Merchandise display security systems and methods

ABSTRACT

Merchandise security systems and methods are provided. In one example, a merchandise security system includes a plurality of electronic keys and a plurality of merchandise security devices located within a retail store. Each electronic key and each merchandise security device is configured to store one or more serial numbers. In addition, each electronic key is configured to be authorized for communication with one or more merchandise security devices within the retail store. An electronic key is configured to communicate with a merchandise security device for locking, unlocking, arming, and/or disarming the merchandise security device when the serial numbers match.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/245,332, filed on Jan. 11, 2019, which is a continuation of U.S.application Ser. No. 16/169,664, filed on Oct. 24, 2018, and now U.S.Pat. No. 10,210,681, which is a continuation of U.S. application Ser.No. 15/540,403, filed on Jun. 28, 2017, now U.S. Pat. No. 10,127,745,which is a 371 national phase entry of International Application No.PCT/US2015/067034, filed Dec. 21, 2015, which claims the benefit of thefiling dates of U.S. Provisional Application No. 62/097,264 filed onDec. 29, 2014, and U.S. Provisional Application No. 62/197,777 filed onJul. 28, 2015, the disclosures of which are incorporated herein byreference in their entireties.

FIELD OF THE INVENTION

The present invention relates generally to merchandise display securitysystems and methods for protecting items of merchandise from theft.

BACKGROUND OF THE INVENTION

It is common practice for retailers to display relatively small,relatively expensive items of merchandise on a security device, such asa display hook or a display fixture, within security packaging commonlyreferred to as a “safer”, or otherwise on a display surface. Thesecurity device or safer displays an item of merchandise so that apotential purchaser may examine the item when deciding whether topurchase the item. The small size and relative expense of the item,however, makes the item an attractive target for shoplifters. Ashoplifter may attempt to detach the item from the security device, oralternatively, may attempt to remove the security device from thedisplay area along with the merchandise. Items of merchandise may alsobe secured using a display stand to allow users to sample the item forpotential purchase. In some instances, the security device is secured toa display support using a lock operated by a key, for example, amechanical lock. In other instances, the security device is secured tothe display support using a lock operated by an electronic key to armand disarm the security device.

BRIEF SUMMARY

Embodiments of the present invention are directed to merchandisesecurity system and methods for protecting an item of merchandisesusceptible to theft. In one example, a merchandise security systemincludes a plurality of merchandise security devices located within aretail store, wherein each merchandise security device has at least oneserial number. The security system also includes a plurality ofelectronic keys, wherein each electronic key is configured to store atleast one of the serial numbers. At least one of the electronic keys isconfigured to be authorized for locking, unlocking, arming, and/ordisarming one or more merchandise security devices within the retailstore. One of the electronic keys is configured to communicate with amerchandise security device for locking, unlocking, arming, and/ordisarming the merchandise security device in response to the serialnumber stored by the electronic key matching the serial number of themerchandise security device.

In another embodiment, a method for protecting an item of merchandisesusceptible to theft is provided. The method includes providing aplurality of merchandise security devices located within a retail store,wherein each merchandise security device has at least one serial number.The method also includes authorizing at least one of a plurality ofelectronic keys to communicate with one or more different merchandisesecurity devices than at least one other electronic key within theretail store and programming one or more of the serial numbers in eachof the plurality of electronic keys. In addition, the method includesinitiating communication with one of the merchandise security devicesvia one of the electronic keys for locking, unlocking, arming, and/ordisarming the merchandise security device in response to the serialnumber of the electronic key matching the serial number of themerchandise security device.

According to one embodiment, a merchandise security system includes aplurality of merchandise security devices located within a retail store,wherein each merchandise security device has at least one serial number.The security system also includes a plurality of electronic keys,wherein each electronic key is configured to store a plurality of theserial numbers. One of the electronic keys is configured to communicatewith one of the merchandise security devices for locking, unlocking,arming, and/or disarming the merchandise security device in response toone of the serial numbers stored by the electronic key matching theserial number of the merchandise security device.

In another embodiment, a method for protecting an item of merchandisesusceptible to theft is provided. The method includes storing one ormore serial numbers in a plurality of merchandise security deviceslocated within a retail store and storing one or more of the serialnumbers in a first plurality of electronic keys. The method furtherincludes storing one or more of the serial numbers in a second pluralityof electronic keys, wherein the serial numbers stored by the firstplurality of electronic keys are different than the second plurality ofelectronic keys. Moreover, the method includes communicating with one ofthe merchandise security devices via one of the electronic keys forlocking, unlocking, arming, and/or disarming the merchandise securitydevice in response to one of the serial numbers of the electronic keymatching the serial number of the merchandise security device.

In another embodiment, a merchandise security system includes aplurality of merchandise security devices located within a retail store,wherein each merchandise security device is configured to store at leastone security code and at least one serial number. The security systemalso includes a plurality of electronic keys, wherein each electronickey is configured to store at least one security code and at least oneof the serial numbers. Each of the electronic keys is configured to beauthorized for locking, unlocking, arming, and/or disarming one or moreof the merchandise security devices within the retail store when aserial number of one of the electronic keys matches a serial number ofone of the merchandise security devices. Furthermore, an electronic keyis configured to communicate with the merchandise security device forlocking, unlocking, arming, and/or disarming the merchandise securitydevice in response to the security code of the electronic key matchingthe security code of the merchandise security device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a merchandise security system according to oneembodiment of the present invention.

FIG. 2 illustrates a merchandise security system according to anotherembodiment of the present invention.

