Security tag

ABSTRACT

Systems ( 100 ) and methods ( 1000 ) for operating a Security Tag (“ST”). The methods involve rotating a Rotational Clip (“RC”) of ST ( 132 ) towards a Housing Base (“HB”) of ST until RC ( 406 ) contacts a latch ( 610 ) disposed within HB ( 404 ), where an article resides between a first pad ( 602 ) fixedly coupled to RC and a second pad ( 604 ) movably coupled to HB. An angled surface ( 626 ) of RC slides against an angled surface ( 624 ) of the latch so as to cause compression of a cap spring ( 614 ) and a latch spring ( 612 ). The cap spring is disposed in HB such that a center axis ( 818 ) thereof is perpendicular to a center axis ( 816 ) of the latch spring. When the latch becomes aligned with an aperture ( 628 ) formed in the rotational clip, the latch travels into the aperture as result from a pushing force applied thereto by the latch spring.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional application of and claims priority toU.S. patent application Ser. No. 14/548,585 which was filed Nov. 20,2014 and U.S. Patent Application No. 62/062,402 which was filed Oct. 10,2014. The contents of the above applications are incorporated byreference in their entirety.

FIELD OF THE INVENTION

This document relates generally to security tags used in ElectronicArticle Surveillance (“EAS”) systems. More particularly, this documentrelates to security tags and methods for preventing the unauthorizedremoval of articles (e.g., optical wear) from a given location (e.g., aretail store).

BACKGROUND OF THE INVENTION

In retail stores for optical articles, it is desirable to present alarge variety of eyeglasses and eyeglass frames to prospective buyers ina manner which allows them easily to examine and compare a large numberof different frames or eyeglasses. Eyeglasses and eyeglass frames areconstructed with temple pieces or earpieces to engage a wearer's ears tohold the eyeglasses in place. The eyeglass temples are usually pivotallycoupled to a lens support. The lens support may include spaced pads oran arch portion which fits the bridge of the nose. This construction iscommon to eyeglass frames, finished eyeglasses, sunglasses, readingglasses, goggles, protective eyewear and the like.

Eyeglasses and eyeglass frames may be expensive. Their value andrelatively small size make these articles target for thieves. In orderto prevent theft, optical retailers often display eyeglasses or framesin locked glass cases. This approach not only greatly increases theoverhead, but also requires the presence of salespeople to allow acustomer to try on a pair of eyeglasses. In addition, display casespresent a barrier between the customer and the product.

Other attempts to overcome security problems include connecting eyeglassframes to a weight or fixture using cables or chains. Such devices allowcustomers to handle the eyeglasses and try them on without theassistance of personnel. The cable or chain connecting the model eyewearto the weight or fixture may be effective for preventing a thief frompocketing the eyewear, but there are shortcomings in this type of systemas well. The cables or chains connected to the model eyewear can breakor become tangled from customer handling. Tangled cables and chainsprevent customers from fully accessing the model eyewear and make thedisplay space look unattractive. Cables or chains attached to eyewearalso interfere with the customer's ability to try on the eyewearcomfortably. Sometimes cables or chains are removed by personnel toallow a customer to try on a product, which reduces the effectiveness ofthe security system.

SUMMARY OF THE INVENTION

The disclosure concerns implementing systems and methods for operating asecurity tag. The methods involve rotating a rotational clip of thesecurity tag towards a housing base of the security tag until therotational clip contacts a latch disposed within the housing base. Atleast a portion of an article (e.g., a side frame of optical wear)resides between the rotational clip and the housing base. An angledsurface of the rotational clip is slid against an angled surface of thelatch so as to cause a simultaneous compression of a cap spring and alatch spring. The cap spring is disposed in the housing base such that acenter axis thereof is perpendicular to a center axis of the latchspring. An engagement structure of the latch is then aligned with anaperture formed in the rotational clip. At this time, a pushing forceapplied by the latch spring to the latch causes the engagement structureto travel into the aperture formed in the rotational clip.

