Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security device for preventing unauthorized removal of merchandise

An unlicensed and commercial technology, applied in the field of security systems, can solve problems such as inability to fully exert its effectiveness, and achieve the effect of effective structure, simple structure and easy connection

Active Publication Date: 2006-07-12
BRAEBURN ASSET HLDG +1
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] While popular, it is recognized that a considerable number of theft-resistant tags in use today include problems and disadvantages that prevent them from being fully effective

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security device for preventing unauthorized removal of merchandise
  • Security device for preventing unauthorized removal of merchandise
  • Security device for preventing unauthorized removal of merchandise

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] As shown in the drawings, the present invention is directed to a security tag assembly generally indicated at 10 and comprising at least one base 12 and at least one attachment 14 . However, multiple bases 12 and multiple attachments 14 are typically used in practice of the present invention, such as when multiple different products are to be protected and / or monitored. Additionally, the security tag assembly 10 is of the type configured to be removably secured to various types of merchandise 18 to prevent unauthorized removal of the merchandise 18 from certain areas and locations. Typical applications for the security assembly 10 of the present invention include attaching a base 12 and any of a plurality of attachments 14 to an article 18 to be secured. In this way, security tag assembly 10 can be quickly and easily removed from its working location by authorized individuals using approved techniques and / or hardware. On the contrary, it is very difficult for an unauth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security tag assembly and security system associated therewith prevent the unauthorized removal of merchandise from a given area, such as a retail establishment. The security tag assembly comprises a base and at least one attachment member removably connected in an operative position on the merchandise being protected. A locking assembly including a locking member is structured to restrict detachment of the attachment member and is forcibly disposed out of movement restricting relation to said connector member when the base and the attachment member are separated. A detachment assembly and a data registering processor may include a two-way communication link which facilitates processing of the merchandise data disposed on the security tag assembly, such that the purchasing of the merchandise and the removal of the security tag assembly can be effectively accomplished without jeopardizing the security of the merchandise being sold.

Description

technical field [0001] The present invention relates to a security system incorporating a security tag assembly comprising a reusable base and disposable attachments all removably secured to various merchandise. The invention also relates to such security tag assemblies. The base includes a display area displaying item information, etc., that can be read and communicated to a checkout register / processor that disassembles the assembly, which is configured to detach the base from the attachment, thereby removing the security tag assembly from the item. Take it off. Background technique [0002] Security or theft deterrent labels are widely used in the retail industry as well as in many other areas of commerce. In common fashion, such devices are attached to various merchandise in such a manner as to be clearly visible to a person inspecting the merchandise. The use and operation of such devices is known to prevent, or at least limit, the theft or unauthorized removal of mer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G08B13/22G09F3/08G06K19/00
CPCE05B73/0064E05B73/0017Y10T24/346
Inventor 约翰·谢尔勒鲁普爱迪·L·斯坦尼尔德
Owner BRAEBURN ASSET HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products