Self-detaching anti-theft device with a multi-purpose transceiver for energy harvesting and communication

ABSTRACT

Systems and methods for operating a security tag. The methods comprise: performing communication operations by the security tag at a communications frequency; using a receive circuit of the security tag to harvest energy emitted from a transmit circuit of an external device at an energy harvesting frequency. The communications frequency is out of band of the energy harvesting frequency.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims priority to U.S. Provisional PatentApplication Ser. No. 62/900,700, which was filed on Sep. 19, 2019. Thecontents of this U.S. Provisional Patent Application are incorporatedherein in its entirety.

FIELD

This document relates generally to anti-theft devices. Moreparticularly, this document relates to security tags and methods forproviding self-detaching anti-theft devices with a multi-purposetransceiver for energy harvesting and communication.

BACKGROUND

A typical Electronic Article Surveillance (“EAS”) system in a retailsetting may comprise a monitoring system and at least one security tagor marker attached to an article to be protected from unauthorizedremoval. The monitoring system establishes a surveillance zone in whichthe presence of security tags and/or markers can be detected. Thesurveillance zone is usually established at an access point for thecontrolled area (e.g., adjacent to a retail store entrance and/or exit).If an article enters the surveillance zone with an active security tagand/or marker, then an alarm may be triggered to indicate possibleunauthorized removal thereof from the controlled area. In contrast, ifan article is authorized for removal from the controlled area, then thesecurity tag and/or marker thereof can be detached therefrom.Consequently, the article can be carried through the surveillance zonewithout being detected by the monitoring system and/or withouttriggering the alarm.

Radio Frequency Identification (“RFID”) systems may also be used in aretail setting for inventory management and related securityapplications. In an RFID system, a reader transmits a Radio Frequency(“RF”) carrier signal to an RFID device. The RFID device responds to thecarrier signal with a data signal encoded with information stored by theRFID device. Increasingly, passive RFID labels are used in combinationwith EAS labels in retail applications.

As is known in the art, security tags for security and/or inventorysystems can be constructed in any number of configurations. The desiredconfiguration of the security tag is often dictated by the nature of thearticle to be protected. For example, EAS and/or RFID labels may beenclosed in a rigid tag housing, which can be secured to the monitoredobject (e.g., a piece of clothing in a retail store). The rigid housingtypically includes a removable pin which is inserted through the fabricand secured in place on the opposite side by a mechanism disposed withinthe rigid housing. The housing cannot be removed from the clothingwithout destroying the housing except by using a dedicated removaldevice.

A typical retail sales transaction occurs at a fixed Point Of Sale(“POS”) station manned by a store sales associate. The store salesassociate assists a customer with the checkout process by receivingpayment for an item. If the item is associated with an EAS/RFID element,the store sales associate uses the dedicated removal device to removethe security tag from the purchased item.

A retail sales transaction can alternatively be performed using a mobilePOS unit. Options for detaching a security tag using a mobile POS unitinclude: the use of a mobile detacher unit in addition to a mobile POSunit; the use of a fixed detacher unit located within the retail storewhich reduces the mobility of the mobile POS unit; or the use of a fixeddetacher unit located at an exit of a retail store which burdenscustomers with a post-POS task. None of these options is satisfactoryfor large scale mobile POS adaption in a retail industry.

SUMMARY

This document concerns operating a security tag. The methods comprise:performing communication operations by the security tag at acommunications frequency; activating a transmit circuit of an externaldevice of the security tag; emitting energy from the transmit circuit atan energy harvesting frequency; and/or using a receive circuit of thesecurity tag to harvest the energy emitted from the transmit circuit.The communications frequency may be out of band of the energy harvestingfrequency (or outside of an energy harvesting band including the energyharvesting frequency), and/or the energy harvesting frequency may belower than or the same as the communications frequency.

In some scenarios, the methods also comprise: receiving a wirelesssignal by the receive circuit of the security tag; performing operationsby a controller of the security tag to selectively close a switch inresponse to the wireless signal; and causing a release of a mechanicalcomponent of the security tag by allowing energy to flow from thereceive circuit to the mechanical component when the switch is closed.The energy harvesting is discontinued by the security tag when theswitch is closed or when another event occurs (e.g., expiration of agiven period of time or termination of the external transmit device'stransmission of the wireless signal). In some scenarios, the energyharvesting continues even after the switch is closed. Operations mayalso be performed by the controller to re-open the switch. Theharvesting of energy may once again be performed by the security tagwhen the switch is re-opened.

In those or other scenarios, the transmit circuit of the external devicecomprises a capacitor, an inductor connected to a first terminal of thecapacitor, and a voltage source coupled a second terminal of thecapacitor and tuned to a frequency of the capacitor and inductor. Theenergy is harvested by inducing a voltage in the receive circuit viaresonant inductive coupling between the inductor of the transmit circuitand an inductor of the receive circuit. The mechanical component of thesecurity tag is connected directly between the switch and a receivecapacitor of the receive circuit.

DESCRIPTION OF THE DRAWINGS

The present solution will be described with reference to the followingdrawing figures, in which like numerals represent like items throughoutthe figures.

FIG. 1 is an illustration of an illustrative system.

FIG. 2 is a block diagram of an illustrative architecture for a securitytag shown in FIG. 1.

FIG. 3 is a front perspective view of an illustrative security tag.

FIG. 4 is a back perspective view of the security tag shown in FIG. 3.

FIG. 5 is a top view of the security tag shown in FIGS. 3-4.

FIG. 6 is a right side view of the security tag shown in FIGS. 3-5.

FIG. 7 is a left side view of the security tag shown in FIGS. 3-6.

FIG. 8 is a bottom view of the security tag shown in FIGS. 3-7.

FIGS. 9-11 provide illustrations that are useful for understandingoperations of various mechanical components disposed within the securitytag shown in FIGS. 3-8.

