said locking body makes intimate contact with the shaft of a pin held therein; an electrically-powered elevation-changing mechanism configured to move said locking body, under control of said controller, proximally towards said locking cap or distally away from said locking cap in parallel to said vertical axis between at least two positions:

- in a proximal position corresponding to said locking state of said pin-locking mechanism, said upper portion of said locking body is inside said inner volume of said locking cap so that said inner wall of said locking cap applies an axially-inwards force to said locking elements so that said locking elements are in said locking position making intimate contact with the shaft of a pin present in said pin-accepting channel; and

- in a distal position corresponding to said unlocked state of said pin-locking mechanism, said upper portion of said locking body sufficiently outside of said inner volume of said locking cap so that said inner walls do not apply an axially-inwards force to said locking elements.

13. The pin-locking tag of claim 12, wherein said electrically-powered elevation-changing mechanism comprises:

- an electrical motor producing rotational motion

- a transmission that converts said rotational motion produced by said electrical motor to linear motion inside a plane perpendicular to said vertical axis, the linear motion rotating a serrated ring around said vertical axis, wherein rotation of said serrated ring in a first direction around said vertical axis leads to proximal motion of said locking body to said proximal position so that said pin-locking mechanism is in said unlocked state and rotation of said serrated ring in a second direction opposite said first direction around said vertical axis leads to distal motion of said locking body to said distal position so that said pin-locking mechanism is in said unlocked state.

14. A method for changing the pin-locking mechanism of a pin-locking tag of any one of claims 1 to 13 from a locking state to an unlocked state, comprising at the pin-locking tag: a. said controller receiving information from said antenna transmitted by a radio frequency transmitter, said information being a purported unlock command include a transmitted release code (104); b. said controller comparing said transmitted release code with a release code stored in the pin-locking tag (106); and c. if all unlocking conditions are met including said transmitted release code being the same as said stored release code (108) then said controller considering the purported unlock command to correspond to said valid unlock command and activating said pinlocking mechanism to change from said locking state to said unlocked state (110).

15. A method for changing the pin-locking mechanism of a pin-locking tag of any one of claims 1 to 13 from a locking state to an unlocked state, comprising at a checkout device: i. from said checkout device, wirelessly transmitting an unlock command including a release code to the pin-locking tag antenna (102).

16. The method for unlocking of claim 15, wherein said pin-locking tag comprises a tag identifier which allows specifically addressing that said pin-locking tag and the method at said checkout device further comprises, prior to 'i': said checkout device acquiring: said tag identifier of said pin-locking tag, an identifier of an item to which said tag is attached, and an indication to purchase said item to which said tag is attached (114); said checkout device transmitting to a remote device said tag identifier of said pin-locking tag, an identifier of an item to which said tag is attached, and an indication to purchase said item to which said tag is attached together with a request to receive a release code for the pin-locking tag associated with said tag identifier (116); and said checkout device receiving from a remote device said release code for the pinlocking tag associated with said tag identifier (118).

17. The method of claim 16, wherein said unlock command that said checkout device transmits to the pin-locking tag includes said tag identifier .

18. The method of any one of claims 16 to 17, said tag identifier is a unique tag identifier (UID).

19. A method for receiving a lock command by a pin-locking tag of any one of claims 1 to 13, comprising at the pin-locking tag: a. receiving from an administrator device via said antenna of the pin-locking tag a lock command including a release code and an item identifier (140); b. if said received lock command is valid, storing said received release code and said received item identifier in the pin-locking tag and activating said pin-locking mechanism of the pin-locking tag to change from said unlocked state to said locking state (140); and c. after said pin-locking mechanism is in said locking state, the pin-locking tag transmitting to said administrator device, via said antenna of said pin-locking tag, a tag identifier and a confirmation that said pin-locking mechanism is in said locking state.

. A method for sending a lock command to a pin-locking tag of any one of claims 1 to, comprising at an administrator device: a. accepting an item identifier to which the pin-locking tag is to be attached; b. sending said item identifier to a remote device and requesting a release code for the item from said remote device (124); c. receiving from said remote device a release code (126), d. accepting instructions to send a lock command to the pin-locking tag, then starting at the administrator device a locking-preparation period having a duration (130); e. if during said locking-preparation period communication is established between the administrator device and the pin-locking tag through the tag antenna, then the administrator device transmitting a lock command including said received release code and said item identifier to said pin-locking tag via said tag antenna (138); and f. subsequent to 'e', receiving from the pin-locking tag a tag identifier and a locking confirmation, and the adminstrator device forwarding said received tag identifier to a remote device (144).

Description:
PIN-LOCKING TAG AND METHODS FOR RELEASING PIN-LOCKING TAG

RELATED APPLICATION

The present application gains priority from provisional patent application US 63/400,514 filed 24 August which is included by reference as if fully set-forth herein.

FIELD AND BACKGROUND OF THE INVENTION

The invention, in some embodiments, relates to the field of security and, more particularly, to the field of theft reduction. Additionally or alternatively, some embodiments of the invention relate to the field of retail sales and, more particularly, to methods and devices that allow at least partial replacement of physical checkout counters. Additionally or alternatively, some embodiments of the invention relate to the field of pin-locking tags and more particularly, to methods and devices for unlocking the pin-locking mechanism of a pinlocking tag.

In the art, the use of pin-locking tags to help reduce the unauthorized removal of an item from a specified location, for example the theft of an item from a store, is known. For example, in the field of retail clothing stores, it is known to attach a pin-locking tag to an item of clothing by locking the tag to a pin the shaft of which passes through a portion of the item. Once attached to an item of clothing, the pin-locking tag is difficult or impossible to detach from the item without damaging the item unless a special tag detacher that is present at a store checkout counter is used.

In Figures 1A and IB are schematically depicted a prior art pin-locking tag 10 and a matching pin 12, in side cross section.

Pin-locking tag 10 comprises a shell 14 with a pin-accepting port 16 and inside shell 14 a pin-accepting channel 18 and a functionally-associated pin-locking mechanism 20.

Pin 12 comprises a tip 12a, a shaft 12b and a wide head 12c. In some embodiments, tip 12a is pointed to allow penetration through a cloth portion of an item.

In Figure 1A, pin-locking tag 10 and pin 12 are separated one from the other. Shaft 12b of pin 12 passes through a portion of an item 22, a leather belt.

In Figure IB, pin-locking tag 10 and pin 12 are locked together so that pin-locking tag 10 is attached to item 22. When pin-locking tag 10 and pin 12 are locked together, tip 12a and shaft 12b of pin 12 are located inside pin-accepting channel 18 of pin-locking tag 10 and are engaged by pin-locking mechanism 20 which is in a locking state. Item 22 is clamped between shell 14 of pin-locking tag 10 and wide head 12c of pin 12. Separation of pin- locking tag 10 and pin 12 without the use of a special tag detacher to unlock pin-locking mechanism 20 is substantially impossible without damaging item 22.

If desired, a special tag detacher (not depicted) is brought in proximity to pin-locking mechanism 20 to unlock pin-locking mechanism 20 (e g., by application of a strong magnetic field) so that pin-locking mechanism 20 disengages from tip 12a and/or shaft 12b of pin 12. It is then possible to remove tip 12a and shaft 12b of pin 12 from pin-accepting channel 18 so that pin-locking tag 10 and pin 12 are separated, thereby detaching pin-locking tag 10 from item 12.

In some instances, a pin-locking tag and/or a matching pin (such as pin-locking tag 10 and pin 12, respectively) comprise a booby trap, such as a rupturable ink reservoir, which damages an item if an attempt is made to separate a pin-locking tag attached to an item from a locked pin without the use of a tag detacher to disengage the pin-locking mechanism from the pin.

Additionally or alternatively, in some instances a pin-locking tag and/or a matching pin (such as pin-locking tag 10 and pin 12, respectively) comprise an EAS (electronic article surveillance) label. Such a pin-locking tag is attached to an item in a store with a locked pin. A person leaving the store must pass near an EAS antenna. If the person passes near the EAS antenna with an item to which a pin-locking tag is attached, the system associated with the EAS antenna detects the EAS label and sounds an alarm. In order to avoid sounding the alarm, the person purchases the item at the checkout counter and, once the sale is approved, a store worker disengages the pin-locking mechanism from the pin using a special tag detacher to separate the pin-locking tag from the pin, and then detaches the tag from the item so that the person can leave the store with the item without triggering an alarm.

SUMMARY OF THE INVENTION

The invention, in some embodiments thereof, relates to methods and devices allowing unlocking of the pin-locking mechanism of a pin-locking tag using wireless communication. Some embodiments of the invention allow at least partial replacement of physical checkout counters, for example, checkout counters found in retail stores.

According to an aspect of some embodiments of the teachings herein, there is provided a pin-locking tag, comprising: a. a shell with a pin-accepting port; b. inside the shell, a pin-accepting channel accessible through the pin-accepting port; c. a pin-locking mechanism having at least two states: i. a locking state where the pin-locking mechanism engages a portion of a pin a part of which shaft is positioned inside the pin-accepting channel, which engagement prevents removal of the pin from the pin-accepting channel; and ii. an unlocked state where the pin-locking mechanism does not prevent removal of the pin from the pin-accepting channel; d. an antenna configured to receive information transmitted by a radio frequency transmitter; and e. a controller functionally-associated with the pin-locking mechanism and the antenna, the controller configured to receive information from the antenna and, if the received information corresponds to a valid unlock command and the pin-locking mechanism is in a locking state, the controller activates the pin-locking mechanism to change from a locking state to an unlocked state.

In some embodiments, the pin-locking tag further comprises a power supply for providing electrical power to the pin-locking mechanism and to the controller.

In some embodiments, the pin-locking tag further comprises a RF label. In some embodiments, the RF label comprises an EAS label. Additionally or alternatively, in some embodiments the RF label comprises an RFID. In some such embodiments, the RFID comprises a unique identifier (UID), which unique identifier allows specifically addressing the controller of that pin-locking tag as opposed to a controller of another nearby pin-locking tags.

In some embodiments, the antenna and the controller are together configured as a transceiver to both receive information transmitted by a radio frequency transmitter and to transmit information to a radio frequency receiver.

In some embodiments, the antenna is an NFC antenna.

In some embodiments, the pin-locking tag further comprises an alarm module configured, when activated to: monitor the receipt of a radio frequency signal indicating that an alarm should not be generated; and if no such radio frequency signal is received, generate an alarm.

In some embodiments, the shell of the pin-locking tag is clamp-shaped, comprising: a rigid lower arm with a proximal end and a distal end, the distal end of the lower arm having an inner face bearing the pin-accepting channel; a rigid upper arm with a proximal end and a distal end, the distal end of the upper arm having an inner face bearing a pin; the lower arm and the upper arm mutually connected with a moveable joint through the respective proximal ends allowing a pincer movement of the shell so that: in an open state of the shell, the pin of the upper arm is outside of the pinaccepting channel, and from the open state of the shell, closing forces applied to the upper arm and the lower arm bring the respective distal ends closer together, with the pin of the upper arm entering the pin-accepting channel of the lower arm, bringing the shell to a closed state.

Such an embodiment is depicted in Figures 6.

In some embodiments, the pin-locking tag is configured to automatically remove a pin from the pin-accepting channel when the pin-locking mechanism disengages from a locked pin. Such an embodiment is depicted in Figures 6 where the clamp-shaped shell of the pinlocking tag is biased to an ordinarily open state.

In some embodiments, the pin-locking mechanism comprises at least one of an electrical motor and a solenoid.

In some embodiments, the pin-locking mechanism comprises: a vertical axis coaxial with the pin-accepting channel; a locking cap mounted inside the shell coaxial with the vertical axis, having:

- a proximal end with a through-hole close to the pin-accepting port,

- an open distal end, and

- an inner volume defined by a convergently sloping inner wall so that the inner volume has a larger cross section perpendicular to the vertical axis at the distal end and a smaller cross section perpendicular to the vertical axis at the proximal end; a locking body having an axial channel that constitutes the pin-accepting channel, the ball-locking body having:

- an open apex defining a proximal end of the pin-accepting channel,

- an axi ally-convergent upper portion having a larger cross section perpendicular to the vertical axis further from the apex and a smaller cross section perpendicular to the vertical axis closer to the apex, the upper portion configured (including being dimensioned and shaped) to enter the inner volume of the locking cap,

- at least two locking-body channels providing fluid communication from the pin-accepting channel to an outer surface of the upper portion, and

- movably-confined inside each locking-body channel, a locking body, each locking body configured (including being dimensioned and shaped) to reversibly move from a locking position where a portion of the locking body extends into the pin-accepting channel to make intimate contact with the shaft of a pin present therein and to an unlocked position wherein no portion of the locking body makes intimate contact with the shaft of a pin held therein; an electrically-powered elevation-changing mechanism configured to move the locking body, under control of the controller, proximally towards the locking cap or distally away from the locking cap in parallel to the vertical axis between at least two positions:

- in a proximal position corresponding to a locking state of the pin-locking mechanism, the upper portion of the locking body is inside the inner volume of the locking cap so that the inner wall of the locking cap applies an axially- inwards force to the locking elements so that the locking elements are in the locking position making intimate contact with the shaft of a pin present in the pin-accepting channel; and

- in a distal position corresponding to the unlocked state of the pin-locking mechanism, the upper portion of the locking body sufficiently outside of the inner volume of the locking cap so that the inner walls do not apply an axially- inwards force to the locking elements. Such an embodiment is depicted in Figures 6.

