09 - Scientific and electric apparatus and instruments
Goods & Services
RFID fixed readers, RFID mobile readers, electronic article surveillance (EAS) systems, Point of Sales (POS) systems, RFID electronics, radio frequency identification (RFID) tags and labels attached to retail merchandise to prevent theft in retail stores and to provide information for inventory management at retails stores, security tags.
A detection system for detecting EAS marker shielding material includes transceiver configured to generate an interrogation signal. The pedestal includes transmitter and receiver coils coupled to the transceiver. The transmitter coil generates an electromagnetic field across a detection region based on the interrogation signal. The receiver coil detects the electromagnetic field, which induces a reply signal in the receiver coil. The reply signal is sent to the transceiver. The reply signal changes in response to a disturbance of the electromagnetic field indicative of the presence of EAS marker shielding passing through the detection region.
Described are label and tag systems and methods that can provide more than one label or tag in the same assembly that are detachable or separable from each other for use and application to a single product. The labels and tags can be printed and/or encoded in the same process. The systems and methods can provide one or more (or all) of the following: at least two labels in the same assembly; a sewn-in label including a detachable adhesive label applicable to a product or secondary tag such as a hang tag; a pocket tag including a detachable adhesive label applicable to a product or secondary tag such as a hang tag; a tag including RFID technologies for asset tracking and EAS systems; and, a label including printed information associated with or linked to an RFID tag and able to register when an attached product is sold.
An EAS circuit is shown and described herein. The EAS circuit comprises a substrate with first and second electric conductive layers disposed on opposite sides of the substrate, one of the electric conductive layers comprising an inductive coil and a capacitor. The EAS circuit is configured to increase the magnetic flux through the center of the inductor coil and/or allow for providing an inductor coil with a larger coil area. The capacitor is located adjacent to the outer perimeter of the inductor coil. The capacitor may be foldable onto the first electric conductive layer or the second electric conductive layer to an area within the outer perimeter of the inductor coil.
Provided are loss prevention tracking systems and methods to identify and alert security-related threats or events. The systems and methods can identify and track potential offenders and provide real time alerts for potential future security threats. The systems and methods can determine and provide real time alerts for an attempted theft of an item with an active tag. The captured images and information can be used to monitor the reentrance of offenders to the store.
A RFID label is shown and described herein. The RFID label having a combined structure with an RFID component layer and an inductive component layer separated by and placed on opposite sides of a dielectric substrate. The RFID component layer including an antenna segment with an integrated circuit located along the antenna segment. A first and second capacitor assembly couples the RFID component layer to the inductive component layer. The combined structure is adhered to a spacer layer. The antenna segment radiates a plane wave when the combined structure is coupled to a ground plane.
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
An EAS pedestal system is shown and described herein. The pedestal system comprises a base and an EAS antenna frame removably connected to the base. The removable frame allows for the frame to be dissociated from the base to allow access to the electronic components housed in the base or to replace the frame portion.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Security devices, namely, magnetic locks comprising amplitude modulation technology; security devices, namely, magnetic locks comprising radio frequency technology
(2) Magnetic locks
09 - Scientific and electric apparatus and instruments
Goods & Services
Security devices, namely, magnetic locks comprising amplitude modulation technology; security devices, namely, magnetic locks comprising radio frequency technology.
09 - Scientific and electric apparatus and instruments
Goods & Services
Security devices, namely, magnetic locks comprising amplitude modulation technology; security devices, namely, magnetic locks comprising radio frequency technology
A security device is shown and described herein. The security device is configured to engage with an item such as a container to be securely fitted around the container. The security device includes an adjustable back plate with corner sections disposed at opposite ends. The corner sections are configured to fit around a corner of a container or item. The corner sections can swivel or rotate such that they may be used on items of different dimensions. The corner sections are also adjustable in height to accommodate containers of different thicknesses.
40 - Treatment of materials; recycling, air and water treatment,
Goods & Services
Printing services, digital printing services, custom printing of labels and tags for others, RFID encoding services, rental of RFID encoding machines and apparatus, rental of printing machines and apparatus.
Electronic article surveillance (EAS) labels and, more specifically, multiple layer stack EAS labels are described herein. An example EAS label includes a base. The base includes a planar capacitor defining a footprint on a first layer and a planar inductor on a second layer defining a central area where electromagnetic field flux passes through. The second layer is a different layer than the first layer. The planar capacitor and the planar inductor are connected between the first and layer and the second layer via a first set of stack terminals. Additionally, the footprint of the planar inductor is not within the central area.
A RFID label is shown and described herein. The RFID label having a combined structure with an RFID component layer and an inductive component layer separated by and placed on opposite sides of a dielectric substrate. The RFID component layer including an antenna segment with an integrated circuit located along the antenna segment. A first and second capacitor assembly couples the RFID component layer to the inductive component layer. The combined structure is adhered to a spacer layer. The antenna segment radiates a plane wave when the combined structure is coupled to a ground plane.
A EAS surveillance system is shown and described herein. The EAS surveillance system comprises a ferrite EAS antenna disposed adjacent a support surface of an area for surveillance. The EAS antenna is disposed in a substantially horizontal orientation relative to a ground surface. The EAS antenna can be surrounded or covered by a shroud to conceal the EAS antenna.
This disclosure relates to inline testing of RFID inlays. A test system includes a test interface without moving parts and a marking device. The test interface an array of antennas, a radio frequency identification (RFID) reader to interrogate RFID inlays to be tested; and a circuit configured to selectively connect the RFID reader to the antenna in the array of antenna. The test interface performs a primary scan of all of the RFID inlays to be tested and, when not all of the RFID inlays respond, a secondary scan to determine which of the RFID inlays failed to respond. The marking devices mark any of the identified RFID inlays that failed to respond.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
A RFID label is shown and described herein. The RFID label includes a RFID antenna configured to provide attenuation of unwanted signals at relatively high frequencies, e.g., above 2 GHz and in the range of about 2 to about 5 GHz. The RFID label comprises a dipole antenna having tuning elements that attenuate or reject signals at high frequencies such as, for example, those frequencies at which microwave ovens operate.
