[go: up one dir, main page]

HK1218801B - Security tag for application to footwear - Google Patents

Security tag for application to footwear Download PDF

Info

Publication number
HK1218801B
HK1218801B HK16106682.2A HK16106682A HK1218801B HK 1218801 B HK1218801 B HK 1218801B HK 16106682 A HK16106682 A HK 16106682A HK 1218801 B HK1218801 B HK 1218801B
Authority
HK
Hong Kong
Prior art keywords
security tag
article
locking mechanism
shoe
central body
Prior art date
Application number
HK16106682.2A
Other languages
Chinese (zh)
Other versions
HK1218801A1 (en
Inventor
J‧C‧福特
K‧福德
罗丹辉
T‧T‧源
C‧T‧托吉恩
Original Assignee
Sensormatic Electronics, LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/972,148 external-priority patent/US9070265B2/en
Application filed by Sensormatic Electronics, LLC filed Critical Sensormatic Electronics, LLC
Publication of HK1218801A1 publication Critical patent/HK1218801A1/en
Publication of HK1218801B publication Critical patent/HK1218801B/en

Links

Description

Security tag for footwear products
Cross Reference to Related Applications
This application is a non-provisional application of U.S. provisional application No.61/691,535 filed on 21/8/2012, which is incorporated herein by reference in its entirety.
Technical Field
The present inventive arrangement relates to security tags for use in electronic article surveillance ("EAS") systems. More particularly, the inventive arrangements relate to security tags and methods for preventing unauthorized removal of an article (e.g., an article of footwear) from a given location (e.g., a retail store).
Background
A typical EAS system in a retail environment may include a monitoring system and at least one security tag (tag) or label (1abel) affixed to an item to be protected from unauthorized removal. The monitoring system establishes a monitoring zone in which the presence of a security tag and/or label can be detected. The monitoring area is typically established at an access point of the control area (e.g., adjacent to an entrance and/or exit of a retail store). If an item with an active security tag and/or label enters the surveillance zone, an alarm may be triggered to indicate that it may be removed from the control zone without authorization. Conversely, if an item is authorized to be removed from the controlled area, its security tag and/or label can be deactivated and/or disengaged therefrom. Thus, the item can be carried through the monitoring zone without being detected by the monitoring system and/or without triggering an alarm.
The security tags of the EAS system can be constructed in a number of configurations. The desired configuration of the security tag is typically dependent upon the nature of the item to be protected. For example, prepackaged goods that are subject to retail theft (e.g., compact discs ("CDs") and small electronic devices) may each contain a security label disposed within its packaging in a manner that makes the security label invisible to bystanders, at least for the period prior to purchase. In contrast, unpackaged goods (e.g., clothing, shoes, and purses) may each have a security tag attached thereto. The security housing includes a rigid housing within which the security label is disposed. The rigid shell typically contains a pin that is inserted through a portion of the unpackaged cargo (e.g., the fabric of an article of clothing) and secured in place via a locking mechanism. The security tag cannot be removed from the unpackaged goods without destroying the rigid outer shell unless an EAS security tag deactivator/remover is used.
In the case of unpackaged goods, the article is subject to some damage due to the penetration of the pins therethrough. High-end retailers and customers do not like to purchase expensive items (e.g., pickup goods) that are subject to retail theft prevention equipment damage. Shoes are particularly difficult to protect using equipment having pins because the material from which the shoes are made is often subject to permanent damage by the pins.
Shoes also present other difficulties with pinned security tags. For example, the material from which certain shoes are made is often too rigid to insert a pin therein and/or too thick to pierce a pin therethrough to enable the pin to be locked by the locking mechanism. Many retailers attempt to protect certain types of footwear with security tags in the eyelet or tongue area using laces whose pins and/or lanyards are threaded through the footwear. This practice is good for a few shoe models (e.g., rubber-backed canvas shoes), but the security tag can interfere with the shoe fitting and lacing process.
Various solutions have been developed to overcome the previously identified problems associated with preventing unauthorized removal of unpackaged goods from retail stores. One such solution involves the use of a pinless security tag that can tighten or clamp an item between its housing and the arm. An exemplary non-tag security tag configured to protect an article of footwear is disclosed in U.S. patent application No.12/894,738. It will be appreciated that such tightening and clamping applies a compressive force to the article which can result in damage to the article. Further, if no tightening or clamping force is provided for securing the needleless security tag to the article, the security tag can be removed from the article by an unauthorized person. As such, the security tag does not actually prevent the item from being removed from the retail store without authorization.
Disclosure of Invention
The present invention relates to a system and method for operating a security tag of an EAS system. The method comprises the following steps: attaching a clip to a curved sidewall (e.g., a counter) of an article (e.g., a high-heeled shoe) such that a central body of the security tag is vertically aligned with a central axis (or vertical seam) of the curved sidewall; and maintaining the vertical alignment by positioning the first and second flanges of the security tag against respective opposing surface regions of the curved sidewall. The first and second flanges extend from respective sides of the central body so as to be symmetrical to each other. The first and second flanges are shaped to closely align with the outer contours of the respective surface areas of the curved sidewall. Thereafter, the fastening component of the security tag is wrapped around an elongated structure (e.g., a heel) of the article. The elongated structure is offset from the curved sidewall in at least one direction and projects from the body of the article. The fastening member is formed of an elongated flexible material. As such, the fastening component can include, but is not limited to, a strap (strap), a cable, a rope, or a lanyard. The fastening member is locked in position around the elongated structure of the article using the mechanical locking mechanism of the security tag. The mechanical locking mechanism may be unlocked via application of a magnetic field thereto.
An exemplary architecture for a security tag will now be described. The security tag includes a hub and a collet coupled to the hub. The jacket is configured for attachment to a curved sidewall of an article (e.g., a counter) such that the central body is vertically aligned with a central vertical axis of the curved sidewall (or a vertical seam of the counter). The collet includes a curved portion coupled to a first end of the central body opposite a second end of the security tag to which the securing member is coupled. The collet also includes an extension coupled to and extending from the bend so as to be adjacent and parallel to the outer surface of the central body. The extension is in a taut arrangement with the outer surface of the central body such that the side wall of the article can be gripped therebetween. The extension may be shaped the same or similar to a shoehorn.