In some such embodiments, the locking cap and the locking elements are sufficiently rigid and hard so that neither the locking elements nor the locking cap deform when a force of up to 10 Newton is applied to separate the pin-locking tag from a pin which shaft is located in the pin-accepting channel and the pin-locking mechanism is in a locking state. Additionally or alternatively, in some such embodiments, the moveable locking elements are spherical balls, e.g., of a metal.

In some such embodiments, the electrically-powered elevation-changing mechanism comprises:

- an electrical motor producing rotational motion

- a transmission that converts the rotational motion produced by the electrical motor to linear motion inside a plane perpendicular to the vertical axis, the linear motion rotating a serrated ring around the vertical axis, wherein rotation of the serrated ring in a first direction around the vertical axis leads to proximal motion of the locking body to the proximal position so that the pin-locking mechanism is in the unlocked state and rotation of the serrated ring in a second direction opposite the first direction around the vertical axis leads to distal motion of the locking body to the distal position so that the pin-locking mechanism is in the unlocked state.

According to an aspect of some embodiments of the teachings herein, there is also provided a method for changing the pin-locking mechanism of a pin-locking tag as described herein from a locking state to an unlocked state, comprising at the pin-locking tag: a. the controller receiving information from the antenna of the pin-locking tag transmitted by a radio frequency transmitter, the information being a purported unlock command include a transmitted release code; b. the controller of the pin-locking tag comparing the transmitted release code with a release code stored in the pin-locking tag; and c. if all unlocking conditions are met including the transmitted release code being the same as the stored release code then the controller considers the purported unlock command to correspond to a valid unlock command and activates the pin-locking mechanism of the pin-locking tag to change from a locking state to an unlocked state.

According to an aspect of some embodiments of the teachings herein, there is also provided method for changing the pin-locking mechanism of a pin-locking tag as described herein from a locking state to an unlocked state, comprising at a checkout device: i. from the checkout device, wirelessly transmitting an unlock command including a release code to the pin-locking tag antenna.

In some embodiments, the pin-locking tag comprises a tag identifier which allows specifically addressing that the pin-locking tag and the method at the checkout device further comprises, prior to 'i': the checkout device acquiring: the tag identifier of the pin-locking tag, an identifier of an item to which the tag is attached, and an indication to purchase the item to which the tag is attached; the checkout device transmitting to a remote device the tag identifier of the pin-locking tag, an identifier of an item to which the tag is attached, and an indication to purchase the item to which the tag is attached together with a request to receive a release code for the pin-locking tag associated with the tag identifier; and the checkout device receiving from a remote device the release code for the pinlocking tag associated with the tag identifier. In some embodiments, the unlock command that the checkout device transmits to the pin-locking tag includes the tag identifier. In some embodiments, the tag identifier is a unique identifier (UID).

According to an aspect of some embodiments of the teachings herein, there is also provided a method for receiving a lock command by a pin-locking tag as described herein, comprising at the pin-locking tag: a. receiving from an administrator device via the antenna of the pin-locking tag a lock command including a release code and an item identifier; b. if the received lock command is valid, storing the received release code and the received item identifier in the pin-locking tag and activating the pin-locking mechanism of the pin-locking tag to change from the unlocked state to the locking state; and c. after the pin-locking mechanism is in the locking state, the pin-locking tag transmitting to the administrator device, via the antenna of the pin-locking tag, a tag identifier and a confirmation that the pin-locking mechanism is in the locking state.

According to an aspect of some embodiments of the teachings herein, there is also provided method for sending a lock command to a pin-locking tag as described herein, comprising at an administrator device: a. accepting an item identifier (a numerical or alphanumeric string that identifies the item) to which the pin-locking tag is to be attached; b. sending the item identifier to a remote device and requesting a release code for the item from the remote device; c. receiving from the remote device a release code; d. accepting instructions (e.g., from a human user entered to the administrator device via the GUI of the administrator device) to send a lock command to the pin-locking tag, then starting at the administrator device a locking-preparation period having a duration; e. if during the locking-preparation period communication is established between the administrator device and the pin-locking tag through the tag antenna, then the administrator device transmitting a lock command including the received release code and the item identifier to the pin-locking tag via the tag antenna; and f. subsequent to 'e', receiving from the pin-locking tag a tag identifier and a locking confirmation, and the adminstrator device forwarding the received tag identifier to a remote device. Aspects and embodiments of the invention are described in the specification hereinbelow and in the appended claims.

As used herein and in the priority document, the terms "pin-locking tag", "security tag", "pin-locking security tag" and similar terms are used synonymously unless the context clearly indicates otherwise.

BRIEF DESCRIPTION OF THE FIGURES

Some embodiments of the invention are described herein with reference to the accompanying figures. The description, together with the figures, makes apparent to a person having ordinary skill in the art how some embodiments of the invention may be practiced. The figures are for the purpose of illustrative discussion and no attempt is made to show structural details of an embodiment in more detail than is necessary for a fundamental understanding of the invention. For the sake of clarity, some objects depicted in the figures are not to scale.

In the Figures:

FIGS. 1A and IB (prior art) schematically depict a prior art pin-locking tag and matching pin mutually separated (Figure 1A) and locked together (Figure IB);

FIGS. 2A and 2B schematically depict a pin-locking tag of the teachings herein and a matching pin, in Figure 2A where no part of the pin is in the pin-accepting channel and in Figure 2B where the pin-locking tag is locked together with the pin;

FIGS. 3A and 3B schematically depict a pin-locking tag of the teachings herein which pin-locking mechanism comprises a solenoid and a matching pin, in Figure 3 A where no part of the pin is in the pin-accepting channel and in Figure 3B where the pin-locking tag is locked together with the pin;

FIGS. 4A and 4B schematically depict a pin-locking tag of the teachings herein which pin-locking mechanism comprises a solenoid and a matching pin that is connected to pinlocking tag through a linking component, in Figure 4A where no part of the pin is in the pinaccepting channel and in Figure 4B where the pin-locking tag is locked together with the pin;

FIGS. 5A and 5B schematically depict a pin-locking tag of the teachings herein which pin-locking mechanism comprises a worm drive and an electrical motor, in Figure 5A where no part of the pin is in the pin-accepting channel and in Figure 5B where the pin-locking tag is locked together with the pin;

FIGS. 6A, 6B, 6C, 6D, 6E, 6F, 6G, 6H-a, 6H-b, 6I-a and 6I-b schematically depict a pin-locking tag of the teachings herein in perspective view (Figure 6A), side view with no part of the pin in the pin-accepting channel (Figure 6B), schematic side view while being manually closed with a hand (Figure 6C), side view locked with parts of the pin in the pinaccepting channel (6D), schematic side cross section (Figure 6E), the pin-locking mechanism in cut away view inside the pin-locking tag (Figures 6F and 6G), the pin-locking mechanism in isolated perspective view towards the top (Figure 6H-a in an unlocked state, Figure 6H-b in a locking state) and the pin-locking mechanism in schematic side cross section (Figure 6I-a in an unlocked state, Figure 6I-b in a locking state);

FIGS. 7A and 7B are of two flow charts showing an embodiment of unlocking a pinlocking mechanism of a pin-locking tag according to the teachings herein, the method at a checkout device (Figure 7A) and the method at a pin-locking tag (Figure 7B);

FIG. 8 is of a flowchart showing an embodiment of unlocking a pin-locking mechanism of a pin-locking tag according to the teachings herein, the method at a checkout device;

FIG. 9 is of a flowchart showing an embodiment of locking a pin-locking mechanism of a pin-locking tag according to the teachings herein; and

FIG.10 (sheet 1 and sheet 2) is of a flowchart showing an embodiment of unlocking a pin-locking mechanism of a pin-locking tag according to the teachings herein.

DESCRIPTION OF SOME EMBODIMENTS OF THE INVENTION

The invention, in some embodiments thereof, relates to methods and pin-locking tags allowing unlocking of the pin-locking mechanism of a pin-locking tag using wireless communication. Some embodiments of the invention allow at least partial replacement of physical checkout counters, for example, checkout counters found in retail stores.

Specifically, some embodiments of the teachings herein allow a customer to select an item for purchase, pay for the item and then separate the item from the pin-locking tag attached thereto without the assistance of an employee. Additionally, some embodiments allow that the point of sale of a physical store be wherever the customer is located. As a result, in some embodiments the waiting time in a queue to purchase an item is reduced and even eliminated. Additionally or alternatively, in some embodiments a store or similar establishment may need to employ fewer people at the checkout counter. Additionally or alternatively, in some embodiments, the teachings herein allow the separation of multiple pinlocking tags with a single action, saving time and effort. Additionally or alternatively, in some embodiments the teachings herein replace extant EAS systems with a less obtrusive system. As a consequence of one or more of these listed aspects as well as potentially other aspects, embodiments of the teachings herein may increase the profitability of a location such as a retail store.

The principles, uses and implementations of the teachings of the invention may be better understood with reference to the accompanying description and figures. Upon perusal of the description and figures present herein, one skilled in the art is able to implement the teachings of the invention without undue effort or experimentation. In the figures, like reference numerals refer to like parts throughout.

Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not necessarily limited in its application to the details of construction and the arrangement of the components and/or methods set forth herein. The invention is capable of other embodiments or of being practiced or carried out in various ways. The phraseology and terminology employed herein are for descriptive purpose and should not be regarded as limiting.

As discussed in the introduction, pin-locking tags are known in the art of theft prevention. For example, when a prior art pin-locking tag is attached to an item at a store, a person who desires to remove the item from the store must purchase the item at a checkout counter. After the item is purchased, the tag can be removed by a store employee using a special tag detacher. Thus the primary and often exclusive function of the pin-locking tag is to help ensure that a person who wants to take an item must purchase the item.

Herein are taught methods and pin-locking tags that allow unlocking the pin-locking mechanism of a pin-locking tag using wireless communication. At least some embodiments of the teachings herein can function as prior art tags to help prevent theft of an item to which the tag is attached. At least some embodiments of the teachings herein provide pin-locking tags with a heretofore unknown functionality: allowing a customer to select an item for purchase, pay for the item and separate the item from the pin-locking tag attached thereto without the assistance of an employee. In some embodiments, the separation of the item from the pin-locking tag is performed at a physical checkout location. In some embodiments, the separation of the item from the pin-locking tag is performed wherever the customer is located. In some embodiments, multiple pin-locking tags can be unlocked with a single action. Pin-locking tag

According to an aspect of some embodiments of the teachings herein there is provided a pin-locking tag, comprising: a. a shell with a pin-accepting port; b. inside the shell, a pin-accepting channel accessible through the pin-accepting port; c. a pin-locking mechanism having at least two states: i. a locking state where the pin-locking mechanism engages a portion of a pin a part of which shaft is positioned inside the pin-accepting channel, which engagement prevents removal of the pin from the pin-accepting channel; and ii. an unlocked state where the pin-locking mechanism does not prevent removal of the pin from the pin-accepting channel; d. an antenna configured to receive information transmitted by a radio frequency transmitter; and e. a controller functionally-associated with the pin-locking mechanism and the antenna, the controller configured to receive information from the antenna and, if the received information corresponds to a valid unlock command and the pin-locking mechanism is in a locking state, the controller activates the pin-locking mechanism to change from a locking state to an unlocked state.

In some preferred embodiments, the pin-locking tag comprises a digital stored release code accessible to the controller. In some embodiments, the release code is stored in the controller. Typically, a valid unlock command received via the antenna includes a release code that is the same as the stored release code. In some embodiments, the stored release code is a permanent code for the pin-locking tag. In some embodiments, the stored release code is a rewritable release code that can be uploaded to the tag, and usually to the controller, in any suitable way, for example wired communication (for tags having a suitable communication port), wireless communication through the antenna or wireless communication through a different antenna.

Additionally or alternatively, in some embodiments, the pin-locking tag comprises a digital tag identifier which allows specifically addressing that pin-locking tag. In some such embodiments, the controller of a given pin-locking tag is configured that some or all communication received via the antenna be specifically addressed to that pin-locking tag by including the tag identifier. In some embodiments, the tag identifier is a unique identifier (UID) as known in the art of computer science and information systems. Generally speaking, a UID is an identifier that is guaranteed to be effectively unique among all identifiers used for pin-locking tags used in the same context. In some embodiments, a UID as used herein is a UUID (universally unique identifier) or a GUID (globally unique identifier). As used herein, no two pin-locking tags present in the same context have the same UID. Thus, two pinlocking tags belonging to two different stores or found on two different continents may theoretically have the same UID, but in a given retail context any pin-locking tag can be uniquely identified by a respective UID. In such embodiments, it is preferred that a valid unlock command include the UID. In some embodiments, a UID is a permanent tag identifier of the tag, in some embodiments analogous or identical to a device ID as known in the art of computing In some embodiments, the UID is a rewritable UID that can be uploaded to the tag, and usually to the controller, in any suitable way, for example wired communication (for tags having a suitable communication port), wireless communication through the antenna or wireless communication through a different antenna.