H01Q 5/307 - Individual or coupled radiating elements, each element being fed in an unspecified way
H01Q 21/06 - Arrays of individually energised antenna units similarly polarised and spaced apart
H01Q 5/50 - Feeding or matching arrangements for broad-band or multi-band operation
H01Q 9/28 - Conical, cylindrical, cage, strip, gauze or like elements having an extended radiating surface Elements comprising two conical surfaces having collinear axes and adjacent apices and fed by two-conductor transmission lines
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
An indicator device for detecting the presence of another device and alerting a user of the indicator device may comprise a housing, an electrical power source, a proximity sensor configured to detect the presence of the other device, and one or more indicator elements operable to alert the user of the indicator device where the proximity sensor is configured to operate the indicator element if the distance between the indicator device and the other device is below a predetermined value. The proximity sensor may be configured to operate the indicator element if the distance between the indicator device and the other device is within a predetermined distance.
An inventory monitoring system and process for monitoring inventory is shown and described herein. The system and process includes an RFID reader configured to collect or receive product code data, location data, and secondary metric data of inventory RFID tags relative to that of other RFID tags or markers for determining the location of the inventory from such data. From the information obtained from the RFID tags, the location of inventory in an environment can be determined.
An inventory monitoring system and process for monitoring inventory is shown and described herein. The system and process includes an RFID reader configured to collect or receive product code data, location data, and secondary metric data of inventory RFID tags relative to that of other RFID tags or markers for determining the location of the inventory from such data. From the information obtained from the RFID tags, the location of inventory in an environment can be determined.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
09 - Scientific and electric apparatus and instruments
Goods & Services
Electronic security and surveillance devices, namely, electronic security tags and labels, namely, labels with detachable stickers containing variable data for use in retail and inventory tracking.
09 - Scientific and electric apparatus and instruments
Goods & Services
Electronic security and surveillance devices, namely, electronic security tags and labels, namely, labels with detachable stickers containing variable data for use in retail and inventory tracking
25.
ANTI-THEFT AND TRACKING TAG AND METHODS OF MANUFACTURING SAME
A dual security tag including an RFID component and an electronic article surveillance (EAS) component, respectively disposed on opposite sides of a PET carrier substrate, is provided. The RFID component may include one or more ultra-high frequency antennae, such as a near field loop antenna and a far field dipole antenna, and an integrated circuit (IC) chip. The EAS component may be provided as an RF device, an acoustic-magnetic (AM) device, a low power Bluetooth (BLE) device, or other suitable device. The security tag may also include a facesheet affixed to the RFID component, a release liner layer affixed to the EAS device, and one or more intermediary films or protective layers. A method for manufacturing a dual security tag is also described.
This disclosure relates to a dual stage security tag. The dual stage security tag includes a ball clutch stage with a locked and an unlockable position. A pin can be removed from the dual stage security tag when the ball clutch stage is in the unlockable position. The dual stage security tag also includes a dial stage with a locked and unlocked position. In the locked position, the dial stage prevents the ball clutch stage from transitioning to the unlockable position. Thus, the pin cannot be removed from the dual stage security tag until the dial stage is in the unlocked position. Additionally, unlocking the dial stage requires information that is not available by a physical inspection of an intact dual stage security tag.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Electronic surveillance system, for use in inventory management and product tracking, comprised of overhead sensors and RF and RFID antennas, and software for use therewith
09 - Scientific and electric apparatus and instruments
Goods & Services
Electronic surveillance system, for use in inventory management and product tracking, comprised of overhead sensors and RF and RFID antennas, and software for use therewith.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Electronic surveillance system, for use in inventory management and product tracking, comprised of electronic overhead sensors for monitoring and tracking RF and RFID antennas, and downloadable software for use therewith Providing temporary use of non-downloadable cloud-based software for use with electronic surveillance systems used in inventory management and product tracking
The present invention relates to a security device for products that typically are sold on hangers in stores. Such products include, by way of example only and not to limit the scope of the invention, razors, razor blades, batteries, electronics and other high value items. These types of products are typically included in packaging, such as a clam-shell or thermoformed plastic packaging, cardboard containers or combinations of plastic and cardboard. The packaging typically will have a perforation near the top which allows the product in the package to be hung on a hanger type device that is attached to a display area such as in a pegboard/hanger arrangement. Unless there is some type of security mechanism attached to the packaging, these types of items can be easily taken and have historically been the subject of theft due to the relatively small size of the packages and high value of the items. The invention relates specifically to a security tray device comprising: a vertical wall (122) having a top end (122a), a bottom end (122b), a first side (122c) extending longitudinally between the top end and the bottom end, and a second side (122d) opposite the first side and extending longitudinally between the top end and the bottom end; a tray area (127) adjacent the bottom end and extending outward from the vertical wall; and a hanger aperture (125) adjacent to the top end.
A47F 5/00 - Show stands, hangers, or shelves characterised by their constructional features
A47F 5/08 - Show stands, hangers, or shelves characterised by their constructional features secured to the wall, ceiling, or the likeWall-bracket display devices
E05B 73/00 - Devices for locking portable objects against unauthorised removalLocking devices not provided for in other groups of this subclass
This disclosure relates to inline testing of RFID inlays. A test system includes a test interface without moving parts and a marking device. The test interface an array of antennas, a radio frequency identification (RFID) reader to interrogate RFID inlays to be tested; and a circuit configured to selectively connect the RFID reader to the antenna in the array of antenna. The test interface performs a primary scan of all of the RFID inlays to be tested and, when not all of the RFID inlays respond, a secondary scan to determine which of the RFID inlays failed to respond. The marking devices mark any of the identified RFID inlays that failed to respond.