Once the engagement structure travels into the aperture of rotationalclip, the security tag is securely attached to the article. In thisregard, it should be understood that a clamping force is applied to theportion of the article by the rotational clip and the housing base.Notably, a first pad is fixedly coupled to the rotational clip, and asecond pad is movably coupled to the housing base. The second pad isresiliently biased by the cap spring in a direction away from thehousing base and towards the first pad, whereby the clamping force is ofa level to securely couple the security tag to the article regardless ofthe overall thickness of the article's portion residing between thefirst and second pads. A frictional force is also applied to the portionof the article by the first and second pads if the article is pulled. Asensor may be disposed within the security tag to detect when thearticle to which the security tag is affixed enters a surveillance zoneof an EAS system.

The latch may disengage the rotational clip when a magnetic field isapplied thereto. Thereafter, the rotational clip may be rotated in adirection away from the housing base. As a result of such rotation, thesecurity tag may be removed from the article.

DESCRIPTION OF THE DRAWINGS

Embodiments will be described with reference to the following drawingfigures, in which like numerals represent like items throughout thefigures, and in which:

FIG. 1 is a schematic illustration of an exemplary system that is usefulfor understanding the present invention.

FIG. 2 is a front perspective view of a piece of optical wear with asecurity tag attached thereto.

FIG. 3 is a rear perspective view of a piece of optical wear with asecurity tag attached thereto.

FIG. 4 is a front perspective view of the security tag shown in FIGS.2-3.

FIG. 5 is a rear perspective view of the security tag shown in FIGS.2-4.

FIG. 6 is an exploded view of the security tag shown in FIGS. 2-5.

FIGS. 7-9 provide schematic illustrations that are useful forunderstanding operations of the security tag shown in FIGS. 2-6.

FIG. 10 is a flow diagram of an exemplary method for protecting anarticle using a security tag.

FIG. 11 is a block diagram of exemplary circuitry of a security tagwhich is useful for understanding the present invention.

DETAILED DESCRIPTION OF THE INVENTION

It will be readily understood that the components of the embodiments asgenerally described herein and illustrated in the appended figures couldbe arranged and designed in a wide variety of different configurations.Thus, the following more detailed description of various embodiments, asrepresented in the figures, is not intended to limit the scope of thepresent disclosure, but is merely representative of various embodiments.While the various aspects of the embodiments are presented in drawings,the drawings are not necessarily drawn to scale unless specificallyindicated.

The present invention may be embodied in other specific forms withoutdeparting from its spirit or essential characteristics. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the invention is, therefore, indicatedby the appended claims rather than by this detailed description. Allchanges which come within the meaning and range of equivalency of theclaims are to be embraced within their scope.

Reference throughout this specification to features, advantages, orsimilar language does not imply that all of the features and advantagesthat may be realized with the present invention should be or are in anysingle embodiment of the invention. Rather, language referring to thefeatures and advantages is understood to mean that a specific feature,advantage, or characteristic described in connection with an embodimentis included in at least one embodiment of the present invention. Thus,discussions of the features and advantages, and similar language,throughout the specification may, but do not necessarily, refer to thesame embodiment.

Furthermore, the described features, advantages and characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. One skilled in the relevant art will recognize, in light ofthe description herein, that the invention can be practiced without oneor more of the specific features or advantages of a particularembodiment. In other instances, additional features and advantages maybe recognized in certain embodiments that may not be present in allembodiments of the invention.

Reference throughout this specification to “one embodiment”, “anembodiment”, or similar language means that a particular feature,structure, or characteristic described in connection with the indicatedembodiment is included in at least one embodiment of the presentinvention. Thus, the phrases “in one embodiment”, “in an embodiment”,and similar language throughout this specification may, but do notnecessarily, all refer to the same embodiment.