In some embodiments, a pin-locking tag has both a tag identifier (in preferred embodiments, a UID) and a stored release code. In some embodiments, the tag identifier (in preferred embodiments, a UID) and the stored release code are different and used by the controller for different purposes. In some alternative embodiments, the tag identifier (in preferred embodiments, a UID) and the stored release code are the same, that is to say, the tag identifier is used both as a tag identifier and as the stored release code.

A pin-locking tag according to the teachings herein is configured to be attached to an item by locking the pin-locking tag to a pin a part of which shaft is positioned inside a pinaccepting channel of the tag with a pin-locking mechanism that engages a portion of the pin. The engagement prevents removal of the pin from the pin-accepting channel. The pin-locking mechanism can be unlocked by transmitting a valid unlock command to the controller through the antenna. Once the pin-locking mechanism is unlocked, the pin-locking mechanism disengages from the pin allowing removal of the pin shaft from the pin-accepting channel and subsequent detachment of the pin-locking tag from the item. As detailed hereinbelow, some embodiments of a pin-locking tag according to the teachings herein are configured to be unlocked from a locked pin by disengaging the pin-locking mechanism from the pin according to the method of unlocking a pin-locking tag according to the teachings herein.

An embodiment of a pin-locking tag according to the teachings herein, pin-locking tag 24, is schematically depicted in side cross section together with a matching pin 12 in Figures 2A (where no part of the pin is in the pin-accepting channel of the tag) and 2B (with the shaft and tip of the pin in the pin-accepting channel of the tag). In Figures 2A and 2B, pin-locking tag 24 comprises: a. a shell 14 with a pin-accepting port 16; b. inside shell 14, a pin-accepting channel 18 accessible through pin-accepting port 16; c. a pin-locking mechanism 20 having at least two states: i. a locking state where pin-locking mechanism 20 engages a portion of pin 12 a part of which shaft 12b is positioned inside pin-accepting channel 18, which engagement prevents removal of pin 12 from pin-accepting channel 18; and ii. an unlocked state where pin-locking mechanism 20 does not prevent removal of pin 12 from pin-accepting channel 18; d. an antenna 28 configured to receive information transmitted by a radio frequency transmitter; and e. a controller 30 functionally-associated with pin-locking mechanism 20 and antenna 28, controller 30 configured to receive information from antenna 28 and, if the information corresponds to a valid unlock command and the pin-locking mechanism is in a locking state, controller 30 activates pin-locking mechanism 20 to change from the locking state to an unlocked state.

Pin-locking tag 24 further comprises: a power supply 32 (a rechargeable lithium battery) functionally associated with a USB port 32a as a recharging module for recharging power supply 32 for providing electrical power to pin-locking mechanism 20 and controller 30; an ink reservoir 34 as a booby trap; and a radio frequency (RF) label 36.

Pin-locking mechanism

A pin-locking tag according to the teachings herein comprises, typically inside the shell, a pin-locking mechanism, the pin-locking mechanism having at least two states.

A first state of the pin-locking mechanism is a locking state where the pin-locking mechanism engages a portion of a pin, a part of which shaft is positioned inside the pinaccepting channel. The engagement of the portion of the pin prevents removal of the pin from the pin-accepting channel, and thereby maintains the pin-locking tag and the pin locked together. A second state of the pin-locking mechanism is an unlocked state where the pinlocking mechanism does not prevent removal of a pin from the pin-accepting channel.

The pin-locking mechanism requires electrical power to change from a locking state to an unlocked state.

The pin-locking mechanism is configured to be activated by the controller to change from a locking state to the unlocked state. In some embodiments, activation of the pinlocking mechanism is the pin-locking mechanism receiving electrical power that powers a component of the pin-locking component to change from a locking state to the unlocked state.

Any suitable type of pin-locking mechanism which can be changed from a locking state to the unlocked state when activated by a controller can be used.

In preferred embodiments, the pin-locking mechanism uses no electrical power while in the unlocked state.

Additionally or alternatively, in preferred embodiments, the pin-locking mechanism uses no electrical power while in a locking state.

Additionally or alternatively, in preferred embodiments, the pin-locking mechanism uses very little electrical power when changing from a locking state to the unlocked state. In some preferred embodiments, changing from a locking state to the unlocked state requires not more than 10 W, not more than 5 W and even not more than 1 W. As is known in the art, NFC power transfer allows transfer of 10 W with a 20 cm 2 antenna and 1 W with a 10 cm 2 antenna.

Any suitable type of pin-locking mechanism can be used for implementing a pinlocking tag according to the teachings herein. A number of exemplary pin-locking mechanisms are described herein.

In some embodiments a pin-locking mechanism comprises a solenoid and/or an electrical motor, for example, as described hereinbelow. A person having ordinary skill in the art is able to conceive additional types of suitable pin-locking mechanisms upon perusal of the disclosure herein.

An embodiment of a pin-locking tag according to the teachings herein, pin-locking tag 38, is schematically depicted in side cross section together with a matching pin 12 in Figures 3A (where no part of the pin is in the pin-accepting channel of the tag) and 3B (with the shaft and tip of the pin in the pin-accepting channel of the tag). Shaft 12b of pin 12 passes through a portion of an item 22. Pin-locking tag 38 has many similarities to pin-locking tag 24 depicted in Figures 2 with a few notable differences.

Pin-locking tag 38 is devoid of a booby trap such as ink reservoir 34 of pin-locking tag 24 and is also devoid of an RF label such as RF label 36 of pin-locking tag 24. However, pin 12 of pin-locking tag 38 comprises an RF label 36.

Pin-locking tag 38 comprises a power supply 32, a rechargeable lithium battery for providing electrical power to a pin-locking mechanism 20 and to controller 30. Pin-locking tag 38 further comprises, as a recharging module, a wireless charging coil 40 that is functionally associated with power supply 32, allowing wireless recharging of power supply 32 by induction.

Similarly to pin-locking tag 24, pin-locking tag 38 comprises a pin-accepting channel 18 accessible from outside of a shell 14 through a pin-accepting port 16.

Pin-locking mechanism 20 comprises a solenoid 42 which, as known to a person skilled in the art, includes an electric coil 42a and a plunger 42b.

When pin-locking mechanism 20 is in the unlocked state as depicted in Figure 3A, plunger 42b is positioned proximally inside coil 42a so that no part of pin-locking mechanism 20 enages a part of pin 12. As a result, tip 12a and shaft 12b of pin 12 can be freely moved into and out of pin-accepting channel 18 through pin-accepting port 16.

To attach pin-locking tag 38 to item 22, tip 12a and shaft 12b of a pin 12 are moved into pin-accepting channel 18 through pin-accepting port 16 so that an eye 12d of shaft 12b of pin 12 is located near the tip of plunger 42b. The NFC antenna of a software-configured NFC-enabled smartphone is placed close to an NFC antenna 28 of pin-locking tag 38 and wirelessly transmits a "lock" command. NFC antenna 28 receives the "lock" command which is provided to and received by a controller 30. Controller 30 determines that the received command is a valid "lock" command so activates coil 42a to move plunger 42b distally into pin-accepting channel 18 to a locking state depicted in Figure 3B. Since shaft 12b of pin 12 is inside pin-accepting channel 18, pin-locking mechanism 20 engages shaft 12b of pin 12 by plunger 42b moving into eye 12d of shaft 12b. The presence of plunger 42b inside eye 12d of shaft 12b prevents removal of pin 12 from pin-accepting channel 18, thereby maintaining pin-locking tag 38 and pin 12 locked together.

When it is desired to detach pin-locking tag 38 from item 22, the NFC antenna of a software-configured NFC-enabled smartphone as a tag detacher is placed close to NFC antenna 28 of pin-locking tag 38 and activated to wirelessly transmit an "unlock" command. NFC antenna 28 receives the "unlock" command which is provided to and received by controller 30. Controller 30 determines that the received command is a valid "unlock" command so activates coil 42a to move plunger 42b proximally out of eye 12d of pin 12 and out of pin-accepting channel 18 to the unlocked state depicted in Figure 3 A. As a result, no portion of pin 12 is engaged by pin-locking mechanism 20 so pin-locking mechanism 20 does not prevent removal of pin 12 from pin-accepting channel 18. Actual separation of the pin from the tag can be performed by manually pulling pin 12 and pin-locking tag 38 apart.

An embodiment of a pin-locking tag according to the teachings herein, pin-locking tag 44, is schematically depicted in side cross section together with a matching pin 12 in Figures 4 A (where no part of the pin is in the pin-accepting channel of the tag) and 4B ( with the shaft and tip of the pin in the pin-accepting channel of the tag).

Pin-locking tag 44 has many similarities to pin-locking tag 38 depicted in Figures 3A and 3B with at least two notable differences.

A first notable difference is that unlike pin-locking tag 38, pin-locking tag 44 is devoid of a separate recharging module comprising a wireless charging coil 40 that allows recharging of the lithium battery of power supply 32 by induction. Instead, pin-locking tag 38 is configured to charge power supply 32 (a lithium battery) by induction through NFC antenna 28.

A second notable difference is that while in pin-locking tag 38 depicted in Figures 2A and 2B matching pin 12 is a physically-separate component that is easily interchangeable with any other substantially similar pin, matching pin 12 of pin-locking tag 44 is a component of pin-locking tag 44 that is physically connected to shell 14 with a linking component 46, a flexible tether of steel braid armored cable. As is depicted in Figure 4B, tether 46 allows attaching pin-locking tag 44 to an item 22 by encircling item 22 with tether 46 (alternatively, threading tether 46 and pin 12 through the item) when pin-locking tag 44 is locked to pin 12.

Operation of pin-locking mechanism 20 of pin-locking tag 44 is substantially the same as described for pin-locking tag 38.

An embodiment of a pin-locking tag according to the teachings herein, pin-locking tag 52, is schematically depicted in side cross section together with a matching pin 12 in Figure 5A attached to an item 22 (a pin-locking mechanism 20 of pin-locking tag 52 in a locking state) and Figure 5B (pin-locking mechanism 20 of pin-locking tag 52 in an unlocked state), pin-locking tag 52 comprising: a. a shell 14 with a pin-accepting port 16; b. inside shell 14, a pin-accepting channel 18 accessible through pin-accepting port 16; c. pin-locking mechanism 20, pin-locking mechanism 20 having at least two states: i. a locking state depicted in Figure 5A where pin-locking mechanism 20 engages a portion of pin 12 a part of which shaft 12b is positioned inside pinaccepting channel 18, which engagement prevents removal of pin 12 from pinaccepting channel 18; and ii. an unlocked state depicted in Figure 5B where pin-locking mechanism 20 does not prevent removal of pin 12 from pin-accepting channel 18; d. an antenna 28 configured to receive information transmitted by a radio frequency transmitter; and e. a controller 30 functionally-associated with pin-locking mechanism 20 and antenna 28, controller 30 configured to receive information from antenna 28 and, if the information corresponds to a valid unlock command and pin-locking mechanism 20 is in a locking state, controller 30 activates pin-locking mechanism 20 to change from a locking state to an unlocked state; a power supply 32 (a non-rechargeable battery) for providing electrical power to pinlocking mechanism 20 and controller 30; and a passive RF label 36.

Pin-locking tag 52 comprises an activation button 54 functionally associated with controller 30 and a stand-by function with a standby mode and an active mode. In the standby state, the various components use little electrical power, and in some embodiments no electrical power, from power supply 32. In the active state, controller 30 is functional to receive and transmit information via antenna 28 and to operate pin-locking mechanism 20. In pin-locking tag 52, the transition from the active state to the stand-by state occurs after two minutes of not receiving a transmission via antenna 28 while the transition from the stand-by state to the active state occurs upon depression of activation button 54. In preferred embodiments, controller 30 is configured to enter a non-power usage state one second after entering a locking state. In order to change pin-locking tag 52 to an unlocked state from a locking state, a user must first depress activation button 54 to turn controller 30 on. Controller 30 is subsequently activated to receive information from antenna 28.

As seen from Figures 5A and 5B, unlike the previously-discussed embodiments, in pin-locking tag 52 pin 12 is held inside shell 14 and is never physically separated from the other components of pin-locking tag 52. Further, whereas in the previously-discussed embodiments the pin-locking mechanism engaged the shaft and/or tip of the pin in a locking state, in pin-locking tag 52 pin-locking mechanism 20 engages head 12c of pin 12.

Specifically, in pin-locking tag 52, pin-locking mechanism 20 comprises a worm drive 56, including a worm gear 56a driven by an electrical motor 56b, worm gear 56a meshing with worm 56c which constitutes head 12c of pin 12. When controller 30 activates motor 56b to rotate worm gear 56a in a clockwise direction, worm 56c (i.e., head 12c of pin 12) is withdrawn proximally into a pin housing 58 and shaft 12b and tip 12a of pin 12 are withdrawn from pin-accepting channel 18 and out of an item-holding slot 60, thereby releasing item 22, e.g., going from the depicted in Figure 5Ato the depicted in Figure 5B.