FIG. 12 is an illustration that is useful for understanding how a pawlof a security tag is released.

FIG. 13 is a top view of a pawl and a pinion gear.

FIG. 14 is a perspective view of another illustrative security tag.

FIG. 15 is a flow diagram of an illustrative method for operating asecurity tag.

FIG. 16 is a flow diagram of an illustrative method for operating asecurity tag.

FIG. 17 is a flow diagram of an illustrative method for operating asecurity tag.

FIG. 18 provides an illustration of another illustrative architecturefor a security tag.

FIG. 19 provides an illustration of an illustrative pad that can be usedwith the security tag of FIG. 18 for selectively releasing a pintherefrom.

FIG. 20 provides an illustration of an illustrative transmit circuit forthe pad of FIG. 19.

DETAILED DESCRIPTION

It will be readily understood that the components of the embodiments asgenerally described herein and illustrated in the appended figures couldbe arranged and designed in a wide variety of different configurations.Thus, the following more detailed description of various embodiments, asrepresented in the figures, is not intended to limit the scope of thepresent disclosure, but is merely representative of various embodiments.While the various aspects of the embodiments are presented in drawings,the drawings are not necessarily drawn to scale unless specificallyindicated.

The present invention may be embodied in other specific forms withoutdeparting from its spirit or essential characteristics. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the invention is, therefore, indicatedby the appended claims rather than by this detailed description. Allchanges which come within the meaning and range of equivalency of theclaims are to be embraced within their scope.

Reference throughout this specification to features, advantages, orsimilar language does not imply that all of the features and advantagesthat may be realized with the present invention should be or are in anysingle embodiment of the invention. Rather, language referring to thefeatures and advantages is understood to mean that a specific feature,advantage, or characteristic described in connection with an embodimentis included in at least one embodiment of the present invention. Thus,discussions of the features and advantages, and similar language,throughout the specification may, but do not necessarily, refer to thesame embodiment.

Furthermore, the described features, advantages and characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. One skilled in the relevant art will recognize, in light ofthe description herein, that the invention can be practiced without oneor more of the specific features or advantages of a particularembodiment. In other instances, additional features and advantages maybe recognized in certain embodiments that may not be present in allembodiments of the invention.

Reference throughout this specification to “one embodiment”, “anembodiment”, or similar language means that a particular feature,structure, or characteristic described in connection with the indicatedembodiment is included in at least one embodiment of the presentinvention. Thus, the phrases “in one embodiment”, “in an embodiment”,and similar language throughout this specification may, but do notnecessarily, all refer to the same embodiment.

As used in this document, the singular form “a”, “an”, and “the” includeplural references unless the context clearly dictates otherwise. Unlessdefined otherwise, all technical and scientific terms used herein havethe same meanings as commonly understood by one of ordinary skill in theart. As used in this document, the term “comprising” means “including,but not limited to”.

This disclosure deals broadly with anti-theft devices featuringAcousto-Magnetic (“AM”) and/or RFID technology, advanced security tagsequipped with visual and audible alarms, and audio/visual alarmsincorporated into the AM/RFID pedestals at the stores' entrance/exit. Incurrent retail practices generally employed, anti-theft devices (whichare equipped with an RFID element, an AM element or both types ofelements incorporated into hard tags) require customers to bring theirmerchandise to the POS at which time the cashier (a) completes thetransaction and (b) deactivates and/or removes the anti-theft devicesfrom the sold items. Customers can wait in lines for long periods oftime before the next cashier is available. This solution can result incustomer dissatisfaction, and thus could result in the loss of returnbusiness. Furthermore, sometimes cashiers forget to remove/deactivateanti-theft devices. This lapse leads to false alarms at the store'sexit, customer embarrassment and wasted time.

Therefore, the present disclosure more specifically concerns aself-detaching solution for security tags. The self-detaching solutionallows a customer to select a desired item (e.g., a piece of clothing),scan the desired item using a MPOS device (e.g., a smart phone and/ortablet running a purchase transaction software application), and make asecure payment of the desired item using a purchase transaction softwareapplication running on the MPOS device (e.g., using PayPal® or othercloud based online service). Once a purchase transaction has beenverified by a retail store system, a wireless command signal is sentfrom the retail store system to the security tag. In response to thewireless command signal, one or both of the following events occurs: amechanical component (e.g., a solenoid and/or a gear motor) is actuatedso that removal of the security tag from the purchased item is possibleby the customer. For example, actuation of the mechanical componentcauses a captive pin to be released, whereby the security tag can beremoved from the item.

The present solution employs a novel solution for causing actuation ofthe security tag's mechanical component. The mechanical component needsa surge of electrical energy for actuation. The electronics controlsection of the security tag needs harvested energy for bias power. Theessential elements involve a resonant RF transmitter at a countersurface and a resonant receive coil inside the security tag. The energyinduced in the receive coil is used to both harvest enough energy topower the security tag's electronics as well as provide the power surgeneeded by the mechanical component.

Illustrative Systems for Detachment of Security Tags

Referring now to FIG. 1, there is provided an illustration of anillustrative system 100. System 100 comprises a Retail Store Facility(“RSF”) 150 including an EAS system 130. The EAS system 130 comprises amonitoring system 134 and at least one security tag 132. Although notshown in FIG. 1, the security tag 132 is attached to article 102,thereby protecting the article 102 from an unauthorized removal from RSF150. The monitoring system 134 establishes a surveillance zone (notshown) within which the presence of the security tag 132 can bedetected. The surveillance zone is established at an access point (notshown) for RSF 150. If the security tag 132 is carried into thesurveillance zone, then an alarm is triggered to indicate a possibleunauthorized removal of article 102 from RSF 150.