FIG. 3 illustrates a key in communication with a remote device via acloud according to one embodiment.

FIG. 4 illustrates a plurality of keys with different authorizationlevels according to one embodiment.

FIG. 5 is a plan view of an electronic key according to one embodiment.

FIG. 6 is a perspective view of the electronic key shown in FIG. 5.

FIG. 7 is a plan view of an electronic key according to anotherembodiment.

FIG. 8 is a perspective view of the electronic key shown in FIG. 7.

FIG. 9 is a plan view of an electronic key according to anotherembodiment.

FIG. 10 is a perspective view of the electronic key shown in FIG. 9.

FIG. 11 is a perspective view of a merchandise security device accordingto one embodiment.

FIG. 12 is a perspective view of an electronic key according to oneembodiment.

FIG. 13 is a cross-sectional view of the electronic key shown in FIG.12.

FIG. 14 is a perspective view of a merchandise security device in alocked and unlocked position according to one embodiment.

FIG. 15 is a perspective view of a merchandise security device in alocked and unlocked position according to another embodiment.

FIG. 16 is a plan view of a charging station according to oneembodiment.

FIG. 17 is a perspective view of the charging station shown in FIG. 16.

FIG. 18 illustrates a merchandise security system according to oneembodiment.

FIG. 19 illustrates an electronic key in communication with a computingdevice according to one embodiment.

FIG. 20 illustrates top and bottom perspective views of an electronickey according to another embodiment.

FIG. 21 illustrates plan and side views of the electronic key shown inFIG. 20.

FIG. 22 is a plan view of a programming or authorization stationaccording to one embodiment.

FIG. 23 is a perspective view of the programming or authorizationstation shown in FIG. 22.

FIG. 24 is another perspective view of the programming or authorizationstation shown in FIG. 22.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Referring now to the accompanying drawing figures wherein like referencenumerals denote like elements throughout the various views, one or moreembodiments of a merchandise display security system are shown. In theembodiments shown and described herein, the system includes anelectronic key and a merchandise security device. Merchandise securitydevices suitable for use with the electronic keys include, but are notlimited to, a security display (e.g. alarming stand), security fixture(e.g. locking hook, shelf, cabinet, etc.) or security packaging (e.g.merchandise keeper) for an item of merchandise. However, an electronickey (also referred to herein as a programmable key or generally as akey) may be useable with any security device or locking device thatutilizes power transferred from the key to operate a mechanical and/orelectronic lock mechanism and/or utilizes data transferred from the keyto authorize the operation of a lock mechanism and/or arming ordisarming an alarm circuit. In other words, an electronic key is useablewith any security device or locking device that requires powertransferred from the key to the device and/or data transferred from thekey to the device. Further examples of security devices and lockingdevices include, but are not limited to, a door lock, a drawer lock or ashelf lock, as well as any device that prevents an unauthorized personfrom accessing, removing or detaching an item from a secure location orposition. Although the following discussion relates to a system for usein a retail store, it is understood that the system is also suitable forother industries, such as hospital, restaurants, etc. In someembodiments, the merchandise security device and the electronic key aresimilar to those disclosed in U.S. application Ser. No. 13/222,225 filedon Aug. 31, 2011, entitled Electronic Key for Merchandise SecurityDevice, the disclosure of which is incorporated herein by reference inits entirety.

FIG. 1 illustrates one embodiment of a system 10. In this embodiment,the system generally includes an electronic key 12, one or moremerchandise security devices 14, a programming or authorization station16, and a charging station 18. FIG. 2 shows an embodiment of a system 10that is part of a network of merchandise security devices. According tosome embodiments, the network enables communication between a pluralityof electronic keys and merchandise security devices. The network may becloud-based and include a cloud 22 for receiving data from, and/orproviding data to, the electronic keys and/or merchandise securitydevices. The cloud 22 may facilitate data transfer to one or more remotelocations or devices 26 (e.g., a tablet or computer) where the data maybe reviewed and analyzed. The network may be a mesh network including aplurality of nodes 20 that are configured to communicate with oneanother, one or more electronic keys 12, and/or one or more merchandisesecurity devices 14. The nodes 20 and/or security devices 14 may belocated within one or more zones. A gateway 24 may be employed to allowfor communication between the one or more nodes 20 and the cloud 22. Insome embodiments, all communication within the network is wireless, suchas via radio-frequency signals (e.g., Sub GHz ISM band or 2.4 GHz),although other types of wireless communication may be possible.

In some embodiments, each electronic key 12 is configured to storevarious types of data. For example, each key 12 may store a serialnumber of one or more merchandise security devices 14, the data and timeof activation of the key, a user of the key, a serial number of the key,a department number within a retail store, number of key activations, atype of activation (e.g., “naked” activation, activation transferringonly data, activation transferring power, activation transferring dataand power), and/or various events (e.g., a merchandise security devicehas been locked, unlocked, armed, or disarmed). For instance, FIG. 3shows that the identity of a user of an electronic key 12 may becommunicated to a remote location or device 26. This information may betransmitted to the remote location or device 26 upon each activation ofthe key 12 or at any other desired period of time, such as uponcommunication with a programming or authorization station 16. Thus, thedata transfer may occur in real time or automatically in someembodiments. In some cases, the programming station 16 may be configuredto store the data and transfer the data to a remote location or device26. Authorized personnel may use this data to take various actions, suchas to audit and monitor associate activity, determine the battery lifeof a key 12, audit merchandise security devices 14 (e.g., ensure thesecurity devices are locked or armed), etc. Moreover, such informationmay be requested and obtained on demand, such as from the programmingstation 16.