G01R 31/28 - Testing of electronic circuits, e.g. by signal tracer
G06K 7/00 - Methods or arrangements for sensing record carriers
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 5/02 - Methods or arrangements for verifying the correctness of markings on a record carrierColumn-detection devices the verifying forming a part of the marking action
A security alarm management system and method includes a reader device, a person counter, and an alarm. The reader device reads security tags within a range of the reader. The person counter detects people passing through a point of entry. The person counter can determine a direction of travel of people passing through the point of entry. A white-list includes entries or product identifiers that will not trigger an alarm. The alarm is triggered if conditions associated with the reader device, person counter, and white-list are met.
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
45 - Legal and security services; personal services for individuals.
Goods & Services
Labeling machines; price marking machines; machines for printing labels and documents for product pricing, product weighing, and product inventory purposes. Computer software for retail merchandising and the technical production of informational materials, namely, computer software for pricing products; electronic security and surveillance systems comprising magnetic sensors, magnetic tags, and magnetic tag deactivators; electronic access control systems for securing corporate assets, namely, access control cards, access control card readers, computers for operating and controlling electronic access control systems, and computer programs for running electronic access control systems; closed circuit television systems for tracking assets comprising televisions, controllers, cameras, and computers and computer programs for operating and controlling closed circuit television systems; radio frequency identification and surveillance systems for monitoring the location and control of assets comprised of radio frequency readers, radio frequency tags, and computers and computer programs for operating radio frequency identification and surveillance systems; electronic security tags for attachment to consumer products in retail stores; electronic surveillance systems comprising electronic article surveillance antennas for monitoring assets; radio frequency identification and surveillance systems for monitoring assets, comprised of radio frequency readers and radio frequency identification tags; downloadable or recorded computer software to maintain and operate electronic surveillance systems for use in connection with the aforementioned goods; electronic security tags made primarily of plastic with and without alarming features to prevent theft of merchandise at retail stores; electronic protection equipment, namely, apparatus for detecting articles being removed and locating lost articles. Paper articles, cardboard articles, pens, stationery, printed or blank posters, printed or blank signs, printed sheets and printed patterns for hanging in sales premises for sales promotion purposes, used for the manual production of information on products within written retail promotion systems; Printed queue slips and printed queue slip holders for use in determining customer order within customer priority systems; hand-held printed label systems for labeling products comprised of printed labels not of textile, special inks used in the price markers to mark the labels, labeling machines, label dispensers, printing blocks, inking refills and inking rollers for sales promotion, advertising, and article surveillance in retail stores. Security services, namely, preventing the unauthorized removal of materials from restricted areas.
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Labeling machines; price marking machines; machines for printing labels and documents for product pricing, product weighing, and product inventory purposes
(2) Computer software for retail merchandising and the technical production of informational materials, namely, computer software for pricing products; electronic security and surveillance systems comprising magnetic sensors, magnetic tags, and magnetic tag deactivators; electronic access control systems for securing corporate assets, namely, access control cards, access control card readers, computers for operating and controlling electronic access control systems, and computer programs for running electronic access control systems; closed circuit television systems for tracking assets comprising televisions, controllers, cameras, and computers and computer programs for operating and controlling closed circuit television systems; radio frequency identification and surveillance systems for monitoring the location and control of assets comprised of radio frequency readers, radio frequency tags, and computers and computer programs for operating radio frequency identification and surveillance systems; electronic security tags for attachment to consumer products in retail stores; electronic surveillance systems comprising electronic article surveillance antennas for monitoring assets; radio frequency identification and surveillance systems for monitoring assets, comprised of radio frequency readers and radio frequency identification tags; downloadable or recorded computer software to maintain and operate electronic surveillance systems for use in connection with the aforementioned goods; electronic security tags made primarily of plastic with and without alarming features to prevent theft of merchandise at retail stores; electronic protection equipment, namely, apparatus for detecting articles being removed and locating lost articles
(3) Retail merchandising systems for use in providing information about products, namely, written retail promotion systems for use in the manual production of information on products, said systems comprised of paper articles and cardboard articles, namely, pens, stationery, printed or blank posters, printed or blank signs, printed sheets and printed patterns for hanging in sales premises for sales promotion purposes; customer priority systems for use in determining customer order, said systems comprised of printed queue slips, printed queue slip holders and display boards; hand-held printed label systems for labeling products comprised of printed labels not of textile, special inks used in the price markers to mark the labels, labeling machines, label dispensers, printing blocks, inking refills and inking rollers for sales promotion, advertising, and article surveillance in retail stores (1) Security services, namely, preventing the unauthorized removal of materials from restricted areas
38.
ANTI-THEFT AND TRACKING TAG AND METHODS OF MANUFACTURING SAME
A dual security tag including an RFID component and an electronic article surveillance (EAS) component, respectively disposed on opposite sides of a PET carrier substrate, is provided. The RFID component may include one or more ultra-high frequency antennae, such as a near field loop antenna and a far field dipole antenna, and an integrated circuit (IC) chip. The EAS component may be provided as an RF device, an acoustic-magnetic (AM) device, a low power Bluetooth (BLE) device, or other suitable device. The security tag may also include a facesheet affixed to the RFID component, a release liner layer affixed to the EAS device, and one or more intermediary films or protective layers. A method for manufacturing a dual security tag is also described.
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
An indicator device for detecting the presence of another device and alerting a user of the indicator device may comprise a housing, an electrical power source, a proximity sensor configured to detect the presence of the other device, and one or more indicator elements operable to alert the user of the indicator device where the proximity sensor is configured to operate the indicator element if the distance between the indicator device and the other device is below a predetermined value. The proximity sensor may be configured to operate the indicator element if the distance between the indicator device and the other device is within a predetermined distance.