During store hours, a customer 140 may desire to purchase the article102. The customer 140 can purchase the article 102 without using atraditional fixed POS station (e.g., a checkout counter). Instead, thepurchase transaction can be achieved using a Mobile Communication Device(“MCD”) 104. MCD 104 (e.g., a mobile phone or tablet computer) can be inthe possession of the customer 140 or store associate 142 at the time ofthe purchase transaction. Notably, MCD 104 has a retail transactionapplication installed thereon that is configured to facilitate thepurchase of article 102 and an attachment/detachment of the security tag132 to/from article 102. The retail transaction application can be apre-installed application, an add-on application or a plug-inapplication.

In order to initiate a purchase transaction, the retail transactionapplication is launched via a user-software interaction. The retailtransaction application facilitates the exchange of data between thearticle 102, security tag 132, customer 140, store associate 142, and/orRetail Transaction System (“RTS”) 118. For example, after the retailtransaction application is launched, a user 140, 142 is prompted tostart a retail transaction process for purchasing the article 102. Theretail transaction process can be started simply by performing a usersoftware interaction, such as depressing a key on a keypad of the MCD104 or touching a button on a touch screen display of the MCD 104.

Subsequently, the user 140, 142 may manually input into the retailtransaction application article information. Alternatively oradditionally, the user 140, 142 places the MCD 104 in proximity ofarticle 102. As a result of this placement, the MCD 104 obtains articleinformation from the article 102. The article information includes anyinformation that is useful for purchasing the article 102, such as anarticle identifier and an article purchase price. In some scenarios, thearticle information may even include an identifier of the security tag132 attached thereto. The article information can be communicated fromthe article 102 to the MCD 104 via a Short Range Communication (“SRC”),such as a barcode communication 122 or a Near Field Communication(“NFC”) 120. In the barcode scenario, article 102 has a barcode 128attached to an exposed surface thereof. In the NFC scenarios, article102 may comprise an NFC enabled device 126.

Thereafter, payment information is input into the retail transactionapplication of MCD 104 by the user 140, 142. Upon obtaining the paymentinformation, the MCD 104 automatically performs operations forestablishing a retail transaction session with the RTS 118. The retailtransaction session can involve: communicating the article informationand payment information from MCD 104 to the RTS 118 via an RFcommunication 124 and public network 106 (e.g., the Internet);completing a purchase transaction by the RTS 118; and communicating aresponse message from the RTS 118 to MCD 104 indicating that the article102 has been successfully or unsuccessfully purchased. The purchasetransaction can involve using an authorized payment system, such as abank Automatic Clearing House (“ACH”) payment system, a credit/debitcard authorization system, or a third party system (e.g., PayPal®,SolidTrust Pay® or Google Wallet®).

The purchase transaction can be completed by the RTS 118 using thearticle information and payment information. In this regard, suchinformation may be received by a computing device 108 of the RTS 118 andforwarded thereby to a sub-system of a private network 100 (e.g., anIntranet). For example, the article information and purchase informationcan also be forwarded to and processed by a purchase sub-system 112 tocomplete a purchase transaction. When the purchase transaction iscompleted, a message is generated and sent to the MCD 104 indicatingwhether the article 102 has been successfully or unsuccessfullypurchased.

If the article 102 has been successfully purchased, then a security tagdetaching process can be started automatically by the RTS 118 or by theMCD 104. Alternatively, the user 140, 142 can start the security tagdetaching process by performing a user-software interaction using theMCD 104. In all three scenarios, the article information can optionallybe forwarded to and processed by a lock release sub-system 114 toretrieve a detachment key or a detachment code that is useful fordetaching the security tag 132 from the article 102. The detachment keyor code is then sent from the RTS 118 to the MCD 104 such that the MCD104 can perform tag detachment operations. The tag detachment operationsare generally configured to cause the security tag 132 to actuate adetaching mechanism (not shown in FIG. 1). In this regard, the MCDgenerates a detach command and sends a wireless detach signal includingthe detach command to the security tag 132. The security tag 132authenticates the detach command and provides notification to the MCDthat the detach command in authenticated. At this time, a pad or otherdevice is enabled or otherwise activated so that a signal is transmittedtherefrom. This signal causes the activation of the security tag'sdetaching mechanism. For example, the signal causes the detachmentmechanism to release a pin such that the security tag can be removedfrom the article 102. Once the security tag 132 has been removed fromarticle 102, the customer 140 can carry the article 102 through thesurveillance zone without setting off the alarm.

Referring now to FIG. 2, there is provided an illustration of anillustrative architecture for security tag 132. Security tag 132 caninclude more or less components than that shown in FIG. 2. However, thecomponents shown are sufficient to disclose an illustrative embodimentimplementing the present solution. Some or all of the components of thesecurity tag 132 can be implemented in hardware, software and/or acombination of hardware and software. The hardware includes, but is notlimited to, one or more electronic circuits.

The hardware architecture of FIG. 2 represents a representative securitytag 132 configured to facilitate the prevention of an unauthorizedremoval of an article (e.g., article 102 of FIG. 1) from an RSF (e.g.,RSF 150 of FIG. 1). In this regard, the security tag 132 may have abarcode 138 affixed thereto for allowing data to be exchanged with anexternal device (e.g., MCD 104 of FIG. 1) via barcode technology.

The security tag 132 also comprises an antenna 202 and an RF enableddevice 136 for allowing data to be exchanged with the external devicevia RF technology. The antenna 202 is configured to receive RF signalsfrom the external device and transmit RF signals generated by the RFenabled device 136. The RF enabled device 136 comprises an RFtransceiver 204. RF transceivers are well known in the art, andtherefore will not be described herein.

The RF enabled device 136 also comprises an Rx circuit 224. In somescenarios, the communications frequency of the RF transceiver 204 isbetween 3 kHz and 300 GHz range for RF communications. The presentsolution is not limited in this regard.