The security tag also includes first and second flanges configured to maintain vertical alignment between the security tag and the article. Vertical alignment is maintained when the flanges are positioned against respective opposing surface regions of the curved sidewall. The flanges extend from respective sides of the central body so as to be symmetrical with each other. The flange is sized and shaped to: closely aligned with the outer contour of each surface region of the curved sidewall; and/or at least partially around the intersection of the elongate structure and the sidewall (e.g., heel and counter) of the article. The fastening component is coupled with the flange and is formed from an elongated flexible material such that it can be wrapped around an elongated structure (e.g., a heel) of the article. A mechanical locking mechanism is provided for locking the fastening member in a position wrapped around an elongate structure of an article. The mechanical locking mechanism may be unlocked by applying a magnetic field thereto.
In some cases, the security tag is formed at least in part from a transparent material, thereby minimizing any obscuring of the appearance of the article. Further, at least one eyelet through which a fastening member passes is formed in each of the first and second flanges. The security label may be affixed to or disposed within a housing of the security tag. The security tag is configured to cause an alarm to be activated when an article to which the security tag is attached enters a surveillance zone of the EAS system.
Drawings
Embodiments will be described with reference to the following drawings, wherein like reference numerals represent like items throughout the several views, and wherein:
FIG. 1 is a schematic diagram of an exemplary system that may be used to understand the present invention.
FIG. 2 is a schematic view of an exemplary security tag secured to an article that may be used to understand the present invention.
FIG. 3 is a right rear perspective view of the security tag shown in FIG. 2 that may be used to understand the present invention.
FIG. 4 is a right side view of the security tag shown in FIG. 2 that may be used to understand the present invention.
FIG. 5 is a left side view of the security tag shown in FIG. 2 that may be used to understand the present invention.
FIG. 6 is a rear view of the security tag shown in FIG. 2 that may be used to understand the present invention.
FIG. 7 is a front view of the security tag shown in FIG. 2 that may be used to understand the present invention.
FIG. 8 is an assembled view of the security tag shown in FIG. 2 that may be used to understand the present invention.
Fig. 9-10 each provide a partial cross-sectional view of the roll-up locking mechanism of fig. 8 that can be used to understand its operation.
FIG. 11 is a schematic view of an exemplary latch-type locking mechanism.
Fig. 12-13 each provide a schematic illustration of an exemplary magnetic cam locking mechanism.
FIG. 14 is a flow chart of an exemplary method for operating a security tag of an EAS system.
Detailed Description
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the figures can be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as presented with respect to the figures, is not intended to limit the scope of the disclosure, but is merely representative thereof. While various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated otherwise.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative. The scope of the invention is, therefore, indicated by the appended claims. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussion of the features and advantages, and similar language, throughout this specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages, and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
Reference throughout this specification to "one embodiment," "an embodiment," or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the phrases "in one embodiment," "in an embodiment," and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used herein, the singular forms "a", "an" and "the" include plural referents unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art. As used herein, the term "including" means "including, but not limited to".
Embodiments will now be described with respect to fig. 1-14. Embodiments are generally directed to systems and methods for providing an innovative security tag for an article (e.g., an article of footwear) that can be used in an EAS system. In the case of footwear products, the security tag is configured for attachment to the rear of the shoe without exerting excessive compressive forces on the shoe (many conventional security tags, such as those disclosed in the background section herein, can exert excessive compressive forces on the shoe). In this regard, the security tag includes an engagement member designed to serve the dual purpose of: (1) slidingly receiving the heel of a high-heeled shoe (i.e., the vertical portion of the shoe that wraps around the rear of the foot) so as to couple the security tag to the shoe, and (2) providing a shoehorn to allow a person to comfortably try on the shoe without the security tag bothering or bothering. Once coupled to the shoe via the engagement means, the security tag is securely attached to the shoe by wrapping the strap, cable or lanyard around the heel of the shoe and locking the strap, cable or lanyard in its wrapped position. Notably, the security tag is not overly visible to a person trying on the shoe. In this regard, it should be appreciated that the security tag is attached to the rear of the shoe and therefore does not obscure a front or side view of the shoe.
Referring now to FIG. 1, a schematic diagram of an exemplary system 100 that may be used to understand the present invention is provided. System 100 includes a retail store facility 150 that includes EAS 130. EAS 130 includes a monitoring system 134 and at least one security tag 132. Although not shown in FIG. 1, security tag 132 is attached to article 102, thereby protecting article 102 from unauthorized removal from retail store facility 150. A schematic illustration of a security tag 132 attached to an article 102 is provided in fig. 2. As shown in fig. 2, the article can include, but is not limited to, an article of footwear. The monitoring system 134 establishes a monitoring zone (not shown) within which the presence of the security tag 132 can be detected. The monitoring area is established at an access point (not shown) of the retail store facility 150. If security tag 132 is carried into a surveillance zone, an alarm is triggered to indicate that item 102 may be tampered with for removal from retail store facility 150.
At retail time, a customer (not shown) may want to purchase the item 102. A customer can purchase an item 102 using a point of sale ("POS") station 104. The POS stations 104 can include, but are not limited to, conventional fixed point of sale ("POS") stations (e.g., check-out counters) or mobile POS stations. In either case, the retail transaction application executing on the computing device 108 of the POS station 104 may facilitate the exchange of data between the item 102, the security tag 132, the customer, store associate (not shown), and/or the retail transaction system ("RTS") 118 of the enterprise facility 152. For example, after a retail transaction application is initiated, store personnel are prompted to begin a retail transaction process for purchasing the item 102. The retail transaction process can begin simply by performing a user-software interaction, such as pressing a key on a keyboard of the computing device 108 or tapping a button on a touch display screen of the computing device 108.
Subsequently, store personnel may manually enter retail transaction requisition item information. Alternatively or in addition, store personnel may also place the handheld device 106 of the POS station 104 in proximity to the item 102. As a result of this placement, the POS station 104 obtains item information from the item 102. The item information includes any information that may be used to purchase the item 102, such as an item identifier and an item purchase price. In some cases, the item information may even include an identifier of the security tag 132 attached to the item. Item information can be transmitted from the item 102 to the hand-held device of the POS station 104 via short-range communication or near field communication ("NFC"), such as bar code communication.