When controller 30 activates motor 56b to rotate worm gear 56a in a counterclockwise direction, worm 56c (i.e., head 12c of pin 12) is advanced distally out of pin housing 58. Tip 12a and shaft 12b of pin 12 advance across item-holding slot 60 into pinaccepting channel 18, e.g., going from the depicted in Figure 5B to the depicted in Figure 5A. If during the advancing of pin 12 an item, such as item 22 (e.g., an item of clothing), is present in item-holding slot 60, tip 12a of pin 12 penetrates the item, so that pin-locking tag 52 is attached to the item of clothing.

In some embodiments, a pin-locking tag according to the teachings herein, the shell is clamp-shaped, comprising: a rigid lower arm with a proximal end and a distal end, the distal end of the lower arm having an inner face bearing the pin-accepting channel; a rigid upper arm with a proximal end and a distal end, the distal end of the upper arm having an inner face bearing a pin. the lower arm and the upper arm mutually connected with a moveable joint through the respective proximal ends of the arms allowing a pincer movement of the shell so that: in an open state of the shell, the pin of the upper arm is outside of the pinaccepting channel, from the open state of the shell, closing forces applied to the upper arm and the lower arm bring the respective distal ends of the arms closer together, with the pin of the upper arm entering the pin-accepting channel of the lower arm, bringing the shell to a closed state.

Such an embodiment of a pin-locking tag according to the teachings herein, a pinlocking tag 62, is schematically depicted in Figures 6A, 6B, 6C, 6D, 6E, 6F, 6G, 6H-a, 6H-b, 6I-a and 6I-b. Figures 6E, 6I-a and 6I-b are very schematic depictions where the physical relationship and relative size of some components are highly inaccurate.

In Figure 6A, pin-locking tag 62 is depicted in perspective view and in Figure 6B in side view, both where no part of pin 12 is located inside the pin-accepting channel of pinlocking tag 62. Shell 14 has the shape of a clamp having a rigid upper arm 14a and a rigid lower arm 14b, arms 14a and 14b connected at a proximal end by an elastic joint 14c that is biased to an ordinarily-open state as depicted in Figures 6A and 6B. The distal portion of upper arm 14a that faces lower arm 14b is a concave spoon-shape to which center is attached pin 12 including a tip 12a and a shaft 12b. Lower arm 14b as discussed in detail below, is hollow and contains many components of pin-locking tag 62. The distal portion of lower arm 14b that faces upper arm 14a is a convex shape which dimensions and curvature match the dimensions and curvature of the distal portion of upper arm 14b. At the apex of the convex shape is a pin-accepting port 16.

As depicted in Figures 6C and 6D, to attach pin-locking tag 62 to an item such as an item of clothing, a user places a portion of item between upper arm 14a and lower arm 14b and presses these together so that tip 12a of pin 12 passes through the item and then enters the pin-accepting channel through pin-accepting port 16. Once tip 12a and at least some of shaft 12b of pin 12 are inside the pin-accepting channel and the pin-locking mechanism is in a locking state, the pin-locking mechanism engages a portion of pin 12 which engagement prevents removal of pin 12 from the pin-accepting channel, a closed state of pin-locking tag 62 as depicted in Figure 6D. The distance between the concave portion of upper arm 14a and the convex portion of lower arm 14b in a closed state is between 1 mm and 5 mm, allowing attachment of pin-locking tag 62 to almost any standard cloth thickness.

In Figure 6E, pin-locking tag 62 is depicted in schematic side cross section. In addition to the above-recited components, in Figure 6E are seen a pin-accepting channel 18 accessible to pin 12 through pin-accepting port 16, a pin-locking mechanism 20, an RF antenna 28, a controller 30 on a PCB 64, a power supply 32 (a rechargeable lithium battery), a RF label 36 ( a passive RFID), a recharging module 32a comprising a USB port which is also suitable for data transfer to and from controller 30. The various components function substantially the same as described above. Pin-locking tag 62 further comprises an alarm module 67 functionally associated with controller 30 and receiving power from power supply 32. Alarm module 67 is described in greater detail below. Pin-locking mechanism

Pin-locking mechanism 20 of pin-locking tag 62 comprises two assemblies, a locking assembly 20a and a lead screw assembly 20b. Locking-assembly 20a has a vertical axis 69. In some preferred embodiments the pin-accepting channel is linear and the central axis of the pin-accepting channel defines the vertical axis of the pin-locking tag, for example linear pinaccepting channel 18 of pin-locking tag 62. In some alternative embodiments, both the pinaccepting channel and the corresponding pin are slightly curved: in such embodiments, the vertical axis of the pin-locking tag is considered the axis that is coaxial with the pin-accepting channel at the pin-accepting port.

In Figures 6F and 6G, locking assembly 20a is depicted in cut away view inside shell 14 of pin-locking tag 62.

In Figures 6H-a and 6H-b locking assembly 20a and lead screw assembly 20b are depicted together in perspective view towards the top isolated from other components of pinlocking tag 62, in Figure 6H-a in an unlocked state and in Figure 6H-b in a locking state.

In Figures 6I-a and 6I-b, components of locking assembly 20a are depicted in schematic side cross section, in Figure 6I-a in an unlocked state and Figure 6I-b in a locking state.

As discussed above and seen in Figure 6E, pin-accepting port 16 is found on the apex of the convex-shaped distal portion of lower arm 14a, providing fluid communication from the outside into pin-accepting channel 18 which is located inside the confines of lower arm 14a

In pin-locking tag 62, protruding inwards from the concave inner surface of the convex-shaped distal portion of lower arm 14a is a cup 70. Cup 70 is depicted in Figures 6E, 6F and 6G. In some preferred embodiments such as in pin-locking tag 62, cup 70 is integrally-formed with the inner surface and is coaxial with vertical axis 69 of pin-locking tag 62. In pin-locking tag 62, the outer walls of cup 70 are cylindrical, but in other similar embodiments have any other suitable shape. In some embodiments such as in pin-locking tag 62, the inner walls of cup 70 are such that the dimensions close to pin-accepting port 16 are smaller than the dimensions close to the lip of cup 70 so that the inner volume of cup 70 has a shape that is similar to a truncated cone. In some alternative embodiments, the inner walls of the cup are parallel.

A component of locking assembly 20a, a rigid locking cap 68, is fixedly located inside of cup 70. Locking cap 68 is depicted in cross section in Figures 6E, 6I-a and 6I-b and with a portion cut-out in Figure 6F while the outer surface of locking cap 68 which is ordinarily contacting the inner surface of cup 70 is depicted in Figures 6G, 6H-a, 6H-b.

At the apex of locking cap 68 is a through-hole 68a aligned with pin-accepting port 16 and vertical axis 69 so that a pin passing through pin-accepting port 16 to enter pin-accepting channel 18 first passes through through-hole 68a Locking cap 68 is made of a strong and hard material such as stainless steel that, as is discussed hereinbelow, is resistant to deformation from outwards pressure applied from inside locking cap 68.

In Figures 6F and 6G it is seen that locking assembly 20a is fixedly anchored inside shell 14 with bolts 74 that hold a base 72 of locking assembly 20a in place.

In Figures 6H-a and 6H-b is seen that lead screw assembly 20b is fixedly anchored inside shell 14 with bolts 74.

In Figures 6H-a and 6H-b, lead screw assembly 20b is depicted in perspective view towards the top, in Figure 6H-a in an unlocked state and in Figure 6H-b in a locking state. Lead screw assembly 20b includes an electrical motor 26 functionally associated with a transmission that converts rotational motion produced by electrical motor 26 to linear motion inside a plane perpendicular to vertical 69.

Specifically, electrical motor 26 is functionally associated with a gear box 76a which is functionally associated with a screw shaft 76b so that gear box 76a transfers rotational motion from electrical motor 26 to rotate screw shaft 76b at a reduced speed. Mounted on screw shaft 76b and a support shaft 76c is a lead nut 76d to which is fixedly attached a rack 78. When screw shaft 76b rotates, lead nut 76d is prevented from rotation by support shaft 76c. As a result, lead nut 76d together with rack 76e move linearly along screw shaft 76b and support shaft 76c. The linear motion of lead nut 76d is in a plane perpendicular to vertical axis 69.

The mechanical linkage between lead screw assembly 20b and locking assembly 20a comprises rack 76e, a component of lead screw assembly 20b, and a serrated ring 80, a component of locking assembly 20a.

Specifically, rack 76e is functionally associated with serrated ring 80 through an integrally-formed pinion 80a, serrated ring 80 made of stainless steel. The serrations of serrated ring 80 are discussed below.

When moving linearly, rack 76e applies a force through pinion 80a that rotates serrated ring 80 around vertical axis 69. As seen in particular detail in Figures 6F, 6G, 6I-a and 6I-b, pin-locking mechanism 20a comprises a ball-locking body 82 of stainless steel. Ball-locking body 82 comprises a truncated-conical upper portion 82a, a cylindrical middle portion 82b and a wide bottom portion 82c which upper surface constitutes a shelf 82d. From the apex of upper portion 82a to midway of the middle portion 82b, ball-locking body 82 defines pin-accepting channel 18. The proximal end of pin-accepting channel 18 opens up to a wide-diameter spring-accepting channel 82e. Middle portion 82b, bottom portion 82c and shelf 82d are machined to hold four roller bearings 84 of stainless steel that rotatingly rest on troughs on the surface shelf 82d, each roller bearing 84 having a rotation axis perpendicular to vertical axis 69.

Near the apex of upper portion 82a are three locking-ball channels 82f each lockingball channel 82f movingly confining a locking ball 86 of hardened stainless steel. The diameters of locking balls 86 are greater than the diameter of pin-accepting channel 18 so that each locking ball 86 remains confined in a respective locking-ball channel 82f.

Ball-locking body 82 is snugly slidingly-mounted inside a circular hole that passes through base 72 so that ball-locking body 82 can freely translate (proximally towards locking cap 68 and distally away from locking cap 68) in parallel to vertical axis 69.

As seen in Figure 6F, serrated ring 80 is rotatably mounted coaxially with pinaccepting channel 18 between the bottom of base 72 and roller bearings 84. Specifically, a return spring 88 located inside spring-accepting channel 82e applies a continuous axially proximal force to the upper inner face of spring-accepting channel 82e. This force pushes ball-locking body 82, including shelf 82d, axially in a proximal direction towards locking cap 68. As a result, roller bearings 84 that rest on the upper surface of shelf 82d are pushed axially against the bottom surface of serrated ring 80. As a result, an upper surface of serrated ring 80 is pushed against the bottom surface of base 72 by the force applied to the bottom surface of serrated ring 80 by roller bearings 84.

As can be seen in Figures 6G, 61-1 and 6I-b, the bottom surface of serrated ring 80 is serrated, includeing four serrations defined by four slopes 80b / steps 80c. When serrated ring 80 rotates, the surfaces of slopes 80b roll over roller bearings 84.

Locking state of pin-locking mechanism

As depicted in Figure 6I-b, when serrated ring 80 is positioned so that roller bearings 84 rest against the face of a step 80c, return spring 88 pushes ball-locking body 82 proximally towards base 72 to a maximal extent, where truncated-conical upper portion 82a is deepest inside locking cap 68. As a result, the force applied by the inner wall of locking cap 68 applies a force that pushes locking balls 86 into pin-accepting channel 18 towards vertical axis 69. If a pin 12 is located inside pin-accepting channel 18, the applied force presses locking balls 86 against the shaft of pin 12, preventing axial motion of pin 12, constituting a locking state of pin-locking mechanism 20 of pin-locking tag 62. Locking balls 86 and locking cap 68 (as noted above) are made of a strong and hard material such as stainless steel. The hardness is sufficient to resist deformation that is caused if there is an attempt to pull pin 12 axially outwards to forcefully remove pin 12 from pin-accepting channel 18 while pinlocking mechanism 20 is in a locking state. In some embodiments, the locking cap and the locking balls are sufficiently rigid and hard so that neither the locking balls nor the locking cap inelastically-deform when a force of up to 10 Newton is applied to separate the pinlocking tag from a pin which shaft is located in the pin-accepting channel and the pin-locking mechanism is in a locking state.

Unlocked state of pin-locking mechanism

When serrated ring 80 is positioned so that roller bearings 84 rest on a slope 80b close to the edge of a step 80c as depicted in Figure 6I-a, return spring 88 pushes ball-locking body 82 proximally towards base 72 to a minimal extent. As a result, locking cap 68 does not apply a force to locking balls 86, constituting an unlocked state such as depicted in Figure 6I-a. In an unlocked state, a pin 12 can be freely pushed into and pulled out of pin-accepting channel 18

Moving from an unlocked state to a locking state of pin-locking mechanism

As discussed above, an unlocked state of pin-locking mechanism 20 of pin-locking tag 62 is depicted in Figure 6H-a and Figure 6I-a.

Lead nut 76d and rack 76e are in a most distal position on shafts 76b and 76c (Figure 6H-a) a result of which that serrated ring 80 is positioned so that roller bearings 84 rest on a slope 80b close to the edge of a step 80c, truncated-conical upper portion 82a is shallowest inside locking cap 68 so that no force is applied to locking balls 86 towards vertical axis 69 in pin-accepting channel 18 (Figure 6La).