Disclosed is a two-alarm security device that will alarm if the security device is forcibly removed from an article or item without detachment by a corresponding detachment device, and the security device will cause the pedestals in a store to alarm if the article or item is passed through the pedestals with the device still attached. The two-alarm security device comprises a slider operatively movable along a stop piece and a spring-biased engagement member that is operatively moveable into the housing of the stop piece. As the slider and engagement member move from an open position to a closed position, the security device alarm is actuated. A pressure pad attached to the engagement member assists in gently, but sufficiently securing an article between the slider and engagement member. If the article is improperly removed from the security device or otherwise tampered with, the spring-biased engagement member will cause a micro-switch to alarm.
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
Goods & Services
RFID readers, scanners, printers, and labels for use for inventory management in the retail grocery and food industries, and downloadable software for use therewith. Installation of RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries; maintenance and repair services for RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries. Non-downloadable software for use with RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries; software-as-a-service (SaaS) for use with RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries.
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) RFID readers, scanners, printers, and labels for use for inventory management in the retail grocery and food industries, and downloadable inventory management software for use therewith (1) Installation of RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries; maintenance and repair services for RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries
(2) Non-downloadable software for use with RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries; software-as-a-service (SaaS) for use with RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
RFID readers; scanners; computer printers and hand-held computer printers for printing documents and encoded bar code labels and quick response code labels for use for inventory management in the retail grocery and food industries, and downloadable software for use therewith Providing temporary use of online non-downloadable software for use with RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries; Software as a service (SAAS) services featuring software for use with RFID readers, scanners, and printers used in inventory management in the retail grocery and food industries
A detectable label and associated methods of making a detectable label are provided. One example of the detectable label may include a coil and a capacitor arranged in an LC circuit. The flux direction of the LC circuit is generally parallel a package when the detectable label is attached to the package.
Provided is a single use hard tag. In an embodiment, the single use hard tag may be removable by the consumer after purchase and prior to wear. In an embodiment, components of the single use hard tag are soluble, biodegradable, or otherwise recyclable. For example, a portion of the single use hard tag may be water soluble under certain conditions. In an example, the entire single use hard tag may be water soluble under certain conditions. The single use hard tag may be removable by a release point on the pin at the base, wherein the pin remains locked in locking mechanism even after removal.
F16B 21/12 - Means without screw-thread for preventing relative axial movement of a pin, spigot, shaft, or the like and a member surrounding itStud-and-socket releasable fastenings without screw-thread by separate parts with locking-pins or split-pins thrust into holes
E05B 15/16 - Use of special materials for parts of locks
E05B 73/00 - Devices for locking portable objects against unauthorised removalLocking devices not provided for in other groups of this subclass
B65D 55/02 - Locking devicesMeans for discouraging or indicating unauthorised opening or removal of closure
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
45 - Legal and security services; personal services for individuals.
Goods & Services
Labeling and pricing machines for applying labels and price tags to containers and bottles; electronic label printing machines for commercial use for product pricing, product weighing, and product inventory purposes Downloadable or recorded computer software for retail merchandising and the technical production of informational materials, namely, computer software for pricing products; electronic security and surveillance systems comprising magnetic sensors, magnetic tags, and magnetic tag deactivators; electronic access control systems for securing corporate assets, namely, access control cards, access control card readers, computers for operating and controlling electronic access control systems, and downloadable or recorded computer programs for running electronic access control systems; closed circuit television systems for tracking assets comprising televisions, controllers, cameras, and computers and downloadable or recorded computer programs for operating and controlling closed circuit television systems; radio frequency identification and surveillance systems for monitoring the location and control of assets comprised of radio frequency readers, radio frequency tags, and computers and downloadable or recorded computer programs for operating radio frequency identification and surveillance systems; electronic security tags for attachment to consumer products in retail stores; electronic surveillance systems comprising electronic article surveillance antennas for monitoring assets; radio frequency identification and surveillance systems for monitoring assets, comprised of radio frequency readers and radio frequency identification tags; downloadable or recorded computer software to maintain and operate electronic surveillance systems for use in connection with the aforementioned goods; electronic security tags made primarily of plastic with and without alarming features to prevent theft of merchandise at retail stores; electronic protection equipment, namely, apparatus for detecting articles being removed and locating lost articles Pens; stationery; printed or blank posters; printed or blank signs; printed sheets and printed patterns for hanging in sales premises for sales promotion purposes; printed queue slips, printed queue slip holders and display boards for use in determining customer orders; Printed shipping labels not of textile; special inks for writing used in the price markers to mark the labels; Office labeling machines; label dispensers; printing blocks; refill cartridges for ink pens Security services, namely, retail and commercial security monitoring using security software and hardware, namely, computer, sensors, cameras, motion detectors, and RFID systems
A dual hard tag assembly comprises radio frequency identification and electronic article surveillance. The dual hard tag is provides a single component able to both track retail merchandise generally and prevent theft by triggering an alarm. The RFID and EAS systems are not coplanar. The dual hard tag system is small and light weight, and may be reprogrammed and reused for the tracking and anti-theft of multiple items.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Measuring, detecting, monitoring and controlling devices, namely, network and computer servers; sensors, detectors and monitoring instruments, namely, people counting sensors; safety, security, protection, and signaling devices, namely, peripheral devices for use in controlling access, lighting, and sound alerts; information technology and audio-visual, multimedia and photographic devices, namely, digital signage displays for use in displaying occupancy information and other content; occupancy sensors, namely, electronic devices which detect the presence of occupants; proximity sensors; counting sensors Software as a service (SAAS) services featuring software for remote maintenance service, data collection, trend analyses, and security and occupancy compliance checks; systems for continuous monitoring, detection, and signaling, namely, a business intelligence cloud based software platform for use in retail security
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Measuring, detecting, monitoring and controlling devices; Sensors, detectors and monitoring instruments; Safety, security, protection and signaling devices; Information technology and audio-visual, multimedia and photographic devices; occupancy sensors, namely, electronic devices which detect the presence of occupants; proximity sensors; counting sensors; Recorded content; Software (1) Software as a service; systems for continuous monitoring, detection, and signaling
Example product security devices and associated methods are provided. An example product security device may include a first jaw and a second jaw that are operably coupled together to slide between an open position and a closed position. The example product security device may include a locking mechanism. In a locked state, the locking mechanism may permit movement of the first jaw towards the second jaw but prevent movement away from the second jaw. The example product security device may also include a product engagement pin. The product engagement pin may fasten the product security device to a product by piercing through the product and being received by the second jaw. A shroud having a shroud orifice may surround the product engagement pin and be operably coupled to the first jaw such that the shroud is movable relative to the product engagement pin. The example security device may also include a signal emitting component, a QR code, a barcode, or combination thereof.