In some cases, the data may include battery analytics of an electronickey 12. For example, the battery analytics may include monitoring thebattery voltage of an electronic key 12 when the key is placed on acharging station 18 and the time taken to reach full charge. Thesevalues may be used to determine depth of discharge. The batteryanalytics may be indicative of a battery that is nearing its end oflife. A retailer or other authorized personnel may take various actionsusing this information, such as replacing the key or disabling the keyto prevent battery swelling and housing failure.

In one embodiment, the electronic key 12 is configured to obtain datafrom a merchandise security device 14 (e.g., a security fixture). Forexample, the merchandise security device 14 may store various dataregarding past communication with a previous electronic key 12 (e.g.,key identification, time of communication, etc.), and when a subsequentelectronic key communicates with the same merchandise security device,the data is transferred to the electronic key. Thus, the merchandisesecurity device 14 may include a memory for storing such data. In somecases, the merchandise security device 14 includes a power source forreceiving and storing the data, while in other cases, the power providedby the electronic key 12 is used for allowing the merchandise securitydevice to store the data. The electronic key 12 may then communicate thedata for collection and review, such as at a remote location or device26. In some instances, communication between the electronic key 12 andthe programming or authorization station 16 may allow data to be pulledfrom the electronic key and communicated, such as to a remote locationor device 26. In other cases, the electronic key 12 may be configured toobtain data from merchandise security devices 14 (e.g., a securitydisplay), such as an identification of the merchandise security device,the type of item of merchandise on display, an identification of theitem of merchandise, and/or the system health of the security deviceand/or the item of merchandise. The electronic key 12 may store the dataand provide the data to a remote location or device 26 uponcommunication with the programming or authorization station 16. As such,the electronic keys 12 may be a useful resource for obtaining varioustypes of data from the merchandise security devices 14 without the needfor wired connections or complex wireless networks or systems.

In some cases, each electronic key 12 may be authorized for specificlocations, departments, or merchandise security devices. For instance,FIG. 4 shows that a manager may have authorization for all zones,locations, departments, or merchandise security devices (indicated asnumbers 1-6), while a first associate may only have authorization fortwo zones, locations, departments, or merchandise security devices(indicated as numbers 4 and 5), and a second associate may only haveauthorization for one zone, location, department, or merchandisesecurity device (indicated as number 6). As such, a retail store orother establishment may limit the scope of authorization for differentassociates within the same retail store. In order to accommodatedifferent authorizations levels, each key 12 may be configured to storea code that is associated with each zone, location, department, ormerchandise security device. For example, each zone may include aplurality of merchandise security devices 14, and a retail store mayhave multiple zones (e.g., a zone for electronics, a zone for jewelry,etc.).

Various techniques may be used to initially program the electronic key12. For example, the electronic key 12 may be initially presented toeach authorized merchandise security device 14. Upon communication withthe security device 14 or the cloud 22, the electronic key 12 will bepaired with each security device. A programming station 16 may provide acode to the electronic key 12, and the key or cloud 22 may thencommunicate the code to each of its authorized security devices 14. Eachkey 12 may only need to be programmed once. In some embodiments, aprogramming station 16 may be located within each zone, and a key 12 mayreceive a code from each programming station that it is authorized.Thereafter, each key 12 may need to be “refreshed” at the programmingstation 16 or a charging station 18 following a predetermined period oftime. In other embodiments, the electronic key 12 may be programmeddirectly via the cloud 22.

In another embodiment, each electronic key 12 may include a securitycode and a serial number for one or more merchandise security devices14. For example, a key 12 may only be able to arm, disarm, lock, orunlock a merchandise security device 14 where the security codes and theserial numbers match one another. In one example, each serial number isunique to a merchandise security device 14 and could be programmed atthe time of manufacture or by the retailer. This technique allows forgreater flexibility in programming keys 12 and assigning keys toparticular merchandise security devices 14 and/or zones. In oneembodiment, a setup electronic key 12″ may be used to initially mapparticular merchandise security devices 14 and serial numbers. In thisregard, the setup key 12″ may be used to communicate with each key 12and obtain the serial number of each merchandise security device 14. Thesetup key 12″ may also obtain a location of the security devices 14, ora user of the setup key may provide a description for each merchandisesecurity device (e.g., SN #123=merchandise security device #1). Thesetup key 12″ may communicate with a tablet or other computing device 26for accumulating all of the information (see, e.g., FIGS. 3 and 19),which may occur via wired or wireless communication. Thus, the tablet orcomputing device 26 may map each of the serial numbers with themerchandise security devices 14 and in some cases, may also includeserial numbers and corresponding electronic keys 12. Individualelectronic keys 12 may then be assigned particular serial numbers forauthorized merchandise security devices 14 (e.g., user 1 includes serialnumbers 1, 2, 3; user 2 includes serial numbers 1, 4, 5). Each of theelectronic keys 12 may be programmed with the same security code using aprogramming station 16. In some embodiments, the setup process may beused in conjunction with a planogram of the merchandise security devices14. The planogram may represent a layout of the merchandise securitydevices 14 within a retail store or other establishment. For example, asetup key 12″ may be used to map serial numbers to specific merchandisesecurity devices 14 on a planogram as the setup key communicates witheach merchandise security device. The setup key 12″ may communicate witha tablet or other computing device 26 for populating the planogram withserial numbers, such as via a wired connection (see, e.g., FIG. 19).This planogram may be uploaded to a remote location or device formanaging the planogram. As before, particular serial numbers may beassigned to authorized users.