As depicted in Figure 6C, a user brings upper arm 14a and lower arm 14b of shell 14 together so that pin 12 enters pin-accepting channel 18 through pin-accepting port 16. The depth of pin 12 inside pin-accepting channel 16 depends on a user decision and the thickness of any cloth item that is located between upper arm 14a and lower arm 14b. As is clear to a person having ordinary skill in the art from the description herein, pin-locking mechanism 20 is configured to effectively engage the shaft of a pin that is inside pin-accepting channel 16 in a wide range of depths.

Once shaft 12b of pin 12 is inside pin-accepting channel 18 to a desired depth, a user provides a lock command through RF antenna 28, for example, in accordance with an embodiment of the method of the teachings herein. Controller 30 receives the lock command. If controller 30 ascertains that the lock command is valid, controller 30 activates electrical motor 26 to rotate in a clockwise fashion. Clockwise rotation of electrical motor 26 rotates gear box 76a and screw shaft 76b. As a result, lead nut 76d and rack 76e move proximally, rotating serrated ring 80 in a counterclockwise fashion. Counterclockwise rotation of serrated ring 80 changes the state of locking assembly 20a from the unlocked state depicted in Figure 6I-a to a locking state depicted in Figure 6I-b where roller bearings 84 rest against the face of a step 80c and where truncated-conical upper portion 82a of ball-locking body 82 moves proximally to be deepest inside locking cap 68. Since pin 12 is located inside pin-accepting channel 18, pin-locking mechanism 20 engages shaft 12b by locking balls 86 forcefully pressing against the shaft of pin 12.

Moving from a locking state to an unlocked state of pin-locking mechanism

As discussed above, a locking state of pin-locking mechanism 20 of pin-locking tag 62 is depicted in Figure 6H-b and Figure 6I-b.

Lead nut 76d and rack 76e are in a most proximal position on shafts 76b and 76d (Figure 6H-b) a result of which serrated ring 80 is positioned so that roller bearings 84 rest against the face of a step 80c, where truncated-conical upper portion 82a of ball-locking body 82 is deepest inside locking cap 68, applying a force pushing locking balls 86 inwardly towards vertical axis 69, pressing against the shaft of pin 12 inside pin-accepting channel 18.

A user provides a valid unlock command through RF antenna 28, for example, in accordance with an embodiment of a method of the teachings herein. Controller 30 receives the unlock command. If controller 30 ascertains that the unlock command is valid, controller 30 activates electrical motor 26 to rotate in a counterclockwise fashion. Counterclockwise rotation of electrical motor 26 rotates gear box 76a and screw shaft 76b. As a result, lead nut 76d and rack 76e move distally, rotating serrated ring 80 in a clockwise fashion. Clockwise rotation of serrated ring 80 leads to roller bearings 84 to be resting on a slope 80b close to the edge of a step 80c as depicted in Figure 6I-a, so that truncated-conical upper portion 82a is moved distally to be shallowest inside locking cap 68 as a result of which locking balls 86 are not pushed against any portion of pin 12 inside pin-accepting channel 18, although locking balls 86 may make incidental contact with a portion of pin 12. As a result, pin 12 can be freely removed from pin-accepting channel 18, for example, as a result of the force separating upper arm 16a from lower arm 16b by elastic joint 16c of shell 16.

As described above, in pin-locking tag 62, lead screw assembly 20b is used to convert the rotational motion produced by electrical motor 26 to linear motion of rack 76e that leads to rotation of serrated ring 80 of locking assembly 20a that leads to translational motion of ball-locking body 82 along vertical axis 69. In some related embodiments, a solenoid is used to rotate such a serrated ring or equivalent component instead of a lead screw assembly 20b with an electrical motor 26.

Shell and pin-accepting channel

A pin-locking tag according to the teachings herein comprises a shell with a pinaccepting port and inside the shell a pin-accepting channel. A matching pin can enter the pinaccepting channel tip-first through the pin-accepting port so that at least a portion of the shaft of the pin is positioned inside the pin-accepting channel.

In some embodiments, such as pin-locking tag 24 depicted in Figures 2, the pinaccepting port is accessible from outside shell 14.

In some embodiments, such as pin-locking tag 24 (Figures 2) and pin-locking tag 38 (Figures 3), a pin-locking tag and a matching pin are physically-separate components.

In some embodiments, such as pin-locking tag 44 (Figures 4), pin-locking tag 52 (Figures 5) and pin-locking tag 62 (Figures 6), a pin-locking tag and a matching pin are physically-linked. In some such embodiments, such as pin-locking tags 44 and 48, the tag and the pin are linked with a linking component that is configured to allow encirclement of a portion of an item with the linking component when the pin-locking tag and pin are locked together, thereby attaching the pin-locking tag to the item.

Locking the pin-locking mechanism

Typically, to attach a tag according to the teachings herein to an item, at least part of a pin must be inserted into the pin-accepting channel, e.g., manually, typically while the pinlocking mechanism is in an unlocked state. Once a part of the pin is in the pin-accepting channel, the state of the pin-locking mechanism is changed from an unlocked state to a locking state. In some embodiments, the pin-locking mechanism is configured so that the act of inserting a pin into the pin-accepting channel causes the pin-locking mechanism to change from the unlocked state to a locking state.

Additionally or alternatively, in some embodiments, the pin-locking mechanism comprises a manually-operated locking switch physically-accessible from the outside of the shell (e g., a button, a lever). Manual manipulation of the locking switch by a person leads to the pin-locking mechanism changing from an unlocked state to a locking state.

In some such embodiments the locking switch is mechanically-linked to other components of the pin-locking mechanism so that the physical motion of the locking switch caused by manual manipulation of the locking switch is mechanically transferred to move components that change the pin-locking mechanism from an unlocked state to a locking state.

Alternatively, in some such embodiments the locking switch is an electric switch so that manual manipulation of the locking switch leads to activation of an electrically-powered component (such as a motor or solenoid of the pin-locking mechanism) which changes the pin-locking mechanism from an unlocked state to a locking state.

Additionally or alternatively, in some embodiments the pin-locking tag is configured that changing the state of the pin-locking mechanism from an unlocked state to a locking state is performed using wireless communication with the controller in a manner analogous to changing the state of the pin-locking mechanism from an locking state to an unlocked state. Specifically, in some such embodiments, the controller of the pin-locking tag is further configured so that if the pin-locking mechanism is in an unlocked state and information received from the antenna corresponds to a valid lock command, the controller activates the pin-locking mechanism to change from the unlocked state to a locking state.

Removal of pin from pin-accepting channel

When the pin-locking mechanism in the locking state engages at least a portion of a pin that is located inside the pin-accepting channel, the pin cannot be removed from the pinaccepting channel.

In some embodiments, when the pin-locking mechanism is then changed from the locking state to an unlocked state, no force is applied by the pin-locking tag to remove the pin from the pin-accepting channel. Such an embodiment is tag 24 depicted in Figures 2. Once the pin-locking mechanism is in an unlocked state, a user must apply a force to remove the pin from the pin-accepting channel, for example, a manual force. In some alternative embodiments, the pin-locking tag is configured to automatically remove a pin from the pin-accepting channel when the pin-locking mechanism disengages from a locked pin. Such an embodiment is tag 62 depicted in Figures 6 where clamp-shaped shell 14 of the pin-locking tag 62 is biased to an ordinarily open state by elastic joint 14c. From a situation where pin-locking mechanism 20 is in a locking state where pin 12 is in pinaccepting channel 18 as depicted in Figure 6D, when pin-locking mechanism 20 is changed to an unlocked state, elastic joint 14c applies a force that separates arms 14a and 14b, thereby automatically removing pin 12 from pin-accepting channel 18 to the situation depicted in Figure 6B.

Antenna

A pin-locking tag according to the teachings herein comprises an antenna configured to receive information transmitted by a radio frequency transmitter and to provide the received information to the controller. In some embodiments, the antenna is also configured to transmit radio frequency signals, e.g., provided by the controller.

As used herein, the term "antenna" includes the actual antenna as well as the required hardware and software to receive transmitted information and to provide the information to the controller. The antenna is physically associated with the pin-locking tag, typically held inside the shell and/or secured to an outside portion of the cell.

Any suitable antenna can be used, for example, an NFC antenna, a Bluetooth® or WiFi antenna®.

In some preferred embodiments, the antenna is an NFC antenna. An NFC antenna allows a pin-locking tag to use particularly little electrical power for operation (e g., it is accepted that NFC antennas use a third the power of a Bluetooth® LE antenna). An additional advantage of an NFC antenna is that it allows a person wishing to unlock a pinlocking tag to use an NFC-enabled device such as an NFC-enabled smartphone to implement an embodiment of the method of unlocking a pin-locking tag according to the teachings herein, for example, to purchase items and remove a pin-locking tag using the NFC-enabled smartphone as a tag detacher.

In preferred embodiments, the antenna and supporting hardware such as the controller are configured to receive short-range signals, e.g., from a transmitter that is close to the shell and/or the antenna, in some embodiments with a reception range of between contact and not more than 100 cm and in some embodiments with a reception range of between contact and not more than 50 cm and even not more than 20 cm. In some embodiments when the antenna is an NFC antenna, the reception range is not more than 10 cm, not more than 5 cm and even not more than 2 cm.

Controller

A pin-locking tag according to the teachings herein comprises a controller functionally-associated with the pin-locking mechanism and the antenna. The controller is typically held inside the shell.

The controller is any suitable controller, e.g., a custom controller or a general-purpose computer comprising an integrated circuit, memory and other required components which is software, hardware and/or firmware-configured for performing the required functions according to the teachings herein.

The controller is configured to receive information from the antenna and, if the information corresponds to a valid unlock command, to activate the electrical motor to change the pin-locking mechanism from a locking state to an unlocked state, allowing the pin to be removed from the pin-locking channel of the security tag. As such, the controller can also be considered a radio receiver. In some embodiments, the controller is also configured to provide signals to be transmitted by an antenna (preferably, but not necessarily, the antenna described above) and in such embodiments can be considered a radio transceiver.

In some preferred embodiments, the controller is configured to implement an embodiment of the method of unlocking a pin-locking tag according to the teachings herein.

In some preferred embodiments, the controller is configured to implement an embodiment of the method of locking a pin-locking tag according to the teachings herein.

Power supply

A pin-locking tag according to the teachings herein comprises at least two components that require electrical power to operate, the pin-locking mechanism and the controller.

Internal power supply

In some embodiments, a pin-locking tag comprises a power supply for providing electrical power to at least one of the components that require electrical power to operate for example, one or both of the pin-locking mechanism and the controller. Typically, but not necessarily, the power supply is found inside the shell. For example, tag 24 depicted in Figures 2 and tag 62 depicted in Figures 6 comprise a power supply 32 that is a rechargeable lithium battery functionally associated with a USB port 32a for recharging the battery.

Any suitable power supply or combination of power supplies may be used, for example, one or more of a non-chargeable battery, a replaceable battery, a rechargeable battery, a supercapacitor and a fuel cell.

In some embodiments, a supercapacitor is a preferred power supply to power the controller and/or the pin-locking mechanism (optionally, also other components) as supercapacitors are cheap, compact, lightweight, do not leak, can be charged quickly, compared to batteries can be disposed of in an environmentally-friendly manner. A challenge for using a supercapacitor is that some types of pin-locking mechanisms require too much power to be dependably powered by a supercapacitor. Embodiments of pin-locking mechanisms such as described herein that require electrical power when changing from a locking state to an unlocking state or from an unlocking state to an unlocked state, are particularly preferred for use together with a supercapacitor. Further, the specific pin-locking mechanisms described herein, particularly the pin-locking mechanisms discussed with reference to tag 38 depicted in Figures 3, tag 44 depicted in Figures 4, tag 52 depicted in Figures 5 and tag 62 depicted in Figures 6, have been found to be suitable for use with a supercapacitor as a power supply.

In embodiments that comprise a rechargeable battery, the pin-locking tag preferably comprises a recharging module that allows for recharging of the battery without removing the battery from the pin-locking tag, for example, USB port 32a of pin-locking tag 24 depicted in Figures 2 and of pin-locking tag 62 depicted in Figures 6. In some embodiments, the recharging module comprises a wireless charging coil and the recharging module is configured for induction charging of a rechargeable battery, for example wireless charging coil 40 of pin-locking tag 38 depicted in Figures 3. In some such embodiments, the antenna of the pin-locking tag is an NFC antenna that functions to receive information transmitted by a radio frequency transmitter, to provide the received information to the controller and also to function as a wireless charging coil to recharge a rechargeable battery, for example, as in pinlocking tag 44 depicted in Figures 4.

External power supply

In some embodiments, a pin-locking tag according to the teachings herein receives electrical power to operate at least one, preferably all, components (e g., the controller and/or the electrical motor) from an external power supply. In some such embodiments, the pin-locking tag is devoid of an internal power supply.