As used in this document, the singular form “a”, “an”, and “the” includeplural references unless the context clearly dictates otherwise. Unlessdefined otherwise, all technical and scientific terms used herein havethe same meanings as commonly understood by one of ordinary skill in theart. As used in this document, the term “comprising” means “including,but not limited to”.

There exists a need for an improved EAS security system for optical wearand other articles (1) that allow customers to handle and try on thesame without interference from the security tag and/or (2) that can beeasily attached and detached therefrom by one or more authorized persons(e.g., store personnel). Accordingly, the present disclosure concernsimproved security tags for eyeglass frames, finished eyeglasses,sunglasses, reading glasses, goggles, protective eyewear and other typesof articles having similar needs or attributes. In the optical wearscenarios, the security tags are generally configured to be attached toa side frame or temple of optical wear such that the security tags donot interfere with the wearers' vision. Parallel soft pads are providedalong with a securement mechanism of each security tag so as to minimizeany damage to the side frame or temple of the optical wear to which acompression force is being applied by the securement mechanism. Thesecurement mechanism is designed to apply a compression force which iseffective for any frame or temple thickness.

Notably, the security tags implement a one-click application method forenabling their attachment to the articles. The one-click applicationmethod eliminates the human factor which during attachment may make thesecurity tag easy to defeat due to insufficient compression force orotherwise make the security tags inoperable due to excessive compressionforce. The security tags also have a one-piece design, thus ensuringeasy handling and less inventory management thereof. Known magneticdetachers can be used to detach the security tags from the articles.

Referring now to FIG. 1, there is provided a schematic illustration ofan exemplary system 100 that is useful for understanding the presentinvention. System 100 comprises a retail store facility 150 including anEAS 130. The EAS 130 comprises a monitoring system 134 and at least onesecurity tag 132. Although not shown in FIG. 1, the security tag 132 isattached to article 102, thereby protecting the article 102 from anunauthorized removal from the retail store facility 150. A schematicillustration of the security tag 132 attached to an article 102 isprovided in FIG. 2. As shown in FIG. 2, the article can include, but isnot limited to, optical wear. The monitoring system 134 establishes asurveillance zone (not shown) within which the presence of the securitytag 132 can be detected. The surveillance zone is established at anaccess point (not shown) for the retail store facility 150. If thesecurity tag 132 is carried into the surveillance zone, then an alarm istriggered to indicate a possible unauthorized removal of article 102from the retail store facility 150.

During store hours, a customer (not shown) may desire to purchase thearticle 102. The customer can purchase the article 102 using a Point OfSale (“POS”) station 104. The POS station 104 can include, but is notlimited to, a traditional fixed Point Of Sale (“POS”) station (e.g., acheckout counter) or a mobile POS station. In either scenario, a retailtransaction application executing on a computing device 108 of the POSstation 104 facilitates the exchange of data between the article 102,security tag 132, customer, store associate (not shown) and/or RetailTransaction System (“RTS”) 118 of a corporate facility 152. For example,after the retail transaction application is launched, a store associateis prompted to start a retail transaction process for purchasing thearticle 102. The retail transaction process can be started simply byperforming a user software interaction, such as depressing a key on akeypad of the computing device 108 or touching a button on a touchscreen display of the computing device 108.

Subsequently, the store associate may manually input into the retailtransaction application article information. Alternatively oradditionally, the store associate may place a handheld device 106 of thePOS station 104 in proximity of article 102. As a result of thisplacement, the POS station 104 obtains article information from thearticle 102. The article information includes any information that isuseful for purchasing the article 102, such as an article identifier andan article purchase price. In some scenarios, the article informationmay even include an identifier of the security tag 132 attached thereto.The article information can be communicated from the article 102 to thehandheld device of the POS station 104 via a short range communication,such as a barcode communication or a Near Field Communication (“NFC”).