In order to arm, disarm, lock, or unlock a merchandise security device14, the electronic key 12 may communicate with a particular merchandisesecurity device and determine whether the security codes and the serialnumbers match. If the codes match, the electronic key 12 then arms,disarms, locks, or unlocks the merchandise security device 14. Uponrefreshing an electronic key 12 and/or when a user requests anelectronic key via programming or authorization station 16, anyavailable electronic key may be used since the key may be programmed inreal time with the appropriate level of authorization for that user(e.g., specific zones, departments, and/or merchandise securitydevices).

In one embodiment, the merchandise display security system 10 comprisesan electronic key 12 and a merchandise security device 14 that isconfigured to be operated by the key. The system may further comprise anoptional programming station 16 that is operable for programming the key12 with a security code, which may also be referred to herein as aSecurity Disarm Code (SDC). In addition to programming station 16, thesystem may further comprise an optional charging station 18 that isoperable for initially charging and/or subsequently recharging a powersource disposed within the key 12. For example, the key 12 andmerchandise security device 14 may each be programmed with the same SDCinto a respective permanent memory. The key 12 may be provisioned with asingle-use (i.e., non-rechargeable) power source, such as a conventionalor extended-life battery, or alternatively, the key may be provisionedwith a multiple-use (i.e. rechargeable) power source, such as aconventional capacitor or rechargeable battery. In either instance, thepower source may be permanent, semi-permanent (i.e., replaceable), orrechargeable, as desired. In the latter instance, charging station 18 isprovided to initially charge and/or to subsequently recharge the powersource provided within the key 12. Furthermore, key 12 and/ormerchandise security device 14 may be provided with only a transientmemory, such that the SDC must be programmed (or reprogrammed) atpredetermined time intervals. In this instance, programming station 16is provided to initially program and/or to subsequently reprogram theSDC into the key 12. As will be described, key 12 may be operable toinitially program and/or to subsequently reprogram the merchandisesecurity device 14 with the SDC. Key 12 is then further operable tooperate the merchandise security device 14 by transferring power and/ordata to the device, as will be described.

In the exemplary embodiment of the system illustrated in FIGS. 1-2,electronic key 12 is configured to be programmed with a unique SDC bythe programming station 16. In some embodiments, the key 12 is presentedto the programming station 16 and communication therebetween isinitiated, for example, by pressing or otherwise actuating a controlbutton 28 provided on the exterior of the key. Communication between theprogramming station 16 and the key 12 may be accomplished directly, forexample by one or more electrical contacts, or indirectly, for exampleby wireless communication. Any form of wireless communication capable oftransferring data between the programming station 16 and key 12 is alsopossible, including without limitation optical transmission, acoustictransmission or magnetic induction. In some embodiments shown anddescribed herein, communication between programming station 16 and key12 is accomplished by wireless optical transmission, and moreparticularly, by cooperating infrared (IR) transceivers provided in theprogramming station and the key. In some embodiments, the programmingstation 16 may function similarly to that disclosed in U.S. Pat. No.7,737,844 entitled PROGRAMMING STATION FOR A SECURITY SYSTEM FORPROTECTING MERCHANDISE, the disclosure of which is incorporated hereinby reference in its entirety. For the purpose of describing someembodiments of the present invention, it is sufficient that theprogramming station comprises at least a logic control circuit forgenerating or being provided with a SDC, a memory for storing the SDC,and a communications system suitable for interacting with the electronickey 12 in the manner described herein to program the key with the SDC.

An available feature of a merchandise security system 10 according toone embodiment is that the electronic key 12 may include a time-outfunction. More particularly, the ability of the key 12 to transfer dataand/or power to the merchandise security device 14 may be deactivatedafter a predetermined time period. By way of example, the electronic key12 may be deactivated after about six to about twenty-four hours fromthe time the key was programmed or last refreshed. In this manner, anauthorized sales associate typically must program or refresh the key 12assigned to him at the beginning of each work shift. Furthermore, thecharging station 18 may be configured to deactivate the electronic key12 when the key is positioned within or otherwise engaged with acharging port 30 (see, e.g., FIG. 1). In this manner, the chargingstation 18 can be made available to an authorized sales associate. Inone embodiment, the electronic key 12 may be authorized upon the salesassociate inputting an authorized code to release the key for use. Forinstance, the sales associate may input a code on a keypad incommunication with the charging station 18. Upon inputting the correctcode, the charging station 18 may indicate which key 12 is authorizedfor use by the sales associate (e.g., via an audible and/or a visibleindicator). In some cases, the time-out period may be predetermined orcustomized by a user. For example, a manager of a retail store may inputa particular time period for one or more of the electronic keys 12.Those electronic keys 12 that are “active” may be monitored viacommunication within the cloud-based network. In other embodiments, theelectronic key 12 may be timed out or otherwise disabled in response toan event. For instance, the electronic key 12 may be disabled inresponse to the key being misplaced or stolen, or keys being broughtinto a retail store that are not authorized for use. Such disabling mayoccur via a command sent to the electronic key 12 via the cloud 22.