Additionally or alternatively, in some preferred such embodiments, the pin-locking tag comprises a wireless charging coil and is configured to operate electrical components such as the controller and/or the pin-locking mechanism with electrical power received by the wireless charging coil via induction. In preferred such embodiments, the antenna of the pinlocking tag is an NFC antenna that functions to receive information transmitted by a radio frequency transmitter, to provide the received information to the controller and also to function as a wireless charging coil to receive electrical power to operate electrical components via induction.

Periods of inactivity

During use, pin-locking tags, including pin-locking tags according to the teachings herein, are generally inactive except for very brief events: during attachment to an item and during detachment from an item. For that reason, prior art pin-locking tags are unpowered. In contrast, pin-locking tags according to the teachings herein require power for operation of the controller, for changing from a locking state to an unlocked state and in some embodiments for other functions. It is therefore desirable that during inactive periods a pin-locking tag according to the teachings herein uses minimal or no electrical power.

In some embodiments, the controller of a pin-locking tag according to the teachings herein is configured having at least two modes: a low power-usage standby mode; and an active mode where the controller is functional to receive information from the antenna, to determine whether or not the information corresponds to a valid unlock command, and if the information corresponds to a valid unlock command, to activate the pin-locking mechanism to change from a locking state to an unlocked state.

Standby mode is a sleep-mode

In some embodiments, the controller of a pin-locking tag according to the teachings is ordinarily found in a standby mode that is a sleep mode, as known in the art of computing, where the controller uses little power.

In some embodiments, the controller of a pin-locking tag according to the teachings herein is functionally associated with an induction component which can receive power from a suitable transmitter through induction. When a suitable transmitter is in proximity of the induction component, the induction component receives power which is a signal for the controller to exit the sleep mode and enter an active mode.

In some such embodiments, the controller periodically interrogates the antenna and, if an appropriate signal is received by the antenna, the controller exits the sleep mode and enters an the active mode. In such embodiments, in the sleep mode the controller typically interrogates the antenna more frequently than once in 5 seconds but less frequently than once every 10 milliseconds.

In some such embodiments, the pin-locking tag comprises a motion sensor such as an accelerometer known in the art of smartphones functionally-associated with the controller. In the sleep-mode the motion sensor is provided with sufficient power to detect motion and the controller periodically interrogates the motion sensor, e.g., more frequently than once in 5 seconds but less frequently than once every 10 milliseconds. When the motion sensor reports to the controller that the pin-locking tag has been moved, the controller enters the active mode from the sleep mode for a predetermined period of time, typically of at least 1 minute.

In some such embodiments, the pin-locking tag comprises a manually-operable activation switch. In the sleep-mode the activation switch is provided with sufficient power to detect operation of the switch and the controller interrogates the activation switch. When the activation switch is operated, the controller enters the active mode from the sleep mode for a predetermined period of time, typically of at least 1 minute. For example, some embodiments of pin-locking tag 52 depicted in Figures 5 change from a sleep mode to an active mode upon manual operation of activation button 54 as an activation switch.

In some such embodiments, the controller enters an active mode from a sleep mode upon receiving power from an external source (e.g., by induction, for example, through a wireless charging coil or an NFC antenna operating as a wireless charging coil).

Controller in off-mode

In some embodiments, the controller of a pin-locking tag according to the teachings is ordinarily found in a standby mode that is an off mode, as known in the art of computing, where the controller uses no power.

In some such embodiments, the controller enters the active mode from the off mode upon receiving power from an external source (e.g., by induction, for example, through a wireless charging coil or an NFC antenna operating as a wireless charging coil).

In some such embodiments, the pin-locking tag comprises a manually-operable activation switch. When the activation switch is operated, the controller enters the active mode from the off mode for a predetermined period of time, typically of at least 1 minute. For example, some embodiments of pin-locking tag 52 depicted in Figures 5 change from a standby mode to an active mode upon manual operation of activation button 54 as an activation switch.

Booby trap

As is discussed in the background section, pin-locking tags may include a booby trap configured so that when an improper attempt is made to separate the pin-locking tag from a pin to which the pin-locking tag is locked (e g., forceful separation of the pin-locking tag from the pin without using a suitable tag detacher), the booby trap is triggered. One known type of booby trap is an ink reservoir which, when triggered by an improper attempt to separate the pin-locking tag from a pin to which the pin-locking tag is locked, releases ink which ruins an item to which the pin-locking tag is attached. In some embodiments, a pinlocking tag according to the teachings herein comprises a booby trap, such as pin-locking tag 24 depicted in Figures 2 comprising ink reservoir 34 as a booby trap.

In some alternative embodiments, a pin-locking tag according to the teachings herein is devoid of a booby trap, for example, pin-locking tag 38 depicted in Figures 3.

Whether a pin-locking tag comprises a booby trap or not, in some embodiments a pinlocking tag according to the teachings herein is used together with a pin that comprises a booby trap.

On-board alarm module

In some embodiments, a pin-locking tag according to the teachings herein comprises an alarm module configured, when activated, to: monitor the receipt of a RF signal indicating that an alarm should not be generated; and if no such RF signal is received, generate an alarm.

An alarm module can be used together with a booby trap, but generally obviates the need for a booby trap, so in some embodiments a pin-locking tag having an alarm module is devoid of a booby trap.

An alarm module can be used together with an EAS label but generally obviates the need for an EAS label so in some embodiments a pin-locking tag having an alarm module is devoid of an EAS label. As is known to a person having ordinary skill in the art, for an EAS label to be useful for helping reduce unauthorized removal of an item from a specified area, each exit from the specified area must include an EAS security gate. When an item with an active EAS label attached thereto is taken through the EAS security gate. The EAS security gate detects the EAS label and generates an alarm. In contrast, when a security tag according to the teachings herein comprises an alarm module, there is no need for expensive EAS security gates, just one or more radio frequency transmitters to transmit the signal indicating that an alarm should not be generated.

An alarm module is configured to generate any suitable alarm or combination of alarms. In some embodiments, an alarm comprises an audible alarm. Additionally or alternatively, in some embodiments an alarm comprises transmission of a RF signal. The hardware, software and other requirements of an alarm module are well known to a person having ordinary skill in the art, for example, similar or identical to an audible or RF alarm module known in the art of smartphones. Typically an alarm that is an RF signal is detected by an RF receiver of an anti-theft system which then activates anti-theft actions. Typical antitheft actions can include one or more of activating an audible or visible alarm, activating cameras to record images of the alleged theft, and deployment of security personnel.

In some preferred embodiments, the alarm module comprises the controller of the tag, but in some alternative embodiments, the alarm module comprises a controller that is different from the controller of the tag.

In some embodiments, the controller of the alarm module continuously monitors the receipt of a RF signal indicating that an alarm should not be generated but a disadvantage of such embodiments is the excessive use of power from the supply. Alternatively, in some embodiments the controller intermittently monitors the receipt of the RF signal, in preferred such embodiments at a rate of not more than once every 0.5 seconds and not less than once every 60 seconds, more preferably at not less than once every 15 seconds. Alternatively, in some embodiments the controller of the alarm module is functionally-associated with a motion sensor such as an accelerometer and the controller monitors the receipt of the RF signal for a predetermined period of time only subsequently to the accelerometer detecting motion.

In some preferred embodiments, radio frequency signal indicating that the alarm should not be produced is received via the antenna configured to receive information transmitted by a radio frequency transmitter, but in some alternative embodiments, the alarm module comprises an antenna different therefrom.

In some preferred embodiments, the power supply for the alarm module is the same power supply that provides power for the controller, but in some alternative embodiments, the alarm module comprises a power supply that is different from the power supply for the controller.

In some preferred embodiments, the power supply that provides power for monitoring the receipt of a RF signal indicating that an alarm should not be generated is a first power supply (e.g., the power supply that provides power for the controller) and the power supply that provides power for generating an alarm is no RF signal is received is a second power supply different from the first power supply. In such embodiments, the tag always has sufficient power to generate an alarm that is sufficiently intense and has a sufficient duration, in both cases "sufficient" as defined by the user or the designer of the tag. For example, in some embodiments, the first power supply is a rechargeable battery or an ultracapacitor and the second power supply is a long-lifetime low self-discharge battery chosen to be as small as possible (so that the tag is as small as possible) but having sufficient power capacity to generate the alarm.

Pin-locking tag 62 depicted in Figures 6 comprises an audible alarm module 67 that receives power from power supply 32, is controlled by controller 30 and the radio frequency signal indicating that the audible alarm should not be produced is received via antenna 28,

In typical use, pin-locking tag 62 is attached to an item of clothing and is found in a store. In the store, one or more security RF transmitters transmit a signal indicating that an alarm should not be generated by the pin-locking tags 62 in the store. As long as pin-locking tag 62 is in the store, the alarm module detects the signal transmitted by the security RF transmitters and therefore does not generate an alarm. If the item with the attached pinlocking tag 62 is removed from the store, the signal is no longer received. When the signal is no longer received, the alarm module generates an alarm.

Radio frequency label

As is discussed in the background section, pin-locking tags often include an EAS label. In some embodiments, a pin-locking tag according to the teachings herein comprises a radio frequency (RF) label.

In some embodiments, the RF label comprises a component or is selected from the group consisting of an EAS label and an RFID. When the RF label comprises an RFID, it is preferred that the RFID be a non-collision RFID. Preferably, the RF label is a passive RF label such as a passive RFID or a passive EAS label. That said, in some embodiments, the RF label is powered, e.g., is an active RFID or an active EAS label. In some embodiments, an active RF label receives power from the same power source as the controller In some alternative embodiments, an active RF label receives power from a power source different from the controller power source.

Pin-locking tag 24 depicted in Figures 2 and pin-locking tag 62 depicted in Figures 6 both comprise an RF label 36.

In some alternative embodiments, a pin-locking tag according to the teachings herein is devoid of an EAS label, for example, pin-locking tag 38 depicted in Figures 3.

Whether a pin-locking tag comprises an EAS label or not, in some embodiments a pin-locking tag according to the teachings herein is used together with a pin that comprises an RF label, see for example pin 12 comprising an RF label 36 depicted in Figures 3.

The differences between an RFID and an EAS label as well as the advantages of one over the other are well-known to a person having ordinary skill in the art.

In one particularly preferred embodiment, a pin-locking tag according to the teachings herein, such as pin-locking tag 62 depicted in Figures 6 includes a RFID (preferably a passive RFID, but in some embodiment an active RFID), where the RFID identifier is unique to that pin-locking tag and is known to the controller. Such a configuration allows an external system to directly address the specific pin-locking tag. Specifically, in a first step an external system uses an RFID reader in the usual way to receive the RFID identifier of the pin-locking tag from the RFID. Subsequently, the external system addresses the controller in the usual way using the received RFID identifier. In such a way, interference by other transmitters is reduced or even eliminated as substantially the only transmitter to subsequently respond to the external system or to perform an instruction that was transmitted by the external system will be the pin-locking tag which was addressed. In preferred such embodiments, the RFID is a non-collision RFID. In one example, multiple items are placed in a shopping basket, all items with an attached pin-locking tag of the teachings herein with a non-collision RFID with a unique identifier. A person pays for some of the items and then requests that the pin-locking mechanisms be unlocked so as to remove the pin-locking tags and take the items elsewhere. The tag-releasing system first uses an RFID reader in the usual way to receive the RFID identifiers of all tags that are found in the shopping basket. Since the RFIDs of the tags are non-collision RFIDs, the tag-releasing system serially receives the unique RFID identifiers of all the tags in the shopping basket, without interference caused by simultaneous transmission. The tag-releasing system then checks to see for which items the person paid and which of the RFID identifiers correspond to paid-for items. The tag-releasing system then transmits a valid unlock command that is addressed only to the paid-for items. Pin locking-confirmation module

In some embodiments, a pin-locking tag according to the teachings herein comprises a pin locking-confirmation module. A pin locking-confirmation module is a component (software, hardware or combination thereof) that is configured to report to the tag controller whether or not the pin-locking mechanism is engaging a portion of a pin located inside the pin-accepting channel when the pin-locked mechanism is in a locking state.

In some embodiments, a pin locking-confirmation module includes components that can directly detect the presence of a portion of a pin in the pin-accepting channel, for example, a photodetector and light source: a portion of a pin that is located inside the pinaccepting channel blocks light from the light source from reaching the photodetector, which is reported as confirmation of the pin-locking mechanism being in a locking state and engaging at least a portion of a pin.

In some embodiments, a pin locking-confirmation module detects the status of some component of the pin-locking mechanism as indicating whether or not the pin-locking mechanism is in a locking state and engaging at least a portion of a pin. For example, in some embodiments of a pin-locking tag having a pin-locking mechanism similar to or identical to that depicted for pin-locking tag 62 in Figures 6, the controller is configured to determine whether or not a pin is present in the pin-accepting channel by the time that electrical motor 26 is activated when going from an unlocked state to a locking state. If a pin is present in the pin-accepting channel, the electrical motor is activated for a relatively short time until the locking elements (e.g., locking balls) contact the shaft of the pin, preventing further rotation of the electrical motor. If a pin is not present in the pin-accepting channel, the electrical motor is activated for a relatively long time and stops only when the locking body contacts the locking cap.