A signal transmitted from a pad (e.g., pad 1800 of FIG. 18) or otherdevice induces a voltage in a receive coil L_rx of the Rx circuit 224.This voltage charges an energy harvesting capacitor C_eh of the Rxcircuit 224, when a switch 228 is open. The energy stored by the energyharvesting capacitor C_eh is used to power the controller 206. Theenergy harvesting may be discontinued by the security tag when theswitch is closed or when another event occurs (e.g., expiration of agiven period of time or termination of the external transmit device'stransmission of the wireless signal). In some scenarios, the energyharvesting continues even after the switch is closed. Notably, thecommunications frequency may be out of band of or outside of the energyharvesting band. In some scenarios, the energy harvesting band is lowerthan, the same as or higher than the communications frequency. Forexample, the energy harvesting band includes, but is not limited to, 3kHz-300 kHz. The present solution is not limited in this regard.

The controller 206 processes received RF signals to extract informationtherein. This information can include, but is not limited to, a requestfor certain information (e.g., a unique identifier 210), and/or amessage including information specifying a detachment key or code fordetaching the security tag 132 from an article.

If the extracted information includes a request for certain information,then the controller 206 may perform operations to retrieve a uniqueidentifier 210 and/or article information 214 from memory 208. Thearticle information 214 can include a unique identifier of an articleand/or a purchase price of the article. The retrieved information isthen sent from the security tag 132 to a requesting external device(e.g., MCD 104 of FIG. 1) via an RF communication facilitated by RFtransceiver 204.

If the extracted information includes instructions for actuating adetachment mechanism 250 of an electro-mechanical lock mechanism 216,then the controller 206 may perform operations to selectively close theswitch 228 (which is normally open). Switch 228 can include, but is notlimited to, a transistor. When switch 228 is closed, energy is allowedto flow from the Rx circuit 224 to the detachment mechanism 250 of anelectro-mechanical lock mechanism 216. In this regard, a receive coilL_rx of the Rx circuit 224 resonates with a receive capacitor C_rx(tuned to the same frequency as the Tx circuit 222) to provide energy tothe electro-mechanical lock mechanism 216. At this time, actuation ofthe detachment mechanism 250 occurs. An auditory or visual indicationcan be output by the security tag 132 when the detachment mechanism 250is actuated.

Alternatively or additionally, the controller 206 can: parse theinformation from a received message; retrieve a detachment key/code 212from memory 208; and compare the parsed information to the detachmentkey/code to determine if a match exists therebetween. If a match exists,then the controller 206 closes switch 228 for actuating the detachmentmechanism 250. An auditory or visual indication can be output by thesecurity tag 132 when the detachment mechanism 250 is actuated. If amatch does not exist, then the controller 206 may generate a responsemessage indicating that detachment key/code specified in the extractedinformation does not match the detachment key/code 212 stored in memory208. The response message may then be sent from the security tag 132 toa requesting external device (e.g., MCD 104 of FIG. 1) via a wirelessshort-range communication or a wired communication via interface 260. Amessage may also be communicated to another external device or networknode via interface 260.

Notably, the detachment mechanism 250 may be damaged when the distancebetween the security tag 132 and a transmitting device (e.g., MCD 104 ofFIG. 1 and/or pad 1800 of FIG. 18) is too close. At such closeproximity, more energy than necessary is delivered to theelectromechanical lock mechanism 216. An energy integrator 230 isprovided with controller 206 to ensure that such damage to theelectromechanical lock mechanism 216 does not occur when the securitytag 132 is in relatively close proximity to the transmitting device.

The energy integrator 230 is configured to monitor relevant electricalparameters (e.g., current and/or voltage at an output terminal of thecapacitor C_rx), and calculate the amount of energy that theelectromechanical lock mechanism 216 is dissipating in real time. Theamount of energy dissipation is computed in accordance with thefollowing Mathematical Equations (1) and (2).

E _(D) =I×V×Δt  (1)

wherein E_(D) represents an amount of energy dissipation, I representscurrent, V represents voltage, and Δt represents an integrationinterval. E_(D) is determined at a plurality of times 1, . . . , N,where N is an integer. The values for E_(D1), E_(D2), . . . , E_(DN) arestored in memory 208. Each time a new energy dissipation value iscomputed, an accumulated dissipated energy E_(D-A) is also computed inaccordance with the following Mathematical Equation (2).

E _(D-A) =E _(D1) +E _(D2) + . . . +E _(DN)  (2)

The value of E_(D-A) is then compared to a threshold value thr. IfE_(D-A) is greater than thr, then the integrator 230 causes aninterruption of the supply of energy from the receive circuit 224 to theelectromechanical lock mechanism 216. The threshold value thr representsan upper safe operational limit of the detachment mechanism 250. Thesupply of energy is interrupted by causing the controller 206 toselectively open the switch 228. The E_(D) and E_(D-A) values may bedeleted or re-set to zero when the supply of energy is interrupted.

The controller 206 selectively opens the switch 228 when certaincriteria is met. For example, the switch 228 is opened when apre-defined period of time (staring from the time at which the switchwas last closed) expires, when motion of the detachment mechanism isdetected by the controller 206, and/or the energy integrator 230determines that E_(D-A) is greater than thr as mentioned above.

Memory 208 may be a volatile memory and/or a non-volatile memory. Forexample, the memory 208 can include, but is not limited to, a RandomAccess Memory (“RAM”), a Dynamic Random Access Memory (“DRAM”), a StaticRandom Access Memory (“SRAM”), a Read-Only Memory (“ROM”) and a flashmemory. The memory 208 may also comprise unsecure memory and/or securememory. The phrase “unsecure memory”, as used herein, refers to memoryconfigured to store data in a plain text form. The phrase “securememory”, as used herein, refers to memory configured to store data in anencrypted form and/or memory having or being disposed in a secure ortamper-proof enclosure.