A security alarm management system and method includes a reader device, a person counter, and an alarm. The reader device reads security tags within a range of the reader. The person counter detects people passing through a point of entry. The person counter can determine a direction of travel of people passing through the point of entry. A white-list includes entries or product identifiers that will not trigger an alarm. The alarm is triggered if conditions associated with the reader device, person counter, and white-list are met.
A folded coil label and associated methods of making a folded coil label are provided. On example folded core label may include a core, a coil, and a capacitor. The coil may be wrapped around the core and connected to the capacitor to form a resonant circuit. The coil may be formed of angled traces wrapped around the core to form turns of the coil, and each angled trace may be electrically and physically connected in series to an adjacent angled trace to form a helical structure of the coil.
Disclosed is a two-alarm security device that will alarm if the security device is forcibly removed from an article or item without detachment by a corresponding detachment device, and the security device will cause the pedestals in a store to alarm if the article or item is passed through the pedestals with the device still attached. The two-alarm security device comprises a slider operatively movable along a stop piece and a spring-biased engagement member that is operatively moveable into the housing of the stop piece. As the slider and engagement member move from an open position to a closed position, the security device alarm is actuated. A pressure pad attached to the engagement member assists in gently, but sufficiently securing an article between the slider and engagement member. If the article is improperly removed from the security device or otherwise tampered with, the spring-biased engagement member will cause a micro-switch to alarm.
E05B 17/22 - Means for operating or controlling lock or fastening device accessories, i.e. other than the fastening members, e.g. switches, indicators
E05B 73/00 - Devices for locking portable objects against unauthorised removalLocking devices not provided for in other groups of this subclass
G08B 13/184 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems by interruption of a radiation beam or barrier using radiation reflectors
Disclosed is a two-alarm security device that will alarm if the security device is forcibly removed from an article or item without detachment by a corresponding detachment device, and the security device will cause the pedestals in a store to alarm if the article or item is passed through the pedestals with the device still attached. The two-alarm security device comprises a slider operatively movable along a stop piece and a spring-biased engagement member that is operatively moveable into the housing of the stop piece. As the slider and engagement member move from an open position to a closed position, the security device alarm is actuated. A pressure pad attached to the engagement member assists in gently, but sufficiently securing an article between the slider and engagement member. If the article is improperly removed from the security device or otherwise tampered with, the spring-biased engagement member will cause a micro-switch to alarm.
An example security device includes a tag and a sled. The tag may include a security element, a receiving recess, a locking channel adjacent to the receiving recess, and a slug biased towards a sled facing surface of the tag. The sled may include a base having a tab extending therefrom, an adhesive applied to a product facing surface of the base for applying the sled to a product, and a cavity in the base having an opening on a tag facing surface of the base.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software, namely, software that captures and
analyzes supply chain data; software that captures and
analyzes data pertaining to tracking items for use in
connection with inventory management, warehouse management,
store and shelf management, automatic checkouts, tracking of
people and assets, and security and access control; software
for providing an on-line marketplace for the access, use,
purchase, or download of software applications. Operating an on-line marketplace for the purchase of
software applications (terms too vague in the opinion of the
International Bureau – Rule 13 (2) (b) of the Common
Regulations). Providing temporary use of non-downloadable software for
capturing and analyzing data pertaining to tracking items
for use in connection with inventory management, warehouse
management, store and shelf management, automatic checkouts,
tracking of people and assets, and security and access
control; computer services, namely, cloud hosting provider
services for providing temporary use of on-line
non-downloadable software; providing a website featuring
technology that allows users to access, use, and download
software applications (terms too vague in the opinion of the
International Bureau – Rule 13 (2) (b) of the Common
Regulations).
A dual hard tag assembly comprises radio frequency identification and electronic article surveillance. The dual hard tag is provides a single component able to both track retail merchandise generally and prevent theft by triggering an alarm. The RFID and EAS systems are not coplanar. The dual hard tag system is small and light weight, and may be reprogrammed and reused for the tracking and anti-theft of multiple items.