In the barcode scenario, article 102 has a barcode 128 attached to anexposed surface thereof. The term “barcode”, as used herein, refers to apattern or symbol that contains embedded data. Barcodes may include, forexample, one-dimensional barcodes, two dimensional barcodes (such asmatrix codes, Quick Response (“QR”) codes, Aztec codes and the like), orthree-dimensional bar codes. The embedded data can include, but is notlimited to, a unique identifier of the article 102 and/or a purchaseprice of article 102. The barcode 128 is read by a barcodescanner/reader (not shown in FIG. 1) of the POS station 104. Barcodescanners/readers are well known in the art. Any known or to be knownbarcode scanner/reader can be used herein without limitation.

In the NFC scenarios, article 102 may comprise an NFC enabled device110. The NFC enabled device 110 can be separate from security tag 132 orcomprise security tag 132. An NFC communication occurs between the NFCenabled device 110 and the handheld device 106 over a relatively smalldistance (e.g., N centimeters or N inches, where N is an integer such astwelve). The NFC communication may be established by touching components102, 106 together or bringing them in close proximity such that aninductive coupling occurs between inductive circuits thereof. In somescenarios, the NFC operates at 13.56 MHz and at rates ranging from 106kbit/s to 848 kbit/s. The NFC may be achieved using NFC transceiversconfigured to enable contactless communication at 13.56 MHz. NFCtransceivers are well known in the art, and therefore will not bedescribed in detail herein. Any known or to be known NFC transceiverscan be used herein without limitation.

After the POS station 104 obtains the article information, paymentinformation is input into the retail transaction application of POSstation 104. In response to the reception of the payment information,the POS station 104 automatically performs operations for establishing aretail transaction session with the RTS 118. The retail transactionsession can involve: communicating the article information and paymentinformation from the POS station 104 to the RTS 118 via a public network106 (e.g., the Internet); completing a purchase transaction by the RTS118; and communicating a response message from the RTS 118 to the POSstation 104 indicating that the article 102 has been successfully orunsuccessfully purchased. The purchase transaction can involve using anauthorized payment system, such as a bank Automatic Clearing House(“ACH”) payment system, a credit/debit card authorization system, or athird party system (e.g., PayPal®, SolidTrust Pay® or Google Wallet®).

The purchase transaction can be completed by the RTS 118 using thearticle information and payment information. In this regard, suchinformation may be received by a computing device 108 of the RTS 118 andforwarded thereby to a sub-system of a private network 100 (e.g., anIntranet). For example, the article information and purchase informationcan also be forwarded to and processed by a purchase sub-system 112 tocomplete a purchase transaction. When the purchase transaction iscompleted, a message is generated and sent to the POS station 104indicating whether the article 102 has been successfully orunsuccessfully purchased.

If the article 102 has been successfully purchased, then a security tagdetaching process can be started. During the security tag detachingprocess, a security tag detacher 112 of the POS station 104 is used tocause actuation of a detaching mechanism of the security tag 132. Oncethe security tag 132 has been detached from article 102, the customer140 can carry the article 102 through the surveillance zone withoutsetting off the alarm.

Referring now to FIGS. 2-3, there are provided schematic illustrationsof the security tag 132 attached to an article 102. As noted above, thearticle 102 can include, but is not limited to, optical wear. As such,the security tag 132 will be described below in relation to glasses.However, the present invention is not limited in this regard. Thesecurity tag 132 can be used with other types of articles that have alinear member which can be clamped between two opposing clamp surfacesof the security tag. In all scenarios, the security tag 132 is generallydesigned to be removably coupled to the article, without causing damagethereto (e.g., by not exerting excessive pressure or compression forcethereon).

More detailed schematic illustrations of the security tag 132 areprovided in FIGS. 4-7. As shown in FIGS. 4-7, the security tag 132comprises a housing 402. The housing 402 can be formed from any suitablymaterial, such as plastic (e.g., which may have been injection molded).The material from which the housing 402 is formed may be transparent oropaque. However, there are certain advantages to using transparentmaterials for the housing 402. For example, transparent materialsfacilitate the minimization of any obstruction of the article'sappearance by the security tag 132.