In one embodiment, commands may be provided remotely for taking variousactions. For example, where a theft has occurred, a command may beprovided from a remote location or device 26 (e.g., a tablet orcomputer) to lock and/or arm all or a portion of the merchandisesecurity devices 14. Similarly, a command may be provided from a remotelocation or device 26 to deactivate all or a portion of the electronickeys 12. As such, the system 10 provides techniques for centralizedsecurity and control of the electronic keys 12, merchandise securitydevices 14, and other components within the system.

FIGS. 5-6 illustrate one embodiment of an electronic key 12. Theelectronic key 12 may include a control button 28 for activating thekey, such as for initiating communication with a merchandise securitydevice. Moreover, the electronic key 12 may also include one or morevisual indicators. In this regard, the key 12 may include one or morestatus indicators 32 that illustrate a status of the communication ofthe key with a merchandise security device 14. The status indicators 32may guide the user to know when communication between the key 12 and themerchandise security device 14 is taking place and has been completed.The status indicators 32 may be different depending on whether thecommunication was authorized (e.g., unlocked or disarmed), unauthorized(e.g., wrong zone or department), or unsuccessful. The status indicators32 may also indicate an amount of time of authorized use remaining onthe key 12, such as where the key includes a time-out feature asdiscussed above. The electronic key 12 may also include one or moreother indicators 34 that provide a visual indication of the powerremaining on the key. These other indicators 34 may also be used for anyother desired purpose, such as to indicate a programming state of thekey 12. For example, the indicators 34 may be activated while theelectronic key 12 is being initially programmed. It is understood thatthe illustrated status indicators 32, 34 are for illustration only, asvarious types and configurations of indicators may be employed inalternative embodiments.

FIGS. 7-10 illustrate additional embodiments of electronic keys 12. Inthese examples, the electronic key 12 includes a removable portion 36.In FIGS. 7-8, the removable portion 36 allows access to an input powerport 38, such as for recharging the electronic key 12. The removableportion 36 may be configured to slide relative to the electronic key 12to expose the input power port 38. The input port 38 may be configuredto receive and electrically connect to a corresponding connector, suchas a connector associated with the charging station 18. For instance,the electronic key 12 may be configured to be docked within the chargingstation 18 for charging thereof (see, e.g., FIG. 1). As shown in FIGS.9-10, the removable portion 36 may also be configured to be removedentirely from the electronic key 12 and may be multi-purpose in that itmay be include a tool portion 40. For example, the tool portion 40 maybe used for facilitating the disconnection of various connectors, as ascrewdriver, etc. The electronic key 12 may include an opening 42defined to receive the removable portion 36 therein in a non-useposition.

FIGS. 20-21 show additional embodiments of an electronic key 12′. Inthis embodiment, the electronic key 12′ includes one or more alignmentfeatures 15 for facilitating alignment with a programming orauthorization station 16′ and/or a charging station 18′ as discussed infurther detail below. In addition, the electronic key 12′ includes aninput port 17 (e.g., a micro-USB port) which may be configured toreleasably engage a corresponding port on the programming orauthorization station 16′ and/or the charging station 18′ for dataand/or power transfer. Notably in the example shown in FIG. 20, theinput port 17 on the electronic key 12′ is on a side surface, while apair of alignment features 15 are provided on opposite surfaces of theelectronic key. In the embodiment shown in FIG. 21, a single alignmentfeature 15 is provided. The input port 17 may be located on a sidesurface between a transfer port at one end and a key chain ring openingat an opposite end. Positioning of the input port 17 on a side surfaceof the electronic key 12′ may provide for a more secure and stableattachment to the programming or authorization station 16′ and/or thecharging station 18′. A series of status indicators 32, 34, as discussedabove, for example light-emitting diodes (LEDs) may be provided on theexterior of the electronic key 12′ for indicating the operating statusthereof.

As shown in FIG. 1, the programming station 16 comprises a housingconfigured to contain the logic control circuit that generates the SDC,the memory that stores the SDC, and a communications system forcommunicating the SDC to the key (e.g., wirelessly). In use, the logiccontrol circuit generates the SDC, which may be a predetermined (i.e.“factory preset”) security code, a manually input security code, or asecurity code that is randomly generated by the logic control circuit.In the latter instance, the logic control circuit further comprises arandom number generator for producing the unique SDC. A series of visualindicators, for example light-emitting diodes (LEDs) may be provided onthe exterior of the housing for indicating the operating status of theprogramming station 16. Programming station 16 may further be providedwith an access mechanism for preventing use of the programming stationby an unauthorized person. For example, the programming station mayinclude a keypad 44. An authorized user may input a code in the key pad44 that allows the programming station 16 to generate a SDC forcommunicating to the key 12.

In a particular embodiment, the logic control circuit of the programmingstation 16 performs an electronic exchange of data with a logic controlcircuit of the key, commonly referred to as a “handshake communicationprotocol.” The handshake communication protocol determines whether thekey 12 is an authorized key that has not been programmed previously(e.g., a “new” key), or is an authorized key that is being presented tothe programming station 16 a subsequent time to refresh the SDC. In theevent that the handshake communication protocol fails, the programmingstation 16 will not provide the SDC to the unauthorized deviceattempting to obtain the SDC. When the handshake communication protocolsucceeds, programming station 16 permits the SDC to be transmitted bythe key 12. As will be readily apparent to those skilled in the art, theSDC may be transmitted from the programming station 16 to the key 12 byany suitable means, including without limitation, wireless, electricalcontacts or electromechanical, electromagnetic or magnetic conductors,as desired. Moreover, in other cases the programming station 16 maysimply provide the SDC to the electronic key 12 without first initiatingany handshake communication protocol.