In the case of a bar code, the item 102 has a bar code 128 attached to its exposed surface. As used herein, the term "barcode" refers to a graphic or symbol that contains embedded data. The barcode may include, for example, a one-dimensional barcode, a two-dimensional barcode (e.g., a matrix code, a quick response ("QR") code, an Aztec code, etc.), or a three-dimensional barcode. The embedded data can include, but is not limited to, a unique identifier of the item 102 and/or a purchase price of the item 102. The barcode 128 is read by a barcode scanner/reader (not shown in fig. 1) of the POS station 104. Bar code scanners/readers are well known in the art. Any known or to be known bar code scanner/reader can be used herein without limitation.
In the case of NFC, the item 102 may contain an NFC-enabled device 110. NFC-enabled device 110 can be separate from security tag 132 or contain security tag 132. NFC communications occur between NFC-enabled device 110 and handheld device 106 over a relatively small distance (e.g., N centimeters or N inches, where N is an integer, e.g., 12). NFC communication may be established by bringing the item 102 and handheld device 106 into contact or bringing them into close proximity so that inductive coupling occurs between their inductive circuits. In some cases, NFC operates at 13.56MHz and at a rate of 106-. NFC may be implemented using an NFC transceiver configured to allow contactless communication at 13.56 MHz. NFC transceivers are well known in the art and therefore will not be described in detail herein. Any known or to be known NFC transceiver can be used here without limitation.
After the item information is obtained at the POS station 104, the payment information is entered into a retail transaction application at the POS station 104. The payment information can include, but is not limited to, a customer loyalty code, payment card information, and/or payment account information. Payment information can be manually entered via an electronic card reader (e.g., a magnetic stripe card reader) or via a bar code reader. Electronic card readers and bar code readers are well known in the art and therefore will not be described further herein. Any known or to be known electronic card reader and/or bar code reader can be used herein without limitation. Alternatively or in addition, payment information can be obtained from a remote data store based on a customer identifier or an account identifier. In this case, the payment information can be retrieved from stored data associated with the previous sale of the item to the customer.
Upon obtaining the payment information, the POS station 104 automatically performs operations for establishing a retail transaction session with the RTS 118. The retail transaction session can include: transmitting the item information and payment information from the POS station 104 to the RTS118 via the public network 107 (e.g., the internet); the purchase transaction is completed by the RTS 118; and a response message is transmitted by the RTS118 to the POS station 104 indicating whether the purchase of the item 102 was successful or unsuccessful. The purchase transaction can involve the use of an authorized payment system, such as an automated Clearing House ("ACH") payment system of a bank, a credit/debit card authorization system, or a third party system (e.g.,SolidTrustor Google)。
Notably, the communication between the POS station 104 and the computing device 108 of the RTS118 can be a secure communication employing encryption techniques. In this case, the key can also be transmitted by the POS station 104 to the RTS118, or vice versa. The key can be a single-purpose key. Any type of encryption technique can be used herein without limitation.
The purchase transaction can be completed by the RTS118 using the item information and payment information. In this regard, such information may be received by the computing device 108 of the RTS118 and forwarded by it to a subsystem of the private network 111 (e.g., an intranet). For example, item information and purchase information can likewise be forwarded to and processed by the purchasing subsystem 112 to complete a purchase transaction. When the purchase transaction is completed, a message indicating whether the item 102 has been purchased successfully or unsuccessfully is generated and sent to the POS station 104.
If the item 102 has been purchased successfully, a security tag detachment process can be initiated. During the security tag detachment process, the security tag detacher 109 of the POS station 104 is used to cause the detachment mechanism of the security tag 132 to be activated. Once the security tag 132 has been disengaged from the item 102, the customer is able to carry the item 102 through the monitoring area without triggering an alarm.
Referring now to FIG. 2, a schematic illustration of a security tag 132 attached to an article 102 is provided. As mentioned above, the article 102 can include, but is not limited to, a high-heeled shoe. As such, security tag 132 will be described below with respect to a high-heeled shoe. However, the present invention is not limited thereto. The security tag can be used with other types of articles that have an adjacent portion that includes (1) a sidewall to which the jacket can be attached and (2) a projection onto which the fastening member can be wrapped. The fastening component can be formed from an elongated flexible material. As such, the fastening component can include, but is not limited to, a strap, cable, rope, or lanyard.
As shown in FIG. 2, the security tag 132 is generally designed to removably couple to the shoe's heel counter 202 (i.e., the vertical portion of the shoe that wraps around the back of the foot) without applying excessive pressure or compression to the shoe. In this regard, the security tag 132 includes an engagement member 210 (e.g., a collet) designed to slidingly receive the heel counter 202 of the shoe so as to couple the security tag 132 thereto. The engagement member 210 will be described in more detail below. Further, it should also be understood that the engaging member 210 is configured such that its central axis (e.g., central axis 700 of fig. 7) is aligned or substantially aligned with the central axis of the counter 202 (not shown in fig. 2) and/or the vertical seam (not shown in fig. 2) of the counter 202. Engagement member 210 is also configured to have a portion shaped to mate or match the outer contour of counter 202 so as to minimize or eliminate any potential damage to the shoe caused by security tag 132 and ensure that alignment between security tag 132 and counter 202 is maintained. The engagement member 210 is also configured to have a portion shaped to allow a person to comfortably try on the shoe's shoehorn without being bothered or bothered by the security tag 132. Shoehorns are well known in the art and therefore will not be described herein.
In some cases, the security tag 132 is designed to eject ink when its sensor (not shown) detects an attempt to break the engagement member 210 and/or detects that the engagement member 210 has been broken. Various audible (e.g., alarm), visual (e.g., light), and/or tactile (e.g., vibration) indicators can also be output by the security tag 132 when an unauthorized attempt is made to remove the security tag from an item or from a particular geographic location. In addition, a disposable cloth sleeve can be provided for removable deployment over the engagement section 210 to enhance the cleanliness of the security tag when used to protect items accessible to the public.
As shown in FIG. 2, the security tag 132 also includes a fastening component 212 wrapped around the heel 204 of the shoe. The fastening component 212 can include, but is not limited to, an adjustable strap, an adjustable cable, an adjustable rope, or an adjustable lanyard. In some cases, the portion of the fastening member that wraps around the protrusions of the article comprises a soft fabric (e.g., felt) to ensure that the protrusions are not damaged by frictional contact therebetween. Such a soft fabric may surround or exclusively define a portion of the fastening component.