The housing 402 has a housing base 404 and a rotational clip 406. Thehousing base 404 is formed of a back cover 606 and a front cover 608,which may be ultrasonically welded together during assembly of thesecurity tag 132. Covers 606 and 608 collectively define insert spaces632, 640, 646, 652 in which various components of the security tag 132are housed.

In some scenarios, one or more security sensors 618 is(are) disposedwithin the housing base 404 (as shown in FIGS. 6, 8 and 9) and/orrotational clip 406. Security sensors are well known in the art, andtherefore will not be described herein. Any known or to be knownsecurity sensors can be used herein without limitation. Still, it shouldbe understood that the security sensor provides a way to detect when anarticle is being removed from a particular area by an unauthorizedperson or in an unauthorized manner (e.g., without being purchased). Assuch, the security label includes a sensor operable with EAS technology.Such sensors can include, but are not limited to, an NFC sensor and/oran RFID sensor. The security sensor may be configured to provide anaudible, visual and/or tactile alarm when it passes into thesurveillance zone of an EAS system. Also, the security label maycomprise a passive device, an active device and/or a hybridpassive/active device. A support structure (e.g., structure 644) may beprovided to retain and/or maintain the security sensor in a particularposition within the housing base 404 and/or rotational clip 406.

The rotational clip 406 is pivotally mounted on the housing base 404. Assuch, the rotational clip 406 can be rotated towards and away from theback cover 606 of the housing 402, as shown by bi-directional arrow 702of FIG. 7. For example, the rotational clip 406 may be rotated away fromthe back cover 606 when an article is to be disposed within the securitytag 132 and/or when the security tag is to be decoupled from thearticle. In contrast, the rotational clip 406 may be rotated towards theback cover 606 such that the rotational clip 406 can be locked in itsclosed position, whereby the article is securely coupled to the securitytag 132.

As shown in FIG. 6, the pivotal movement of the rotational clip 406 isfacilitated by a pivot member 660. Pivot member 660 comprises at leastone post 630 and a curved surface 632. When assembled, the pivot member660 resides within insert space 632, while the post(s) 630 reside(s)between the front and back covers 606, 608 within an insert space 640.Each post is generally circular in shape such that it can be supportedby a curved surface 642 or 643 of a sidewall defining insert space 640,as well as be rotated thereon.

The locking of the rotational clip 406 in its closed position isfacilitated by an engagement member 654 thereof. The engagement member654 comprises an aperture 628 and an angled surface 626. When therotational clip 406 is moved towards the back cover 606, the engagementmember 654 travels through an aperture 638 formed in the back cover 606.Thereafter, the angled surface 626 of the engagement member 654 engagesan angled surface 624 of a latch 610. The angled surface 626 slidesalong angled surface 624 as the rotational clip 406 is further moved ina direction towards the back cover 606. This sliding movement causes thelatch 610 to compress a latch spring 612. When an engagement structure622 of the latch 610 becomes aligned with the aperture 628 formedthrough the engagement member 654 of the rotational clip 406, the latchspring 612 returns to its less compressed state whereby the engagementstructure 622 of the latch 610 travels into the aperture 628 so as tolock the rotational clip 406 in its closed position. Notably, the latch610 and latch spring 612 are disposed in an insert space 652 of thefront cover 608. Also, an audible and/or tactile indictor may begenerated and output when the rotational clip 406 is locked in itsclosed position so that the user knows when the article has beensecurely coupled to the security tag 132.

The rotational clip 406 can be unlocked by the application of a magneticfield to the latch 610 and the latch spring 612. In this regard, thelatch and latch spring are formed of a magnetic material, such as metal.As shown in FIG. 6, the latch 610 has two protruding structures 670 withsurface areas having a size selected for maximizing a magnetic forcewhen a magnetic field is applied thereto. The magnetic field causes thelatch spring 612 to transition from its less compressed state to itsfurther compressed state, whereby the latch 610 is removed from theaperture 628 of the rotational clip 406. Compressing the rotational clip406 by the operator to relieve the force from cap spring 614 may berequired to allow latch 610 to travel under the magnetic force. At thistime, the rotational clip 406 can be rotated away from the housingbase's back cover 606.