In some embodiments, the merchandise security device 14 is a “passive”device. As used herein, the term passive is intended to mean that thesecurity device 14 does not have an internal power source sufficient tolock and/or unlock a mechanical lock mechanism. Significant cost savingsare obtained by a retailer when the merchandise security device 14 ispassive since the expense of an internal power source is confined to thekey 12, and one such key is able to operate multiple security devices.If desired, the merchandise security device 14 may also be provided witha temporary power source (e.g., capacitor or limited-life battery)having sufficient power to activate an alarm, for example apiezoelectric audible alarm, that is actuated by a sensor, for example acontact, proximity or limit switch, in response to a security breach.The temporary power source may also be sufficient to communicate data,for example a SDC, from the merchandise security device 14 to the key 12to authenticate the security device and thereby authorize the key toprovide power to the security device.

In some embodiments, the merchandise security device 14 furthercomprises a logic control circuit, similar to the logic control circuitdisposed within the key 12, adapted to perform a handshake communicationprotocol with the logic control circuit of the key in essentially thesame manner as that between the programming station 16 and the key. Inessence, the logic control circuit of the key 12 and the logic controlcircuit of the merchandise security device 14 communicate with eachother to determine whether the merchandise security device is anauthorized device that does not have a security code, or is a devicehaving a matching SDC. In the event the handshake communication protocolfails (e.g., the device is not authorized or the device has anon-matching SDC), the key 12 will not program the device with the SDC,and consequently, the merchandise security device will not operate. Ifthe merchandise security device 14 was previously programmed with adifferent SDC, the device will no longer communicate with the key 12. Inthe event the handshake communication protocol is successful, the key 12permits the SDC stored in the key to be transmitted to the merchandisesecurity device 14 to program the device with the SDC. As will bereadily apparent to those skilled in the art, the SDC may be transmittedfrom the key 12 to the merchandise security device 14 by any suitablemeans, including without limitation, via radiofrequency, one or moreelectrical contacts, electromechanical, electromagnetic or magneticconductors, as desired. Furthermore, the SDC may be transmitted byinductive transfer of data from the electronic key 12 to the merchandisesecurity device 14. Moreover, in other cases the electronic key 12 maysimply provide the SDC to the merchandise security device 14 withoutfirst initiating any handshake communication protocol.

In one embodiment, when the handshake communication protocol issuccessful and the merchandise security device 14 is an authorizeddevice having the matching SDC, the merchandise security device may bearmed or disarmed, such as where the security device includes an alarmcircuit. In other embodiments, the merchandise security device 14 may bearmed or disarmed when the SDC codes match. In some embodiments, whenthe handshake communication protocol is successful and the SDC codesmatch, the logic control circuit of the key 12 causes an internal powersource of the key to transfer electrical power to the device 14 tooperate a mechanical lock mechanism. In other embodiments, themerchandise security device 14 may be locked or unlocked when the SDCcodes match and power is transferred to the merchandise security device.It is understood that various information and codes may be exchanged inorder to perform the desired function, such as arming, disarming,locking, or unlocking the merchandise security device 14. For example,the data exchanged may include a serial number of the merchandisesecurity device alone and/or an SDC.

FIG. 11 shows one embodiment of a merchandise security device 140 ingreater detail. As previously mentioned, the merchandise security device14 can be any type of security device that utilizes an alarm circuitand/or a lock mechanism that locks and/or unlocks a lock. In some cases,the merchandise security device 140 may be a passive device in the sensethat it does not have an internal power source sufficient to operate alock mechanism. As a result, the merchandise security device 140 may beconfigured to receive power, or alternatively, both power and data, froman external source, such as the electronic key 12 shown and describedherein. The embodiment of the merchandise security device depicted inFIG. 11 is a cabinet lock configured to be securely affixed to thelocking arm 104 of a conventional cabinet lock bracket 105. Aspreviously described, the cabinet lock 140 may include a logic controlcircuit for performing a handshake communication protocol with the logiccontrol circuit of the key 12 and for receiving the SDC from the key. Inother embodiments, the cabinet lock 140 may be configured to transmitthe SDC to the key 12 to authenticate the security device and therebyauthorize the key to transfer power to the security device.

FIG. 12 show an embodiment of an electronic key 120 with inductivetransfer in greater detail. As previously mentioned, the key 120 may beconfigured to transfer both data and power to a merchandise securitydevice 140. Accordingly, the programmable electronic key 120 may be anactive device in the sense that it has an internal power sourcesufficient to operate a mechanical lock mechanism of the merchandisesecurity device 140. As a result, the programmable electronic key 120may be configured to transfer both data and power from an internalsource, such as a logic control circuit (e.g., data) and a battery(e.g., power) disposed within the key. The embodiment of theprogrammable electronic key 120 depicted herein is a key with inductivetransfer capability configured to be received within the transfer port145 of the cabinet lock 140 shown in FIG. 11, as well as a programmingport 46 of the programming station and the charging port 30 of thecharging station.

In some embodiments, the electronic key 120 comprises a housing 121having an internal cavity or compartment that contains the internalcomponents of the key, including without limitation the logic controlcircuit, memory, communication system and battery, as will be described.As shown, the housing 121 is formed by a lower portion 123 and an upperportion 124 that are joined together after assembly, for example byultrasonic welding. The electronic key 120 further defines an opening128 at one end for coupling the key to a key chain ring, lanyard or thelike. The electronic key 120 may further comprise a transfer probe 125located at an end of the housing 121 opposite the opening 128 fortransferring data and/or power to the merchandise security device 140.The transfer probe 125 is also operable to transmit and receive ahandshake communication protocol and the SDC from the programmingstation 16, as previously described, and to receive power from acharging station.