Method for unlocking a pin-locking tag

According to an aspect of the teachings herein, there is also provided a method for unlocking the pin-locking mechanism of a pin-locking tag using wireless communication.

The method for unlocking a pin-locking tag according to the teachings herein may be used to unlock any suitable pin-locking tag. In preferred embodiments, the method is implemented to unlock a pin-locking tag as described herein. Checkout Device

The method for unlocking a pin-locking tag according to the teachings herein relies on using a checkout device that comprises a radio frequency transmitter with an associated antenna suitable for transmission of information including a valid unlock command to the controller of a pin-locking tag through the antenna of the pin-locking tag. For example, to unlock a pin-locking tag having an NFC antenna, a checkout device typically also has an NFC antenna. In preferred embodiments, a checkout device is configured to allow purchase of an item in a manner similar or analogous to known methods of on-line shopping and, once purchase is complete, use the checkout device to separate a pin-locking tag from the item so that the checkout device constitutes a point of sale.

In some embodiments, the checkout device is a custom checkout device configured for implementing an embodiment of the method at a location such as a store. In some such embodiments, a checkout device is a handheld mobile device that is provided to a customer in the store to help purchase items in the store. Alternatively, in some embodiments the checkout device is not handheld. In some embodiments, the checkout device defines a volume in which more than one item can be placed at any one time and the method applied to items held in the volume, e.g., the checkout device having the physical form of a shopping cart, shopping bag or a checkout counter.

In some preferred embodiments, the checkout device is a general-purpose mobile device (e.g., a smartphone and a tablet) which is configured for implementing an embodiment of the method, in some embodiments software-configured (e.g., running a suitable application) and/or in some embodiments hardware-configured (e.g., with an attached dongle). In some such embodiments, the mobile device is owned by the customer.

An embodiment of the method is discussed with reference to flow charts 100a (at the checkout device) depicted in Figure 7A and 100b (at the pin-locking tag) depicted in Figure 7B.

At the checkout device, in Figure 7A box 102, when the customer wants to purchase an item, the customer uses the checkout device to wirelessly transmit an unlock command including a transmitted release code to the tag-controller via the tag antenna. Depending on the embodiment, the unlock command may include information or data in addition to the release code that is required for the unlock command to be a valid unlock command.

At the pin-locking tag, Figure 7B, in box 104, via the antenna, the controller of the pin-locking tag receives the unlock command transmitted by the checkout device as a purported unlock command that includes the transmitted release code. In box 106, the controller compares the transmitted release code with the release code stored in the tag. If all unlocking conditions are met including that the transmitted release code is the same as the stored release code (box 108), then the controller considers the purported unlock command to correspond to a valid unlock command of the tag, so the controller activates the pin-locking mechanism to change from a locking state to the unlocked state (box 110). The customer can then separate the tag from the item.

In some embodiments, the stored release code is a rewritable release code uploaded to the controller in any suitable way, for example, through wireless communication (using the antenna of the tag or a different antenna of the tag) or for suitably-configured tags through wired communication (e.g., USB port 32a of tags 24 and 62). In some embodiments, a stored release code is a permanent release code of the tag that does not change, in some embodiments such a permanent release code is analogous or identical to a device ID such as a UID known in the art of computing.

In some embodiments, the tag comprises a tag identifier and the unlock command that the checkout device transmits to the pin-locking tag includes the tag identifier. Specifically, in some embodiments wherein the pin-locking tag comprises a tag identifier which allows specifically addressing that specific pin-locking tag, the method at the checkout device further comprises, prior to 'i' (the checkout device transmitting an unlock command including a release code, to the pin-locking tag): the checkout device acquiring: the tag identifier of the pin-locking tag, an item identifier of the item to which the tag is attached, and an indication to purchase the item to which the tag is attached; the checkout device transmitting the tag identifier of the pin-locking tag, an identifier of an item to which the tag is attached, and an indication to purchase the item to which the tag is attached to a remote device with a request to receive a release code for the pin-locking tag associated with the tag identifier; and the checkout device receiving from a remote device the release code for the pinlocking tag associated with the tag identifier.

In some such embodiments, the tag identifier is a unique tag identifier (UID).

In Figure 8, a flowchart 112 depicting such an embodiment of the method according to the teachings herein is presented, of a person releasing a pin-locking tag from an item at a store where the pin-locking tag comprises a tag identifier. A person wishing to purchase an item at a store is provided with a suitably-configured checkout device as described above. In the store, the person decides to take a specific item to which a pin-locking tag is attached. The pin-locking mechanism of the pin-locking tag is in a locking state and the pin-locking tag is configured for unlocking in accordance with an embodiment of the teachings herein.

Consequences of not unlocking the pin-locking tag

If the person takes the item without detaching the pin-locking tag, use of the item will be difficult. If the person tries to remove the tag not in accordance with the method of the teachings herein, the item may be damaged, particularly if the tag includes a booby trap (e.g., booby trap 34 of tag 24). Additionally, in some embodiments where the tag comprises a RF label (e.g., EAS label or RFID, such as RF label 36 of tag 24) and the store is equipped with an anti -theft system that includes a suitable detection antenna (e.g., EAS antenna or similar), removal of the item from the store without removing the tag will trigger an alarm as known in the art of EAS. Additionally or alternatively, in some embodiments where the tag comprises an alarm module (e.g., alarm module 67 of tag 62), removing the item with the attached tag from the store and therefore from detection range of the signals transmitted by the security RF transmitter or transmitters leads to the alarm module generating an alarm.

Entering item identifier to a checkout device

Instead of illicitly removing the item from the store, the person enters information comprising three data, an item identifier, a tag identifier and an indication to purchase the item, into the checkout device through the checkout device user interface and the checkout device accepts the three data (box 114). The checkout device transmits the three data to the purchasing system of the store (box 116), as known in the art, the purchasing system of the store typically run on a remote server. Entry of the three data is done in any suitable fashion and in any suitable order as is well known in the art of on-line shopping and in the art of selfcheckout counters at supermarkets. In some embodiments, entry of the three data occurs at substantially the same time. Alternatively, in some embodiments the three data are entered at different times, e.g., in two or three distinct steps, as will be discussed with reference to a specific example hereinbelow. For example, in some embodiments the person enters a list of items over a period of time of shopping, and at the end of the period of time, optionally reviews the list to add/subtract items, and then provides an indication to purchase that relates to all items on the list. The item identifier is an identifier that allows the purchasing system of the store to access information that is required to allow purchase of the item such as price.

In some embodiments, the item identifier is entered using the graphic-user interface (e.g., GUI on a touchscreen) of the checkout device.

Alternatively, in some embodiments the item identifier is entered with a camera of the checkout device to enter a machine-readable identifier that is visible and displayed on or near the item, for example numerical, text, 1-dimensional barcode, 2-dimensional barcode such as Aztec Code, Datamatrix, MaxiCode, PDF-417 or QR Code.

Alternatively, in some embodiments the item identifier is a photograph of the item itself entered with a camera of the checkout device.

Alternatively, in some embodiments the checkout device is configured to read an RF label and the item identifier is read from an RF label that is attached or is in proximity to the item and encodes sufficient information to identify the item.

Alternatively, in some embodiments, the item identifier is stored on the pin-locking tag (e.g., in the controller) and the item identifier is entered by the checkout device reading the item identifier from the pin-locking tag. For example, in some embodiments an item identifier is stored on the tag (e.g., in the controller) as part of the process of attaching the tag to the item. Alternatively, in some embodiments the tag identifier is the item identifier: as part of the process for attaching the tag to the item, the store purchasing system records (e.g., in a database) the identity of the item to which the tag was attached.

Purchasing the item

Once the item identifier is entered in the checkout device, the person is able to purchase the item in the usual way as is well-known in the art, using a method similar to methods known in the art, for example, found in Amazon.com, Inc. (Bellevue, WA, USA), Banggood (Baiyun, Guangzhou, China), Aliexpress (Hangzhou Shi, Yuhang Qu, China) or known self-checkout counters found in stores. Purchase is typically, but not necessarily, made in a dialogue between the checkout device and the purchasing system of the store that includes or is associated with a remote payment server that confirms payment.

Once the purchase is confirmed by the store purchasing system, the checkout device receives a release code (box 118), typically, but not necessarily, from the store purchasing system. Checkout device transmitting release code to unlock pin-locking mechanism

At the checkout device, the purchase continues further substantially as described above with reference to Figure 7: in box 102 (both in Figure 7 and in Figure 8), the checkout device transmits an unlock command to the pin-locking tag through the pin-locking tag antenna, the unlock command including the release code that the checkout device received.

After the checkout device transmits the unlock command (box 102), the purchase at the pin-locking tag is as described above with reference to Figure 7, boxes 104, 106, 108 and 110 and is not repeated here or in Figure 8 for brevity.

Pin-locking tag identifier and concurrent release of multiple pin-locking tags

In some embodiments, it is preferred that an unlock command that is transmitted by a checkout device be specifically addressed to a specific pin-locking tag, and for a pin-locking tag to consider a purported unlock command to be a valid unlock command, the unlock command must be specifically directed to that pin-locking tag.

Some such embodiments allow for efficient purchase of a single item that is attached to a pin-locking security tag of the teachings herein or to multiple items that are each attached to a different pin-locking security tag of the teachings herein. For example, in one such embodiment, a person places all of the items to be purchased in a designated volume, e.g., a checkout device having the physical form of a shopping cart or of a self-checkout counter. The person indicates (for example, via a GUI of the checkout device) the desire to purchase the items located in the designated volume. The checkout device then acquires the tag identifiers of all of the pin-locking tags in the designated volume in any suitable manner. One method of acquiring the tag identifiers of all the tags in the designated volume is that each tag comprises an RFID with a unique identifier (UID), preferably a non-collision RFID and the checkout device uses a known method to acquire the tag identifiers of all of the tags located in the designated volume, for example, as known in the art of non-collision RFID.

Once the tag identifiers of all of the tags in the designated volume is acquired, the checkout device sends a list of tag identifiers to the purchasing system of the store, in some embodiments subsequent to a person confirming the purchase using the checkout device GUI. In response, the purchasing system sends a list of release codes, each release code associated with a tag identifier for which the purchasing system confirms release. The checkout device then transmits an unlock command to each one of the pin-locking tags, where each unlock command includes the tag identifier and the associated release code. Receiving a release code based on a tag identifier

As noted above, the checkout device transmits an acquired tag identifier to a remote device such as a store purchasing system with a request to receive the release code for the pin-locking tag that is associated with the acquired tag identifier; and the checkout device receives from a remote device the release code for the pin-locking tag that is associated with the acquired tag identifier In some embodiments, the two recited remote devices are the same remote device. Alternatively, the two recited remote devices are different devices.

Typically, the remote device(s) are both associated with the purchasing system of the store. The remote device receives the acquired tag identifier and retrieves a release code, e.g., from a database and/or by performing a calculation. Typically, the remote device(s) transmits the release code to the checkout device only if other conditions are met, for example, that sale of the item to which the pin-locking tag is attached to the checkout device is approved.

Acquiring the tag identifier

The tag identifier of a pin-locking tag is acquired in any suitable way. In some embodiments, the checkout device acquires the tag identifier from the pin-locking tag.

In some embodiments the pin-locking tag is labeled with a machine-readable identifier that is visible on the surface of the pin-locking tag from which the tag identifier can be extracted, for example numerical, text, 1 -dimensional barcode, 2-dimensional barcode such as Aztec Code, Datamatrix, MaxiCode, PDF-417 or QR Code. In some such embodiments, the method further comprises acquiring an image of an identifier visible on the surface of the pin-locking tag (with the checkout device or with a device with which the checkout device is in communication) and analyzing the image to extract the tag identifier of the checkout tag, thereby the checkout device acquiring the tag identifier of the pin-locking tag.

In some embodiments the pin-locking tag comprises an RF label as described above (e.g., RF label 36 of any one of tags 24, 52 or 62), which RF label includes the tag identifier (e.g., UID) of the pin-locking tag. In some such embodiments, the method further comprises reading the tag identifier of the pin-locking tag from the RF label (with the checkout device or with a device that can read an RF label with which the checkout device is in communication), thereby the checkout device acquiring the tag identifier of the pin-locking tag. Example of preferred embodiment for locking and unlocking a pin-locking tag

An example of a preferred embodiment of the teachings herein is discussed with reference to a flow chart 120 in Figure 9 for locking a pin-locking tag and flow chart 122 in Figure 10 for unlocking a pin-locking tag.

Locking a pin-locking tag

Flow chart 120 in Figure 9 is embodiment of attaching a pin-locking tag to an item in a store in accordance with the teachings herein, where the antenna of the pin-locking tag for transmission of lock and unlock commands is an NFC antenna.

A store employee (e.g., an administrator) is provided with an administrator device that is configured to communicate with both a pin-locking tag and with the purchasing system of the store. Physically, the administrator device can be a custom device or a general-purpose device such as a smartphone or tablet that is configured (software, hardware and/or firmware) to function as an administrator device. For the discussed embodiment, the administrator device includes an NFC antenna to communicate with a pin-locking tag as well as other software and hardware components to accept user instructions, to acquire an item identifier, to acquire a pin-locking tag identifier and to communicate with the purchasing system of the store. The employee logs-in to the tag-attaching routine of the purchasing system of the store using the administrator device, including entering details such as the store identity, the store branch and in some embodiments, the department.