The tightening member 212 is locked in its wound position (as shown in fig. 2) via a locking mechanism 214. The locking mechanism 214 will be described in detail below. Further, it should also be understood that the locking mechanism 214 can include, but is not limited to, a roll-up type locking mechanism, a clamp type locking mechanism, a latch type locking mechanism, a pin gear (pin gear) type locking mechanism, a tack-anchor type locking mechanism, or other fastener based locking mechanisms. The locking mechanism 214 can be unlocked via mechanical or magnetic means. Notably, this fastening architecture of the security tag 132 may ensure that any potential damage to the shoe by the security tag 132 is minimized or eliminated. In this regard, it should be emphasized that the fastening components 212 do not require excessive tightening to secure the security tag 132 to a shoe having a heel of appropriate height (e.g., > 1 inch). As such, the fastening components 212 are unlikely or likely to cause frictional damage to the shoe.
Although not shown in FIG. 3, the locking mechanism 214 and securing member 212 can alternatively be coupled to the remainder of the security tag via a hinged hinge. In this case, the locking mechanism 214 can be pulled toward the article 102 by the fastening component 212 until an abutting arrangement (abuttingterrangement) is established between the article 102 and the locking mechanism 214. The abutting arrangement also facilitates preventing unauthorized removal of the security tag 132 from the article 102 by simple rotation and/or lateral movement of the security tag.
As is apparent from fig. 2, the security tag 132 is not overly invisible. In this regard, it should be appreciated that the security tag 132 is attached to the rear of the shoe and therefore does not obscure a front or side view of the shoe. In addition, the security tag 132 can be at least partially formed of a transparent material (e.g., a clear plastic) in order to further minimize any obstruction of the shoe appearance by the security tag. Embodiments of the invention are not limited in this regard. Alternatively, the security tag 132 can be formed from an opaque material (e.g., an opaque plastic).
The security tag 132 will now be described in more detail with respect to fig. 3-8. Security tag 132 is shown in fig. 3-8 as being formed of a transparent material. As described above, the present invention is not limited thereto. FIG. 3 is a right rear perspective view of security tag 132. A right side view of security tag 132 is provided in fig. 4. A left side view of security tag 132 is provided in fig. 5. A rear view of security tag 132 is provided in fig. 6. A front view of security tag 132 is provided in fig. 7. An assembled view of security tag 132 is provided in fig. 8.
As shown in fig. 3-8, the security tag 132 includes a housing 302 within which at least a portion of the locking mechanism 214 is housed. The housing 302 can be formed from any suitable material (e.g., plastic). The material forming the housing 302 may be transparent or opaque. However, there are many advantages to using a transparent material for the housing 302. For example, a transparent material is advantageous to minimize any obstruction of the appearance of the article by the security tag 132.
The outer shell 302 is generally configured to closely align with the contours of the rear or counter 202 of the shoe. As such, the outer shell 302 includes a central body 304 formed of a rigid or semi-rigid material and configured for alignment with vertical seams (not shown) of the counter 202. In this regard, the central body 304 is sized and shaped to have an overall height 310 approximately equal to the overall height of the vertical seam of the counter 202. At least the front surface 312 of the central body 304 is relatively smooth and contoured to follow the curvature of the vertical joint. In this regard, the front surface 312 has a generally smooth concave profile. As such, when the front surface 312 contacts the counter 202 during use of the security tag 132, no damage is caused to the shoe. In some cases, at least one component (e.g., a rubber component) is disposed on the front surface 312 to help prevent rotational and/or linear movement of the housing 302 relative to the shoe.
In some cases, EAS label 808 is also disposed within central body 304 of housing 302 or affixed to an exposed surface of central body 304. EAS tags are well known in the art and therefore will not be described herein. Any known or to-be-known security label can be used herein without limitation. In addition, it should also be appreciated that security labels provide utilityIn a manner that is detected when the item is being removed from the particular area by an unauthorized person or in an unauthorized manner (e.g., not purchased). As such, the security label includes a sensor operable with EAS technology. Such sensors can include, but are not limited to, NFC sensors and/or RFID sensors. In some cases, the security label is configured to provide an audible, visual, and/or tactile alert as it passes through the surveillance zone of the EAS system. An exemplary security label that can be used herein is a security label consisting ofEAS manufactured by electronic corporationA narrow label sensor.
The engagement member 210 is attached or coupled to the housing 302 at or near the top 314 of the central body 304 of the housing. In this regard, the engagement member 210 includes a curved portion 318 configured to couple the extension 316 to the housing 302. In some cases, the bend 318 has a generally U-shape or C-shape. In addition, the extension 316 is affixed to or integrally formed with the curved top 318 of the splice component 210. The extension 316 extends along and is aligned with at least a portion of the front surface 312 of the central body 304. As such, the extension 316 is in a taut arrangement with the front surface 312 such that at least a portion of the article can be held or clamped therebetween (e.g., as shown in fig. 2). In some cases, the extension 316: (a) has a length 402 less than the length of the vertical seam of the counter 202; and (b) contouring to follow the curvature of the interior surface of the shoe's heel counter 202. Thus, when the security tag 132 is in use, the interior of the shoe is not damaged by the extension 316.
In some cases, the extension 316 of the engagement member 210 includes one or more segments that are substantially similar or identical in size and shape to a shoehorn. In this regard, each section of the extension 316 contains a smoothly curved implement that can be inserted at the heel of the foot to assist a person in putting on the shoe. The extension 316 can be formed from any suitable rigid, semi-rigid, or flexible material (e.g., material or metal). In some cases, a soft material for enhancing the comfort of the person trying on the shoe is disposed on the extension 316. Additionally or alternatively, a disposable cloth cuff can be provided for removable deployment over the engaging portion 210 to enhance the comfort of the person trying to wear the shoe, as well as to enhance the cleanliness of the security tag when used to protect items accessible to the public.
As shown in fig. 3-8, the security tag 132 also includes flanges 306, 502 coupled to and projecting away from respective sides of the central body 304 of the housing. The flanges 306, 502 are generally provided to maintain the position of the security tag 132 relative to the shoe to which the security tag 132 is attached. In some cases, the flanges 306, 502 are integrally formed with the central body 304 of the outer housing. In other cases, the flanges 306, 502 are coupled to the central body 304 of the housing via a snap type coupler (snap type coupler) or other releasable type coupler. This releasable flange configuration allows for interchangeable different sized flanges for security, thereby expanding the number of items to which the security tag can be attached.