The electro-mechanical lock mechanism 216 is operable to actuate thedetachment mechanism 250. The detachment mechanism 250 can include alock configured to move between a lock state and an unlock state. Such alock can include, but is not limited to, a pin. The electro-mechanicallock mechanism 216 is shown as being coupled between switch 228 and Rxcircuit 224. Components 204, 224, 206 can cause the lock of thedetachment mechanism 250 to be transitioned between states in accordancewith information received from an external device (e.g., MCD 104 of FIG.1).

The components 204-208, 260 may be collectively referred to herein asthe RF enabled device 136. The RF enabled device 136 can be incorporatedinto a device which also houses the electro-mechanical lock mechanism216, or can be a separate device which is in direct or indirectcommunication with the electro-mechanical lock mechanism 216.

Illustrative Security Tag Architectures

Illustrative architectures for a security tag 300 will now be describedin detail in relation to FIGS. 3-12. Security tag 132 of FIG. 1 can bethe same as or similar to security tag 300. As such, the followingdiscussion of security tag 300 is sufficient for understanding variousfeatures of security tag 132.

As shown in FIGS. 3-8, the security tag 300 comprises a hard EAS tagformed of a molded plastic enclosure 302. An EAS and/or RFID element(not shown in FIGS. 3-12) may be housed within the enclosure 302. Theenclosure 302 is defined by first and second housing portions 304, 306that are securely coupled to each other (e.g., via an adhesive, anultrasonic weld and/or mechanical couplers 400 such as screws).

The enclosure 302 has an insert space 402 sized and shaped for receivingat least a portion of an article (e.g., article 102 of FIG. 1) so thatthe security tag 300 can be securely attached or coupled thereto. Thesecurity tag 300 is securely coupled to the article by transitioning apin 308 from an unengaged state shown in FIG. 9 to an engaged stateshown in FIGS. 3-9 and 11. The transitioning is achieved by moving thepin 308 out of a first section 310 of the enclosure 302, through theinsert space 402, and into a second section 312 of the enclosure 302. Aknob 314 is provided to allow a user to control said transitioning. Theknob may be provided on a side surface of the enclosure 302 as shown inFIGS. 3-11 or alternatively on another surface (e.g., a top surface) ofthe enclosure as shown in FIG. 12. A mechanical mechanism (now shown inFIGS. 3-8) retains the pin 308 in its engaged state.

Referring now to FIGS. 9-11, the internal components of the security tag300 will be described. As noted above, an EAS/RFID element, RF enableddevice (e.g., RF enabled device 136 of FIGS. 1-2) and/orelectro-mechanical lock mechanism (e.g., electro-mechanical lockmechanism 216 of FIG. 2) are disposed within the security tag 300. TheEAS/RFID element and RF enabled device are not shown in FIGS. 9-11exclusively for simplifying the illustrations thereof.

As shown in FIG. 9, the electro-mechanical lock mechanism 900 of thesecurity tag 300 comprises the pin 308, a linear actuator 902, 906, aspring 904, a leaf spring 908, a pawl 922 and an electric solenoid 910.The electro-mechanical lock mechanism 900 is not limited to thesecomponents. For example, the electric solenoid 910 may be replaced witha gear motor. Electric solenoids and gear motors are well known in theart, and therefore will not be described herein. Any known or to beknown electric solenoid and/or gear motor can be used herein withoutlimitation, provided that the overall size thereof complies with thesize requirements of the security tag 300.

The linear actuator comprises a pair of gears 902 and 906 which convertrotational motion of a circular gear 906 into linear motion of a lineargear 902. The circular gear 906 is referred to herein as a pinion gear,while the linear gear 902 is referred to herein as a rack gear. The knob314 facilitates the user controlled rotational motion of the pinion gear906. As such, the pinion gear 902 is coupled to the knob 314 such thatit rotates therewith. For example, the pinion gear 902 rotates in thedirection shown by arrow 912 as the knob 314 is rotated in saiddirection by a user.

The pinion gear 902 has a plurality of teeth 914 which engage aplurality of teeth 916 of the rack gear 902. Engagement of the teeth914, 916 allows the rotational motion applied to the pinion gear 906 viathe knob 314 to cause the rack gear 902 to move, thereby translating therotational motion of the pinion gear 906 into the linear motion of therack gear 902.

The rack gear 902 is securely coupled to the pin 308. Accordingly,linear motion of the rack gear 902 in direction 918 causes linear motionof the pin 308 in the same direction. Likewise, linear motion of therack gear 902 in direction 920 causes linear motion of the pin 308 inthe same direction. As the rack gear 902 moves in direction 920, the pin308 transitions from its unengaged position shown in FIG. 9 to anintermediary position shown in FIG. 10.

In the intermediary position, an end 1002 of the pin 308 extends intothe insert space 402. Also, the rack gear 902 applies a pushing force onthe spring 904 which causes the compression thereof. In effect, thepin/gear arrangement is spring loaded, and wants to return to theunengaged position when the pin 208 is in its intermediary position (aswell as when in its fully engaged position).

The pin 308 is retained in its intermediary position via the pawl 922.In this regard, the pawl 922 engages the pinion gear 902, and ispivotally coupled to the enclosure via a pivot member 924. Anillustration is provided in FIG. 13 which is useful for understandingthe mechanical relationship between these components 902, 922. As shownin FIG. 13, the pawl comprises a protrusion 1306 that slidingly engagesthe teeth 914 of the pinion gear 902. The sliding engagement isfacilitated by chamfered surface 1304 of protrusion 1306 and chamferedsurfaces 1302 of teeth 914. As the pinion gear 902 rotates in direction912, the chamfered surface 1304 slides along the exterior surface of thepinion gear 902 at least partially defined by the chamfered surfaces1302 of teeth 914. In effect, the pawl's protrusion 1306 travels intoand out of spaces 1308 existing between adjacent teeth 914 of the piniongear 902. The leaf spring 908 facilitates the protrusion's travelingback into the spaces 1308.