Example product security devices and associated methods are provided. An example product security device may include a first jaw and a second jaw that are operably coupled together to slide between an open position and a closed position. The example product security device may include a locking mechanism. In a locked state, the locking mechanism may permit movement of the first jaw towards the second jaw but prevent movement away from the second jaw. The example product security device may also include a product engagement pin. The product engagement pin may fasten the product security device to a product by piercing through the product and being received by the second jaw. A shroud having a shroud orifice may surround the product engagement pin and be operably coupled to the first jaw such that the shroud is movable relative to the product engagement pin.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Computer software, namely, software that records and manages transactional data, provides statistical analysis and produces notifications and reports in the field of warehousing and supply chain logistics; software that captures and analyzes data pertaining to tracking items for use in connection with supply chain logistics management, warehouse management, store and shelf management, automatic checkouts, tracking the location of people and objects using GPS data and to control security and access for buildings, vehicles and computer systems; software for providing an on-line marketplace for the access, use, purchase, or download of software applications; (1) Operating an on-line marketplace for the purchase of software applications;
(2) Providing temporary use of non-downloadable software for capturing and analyzing data pertaining to tracking items for use in connection with inventory management, warehouse management, store and shelf management, automatic checkouts, tracking the location of people and objects using GPS data and to control security and access for buildings, vehicles and computer systems; computer services, namely, cloud hosting provider services for providing temporary use of on-line non-downloadable software for recording and managing data, providing statistical analysis and producing reports in the field of warehousing and supply chain logistics; providing a website featuring technology that allows users to access, use, and download software applications for recording and managing data, providing statistical analysis and producing reports in the field of warehousing and supply chain logistics;
An example security device is provided that includes a belt attached to a housing. The belt may be insertable into a receiving channel of the housing at an adjustment end of the belt. A lever may be pivotably coupled to the housing. The lever may be configured to pivot relative to the housing between a locked lever position and an unlocked lever position. A hub may be disposed within the housing and coupled to the lever such that the hub rotates as the lever pivots.
Apparatuses and methods associated with a substance release benefit denial security device are provided. One example security device includes a locking assembly to releasably affix the security device to an article, and an electronic assembly. The electronic assembly may include a radio frequency receiver and processing circuitry. The security device may also include a benefit denial assembly, which includes a substance disposed in a vessel and a release mechanism configured to release the substance into or onto an article. The processing circuitry may be configured to receive a gate detected signal from the radio frequency receiver in response to the radio frequency receiver receiving a wireless signal, and in response to receiving the gate detected signal from the radio frequency receiver, transmit a release signal to the release mechanism to trigger the release mechanism to release the substance.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
E05B 73/00 - Devices for locking portable objects against unauthorised removalLocking devices not provided for in other groups of this subclass
G08B 15/02 - Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid
Apparatuses and methods associated with a substance release benefit denial security device are provided. One example security device includes a locking assembly to releasably affix the security device to an article, and an electronic assembly. The electronic assembly may include a radio frequency receiver and processing circuitry. The security device may also include a benefit denial assembly, which includes a substance disposed in a vessel and a release mechanism configured to release the substance into or onto an article. The processing circuitry may be configured to receive a gate detected signal from the radio frequency receiver in response to the radio frequency receiver receiving a wireless signal, and in response to receiving the gate detected signal from the radio frequency receiver, transmit a release signal to the release mechanism to trigger the release mechanism to release the substance.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
B65D 43/16 - Non-removable lids or covers hinged for upward or downward movement
B65D 51/24 - Closures not otherwise provided for combined with auxiliary devices for non-closing purposes
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable or recorded computer software, namely, software that captures and analyzes supply chain data; downloadable or recorded software that captures and analyzes data pertaining to tracking items for use in connection with inventory management, warehouse management, store and shelf management, automatic checkouts, tracking of assets, and security and access control; Downloadable or recorded software for providing an on-line marketplace for the access, use, purchase, or download of software applications Providing temporary use of non-downloadable software for capturing and analyzing data pertaining to tracking items for use in connection with inventory management, warehouse management, store and shelf management, automatic checkouts, tracking of people and assets, and security and access control; computer services, namely, cloud hosting provider services for providing temporary use of on-line non-downloadable software; providing a website featuring technology that allows users to access, use, and download software applications for inventory management, warehouse management, and retail store and shelf management
Apparatuses and methods associated with a substance release benefit denial security device are provided. One example security device includes a container, a locking assembly affixed to the container, and an electronic assembly affixed to the container. The electronic assembly may include a radio frequency receiver and processing circuitry. The security device may also include a benefit denial assembly, which includes a substance disposed in a canister and a release mechanism configured to release the substance into the container. The processing circuitry may be configured to receive a gate detected signal from the radio frequency receiver in response to the radio frequency receiver receiving a wireless signal, and in response to receiving the gate detected signal from the radio frequency receiver, transmit a release signal to the release mechanism to trigger the release mechanism to release the substance into the container.
An example security device includes a tag and a sled. The tag may include a security element, a receiving recess, a locking channel adjacent to the receiving recess, and a slug biased towards a sled facing surface of the tag. The sled may include a base having a tab extending therefrom, an adhesive applied to a product facing surface of the base for applying the sled to a product, and a cavity in the base having an opening on a tag facing surface of the base.
E05B 73/00 - Devices for locking portable objects against unauthorised removalLocking devices not provided for in other groups of this subclass
B65D 41/04 - Threaded or like caps or cap-like covers secured by rotation
B65D 50/06 - Closures with means for discouraging unauthorised opening or removal thereof, with or without indicating means, e.g. child-proof closures openable or removable by the combination of plural actions requiring the combination of different actions in succession
B65D 55/02 - Locking devicesMeans for discouraging or indicating unauthorised opening or removal of closure
B65D 55/14 - Applications of locks, e.g. of permutation or key-controlled locks
An example security device is provided that includes a core and a shuttle. The core includes an internal jaw and a guide surface and a distance between the internal jaw and the guide surface varies across a length of the core. The shuttle includes an opening that forms an external jaw. A jaw gap is defined between the internal jaw and the external jaw that is configured to receive a portion of an item to protect.
An example security device is provided that includes a core and a shuttle. The core includes an internal jaw and a guide surface and a distance between the internal jaw and the guide surface varies across a length of the core. The shuttle includes an opening that forms an external jaw. A jaw gap is defined between the internal jaw and the external jaw that is configured to receive a portion of an item to protect.