The flanges 306, 502 can be formed of a semi-rigid material or a flexible material (e.g., plastic or rubber). The flanges 306, 502 are contoured to follow the shape of the respective portions of the shoe (e.g., as shown in fig. 2), and may extend slightly outward relative to one another (i.e., may extend in directions away from one another). In this regard, when the security tag 132 is attached to a shoe, the flanges 306, 502 are symmetrically arranged with respect to each other and bent toward each other so as to closely align with the contour of the shoe's heel counter 202. Such a flange configuration may ensure that the flange does not damage the shoe when the security tag 132 is attached to the shoe. A soft fabric (e.g., felt) may be provided over a portion of the surface of the flange to further ensure that the flange does not damage the shoe when the security tag 132 is attached to the shoe.
The flanges 306, 502 are sized and shaped to extend at least partially around the intersection of the heel 204 and the upper shoe body 218, as shown in fig. 2. This arrangement ensures that the security tag 132 cannot be removed from the shoe simply by rotating the security tag 132. At least one component (e.g., a rubber component) can be provided on the surface of each flange to further help prevent such rotational and/or linear movement of the security tag 132 relative to the shoe.
The distal end 320 of each flange 306, 502 includes an eyelet 322 sized to be passed therethrough by the fastening member 212. In some cases, the distal portion 320 of each flange is bent outward and away from the security tag to minimize the amount of contact between the fastening component 212 and the article 102. The threading of the fastening components 212 through the eyelets 322 may provide greater stability when the security tag 132 is attached to a shoe, such that the security tag 132 is less likely to be manipulated and removed from the shoe without unlocking the locking mechanism 214. Embodiments of the invention are not limited to this eyelet 322 configuration. For example, each flange 306, 502 can alternatively or additionally be designed as an elongated channel having a bottom edge sized therethrough or therealong for receiving the fastening component 212.
The flanges 306, 502 can have any suitable configuration. Thus, the overall shape of the flanges 306, 502 can vary from that shown in the figures. In the illustrated embodiment, the flanges 306, 502 are configured such that the overall profile of the security tag 132 is approximately triangular, with the widest portion 324 of the flanges 306, 502 being adjacent to the intersection of the heel 204 and the upper shoe body 218, as shown in FIG. 2. In practice, it is desirable that the security tag 132 be constructed so as to be as visually unobtrusive as possible to any bystanders. The approximately triangular shape of the security tag 132 advantageously provides the necessary structure for securing the security tag 132 in place while at the same time minimizing the area of the shoe that is hidden from view by the security tag 132.
As described above, the fastening component 212 can include, but is not limited to, a strap, cable, rope, or lanyard having a length sufficient to wrap around at least a portion of an article (e.g., the heel 204 of a shoe) one or more times. In some cases, the fastening member 212 has a first end 504 fixedly secured to the housing 302 and a second end 326 removable from the housing. In other cases, the first and/or second ends 326 can be removed from or retracted into the housing 302. Such a first/second end configuration allows the fastening component 212 to be wrapped around the heel 204 and tightened so as to secure the security tag 132 to the shoe.
Once the fastening component 212 is wrapped around the heel 204 and tightened, it can be locked in place by the locking mechanism 214. The locking mechanism 214 can include, but is not limited to, a roll-up type locking mechanism (as shown in fig. 2-8), a clamp type locking mechanism, a latch type locking mechanism, a cam type locking mechanism, a pin/pushpin type locking mechanism, and/or a roller-gear type locking mechanism located at least partially inside the housing 302 and/or at least partially outside the housing 302. Examples of these various types of locking mechanisms that can be used with the present invention are described in U.S. patent No.8,031,073 and U.S. patent No.5,022,244.
An exemplary architecture for a roll-up type locking mechanism is described below with respect to fig. 8-10. Further, it should also be understood that in at least some instances of roll-locking, the fastening component 212 (e.g., a cable) passes through the roll-locking mechanism. The two ends of the tightening member 212 are secured within the locking mechanism to provide a closed loop having an adjustable diameter. Rotating the button (e.g., actuator 328 of fig. 3) allows for manual adjustment of the size of the closed loop, which becomes smaller in one rotational direction of the handle and larger in the opposite rotational direction of the handle. The roll-up locking mechanism can include, but is not limited to, the roll-up locking mechanisms disclosed in U.S. patent No.7,918,112, U.S. patent No.8,081,075, U.S. patent No.8,087,269, U.S. patent No.8,106,772, and/or U.S. patent No.8,122,744. The entire disclosures of these listed patents are incorporated herein by reference. An exemplary architecture for a roll-up type locking mechanism is described in detail below with respect to fig. 8-10.
An exemplary architecture for a latch-type locking mechanism will be described below with respect to fig. 11. Further, it should also be understood that in at least some instances of the clamp and latch, at least one loose end of the securing member 212 is retained between a pair of plates (which may be disposed within or outside the housing 302) or between a plate and a sidewall of the housing 302. The flat plates may have a smooth joining surface or a rough joining surface. The roughened engagement surface can have teeth or projections formed thereon to provide a means for preventing the fastening member 212 from being slidingly removed from the clamp or latch. In this regard, the teeth/protrusions may increase the frictional engagement or provide a mating engagement between the jaws and the fastening member 212. Alternatively or additionally, the fastening member 212 is retained between the plate and the tack post. In this case, the plate, post and/or securing member 212 may have a series of teeth or projections formed on at least one end thereof to provide a means for preventing the securing member 212 from being slidingly removed from the clamp or latch.
In the case of a pin/drawing pin and roller pin gear, the fastening member 212 has one or more holes formed through at least one end thereof for receiving the pin. The fastening member 212 is retained in place when the pin is inserted into at least one aperture formed in the fastening member 212. An actuator 328 may be provided for moving the pin/pin or rotating the roller gear longitudinally and/or laterally so that at least one pin/pin may be removably inserted into an aperture formed in the securing component 212. The actuator 328 may include, but is not limited to, a rotatable handle, a pull-out handle (knob), and/or a magnetic actuator. If the actuator 328 is a magnetic actuator, the pin/tack of the locking mechanism 214 may engage and/or disengage the fastening component 212 via application of a magnetic field thereto.
An exemplary architecture for various types of locking mechanisms that can be used with the present invention will now be described in more detail. A schematic illustration of a roll-up type locking mechanism 800 is provided in fig. 8-10. A schematic illustration of an exemplary latch-type locking mechanism 1100 is provided in fig. 11. A schematic illustration of an exemplary magnetic cam-type locking mechanism 1200 is provided in fig. 12-13. Each of these different types of locking mechanisms will be discussed separately below.