As best shown in FIG. 13, an internal battery 131 and a logic controlcircuit, or printed circuit board (PCB) 132 are disposed within thehousing 121 of the electronic key 120. Battery 131 may be a conventionalextended-life replaceable battery or a rechargeable battery suitable foruse with the charging station 18. The logic control circuit 132 isoperatively coupled and electrically connected to a switch 133 that isactuated by the control button 122 provided on the exterior of the key120 through the housing 121. Control button 122 in conjunction withswitch 133 controls certain operations of the logic control circuit 132,and in particular, transmission of the data and/or power. In thatregard, the logic control circuit 132 is further operatively coupled andelectrically connected to a communication system 134 for transferringdata and/or power. In one embodiment, the communication system 134 is awireless infrared (IR) transceiver for optical transmission of databetween the electronic key 120 and the programming station, and betweenthe key and the merchandise security device 140. As a result, thetransfer probe 125 of the key 120 may be provided with an opticallytransparent or translucent filter window 135 for emitting and collectingoptical transmissions between the key 120 and the programming station60, or between the key and the merchandise security device 140, asrequired. Transfer probe 125 may further comprise an inductive core 127and inductive core windings 129 for transferring electrical power to themerchandise security device 140 and/or receiving electrical power fromthe charging station 18 to charge the internal battery 131, as required.Alternatively, the optical transceiver 134 may be eliminated and datatransferred between the programmable electronic key 120 and themerchandise security device 140 via magnetic induction through theinductive coil 126.

In some embodiments, an important aspect of an electronic key 120,especially when used for use in conjunction with a merchandise securitydevice 140 as described herein, is that the key does not require aphysical force to be exerted by a user on the key to operate themechanical lock mechanism of the merchandise security device. Byextension, no physical force is exerted by the key 120 on the mechanicallock mechanism. As a result, the key 120 cannot be unintentionallybroken off in the lock, as often occurs with conventional mechanical keyand lock mechanisms. Furthermore, neither the key 120 nor and themechanical lock mechanism suffer from excessive wear as likewise oftenoccurs with conventional mechanical key and lock mechanisms. Inaddition, in some cases there is no required orientation of the transferprobe 125 of the electronic key 120 relative to the ports on any one ofthe programming station, charging station, and/or the merchandisesecurity device 140. Accordingly, any wear of the electrical contacts onthe transfer probe 125 and ports may be minimized. As a furtheradvantage in some embodiments, an authorized person is not required toposition the transfer probe 125 of the electronic key 120 in aparticular orientation relative to the transfer port 142 of themerchandise security device 140 and thereafter exert a compressiveand/or torsional force on the key to operate the mechanical lockmechanism of the device.

FIGS. 22-24 illustrate an embodiment of a programming or authorizationstation 16′. As illustrated, the programming or authorization station16′ includes a geometry for receiving the electronic key 12′ asdiscussed above (see, e.g., FIG. 21). In this regard, the programming orauthorization station 16′ may include one or more alignment features 15′configured to align with and engage alignment feature 15 of theelectronic key 12′. Moreover, the programming or authorization station16′ may further define a recess 48 for at least partially receiving aside surface of the electronic key 12′. The recess 48 may be curved orany other shape for corresponding to the shape of the electronic key12′. Within the recess 48, the programming or authorization station 16′may include a port 30′ for releasably engaging the input port 17 of theelectronic key 12′. The alignment features 15, 15′ are configured toalign with one another to ensure that the input port 17 and port 30′align with and engage one another. Such engagement may allow for datacommunication between the electronic key 12′ and the programming orauthorization station 16′, which may occur in some cases, upon entry ofan authorized code using keypad 44. In addition, the programming orauthorization station 16′ may include one or more input ports 50 forreceiving power and data communication (e.g., an Ethernet port).

FIG. 1 shows a charging station 18 in greater detail. As previouslymentioned, the charging station 18 recharges the internal battery 131 ofthe key 12. In certain instances, the charging station 18 alsodeactivates the data transfer and/or power transfer capability of thekey 12 until the key has been reprogrammed with the SDC by theprogramming station 16 or the user provides an authorized code to thecharging station. Regardless, the charging station 18 comprises ahousing for containing the internal components of the charging station.The exterior of the housing has at least one, and preferably, aplurality of charging ports 30 formed therein that are sized and shapedto receive the electronic key 12 (see, e.g., FIG. 1). Mechanical ormagnetic means may be provided for properly positioning and securelyretaining the key 12 within the charging port 18 for ensuring properpower transfer.

FIGS. 16-18 show an embodiment of a charging station 18 wherein aplurality of ports 30 are provided for engagement with a plurality ofcorresponding electronic keys 12′. The electronic key 12′ shown in FIG.21 may be compatible with the charging station 18 shown in FIGS. 16-18whereby the electronic key 12′ includes an input port 17 on its side forengagement with the port 30, similar to that described in conjunctionwith programming or authorization station 16′. Likewise, each port 30may be located within a respective recess 48 for receiving at least aside surface of the electronic key 12′. This arrangement may allow for agreater number of electronic keys 12′ to be engaged with the chargingstation 18 at any one time.