When the protrusion 1306 resides in a space 1308, the pin 308 isretained in a given position since the pawl 922 prevents rotation of thepinion gear in a direction opposite direction 912. The prevention of thepinion gear's rotation in the direction opposite direction 912 is atleast partially facilitated by the straight surface 1310 of pawl 922which engages the teeth 914 in a manner which does not allow theprotrusion 1306 to travel into and out of spaces 1308 as a consequenceof the pinion gear's traveling in the direction opposite direction 912.

Referring now to FIG. 11, there is provided an illustration of the pin308 in its fully engaged position. As shown in FIG. 11, the end 1002 ofthe pin 308 extends into an aperture 1102 formed in the second section312 of the enclosure 302. Also, the spring 904 is in its fullycompressed state. In effect, the pin/gear arrangement is spring loaded,and wants to return to the unengaged position. Thus, the pin isretracted back into the first section 310 of the enclosure 302 when thepawl 922 is released which results in the spring's automatic transitionfrom its compressed state to its natural uncompressed state. During thistransition, the rack gear 902 is able to freely travel in direction 918.

Referring now to FIG. 12, there is provided an illustration that isuseful for understanding how the pawl 922 is released. As noted above,detach operations of the security tag 300 are initiated via itsreception of a wireless detach signal from an external device (e.g., MCD104 and/or the RTS 118 of FIG. 1). Upon said reception, the security tag300 authenticates the detach command and performs operations (e.g.,closed switch 228 of FIG. 2) to cause activation of the detachingmechanism, namely electric solenoid 910. The electric solenoid 910 isactivated by supplying power thereto (e.g., from an Rx circuit 224 ofFIG. 2). The electric solenoid 910 drives post 1202 such that it movesin direction 1204 so as to apply a pushing force on the pawl 1204. Thepushing force has a magnitude that is great enough to overcome a pushingforce applied to the pawl 922 by leaf spring 908. The application of thepushing force by post 1202 causes the pawl 922 to transition from itsengaged state shown in FIGS. 9-11 to its unengaged state shown in FIG.12. In effect, the pinion gear 906 is able to move freely in direction1206. Therefore, the pin 308 is able to be retracted from its engagedstate as a result of the spring's 904 decompression. Once the pin 308has been fully retracted, the security tag 300 may be removed from anarticle (e.g., article 102 of FIG. 1) to which it is attached. In thisscenario, a customer (e.g., customer 140 of FIG. 1) can carry thearticle through a surveillance zone without setting off an alarm.

Another illustrative architecture for a security tag 1800 will now bedescribed in detail in relation to FIG. 18. Security tag 132 of FIG. 1can be the same as or similar to security tag 1800. As such, thefollowing discussion of security tag 1800 is sufficient forunderstanding various features of security tag 132.

The security tag 1800 comprises a removable pin 1802 which can besecured to the tag body via a securement mechanism (not visible in FIG.18). Securement mechanisms are well known in the art. Any known or to beknown securement mechanism can be used here. For example, a three ballclutch mechanism or a clamp can be employed as the securement mechanism.

The security tag 1800 also comprises an internal RF enabled device (notshown in FIG. 18) and an optional internal EAS component (not shown inFIG. 18). The RF enabled device can be the same as or similar to the RFenabled device 136 of FIGS. 1-2. The RF enabled device is designed tocause actuation of the securement mechanism for releasing the pin 1802therefrom. EAS components are well known in the art, and therefore willnot be described herein.

FIG. 19 provides an illustration of an illustrative pad 1900 that can beused with a security tag 132, 300, 1700 for selectively releasing thepin (e.g., pin 308 of FIG. 3 or 1702 of FIG. 17) therefrom as describedherein. The pad 1900 includes an internal circuit configured to generateand transmit signals at a given frequency (e.g., 90 kHz). The signalscan include, but are not limited to, RF signals. Circuits for generatingand transmitting signals are well known in the art, and therefore willnot be described herein. Any known or to be known signalgenerating/transmitting circuit can be used here. In some scenarios, theinternal circuit is the same as or similar to a transmit circuit of theRF transceiver 204 of FIG. 2. This given frequency can be the same asthe frequency to which the Rx circuit (e.g., Rx circuit 224 of FIG. 2)of the security tag 1700 is tuned. The signal transmitted by the pad1900 causes power to be supplied to a securement mechanism of thesecurity tag, whereby the pin is released.

In some scenarios, the internal transmit circuit of the pad 1900comprises a capacitor C_tx, an inductor L_tx connected to a firstterminal of the capacitor C_tx, and a voltage source V_tx coupled asecond terminal of the capacitor C_tx and tuned to a frequency of thecapacitor C_tx and inductor L_tx, as shown in FIG. 20. The voltage isinduced in the receive circuit (e.g., Rx circuit 224 of FIG. 2) of thesecurity tag via resonant inductive coupling between the inductor L_txof the pad's transmit circuit and the inductor (e.g., inductor L_rx ofFIG. 2) of the receive circuit. The inductor in the receive circuitresonates with a receive capacitor (e.g., capacitor C_rx of FIG. 2) whenthe switch (e.g., switch 228 of FIG. 2) is closed. The receive capacitoris tuned to a frequency that is the same as a frequency to which thepad's transmit circuit is tuned. The mechanical component (e.g.,electro-mechanical lock mechanism 216 of FIG. 2) of the security tag isconnected directly between the switch and the capacitor of the receivecircuit.