A folded coil label and associated methods of making a folded coil label are provided. One example folded core label may include a core, a coil, and a capacitor. The coil may be wrapped around the core and connected to the capacitor to form a resonant circuit. The coil may be formed of angled traces wrapped around the core to form turns of the coil, and each angled trace may be electrically and physically connected in series to an adjacent angled trace to form a helical structure of the coil.
A folded coil label and associated methods of making a folded coil label are provided. One example folded core label may include a core, a coil, and a capacitor. The coil may be wrapped around the core and connected to the capacitor to form a resonant circuit. The coil may be formed of angled traces wrapped around the core to form turns of the coil, and each angled trace may be electrically and physically connected in series to an adjacent angled trace to form a helical structure of the coil.
Example product security devices and associated methods are provided. An example product security device may include a first jaw and a second jaw that are operably coupled together to slide between an open position and a closed position. The example product security device may include a locking mechanism. In a locked state, the locking mechanism may permit movement of the first jaw towards the second jaw but prevent movement away from the second jaw. The example product security device may also include a product engagement pin. The product engagement pin may fasten the product security device to a product by piercing through the product and being received by the second jaw. A shroud having a shroud orifice may surround the product engagement pin and be operably coupled to the first jaw such that the shroud is movable relative to the product engagement pin.
Example product security devices and associated methods are provided. An example product security device may include a first jaw and a second jaw that are operably coupled together to slide between an open position and a closed position. The example product security device may include a locking mechanism. In a locked state, the locking mechanism may permit movement of the first jaw towards the second jaw but prevent movement away from the second jaw. The example product security device may also include a product engagement pin. The product engagement pin may fasten the product security device to a product by piercing through the product and being received by the second jaw. A shroud having a shroud orifice may surround the product engagement pin and be operably coupled to the first jaw such that the shroud is movable relative to the product engagement pin.
Devices, apparatuses, and methods for detecting product straps are provided. An example product security device for detecting product straps may include a base, and a pivot member affixed to the base via a first hinge. The pivot member may be configured to physically engage a strap to maintain the pivot member in a non-deflected position. The example device may further include a biasing member configured to urge the pivot member into a deflected position and a sensor configured to detect when the pivot member is in the deflected position. The sensor may be configured to, in response to detecting that the pivot member is in the deflected position, generate an alert signal. The example device may also include processing circuitry configured to receive the alert signal and, in response to receiving the alert signal, transmit an alert triggering signal to initiate an alert.
Devices, apparatuses, and methods for detecting product straps are provided. An example product security device for detecting product straps may include a base, and a pivot member affixed to the base via a first hinge. The pivot member may be configured to physically engage a strap to maintain the pivot member in a non-deflected position. The example device may further include a biasing member configured to urge the pivot member into a deflected position and a sensor configured to detect when the pivot member is in the deflected position. The sensor may be configured to, in response to detecting that the pivot member is in the deflected position, generate an alert signal. The example device may also include processing circuitry configured to receive the alert signal and, in response to receiving the alert signal, transmit an alert triggering signal to initiate an alert.
A security device is provided including a security lock configured to retain an object when locked, a receiver configured to receive a security code transmission, and processing circuitry configured to transition the security lock between a locked state and unlock permissive state based on receipt of a security code. The security lock may initially be set to the unlock permissive state. At the first instance in which a security code is received, the processing circuitry may transition the security lock to a key permissive mode in which the security lock transitions to a locked state and in response to a subsequent receipt of the security code the security lock transitions to the unlock permissive state.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software, namely, software that captures and analyzes supply chain data; software that captures and analyzes data pertaining to tracking items for use in connection with inventory management, warehouse management, store and shelf management, automatic checkouts, tracking of people and assets, and security and access control; software for providing an on-line marketplace for the access, use, purchase, or download of software applications Operating an on-line marketplace for the purchase of software applications Providing temporary use of non-downloadable software for capturing and analyzing data pertaining to tracking items for use in connection with inventory management, warehouse management, store and shelf management, automatic checkouts, tracking of people and assets, and security and access control; computer services, namely, cloud hosting provider services for providing temporary use of on-line non-downloadable software; providing a website featuring technology that allows users to access, use, and download software applications
A folded planar antenna device for radio frequency identification (RFID) reading is provided. The folded planar antenna device includes an RFID chip, a conductor member comprising a binocular-shaped slot; and a substrate. The conductor member is mounted on the substrate and the substrate is connected to the RFID chip through the binocular-shaped slot. The folded planar antenna device can be mounted on different objects, such as metal, meat, or liquid container, without being completely de-tuned.
A system, method, and device for improving the functioning of security tags for use with merchandise are provided. A security tag device, to be used in conjunction with a tag monitoring device, may be provided with a product. The product may be conductive or may have metallic packaging. The security tag may include a planar dielectric substrate having a first side and an opposing side. An electronic article surveillance (EAS) circuit may be placed on the first side of the planar dielectric substrate. A ferrite sheet having a first side and an opposing side may be coupled to the opposing side of the planar dielectric substrate. A metal backing sheet may be coupled to the opposing side of the ferrite sheet. The planar dielectric substrate may be centered or offset on the ferrite sheet and the ferrite sheet may be centered or offset on the metal backing sheet.
A security device is provided including a security lock configured to retain an object when locked, a receiver configured to receive a security code transmission, and processing circuitry configured to transition the security lock between a locked state and unlock permissive state based on receipt of a security code. The security lock may initially be set to the unlock permissive state. At the first instance in which a security code is received, the processing circuitry may transition the security lock to a key permissive mode in which the security lock transitions to a locked state and in response to a subsequent receipt of the security code the security lock transitions to the unlock permissive state.