The article 102 is retained between the housing base 404 and therotational clip 406 via a frictional force and a compression force thatis applied thereto. The frictional force is applied to the article 102via two pads 602 and 604 if the article is pulled. In this regard, thepads are both formed of a frictional material, such as rubber. Duringuse, the article 102 cannot be removed from the locked security tag 132by an unauthorized person since (s)he is unable to apply a load to thearticle 102 that is sufficient to overcome at least the frictional forceapplied by the pads 602, 604. Notably, the pads 602 and 604 have a dualpurpose of (1) providing said frictional force when the security tag isbeing used and (2) ensuring that the article is not damaged by thesecurity tag when clamped therein.

The compression force is applied to the article 102 by the rotationalclip 406 and a cap 616 when the security tag 132 is in its lockedposition. In this regard, it should be understood that the cap 616 is aspring-loaded cap that can move in two opposing directions representedby arrows 810 of FIG. 8 and 904 of FIG. 9. The spring-loaded cap isassembled by: securing the cap 616 in an insert space 646 formed betweenthe front and back covers 608, 606; disposing a cap spring 614 withininsert space 646 after the front and back covers have been attached toeach other (e.g., by an ultrasonic weld); and securely coupling a capcover 620 to the front cover 608. The cap spring 614 comprises at leastone stop structure thereon which prevents the cap from being dislodgedfrom the housing base by the cap spring 614. The housing base mayadditionally or alternatively include a stop structure for the samepurpose. The cap spring 614 has a force selected in accordance with aparticular application. The greater the force, the greater the securitylevel. Notably, the cap spring 614 is normally biased towards the cap616. As such, the pad 604 is spring-biased towards the pad 602 duringuse of the security tag 132. When the security tag 132 is in use, thepads 602 and 604 are aligned with each other so that the article 102resides therebetween.

The cap cover 620 acts as a fixed, unmovable structure for (1) retainingthe cap spring 614 within insert space 646 and (2) maintaining the capspring 614 in alignment with the cap 616. The first function (1) isfacilitated by guide structures 650 and snap structures 674, 676. Theguide structures 650 enable (1) proper alignment of the cap cover 620when being assembled with the front cover 608 and (2) facilitate secure,unmovable coupling of the cap cover 620 with the front cover 608. Thesnap structures 674, 676 provide secure coupling mechanisms which snapinto place when the cap cover 620 is pressed towards the front cover608. In this regard, each snap structure 674, 676 snappingly engages anengagement structure 678 formed on an inner surface of the front cover608.

In some scenarios, the security tag 132 is designed to expel ink when asensor (e.g., sensor 1104 of FIG. 11) thereof detects an attempt tobreak the rotational clip 406, detects that the rotational clip 406 hasbeen broken or bent, detects that an attempt has been made todisengage/decouple the rotational clip 406 from the housing base 404,and/or detects an attempt to pull the frame 202 out of the security tag132. Various audio (e.g., an alarm), visual (e.g., light) and/or tactileindicators (e.g., vibration) can also be output from the security tag132 when an unauthorized attempt is made to remove the security tag fromthe article, or from a particular geographic location. Sensorinformation, audio/visual/tactile indicator information, and/orgeographic location information may be communicated from the securitytag to a remote communication device (e.g., a mobile or stationary pointof sale device 106, 108 of FIG. 1, or a mobile device of a storeemployee) so as to (1) immediately inform a store associate that anunauthorized attempt to remove the security tag from an article isoccurring or has just occurred at a certain location in the facilityand/or (2) continuously or periodically inform the store associate as tothe location of the security tag. As such, the security tag can includeinternal circuitry (e.g., circuitry 1100 of FIG. 11) such as GPScircuitry (e.g., GPS circuitry 1106 of FIG. 11), transceiver circuitry(e.g., transceiver circuitry 1102 of FIG. 11), and memory (e.g., memory1108 of FIG. 11). Communication of this information may be triggeredupon the detection of an attempt to cut or break the rotational clip406, an attempt to cut or break the frame 202, and/or an attempt hasbeen made to disengage/decouple the rotational clip 406 and/or frame 202from the security tag 132.