Referring now to fig. 8-10, an exemplary roll-up locking mechanism 800 is generally configured to allow a securing component (e.g., securing component 212 of fig. 2-8) to remain within and release from a security tag (e.g., security tag 132 of fig. 2-8). Notably, the locking mechanism 214 is shown in fig. 2-8 as including a roll-up locking mechanism. The invention is not limited thereto. The locking mechanism 214 can be selected to include other types as appropriate for a particular application (e.g., those discussed below with respect to fig. 11-13).
As shown in fig. 8-10, the various members 806 and 816 of the locking mechanism 800 are at least partially disposed between a first housing cover (cover)802 and a second housing cover 804, the first housing cover (cover)802 and the second housing cover 804 being capable of being coupled together to form a housing (e.g., the housing 302 of fig. 3) of a security tag. The covers 802, 804 can be coupled together via mechanical methods and/or chemical methods. For example, when the locking mechanism 800 is fully assembled, the housing covers 802, 804 are ultrasonically welded together. The various components include a handle 806, resilient members 810, 814, a magnetic plunger 812, and a button assembly 816. In some cases, locking mechanism 800 also includes an EAS tag 808. In other cases, locking mechanism 800 is devoid of EAS tag 808. EAS tags are well known in the art and therefore will not be described herein. Further, it should also be understood that an EAS tag is generally configured to trigger an alarm when it is activated and enters an EAS monitoring zone.
A handle 806 is provided for allowing a user to rotate the gear 818. The gear 818 can be integrally formed with the handle 806 or attached to the handle 806 via a mechanical or chemical attachment method. Rotation of the gear 818 allows for manual adjustment of the length of the securing member 826 (e.g., cable) that passes through the locking mechanism 800. In this regard, it should be appreciated that both ends of the securing member 826 are secured within the locking mechanism 800 to provide a closed loop having an adjustable diameter. The handle 806 allows for manual adjustment of the size of the closed loop, which becomes smaller in one rotational direction and larger in the opposite rotational direction.
The button assembly 816 provides a means for retaining a closed loop having a desired diameter. In this regard, the button assembly 816 includes a button 820 disposed partially within the housings 802, 804 and partially outside the housings 802, 804. The button 820 may be depressed by a user of the locking mechanism 800 to transition the button 820 between the unengaged position shown in fig. 9 and the engaged position shown in fig. 10. When the button assembly 816 is in its unengaged position, the handle 806 is rotatable. Conversely, with the button assembly 816 in its engaged position, the handle 806 cannot be rotated. In this regard, it should be understood that the tooth 821 is provided on a portion 822 of the button 820. The tooth 821 is configured to engage with the tooth 824 of the gear 818 when the button 820 is pressed so as to be placed in its engaged position. Due to the engagement between teeth 821 and 824, handle 806 is prevented from being rotated by a user of locking mechanism 800.
Notably, when the button 820 is first placed in its engaged position, the post 828 of the magnetic plunger 812 drops into the fixed slot 830 of the button assembly 816, which prevents the teeth of the button assembly 816 from disengaging from the gear 818 until the magnetic plunger 812 moves away in the direction indicated by arrow 1002. The magnetic plunger 812 may be removed using an external magnetic detacher (not shown) to overcome the force exerted on the magnetic plunger 812 by the resilient member 810. The elastic member 810 can include, but is not limited to, a spring.
A resilient member 814 is provided to facilitate release of the button assembly 816 such that the tooth 821 of the button assembly 816 disengages from the tooth 824 of the gear 818, thereby allowing the handle 806 to be rotated. When a magnetic field is applied to the magnetic plunger 812, the button assembly 816 is released, whereby the resilient member 814 urges the button 820 out and away from the housings 802, 804, i.e., in the direction indicated by arrow 1004.
Referring now to FIG. 11, an exemplary latch-type locking mechanism 1100 includes a magnetically actuated latch 1104. In this regard, the latch 1104 is at least partially formed of a magnetic material. The magnetic material can include, but is not limited to, iron, nickel, cobalt, iron alloys, nickel alloys, and/or cobalt alloys.
The latch 1104 is configured to engage with a fastening member 1102 (e.g., a strap) to lock the fastening member 1102 in place. Such locking is accomplished, at least in part, by moving the latch 1104 toward the fastening member 1102 disposed within a channel 1116 formed in a housing 1114 of a security tag (e.g., the security tag 132 of fig. 1-8). In other words, the body 1108 of the latch 1104 moves in the direction of arrow 1118 until it engages the securing member 1102 and clamps the securing member 1102 between itself and the side wall 1112 of the housing 1114. Notably, the engagement surface 1110 of the latch 1104 and the engagement surface 1120 of the fastening member 1102 have mating teeth or projections formed thereon. The teeth or protrusions can be angled relative to the insertion direction of the fastening member 1102. These angled teeth or protrusions facilitate the securing of the fastening member 1102 within the security tag in a manner that prevents the fastening member 1102 from being removed from the housing 1114 without unlocking the latch 1104, thereby inhibiting attempts to forcibly withdraw the fastening member 1102 from the locking mechanism 1100. It is noted that the present invention is not limited to the mating tooth/protrusion configuration of the engagement surfaces 1110, 1120. Additionally or alternatively, the engagement surfaces 1110, 1120 can have ribs (ribs) and/or mating apertures and protrusions.
The latch body 1108 is biased into its latched position via the resilient element 1106. The resilient element 1106 may have any shape suitable for a particular application. For example, the elastic element 1106 can have a generally rectangular parallelepiped, ellipsoid or coil shape. In some cases, the resilient member 1106 is cantilevered (e.g., a leaf spring). The resilient member 1106 can be formed of a flexible material. The flexible material can include, but is not limited to, lightweight, porous, semi-rigid, resilient, gaseous, and/or spongy materials that can provide a resistance when compressed and can partially or fully recover its uncompressed shape when the compression force is removed.
The latch 1104 is unlocked using a disengagement device (not shown in fig. 12), such as that disclosed in U.S. patent No.8,031,073 (which is incorporated herein by reference in its entirety). In some cases, the disengagement device includes at least one magnet for creating a magnetic field having a strength sufficient to move the latch body 1108 in a direction opposite to that shown by arrow 1118. In this regard, the magnet is selected to provide sufficient magnetic force to overcome the biasing force of the resilient member 1106. When the latch body 1108 is moved in this manner, the latch 1104 is unlatched so that the securing member 1202 can be at least partially withdrawn from within the housing 1114.
An exemplary magnetic cam-type locking mechanism 1200 will now be discussed with respect to fig. 12-13. The locking mechanism 1200 is configured to secure a fastening member 1202 (e.g., a cable) in its locked position as shown in fig. 12. In this regard, the locking mechanism 1200 includes a housing 1204 within which its various components are disposed. The housing 1204 may be integrally formed with a housing of a security tag (e.g., the security tag 132 of fig. 1-8) or attached to the security tag housing via mechanical and/or chemical attachment methods (e.g., screws, welding, and/or adhesives).