A security device includes: a housing having a plug receptacle; a spool rotatably coupled to the housing; a locking mechanism having a locked state and an unlocked state, the locked state preventing the spool from rotating in a first direction, and the unlocked state allowing rotation of the spool in the first direction and in a second direction; a plug having an inserted position and a removed position with respect to the plug receptacle, the inserted position maintaining the locking mechanism in the locked state, and the removed position allowing alteration of the locking mechanism from the locked state to the unlocked state; a cable coupled to the spool and to the plug; an alarm circuit which activates an alarm upon sensing discontinuity of the cable and/or the plug moving from the inserted position to the removed position, the alarm circuit coupled to and rotating with the spool.
G08B 13/12 - Mechanical actuation by the breaking or disturbance of stretched cords or wires
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
H04Q 5/22 - Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange with indirect connection, i.e. through subordinate switching centre the subordinate centre not permitting interconnection of subscribers connected thereto
A security device is provided including a product presence sensor configured to sense a change in product presence relative to the product presence sensor and a directional element configured to direct the product presence sensor in a sensing direction.
A security device may include a rotatable cap and an engagement member. The cap may be graspable by an operator during attachment of the security device to at least a first strap extending substantially around a portion of an object. The engagement member may be configured to engage the first strap. The engagement member may also be substantially fixed in relation to the cap during the attachment of the security device to the first strap and the engagement member may be rotatable with the cap. The security device may be transitioned to a locked state responsive to rotational engagement of the engagement member with the first strap. The rotational engagement of the engagement member with the first strap may also increase tension on the first strap.
A tag controller is configured to interface with a tag on a product in a monitoring environment that includes first and second monitoring zones. The first monitoring zone includes first locator devices, and the second monitoring zone includes second locator devices. The tag controller includes processing circuitry configured to facilitate operation of the tag in a first mode to employ wireless communication with the first locator devices or the second locator devices to generate position information usable for locating the tag in the monitoring environment. The first mode defines communication parameters associated with the wireless communication. The processing circuitry may also be configured to determine whether mode switch criteria are met, and direct the tag to switch to operation in a second mode to employ different communication parameters relative to wireless communication with the first locator devices or the second locator devices responsive to the mode switch criteria being met.
A tag controller may be configured to interface with one or more security tags and at least one of the tags may be adapted to be disposed on a product in a monitoring environment. The tag controller may include processing circuitry configured to receive location information indicative of tag location responsive to initial movement of a tag, and compare the location information to alerting criteria. The alerting criteria may include at least a position component and a temporal component. The processing circuitry may be further configured to initiate an alerting function responsive to the alerting criteria being met.
In one embodiment, a method of manufacturing an RFID label includes providing a web structure comprising a dielectric layer and a metal layer; depositing a non-removable resist on the metal layer, the deposition of the non-removable resist defining an antenna; depositing a removable resist on the metal layer, the deposition of the removable resist defining connection pads for connecting an integrated circuit (IC) to the antenna; etching the metal layer to form the antenna and the connection pads; removing the removable resist from the metal layer to expose the connection pads; and attaching the IC to the connection pads.
H01L 21/00 - Processes or apparatus specially adapted for the manufacture or treatment of semiconductor or solid-state devices, or of parts thereof
H01Q 1/38 - Structural form of radiating elements, e.g. cone, spiral, umbrella formed by a conductive layer on an insulating support
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
A dual EAS-RFID tag. In one embodiment, the invention can be a tag comprising a substrate having a first surface and a second surface opposite the first surface; an electronic article surveillance (EAS) element comprising an EAS antenna, the EAS antenna on the first surface of the substrate; and a radio frequency identification (RFID) element, the RFID element comprising: a far field antenna on the second surface of the substrate, the far field antenna comprising a first pole portion, a second pole portion, and a connecting portion connecting the first pole portion and the second pole portion; a near field loop antenna on the second surface of the substrate, and an integrated circuit operably coupled to the near field loop antenna; wherein the far field antenna, the near field loop antenna, and the EAS element are located on the substrate so as to be physically isolated from one another.
Manufacturing antennas for a dual tag by: providing a web structure having a dielectric layer between a first metal layer and a second metal layer; depositing a first resist on the first metal layer to define a radio frequency (RF) coil and a first electrode of an RF capacitor; depositing the first resist on the second metal layer to define a second electrode of the RF capacitor; depositing a second resist on the second metal layer to define connection pads for a near field antenna, wherein one of the first resist and the second resist on the second metal layer defines a far field antenna and the near field antenna; and etching the first and second metal layers to form the RF coil, the electrodes of the RF capacitor, the far field antenna, the near field antenna, and the connection pads.
A security tag may include a pin cover, a pin housing, a receiving gap disposed between the pin cover and the pin housing, a pin configured to engage an article placed within the receiving gap, and a biasing member configured to actuate the pin by urging the pin toward the pin cover in response to the article being substantially placed within the receiving gap.
A security device may include an attachment assembly configured to affix the security device to an object, a locking assembly configured to lockably secure the attachment assembly and configured to transition between at least a locked state and an unlocked state, a transformer configured to drive an alarm assembly to generate an alarm, and processing circuitry. The transformer may be further configured to operate as a wireless receiver to receive a remotely transmitted wireless signal. The processing circuitry may be configured to monitor an output of the transformer to determine whether the wireless signal has been received via the transformer, and selectively activate the transformer to drive the alarm assembly to generate the alarm.
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G07C 9/00 - Individual registration on entry or exit
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
A security device may include a spool, locking mechanism, button, plug, and latch. The spool is configured to either wind or unwind a cable for wrapping around an object. The locking mechanism is configured to partially lock the spool. The button may be used to move the locking mechanism between locked and unlocked positions. The button may be blocked by inserting a plug into a housing of the device such that the button cannot be activated to unlock the spool. The plug may be secured to the housing through the latch that prevents the unauthorized removal of the plug. For an enhanced locking feature, the latch and the plug may be configured to require at least two forces to move the latch and free the plug. The spool, locking mechanism, and button may be stacked along a common axis to provide a more compacted design.