Illustrative Methods for Operating a Security Tag

Referring now to FIG. 15, there is provided a flow diagram of anillustrative method 1500 for operating a security tag. Method 1500begins with 1502 and continues with 1504 where a security tag (e.g.,security tag 132 of FIG. 1 or 300 of FIG. 3) is attached to an article(e.g., article 102 of FIG. 1). This attachment involves rotating a knob(e.g., knob 314 of FIG. 3) of the security tag so as to cause a pin(e.g., pin 308 of FIG. 3) to transition into an engaged position (shownin FIG. 11). The manner in which the pin transitions to its engagedposition is described above in relation to FIGS. 9-11. Other techniquesand mechanisms can be used in addition to or as an alternative to theknob based technique for attaching the security tag to an article.

Sometime thereafter, a decision is made in 1506 to determine if apurchase transaction has been successfully performed. If the purchasetransaction was not successful [1506:NO], then method 1500 returns to1504. In contrast, if the purchase transaction was successful[1506:YES], then 1508 is performed where a security tag detachingprocess is automatically begun by an MCD (e.g., MCD 104 of FIG. 1), anRTS (e.g., RTS 118 of FIG. 1) or in response to a user-softwareinteraction with the MCD or RTS. The security tag detaching processinvolves the operations performed in 1510-1516. 1510-1516 involve:generating (e.g., by MCD 104 of FIG. 1) and sending a signal to thesecurity tag which includes a detach command for actuating a detachmentmechanism of the security tag; wirelessly receiving the signal at thesecurity tag; and authenticating the detach command at the security tag.

If the detach command is not authenticated [1516:NO], then operations of1518 are optionally performed so that the MCD, RTS and/or user is(are)notified that the detach command was not authenticated by the securitytag. Subsequently, method 1500 returns to 1510.

If the detach command is authenticated [1516:YES], then a pad (e.g., pad1900 of FIG. 19) or other external device is activated such that asignal is generated and transmitted therefrom. In response to thesignal, the detachment mechanism (e.g., electric solenoid 910 of FIG. 9)of the security tag is activated as shown by 1520. Such activation canbe achieved simply by closing a switch (e.g., switch 228 of FIG. 2)internal to the security tag. As a consequence of closing the switch,energy is allowed to flow from a receive circuit (e.g., Rx circuit 224of FIG. 2) of the security tag to the detachment mechanism so that apawl (e.g., pawl 922 of FIG. 9) is released. The pawl's release can beachieved in the manner described above in relation to FIG. 12.Subsequently, 1522 is performed where method 1500 ends or otherprocessing is performed.

Referring now to FIG. 16, there is provided a flow diagram of anillustrative method 1600 for operating a security tag (e.g., securitytag 132 of FIGS. 1-2 and/or 300 of FIGS. 3-14). The method 1600 beginswith 1602 and continues with 1604 where a pad (e.g., pad 1800 of FIG.18) or other external device (e.g., MCD 104 of FIG. 1) is activated suchthat a wireless signal is transmitted therefrom. The wireless signal isreceived at the security tag using a receive circuit (e.g., receivecircuit 224 of FIG. 2). This wireless signal causes a voltage is inducedin the receive circuit of the security tag as shown by 1608.

In 1614, the controller (e.g., controller 206 of FIG. 2) performsoperations to selectively close a switch (e.g., switch 228 of FIG. 2)that is internal to the security tag. The switch can be selectivelyclosed based on information contained in a signal received by an RFtransceiver (e.g., RF transceiver 204 of FIG. 2) of the security tag.This information can include, but is not limited to, a detach command.When the switch is closed, energy is allowed to flow from the receivecircuit of the security tag to a mechanical component (e.g.,electro-mechanical lock mechanism 216 of FIG. 2) of the security tag, asshown by 1618. This flow of energy causes actuation of the mechanicalcomponent.

In some scenarios, the controller may optionally perform operations todetect motion of the mechanical component and/or detect when apre-determined period of time has expired. The pre-determined period oftime may start at the time of switch closure. This information can beobtained by the controller for determining when to open the switch asdescribed above.

Upon completing 1618, method 1600 continues with operations 1622-1626 toprevent damage to the mechanical component when the security tag is acertain distance from an external device (e.g., MCD 104 of FIG. 1). In1622, the controller of the security tag monitors a level of energydissipation by the mechanical component. In 1624, the controllerdetermines if an accumulated amount of energy dissipation exceeds athreshold value. If the accumulated amount of energy dissipation doesexceed the threshold value [1624:YES], then the controller performsoperations to open the switch as shown by 1626. Subsequently, 1628 isperformed where method 1600 ends or other operations are performed.

In contrast, if the accumulated amount of energy dissipation does notexceed the threshold value [1624:NO], then method 1600 returns to 1622or optionally closes the switch based on some criteria, as shown by1625. For example, the switch can be closed when motion of themechanical component is detected or a pre-determined period of timeexpires. If the switch is closed in 1625, then method 1600 can end orother operations are performed.

In some scenarios, the release of the mechanical component is achievedby transitioning a pin (e.g., pin 308 of FIG. 3) from an engagedposition to an unengaged position without any human assistance ormechanical assistance by a device external to the security tag. An endof the pin resides within an aperture formed in a first portion of anenclosure spaced apart from a second portion of the enclosure by a gapwhen the pin is in the engaged position, and the pin is fully retractedinto the second portion of the enclosure when the pin is in theunengaged position.

In those or other scenarios, the transmit circuit of, for example, thepad comprises: a capacitor (e.g., capacitor C_tx of FIG. 20), aninductor (e.g., inductor L_tx of FIG. 20) connected to a first terminalof the capacitor, and a voltage source (e.g., voltage source V_tx ofFIG. 20) coupled a second terminal of the capacitor and tuned to afrequency of the capacitor and inductor. The voltage is induced in thereceive circuit via resonant inductive coupling between the inductor ofthe transmit circuit and the inductor (e.g., inductor L_rx of FIG. 2) ofthe receive circuit. The inductor in the receive circuit resonates withthe second capacitor when the switch is closed. The second capacitor istuned to a frequency that is the same as a frequency to which thetransmit circuit is tuned. The mechanical component of the security tagis connected directly between the switch and the second capacitor of thereceive circuit.