The locking mechanism 1200 includes an eccentric cam 1206 rotatably mounted on a pivot member 1208. In the locked position, the securing member 1202 is compressed between the flange 1250 of the cam 1206 and the retaining member 1210. Flange 1250 is shown in fig. 12-13 as extending only partially around cam 1206. Embodiments of the invention are not limited in this regard. The cam 1206 has a ridge (or protrusion) 1212 formed on an engagement surface 1214 thereof. The ridge 1212 contacts the fastening member 1202 when in the locked position to securely fasten the member 1202 to grip the fastening member 1202, thereby providing a means for containing an attempt to forcibly withdraw the fastening member 1202 from within the locking mechanism 1200. Ridge 1212 also guides the cable inward (i.e., in the opposite direction indicated by arrow 1260) into locking mechanism 1200 when inserted into a security tag (e.g., security tag 132 of fig. 1-8). In the alternative, the cam 1206 does not have a ridge. As such, the contact between the securing component 1202 and the cam 1206 is a frictional contact sufficient to cause the cam to rotate when the securing component is pulled in the direction indicated by arrow 1260.
The locking mechanism 1200 also includes a latch assembly 1216 for locking the securing member and cam in their fully engaged positions. The latch assembly 1216 includes a magnetic element 1218 contained within a housing 1220. The housing 1220 is movable in opposite directions as indicated by arrows 1222 and 1302 to enable the latch assembly 1216 to be transitioned between a latched position (shown in fig. 12) and an unlatched position (shown in fig. 13). The latch assembly 1216 is transitioned between its locked and unlocked positions via the resilient member 1224. The resilient member 1224 can include, but is not limited to, a spring formed of any material having a resiliency selected according to a particular application. When a magnetic field is applied to the latch assembly 1216, the latch assembly 1216 transitions from its locked position to its unlocked position. When a magnetic field is applied to the locking mechanism 1200, the magnetic element 1218 overcomes the biasing force of the resilient member 1224 to move the latch assembly 1216 in the direction indicated by arrow 1302. Thus, the resilient member 1224 is in a compressed state when the latch assembly 1216 is biased in the locked position and is in an uncompressed state when the latch assembly 1216 is in the unlocked position.
Locking element 1228 is attached to cam 1206 so as to extend radially outwardly therefrom. Locking element 1228 is positioned between two detents 1230, 1232 extending outwardly from housing 1220. The detents 1230, 1232 can be integrally formed with the housing 1220 or attached to the housing via a mechanical or chemical coupling method (e.g., welding or adhesive). During the locking process (i.e., when no magnetic field is applied to locking mechanism 1200), stops 1230, 1232 contact and apply a force to locking element 1228 to rotate cam 1206 in the direction indicated by arrow 1234.
Stop 1232 has an angled engagement surface 1236 for engagement with locking element 1228. When cam 1206 is in its locked position, engagement surface 1236 is angled approximately parallel to surface 1238 of locking member 1228, as shown in fig. 12. The angled engagement surface 1236 serves to retain the cam 1206 in a locked position in which the ridge 1212 compresses the securing member 1202 between the cam 1206 and the retention member 1210. When locking mechanism 1200 is in the locked position, gap 1240 exists between surfaces 1236, 1238. Gap 1240 allows locking element 1228 to rotate a particular distance before locking element 1228 contacts surface 1236 of stop 1232.
As the securing member 1202 (e.g., cable) is advanced further into the locking mechanism 1200, the cam 1206 is rotated slightly until the locking element 1228 contacts the stop 1232. This action causes the ridge 1212 to pull the fastening components 1202 inward. If the securing member 1202 is pulled outward, the ridge 1212 acts on the securing member 1202 to rotate the cam 1206 in the opposite direction. In this case, rotation of locking element 1228 is prevented by contact with fastening member 1202, and fastening member 1202 is once again compressed between cam 1206 and retention member 1210. This arrangement advantageously allows for further insertion of the securing component 1202 (e.g., cable) to tighten the slack of the securing component 1202 (e.g., cable) while the apparatus is locked and while preventing withdrawal of the securing component 1202.
The locking mechanism 1200 is unlocked using a disengagement device (not shown in fig. 12-13). The disengagement apparatus includes a magnet for moving the latch assembly 1216 in the direction indicated by arrow 1302 until the stop 1230 rotates the cam 1206 to a position that allows withdrawal of the securing member 1202. A schematic illustration of the locking mechanism 1200 in its unlocked position is provided in fig. 13.
The present invention is not limited to the architecture of the locking mechanism 1200 shown in fig. 12-13. The locking mechanism 1200 can have any suitable design selected according to the particular application. Thus, the locking mechanism 1200 can alternatively comprise a magnetically actuated ball clutch locking arrangement.
Referring now to FIG. 14, a flow diagram of an exemplary method 1400 for operating a security tag of an EAS system is provided. The method 1400 begins at step 1402 and proceeds to step 1404. Step 1404 includes attaching a collet to a curved sidewall of an article (e.g., a heel counter of a high-heeled shoe) such that a central body of the security tag is vertically aligned with a central axis of the curved sidewall. The vertical alignment is maintained by positioning the first and second flanges of the security tag against respective opposing surface areas of the curved sidewall, as shown in step 1406. The first and second flanges extend from respective sides of the central body so as to be symmetrical to each other and are shaped to closely align with the outer contours of respective surface areas of the curved side walls. The fastening component of the security tag is then wrapped around an elongated structure (e.g., a heel) of the article in step 1408. The elongated structure is offset from the curved sidewall in at least one direction and projects from the body of the article. The fastening member is formed of an elongated flexible material. The fastening component is then locked in place around the elongated structure of the article using the mechanical locking mechanism of the security tag, as shown in step 1410. Once the security tag is secured to the article, the security tag can facilitate detection of the article within the surveillance zone of the EAS system, as shown in step 1412. Later, step 1414, in which the mechanical locking mechanism is unlocked by applying a magnetic field thereto, is performed. In a next step 1416, the method 1400 ends.
All of the apparatus, methods, and algorithms disclosed and claimed herein are capable of being derived and executed without undue experimentation in light of the present disclosure. While the invention has been described in terms of preferred embodiments, it will be apparent to those of skill in the art that variations may be applied to the apparatus, methods and in the sequence of steps of the method described herein without departing from the concept, spirit and scope of the invention. More particularly, it will be apparent that certain elements may be added to, combined with, or substituted for the elements described herein while the same or similar results would be achieved. All such similar substitutes and modifications apparent to those skilled in the art are deemed to be within the spirit, scope and concept of the invention as defined.