The employee proceeds to attach pin-locking tags to the items in preparation for presenting the items for sale to customers.

For a specific item the employee enters an item identifier to the administrator device, as described above for the checkout device (box 114 in Figure 8), for example, by scanning a barcode that is attached to the item. The administrator device accepts the item identifier. The administrator device then requests a release code for the item from a remote device, typically the purchasing system of the store, box 124. In some embodiments, subsequent to entry of the item identifier, the administrator device automatically sends a request for a release code. Alternatively, in some embodiments, subsequent to entry of the item identifier, the employee must enter a command via the GUI of the administrator device to send a request for a release code. In some such embodiments, details about the item are displayed on the GUI of the administrator device for review by the employee prior to the employee entering the command. The purchasing system receives the request and generates a release code. In a release code database, in a record associated with the item identifier, the purchasing system enters the generated release code and sends the generated release code to the administrator device. In some embodiments, a release code is generated for each specific item. In some preferred embodiments, all items of the same type receive the same release code,

In box 126, the administrator device receives the generated release code from the purchasing system.

In box 128, the employee physically brings a pin-locking tag and the item together in such a way that allows attachment of the tag to the item. For example, when the tag has a shell shaped like a clamp as depicted for tag 62 in Figures 6, the employee closes the parts of the shell on a portion of the item substantially as depicted in Figure 6C.

In embodiments of a tag such as tag 24 depicted in Figures 2, tag 38 depicted in Figures 3, tag 44 depicted in Figures 4 or tag 62 depicted in Figures 6, the employee pushes point 12a of pin through the item and then places point 12a and shaft 12b inside pinaccepting channel 18. As a result, the pin passes through the item and a portion of the pin is found inside the pin-accepting channel. In alternative embodiments such as tag 52 depicted in Figures 5, the employee places a portion of the item into item-holding slot 60 so that the pin does not (yet) pass through the item and the pin is not inside the pin-accepting channel.

The employee uses the GUI of the administrator device to instruct the administrator device to send a lock command to the tag. In box 130, the administrator device accepts the instructions and enters a locking-preparation period having a predetermined duration (e.g., 10 seconds) waiting to establish communication with a pin-locking tag via the NFC antenna of the administrator device.

If by the end of the locking-preparation period no valid communication with a tag is established 132, the administrator device informs the purchasing system that the lockingpreparation period has run out, the purchasing system deletes the record associating the item identifier with the release code and the administrator device deletes the reecived release code, box 134.

If during the locking-preparation period the employee places the NFC antenna of the mobile device in communication distance with the NFC antenna of the pin-locking tag then NFC communication is established between the administrator device and the pin-locking tag in the usual way, 136. During the NFC communication, the administrator device communicates with the tag via the antenna, including transmitting a lock command with the release code and the item identifier, box 138.

In box 140, at the pin-locking tag, the tag controller receives the communication including the lock command and, if the tag controller ascertains that the lock command is a valid lock command the controller stores the release code, stores the item identifier and activates the pin-locking mechanism to change from an unlocked state to a locking state that, as described above, includes engaging at least a portion of a pin that is inside the pinaccepting channel or, in embodiments similar to tag 52 depicted in Figures 5, to place a portion of the pin into the pin-accepting channel.

Detection of locking failure

For embodiments of a pin-locking tag that have a pin locking-confirmation module as described above, if in box 140 the tag controller activates the pin-locking mechanism to change from an unlocked state to a locking state but does not receive confirmation of pinlocking from the pin locking-confirmation module then an embodiment-dependent action is taken.

In some embodiments, the action taken is to cancel the running tag-attachment process and, if it is desired, the tag-attachment process must be restarted at box 114. In some such embodiments, the tag controller device does not store the release code and the item identifier or deletes these if already stored. In some such embodiments the controller activates a component of the pin-locking tag to provide a tactile, audible and/or visual indication to the employee as a warning that locking has failed. The tag controller transmits to the administrator device that locking has failed. The administrator device receives the transmission that locking has failed and informs the purchasing system that locking has failed. The checkout device provides a tactile, audible and/or visual indication to the employee that locking has failed, for example a visual indication on a checkout device display screen. Typically, the release code and item identifier are deleted. In some embodiments, the administrator device maintains a record of the locking failure, optionally with item identifier and other salient information such as date, time and the identity of the employee using the administrator device. The purchasing system optionally updates the release code database to reflect that the release code is no longer associated with the item identifier, for example, by deleting that record.

Alternatively, in some such embodiments, the pin-locking tag and/or the administrator device provide the employee with an indication that locking has failed and provide at least one additional chance to repeat the process starting at box 128, allowing attaching the pinlocking tag to the item with the same item identifier and the same release code.

After the release code and item identifier are stored by the tag controller and the pinlocking mechanism is in a locking state and, in embodiments having a pin lockingconfirmation module, confirmation of a locking state is received, the tag controller transmits a communication to the administrator device via the NFC antenna that the tag is in a locking state and the tag identifier of the tag. In some embodiments, the tag controller transmitting the tag identifier is considered confirmation that the tag is in a locking state, box 142.

The administrator device receives the tag identifier and the locking confirmation. The administrator device forwards the tag identifier to the purchasing system, box 144. The purchasing system adds the tag identifier to the release code database record corresponding to the item.

Unlocking a pin-locking tag

Flow chart 122 in Figure 10 (two sheets) depicts unlocking a pin-locking tag locked as described above in accordance with the teachings herein

A customer is provided with a mobile device such as a smartphone that includes an NFC antenna and is configured as described hereinabove to function as a checkout device. In the instant described embodiment, the smartphone of the customer is software-configured by running an application to function as a checkout device. The customer enters the store and opens the application on the smartphone, so that the configured smartphone herein further is referred to as a checkout device.

The customer decides to purchase an item.

The customer enters the item identifier to the checkout device as described above, for example by scanning the barcode that is attached to the item.

In box 146, the checkout device receives the item identifier and consequently displays a description of the item with salient information, e.g., price, on the screen of the checkout device. Depending on the embodiments, the item description that is displayed on the screen may be embedded in the item identifier, may be stored on the checkout device, or may be recovered from the store sales system.

The customer can choose not to purchase the item and indicates such using the checkout device GUI. Alternatively, the customer chooses to add the item to a virtual shopping cart on the checkout device using the GUI as known in the art of Internet shopping. The checkout device receives the instruction from the GUI to add the item to the virtual shopping cart, box 148.

The customer takes the actual physical item with the attached pin-locking tag, for example by placing the item in a physical shopping basket or the like.

While still in the store but after one or more items are in the virtual shopping cart, the customer chooses to actualize the purchase by indicating the desire to actualize purchase via the GUI of the checkout device. The checkout device receives the command to actualize the purchase, then sends the list of items in the virtual shopping cart to the purchasing system, box 150.

The purchasing system handles purchase and payment of the items on the list in the usual way as known in the art of Internet shopping and self-checkout systems. When the purchase is complete, the purchasing system sends to the checkout device, and the checkout device receives and stores, a list of the items that are allowed to be released from a respective attached pin-locking tag, box 152.

The customer then separates the pin-locking tags from the items. For the items that appear on the list of items that are allowed to be released from a respective attached pinlocking tag, the pin-locking tag is moved from a locking state to the unlocked state, allowing separation of the tag from the item.

Specifically, the customer places the NFC antenna of the checkout device in communication distance with the NFC antenna of the pin-locking tag attached to an item so that NFC communication is established between the pin-locking tag and the checkout device.

In box 154, via the NFC antenna, the checkout device requests the UID of the tag and the item identifier stored in the tag.

In box 156, the tag controller responds by sending the UID of the tag and the stored item identifier via the NFC antenna.

In box 158, the checkout device receives the UID and item identifier from the tag via the NFC antenna, and checks to see if the received item identifier is on the list received from the purchasing system.

If the item identifier does not appear on the list 160, the checkout device displays an indication in the screen that the tag will not be released from the item, box 162.

If the item identifier appears on the list 164, the checkout device sends the UID and the item identifier received from the tag (in box 158) together with or as a request to receive the release code associated with that tag, box 166. The purchasing system checks in the release code database that the item identifier and the UID match, recovers the associated release code, and sends the release code to the checkout device.

In box 168, the checkout device receives the release code receiver from the remote device and then transmits an unlock command including the received release code as described in detail hereinabove via the NFC antenna to the tag controller.

In box 170, as described above, the tag receives the transmission as a purported unlock command with the transmitted release code and compares to the stored release code. As described above in Figure 7, boxes 104, 106, 108 and 110, the controller of the pinlocking tag determines if the purported unlock command is a valid unlock command and, if the command is valid, activates the pin-locking mechanism to change from a locking state to the unlocked state. Subsequently, the pin-locking tag transmits via the NFC antenna that the pin-locking mechanism is in an unlocked state so that the tag is no longer attached to the item and, optionally, deletes the stored release code and item identifier, box 172.

At box 174, the checkout device receives the transmission from the tag that the pinlocking mechanism is in an unlocked state, then forwards to the purchasing system the UID of the tag with the indication that the tag is no longer attached to an item.

The purchasing system optionally deletes the record corresponding to the item identifier associated with the UID of the tag. Alternatively, optionally the record is retained with an indication that the purchase was completed.

The above are repeated as long as the customer places the NFC antenna of the checkout device in communication distance with the NFC antenna of a pin-locking tag attached to an item, 176. When the customer has finished separating the items from the respective pin-locking tags, e.g., as indicated by the customer via the GUI and/or when all items on the list have been separated from the respective pin-locking tags, the separation of items from attached pin-locking tags ends, 178.

In some embodiments and when relevant, advantage is taken of the pin-locking tag / checkout device communication in 154 - 178. In some such embodiments, the tag controller performs a diagnostics test on the locking-pin tag systems including checking whether the power supply is sufficiently charged. When the separation of items from attached pin-locking tags is ended, the controller transmits to the checkout device via the antenna that the tag passed the diagnostic test (e.g., there is sufficient charge in the power supply) and/ or that the tag did not pass the diagnostic test (e.g., there is insufficient charge in the power supply). The embodiment of the method described with reference to Figures 9 and 10 included the use of a pin-locking tag, an administrator device and a checkout device, all three devices having an NFC antenna. In some related embodiments, instead of an NFC antenna communication is done using a different type of radio frequency antenna, for example a Bluetooth® antenna, especially a short range (LE) type antenna.

Implementing the teachings herein is well within the capabilities of a person having ordinary skill in the art upon perusal of the description and figures herein. Any one of many companies are able to develop the required software upon perusal of the description herein without exercising any inventive effort, for example, Sigma Software Ltd. (Shoham, Israel), Itransition (Lakewood, CO, USA) and Evon Technologies (Dehradun, India).

Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the invention pertains. In case of conflict, the specification, including definitions, takes precedence.

As used herein, the terms “comprising”, “including”, "having" and grammatical variants thereof are to be taken as specifying the stated features, integers, steps or components but do not preclude the addition of one or more additional features, integers, steps, components or groups thereof. As used herein, the indefinite articles "a" and "an" mean "at least one" or "one or more" unless the context clearly dictates otherwise.

As used herein, when a numerical value is preceded by the term "about", the term "about" is intended to indicate +/-10%. As used herein, a phrase in the form “A and/or B” means a selection from the group consisting of (A), (B) or (A and B). As used herein, a phrase in the form “at least one of A, B and C” means a selection from the group consisting of (A), (B), (C), (A and B), (A and C), (B and C) or (A and B and C).

It is appreciated that certain features of the invention, which are, for clarity, described in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features of the invention, which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable subcombination or as suitable in any other described embodiment of the invention. Certain features described in the context of various embodiments are not to be considered essential features of those embodiments, unless the embodiment is inoperative without those elements. Embodiments of methods and/or devices described herein may involve performing or completing selected tasks manually, automatically, or a combination thereof. Some methods and/or devices described herein are implemented with the use of components that comprise hardware, software, firmware or combinations thereof. In some embodiments, some components are general-purpose components such as general purpose computers, digital processors or oscilloscopes. In some embodiments, some components are dedicated or custom components such as circuits, integrated circuits or software.

For example, in some embodiments, some of an embodiment is implemented as a plurality of software instructions executed by a data processor, for example which is part of a general-purpose or custom computer. In some embodiments, the data processor or computer comprises volatile memory for storing instructions and/or data and/or a non-volatile storage, for example, a magnetic hard-disk and/or removable media, for storing instructions and/or data. In some embodiments, implementation includes a network connection. In some embodiments, implementation includes a user interface, generally comprising one or more of input devices (e.g., allowing input of commands and/or parameters) and output devices (e.g., allowing reporting parameters of operation and results.

Although the invention has been described in conjunction with specific embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, it is intended to embrace all such alternatives, modifications and variations that fall within the scope of the appended claims.

Citation or identification of any reference in this application shall not be construed as an admission that such reference is available as prior art to the invention.

Section headings are used herein to ease understanding of the specification and should not be construed as necessarily limiting.