Referring now to FIG. 8, there is provided a cross-sectional view of theassembled security tag 132 in its unlocked (or open) position. As shownin FIG. 8, the rotational clip 406 is rotated away from the housing base404, as shown by arrow 808. In effect, the latch 610 does not engage theengagement member 654 of the rotational clip 406. Also, the cap 616 andpad 604 are spring-biased in a direction 810 away from the housingbase's back cover 606. In this regard, it should be understood that thecap spring 614 is normally in its less compressed state, whereby adistance 802 exists between a surface 812 of the cap 616 and a surface814 of the housing base's back cover 606. The latch spring 612 is alsonormally in its less compressed state. As such, the latch 610 isspring-biased towards the cap 616.

Referring now to FIG. 9, there is provided a cross-sectional view of theassembled security tag 132 in its locked (or closed) position. As shownin FIG. 9, the rotational clip 406 is rotated towards the housing base404 such that the latch 610 engages the engagement member 654 of therotational clip 406. A side frame 202 of an article 102 is clampedbetween pads 602 and 604. In this regard, it should be understood thatthe cap 616 and pad 604 are still spring-biased in a direction 810 awayfrom the housing base's back cover 606. However, the cap spring 614 isin a further compressed state. In effect, the distance between thesurface 812 of the cap 616 and the surface 814 of the housing base'sback cover 606 has been reduced, as shown by reference numbers 802 and902.

Referring now to FIG. 10, there is provided an exemplary method 1000 foroperating a security tag (e.g., security tag 132 of FIG. 1) of an EASsystem (e.g., EAS system 100 of FIG. 1). Method 1000 begins with step1002 and continues with step 1004. In step 1004, a rotational clip(e.g., rotational clip 406 of FIG. 4) is rotated in a direction (e.g.,direction 808 of FIG. 8) away from a housing base (e.g., housing base404 of FIG. 4) of the security tag. Once the rotational clip has beenrotated a certain distance from the housing base, step 1006 is performedwhere at least a portion (e.g., side frame 202 of FIG. 2) of an article(e.g., article 102 of FIG. 1) is placed on a pad (e.g., pad 602 of FIG.6) of the rotational clip. Notably, another pad is coupled to thehousing base and resiliently biased in a direction (e.g., direction 810of FIG. 1) away from the housing base by a cap spring (e.g., cap spring614 of FIG. 6). The rotational clip is then rotated towards the housingbase, as shown by step 1008.

In next step 1010, the rotational clip is further rotated. Morespecifically, the rotational clip is further rotated in step 1010 untilan engagement member (e.g., engagement member 654 of FIG. 6) of therotational clip contacts a latch disposed within the housing base, wherethe article resides between two pads (e.g., pads 602 and 604 of FIG. 6)respectively coupled to the rotational clip and the housing base. As therotational clip continues to be rotated, an angled surface (e.g., angledsurface 626 of FIG. 6) of the rotational clip slides against an angledsurface (e.g., angled surface 624 of FIG. 6) so as to cause compressionof the cap spring and a latch spring (e.g., latch spring 612 of FIG. 6),as shown by step 1014. Notably, the cap spring is disposed in thehousing base such that a center axis (e.g., center axis 818 of FIG. 8)is aligned perpendicular to a center axis (e.g., center axis 816 of FIG.8) of the latch spring. The angled surface of the rotational clipcontinues to slide against the angled surface of the latch until anengagement structure (e.g., engagement structure 622 of FIG. 6) of thelatch becomes aligned with an aperture (e.g., aperture 628 of FIG. 6)formed in the engagement member of the rotational clip, as shown by step1016.