Claims (20)

1. A method for operating a security tag of an electronic article surveillance system, characterized in that the method comprises:
attaching a collet to a curved sidewall of an article such that a central body of the security tag is vertically aligned with a central axis of the curved sidewall;
maintaining the vertical alignment by positioning first and second flanges of the security tag against respective opposing surface regions of the curved sidewall, the first and second flanges extending away from respective sides of the central body so as to be symmetrical to each other and shaped to closely align with an outer contour of the respective surface regions of the curved sidewall;
wrapping a fastening component of the security tag around an elongate structure of the article, the elongate structure of the article being offset from the curved sidewall in at least one direction and projecting away from the body of the article, the fastening component being formed from an elongate member of flexible material; and
locking the fastening component in a position wrapped around the elongate structure of the article using a mechanical locking mechanism of the security tag.
2. The method of claim 1, wherein the article comprises a shoe, the curved sidewall defines a heel of the shoe, and the elongated structure comprises a heel of the shoe.
3. The method of claim 1, further comprising providing a shoehorn at least partially defining the jacket attaching the security tag to the article.
4. The method of claim 1, further comprising unlocking the mechanical locking mechanism by applying a magnetic field to the mechanical locking mechanism.
5. The method of claim 1, wherein the security tag is formed at least in part from a transparent material.
6. The method of claim 1, further comprising detecting when the item to which the security tag is attached enters a monitoring zone of the electronic article monitoring system.
7. A security tag for use in an electronic article surveillance system, the security tag comprising:
a central body;
a collet coupled with the central body and configured to attach to a curved sidewall of an article such that the central body is vertically aligned with a central vertical axis of the curved sidewall;
first and second flanges configured to maintain the vertical alignment when positioned against respective opposing surface regions of the curved sidewall, the first and second flanges extending away from respective sides of the central body so as to be symmetrical to each other and shaped to closely align with an outer profile of the respective surface regions of the curved sidewall;
a fastening component formed from an elongate member of flexible material, the fastening component being coupled with the first and second flanges such that the fastening component can be wrapped around an elongate structure of the article, the elongate structure of the article being offset from the curved side wall and projecting away from the body of the article in at least one direction; and
a mechanical locking mechanism configured to lock the fastening component in a position wrapped around the elongate structure of the article.
8. The security tag according to claim 7, wherein the article comprises a high-heeled shoe, the curved sidewall defines a heel of the shoe, and the elongated structure comprises a heel of the shoe.
9. The security tag according to claim 8, wherein the central body has an overall height approximately equal to an overall height of the vertical seam of the back part.
10. The security tag according to claim 8, wherein the central body includes a concave surface contoured to follow the curvature of the vertical seam.
11. The security tag according to claim 7, wherein at least a portion of the jacket comprises a shoehorn.
12. The security tag according to claim 7, wherein the collet includes a bend coupled to a first end of the central body opposite a second end of the security tag, wherein the fastening component is coupled with the second end of the security tag.
13. The security tag according to claim 12, wherein the collet further comprises an extension coupled with and extending from the bend so as to be adjacent and parallel to an outer surface of the central body.
14. The security tag according to claim 13, wherein the extension is in a taut arrangement with the outer surface of the central body such that the side wall of the article can be gripped therebetween.
15. The security tag according to claim 7, wherein the first and second flanges are integrally formed with the central body.
16. The security tag according to claim 7, wherein the first and second flanges are sized and shaped to extend at least partially around an intersection of the elongate structure and a sidewall of the article.
17. The security tag according to claim 7, further comprising at least one eyelet formed in each of the first and second flanges, the fastening member passing through the eyelet.
18. The security tag according to claim 7, wherein the mechanical locking mechanism is configured to be unlocked by applying a magnetic field thereto.
19. The security tag according to claim 7, wherein the security tag is at least partially formed of a transparent material.
20. The security tag of claim 7, further comprising a security label configured to cause an alarm to be activated when the item to which the security tag is attached enters a monitoring zone of the electronic item monitoring system.
HK16106682.2A 2013-08-21 2014-03-19 Security tag for application to footwear HK1218801B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261691535P 2012-08-21 2012-08-21
US13/972,148 US9070265B2 (en) 2012-08-21 2013-08-21 Security tag for application to footwear
US13/972,148 2013-08-21
PCT/US2014/031170 WO2015026396A1 (en) 2012-08-21 2014-03-19 Security tag for application to footwear

Publications (2)

Publication Number Publication Date
HK1218801A1 HK1218801A1 (en) 2017-03-10
HK1218801B true HK1218801B (en) 2019-07-05

Family

ID=

Similar Documents

Publication Publication Date Title
EP3036721B1 (en) Security tag for application to footwear
US9262900B2 (en) Security tag for application to footwear
US9336668B2 (en) Alarming pinless security tag
US8179267B2 (en) Pinless security device
CN107002428B (en) Security tag
US20170306657A1 (en) Seal for securing goods
EP2721235A1 (en) Multipurpose security device and associated methods
US10431062B1 (en) Systems and methods for automated security tag detachment
EP2344714B1 (en) Pinless security device
HK1218801B (en) Security tag for application to footwear
US20190284841A1 (en) Tag
CN114586080A (en) Self-detaching anti-theft device with multipurpose transceiver for energy harvesting and communication
JP2020526691A (en) Adjustable clamp product security device
US20210097833A1 (en) Internal power generating circuit for eas hard tags
EP4032073A1 (en) Self-detaching anti-theft device
HK1240993B (en) Security tag
HK1240993A1 (en) Security tag