FIGS. 14-15 show additional embodiments of a merchandise security device150. In this embodiment, the merchandise security device 150 comprises alock mechanism that utilizes “energy harvesting”. Thus, the merchandisesecurity device 150 may be a passive device as described above. However,in this embodiment, the merchandise security device 150 includes meansfor generating power to be stored. For example, the merchandise securitydevice 150 may be configured to rotate between locked and unlockedpositions and include a generator configured to generate energy to bestored (e.g., via a capacitor). In some cases, the merchandise securitydevice 150 may include a bezel and each turn of the bezel may generatean electrical charge to be stored. In one embodiment, the electronic key12 may be used initially to disengage a mechanical lock, and then themerchandise security device 150 may be rotated to an unlocked position.The merchandise security device 150 may then be rotated back to thelocked position. Since the merchandise security device 150 has no powersource, the security device is capable of performing various securityfunctions using the stored power. For instance, the merchandise securitydevice 150 may be configured to use the stored power to push data to oneor more nodes 20 or to generate audible and/or visible signals. In oneexample, the merchandise security device 150 may include an internalradio for transmitting wireless signals using the stored power, such asfor generating a distress signal when the security device is tamperedwith. In another example, the merchandise security device 150 mayinclude a light-emitting device (LED) that is powered by the storedpower. In some embodiments, techniques for energy harvesting may besimilar to that described in U.S. application Ser. No. 13/538,386, thedisclosure of which is incorporated by reference in its entirety.

The foregoing has described one or more exemplary embodiments of amerchandise display security system. Embodiments of a merchandisedisplay security system have been shown and described herein forpurposes of illustrating and enabling one of ordinary skill in the artto make, use and practice the invention. Those of ordinary skill in theart, however, will readily understand and appreciate that numerousvariations and modifications of the invention may be made withoutdeparting from the spirit and scope thereof. Accordingly, all suchvariations and modifications are intended to be encompassed by theappended claims.

1. A security system comprising: a plurality of security devices eachconfigured to protect one or more items from theft; a plurality ofelectronic keys each configured to wirelessly communicate with each ofthe plurality of security devices for operating the security devices,each of the plurality of electronic keys configured to obtain data inresponse to interaction with each of the plurality of security devices;wherein each of the plurality of electronic keys is configured towirelessly communicate the data to a remote computing deviceautomatically or in real time.
 2. The security system of claim 1,wherein each of the plurality of electronic keys is configured tocommunicate with the remote computing device via a cloud network.
 3. Thesecurity system of claim 1, wherein the data further comprises a type ofthe items.
 4. The security system of claim 1, wherein the items areitems of merchandise located in a retail store.
 5. The security systemof claim 1, wherein the data further comprises a system health of theitems and/or the plurality of security devices.
 6. The security systemof claim 1, wherein the plurality of security devices are locks and/oralarming security displays.
 7. The security system of claim 1, whereinthe plurality of security devices comprise different types.
 8. Thesecurity system of claim 1, wherein the data further comprises anidentifier of each of the plurality of security devices.
 9. The securitysystem of claim 1, wherein each of the plurality of electronic keys isconfigured to wirelessly communicate with each of the plurality ofsecurity devices using optical signals.
 10. The security system of claim1, wherein each of the plurality of electronic keys is configured tocommunicate data to the remote computing device comprising a date andtime of activation of each electronic key, a user of each electronickey, a serial number of each electronic key, a number of activations ofeach electronic key, and/or events resulting from activation of eachelectronic key.
 11. The security system of claim 1, wherein at least oneof the plurality of electronic keys is configured to be authorized forlocking, unlocking, arming, and/or disarming one or more differentsecurity devices than at least one other electronic key.
 12. Thesecurity system of claim 1, wherein each of the plurality of electronickeys is configured to receive a command from the remote computing devicefor controlling the electronic key.
 13. The security system of claim 1,wherein each of the plurality of security devices is configured toreceive a command from the remote computing device for controlling thesecurity device.
 14. The security system of claim 1, wherein each of theplurality of electronic keys is configured to communicate the data tothe remote computing device in real time.
 15. The security device ofclaim 1, wherein each of the plurality of electronic keys is configuredto communicate the data to the remote computing device for auditingand/or monitoring the plurality of security devices.
 16. The securitydevice of claim 1, wherein each of the plurality of security devices isprogrammed with a serial number unique thereto, wherein each theplurality of electronic keys is configured to store a plurality of theserial numbers, wherein each of the plurality of electronic keys isconfigured to communicate with any one of the plurality of securitydevices to operate security device in response to the serial numberstored by the electronic key matching the serial number of themerchandise security device.
 17. The security system of claim 16,wherein each of the plurality of security devices is configured to storeat least one security code, wherein each of the plurality of electronickeys is configured to store at least one security code, and wherein eachof the plurality of electronic keys is configured to operate thesecurity device when the security codes match.
 18. The security systemof claim 1, further comprising a programming station, separate from theremote computing device, configured to communicate with any one of theplurality of electronic keys for authorizing the electronic key tooperate the plurality of security devices.
 19. The security system ofclaim 18, wherein each of the plurality of electronic keys is configuredto communicate with the programming station for transferring the data tothe remote computing device.
 20. A method comprising: a plurality ofsecurity devices each configured to protect one or more items fromtheft; and a plurality of electronic keys each wirelessly communicatingwith each of the plurality of security devices for operating thesecurity devices, each of the plurality of electronic keys obtains datain response to interaction with each of the plurality of securitydevices, each of the plurality of electronic keys wirelesslycommunicates the data to a remote computing device automatically or inreal time.