Referring now to FIG. 17, there is provided a flow diagram of anillustrative method 1700 for operating a security tag (e.g., securitytag 132 of FIGS. 1-2 and/or 300 of FIGS. 3-14). Method 1700 begins with1702 and continues with 1704 where the security tag performscommunications operations at a communications frequency (e.g., a sub-GHzfrequency). Next in 1706, a transmit circuit (e.g., transmit circuit2000 of FIG. 20) of an external device (e.g., pad 1900 of FIG. 19) isactivated. Energy is emitted from the activated transmit circuit at anenergy harvesting frequency (e.g., 3 kHz-300 kHz), as shown by 1708. Thecommunications frequency may be out of band of the energy harvestingfrequency or outside of an energy harvesting frequency band thatincludes the energy harvesting frequency. The receive circuit is used in1710 to harvest the energy emitted from the activated transmit circuit.

In 1712, an internal switch (e.g., switch 228 of FIG. 2) of the securitytag is selectively closed. When the switch is closed, the energyharvesting by the security tag is discontinued as shown by 1714. Byclosing the switch, a mechanical component (e.g., detachment mechanism250 of FIG. 2) is caused to be released in 1716. The release of themechanical component is achieved by allowing energy to flow from thereceive circuit to the mechanical component.

In 1718, the switch is selectively re-opened. The receive circuit isthen optionally used once again to harvest energy as shown by 1720.Subsequently, 1722 is performed where method 1700 ends or otherprocessing is performed.

All of the apparatus, methods, and algorithms disclosed and claimedherein can be made and executed without undue experimentation in lightof the present disclosure. While the invention has been described interms of preferred embodiments, it will be apparent to those havingordinary skill in the art that variations may be applied to theapparatus, methods and sequence of steps of the method without departingfrom the concept, spirit and scope of the invention. More specifically,it will be apparent that certain components may be added to, combinedwith, or substituted for the components described herein while the sameor similar results would be achieved. All such similar substitutes andmodifications apparent to those having ordinary skill in the art aredeemed to be within the spirit, scope and concept of the invention asdefined.

The features and functions disclosed above, as well as alternatives, maybe combined into many other different systems or applications. Variouspresently unforeseen or unanticipated alternatives, modifications,variations or improvements may be made by those skilled in the art, eachof which is also intended to be encompassed by the disclosedembodiments.

We claim:
 1. A method for operating a security tag, comprising:performing communication operations by the security tag at acommunications frequency; and using a receive circuit of the securitytag to harvest energy emitted from a transmit circuit of an externaldevice at an energy harvesting frequency; wherein the communicationsfrequency is out of band of the energy harvesting frequency.
 2. Themethod according to claim 1, wherein the energy harvesting frequency ishigher or lower than the communications frequency.
 3. The methodaccording to claim 1, further comprising: receiving a wireless signal bythe transceiver circuit of the security tag; performing operations by acontroller of the security tag to selectively close a switch in responseto the wireless signal; and causing a release of a mechanical componentof the security tag by allowing energy to flow from the receive circuitto the mechanical component when the switch is closed.
 4. The methodaccording to claim 3, wherein the energy harvesting is discontinued bythe security tag when the switch is closed.
 5. The method according toclaim 3, further comprising performing operations by the controller tore-open the switch.
 6. The method according to claim 5, furthercomprising harvesting energy once again by the security tag when theswitch is open.
 7. The method according to claim 1, wherein the transmitcircuit comprises: a capacitor; an inductor connected to a firstterminal of the capacitor; and a voltage source coupled a secondterminal of the capacitor and tuned to a frequency of the capacitor andinductor.
 8. The method according to claim 7, wherein the energy isharvested by inducing a voltage in the receive circuit via resonantinductive coupling between the inductor of the transmit circuit and aninductor of the receive circuit.
 9. The method according to claim 7,wherein the mechanical component of the security tag is connecteddirectly between the switch and a receive capacitor of the receivecircuit.
 10. A security tag, comprising: a transceiver circuit thatperforms communication operations at a communications frequency; and areceive circuit that facilitates a harvest of energy emitted from atransmit circuit of an external device at an energy harvestingfrequency; wherein the communications frequency is out of band of theenergy harvesting frequency.
 11. The security tag according to claim 10,wherein the energy harvesting frequency is higher or lower than thecommunications frequency.
 12. The security tag according to claim 10,further comprising: a switch; a mechanical component connected to theswitch; and a controller configured to selectively close a switch inresponse to a received wireless signal so as to cause a release of themechanical component.
 13. The security tag according to claim 12,wherein the energy harvesting is discontinued by the security tag whenthe switch is closed.
 14. The security tag according to claim 12,wherein the control is further configured to selectively re-open theswitch.
 15. The security tag according to claim 14, wherein the energyis harvested once again by the security tag when the switch is open. 16.The security tag according to claim 10, wherein the transmit circuitcomprises: a capacitor; an inductor connected to a first terminal of thecapacitor; and a voltage source coupled a second terminal of thecapacitor and tuned to a frequency of the capacitor and inductor. 17.The security tag according to claim 16, wherein the energy is harvestedby inducing a voltage in the receive circuit via resonant inductivecoupling between the inductor of the transmit circuit and an inductor ofthe receive circuit.
 18. The security tag according to claim 16, whereina mechanical detachment component of the security tag is connecteddirectly between the switch and a receive capacitor of the receivecircuit.