A pushing force is then applied to the engagement structure of the latchin step 1018 by the latch spring. In effect, the latch's engagementstructure travels into the aperture formed in the engagement member ofthe rotational clip. Consequently, the security tag is securely coupledto the article.

At some later time, a decision step 1020 is performed to determine ifthe security tag should be decoupled from the article. If it isdetermined that the security tag should not be decoupled from thearticle [1020:NO], then method 1000 waits for a period of time beforeperforming a second iteration of decision step 1020.

In contrast, if it is determined that the security tag should bedecoupled from the article [1020:YES], then steps 1022-1026 areperformed. Step 1022 involves applying a magnetic field to the latch andlatch spring so as to cause the latch to disengage the rotational clip.Compressing the rotational clip by the operator to relive the force fromthe cap spring may be required to allow the latch to travel under themagnetic force. Step 1024 involves rotating the rotational clip in adirection away from the housing base of the security tag. Step 1026involves removing the article from the security tag. Thereafter, step1028 is performed where method 1000 ends or is repeated using anotherarticle.

All of the apparatus, methods, and algorithms disclosed and claimedherein can be made and executed without undue experimentation in lightof the present disclosure. While the invention has been described interms of preferred embodiments, it will be apparent to those havingordinary skill in the art that variations may be applied to theapparatus, methods and sequence of steps of the method without departingfrom the concept, spirit and scope of the invention. More specifically,it will be apparent that certain components may be added to, combinedwith, or substituted for the components described herein while the sameor similar results would be achieved. All such similar substitutes andmodifications apparent to those having ordinary skill in the art aredeemed to be within the spirit, scope and concept of the invention asdefined.

The features and functions disclosed above, as well as alternatives, maybe combined into many other different systems or applications. Variouspresently unforeseen or unanticipated alternatives, modifications,variations or improvements may be made by those skilled in the art, eachof which is also intended to be encompassed by the disclosedembodiments.

I claim:
 1. A method for operating a security tag, comprising: rotatinga rotational clip of the security tag towards a housing base of thesecurity tag until the rotational clip contacts a latch disposed withinthe housing base, where at least a portion of an article resides betweenthe rotational clip and the housing base; sliding an angled surface ofthe rotational clip against an angled surface of the latch so as tocause simultaneous compression of a cap spring and a latch spring, wherethe cap spring is disposed in the housing base such that a center axisthereof is perpendicular to a center axis of the latch spring; aligningan engagement structure of the latch with an aperture formed in therotational clip; and applying a pushing force by the latch spring to thelatch such that the engagement structure travels into the apertureformed in the rotational clip.
 2. The method according to claim 1,wherein the cap and latch springs are each normally in a compressedstate.
 3. The method according to claim 1, wherein the cap springresiliently biases a cap disposed in the housing base in a directionaway from the housing base.
 4. The method according to claim 3, furthercomprising applying a clamping force to the portion of the article bythe rotational clip and the cap.
 5. The method according to claim 1,further comprising applying a frictional force to the portion of thearticle by a first pad fixedly coupled to the rotational clip and asecond pad movably coupled to the housing base.
 6. The method accordingto claim 1, further comprising causing the latch to disengage therotational clip by applying a magnetic field to the latch and latchspring.
 7. The method according to claim 6, further comprising rotatingthe rotational clip in a direction away from the housing base.
 8. Themethod according to claim 7, further comprising removing the securitytag from the article.
 9. The method according to claim 1, furthercomprising detecting when the article to which the security tag isaffixed enters a surveillance zone of an Electronic Article Surveillancesystem.
 10. The method according to claim 1, wherein the articlecomprises optical wear.