Patents

Security device and system for use therewith

A security device includes at least two pins and at least two locks. Each lock is adapted to releasably receive one pin. At least one of the at least two pins and the at least two locks are attached together. The device has a release position wherein the pins are not in the locks and a locked position where the pins are secured in the locks. In another aspect of the invention there is provided a detacher for use with two locks.

Download PDF Learn More

Multi-lock security device and detaching device for use therewith

A security device for use in association with a security pin includes a tag body, a spring lock and a magnetic lock. The tag body has a body aperture formed therein adapted to receive the security pin. The spring lock is situated within the tag body and has a spring lock aperture formed therein in registration with the body aperture. The spring lock is adapted to engage the security pin when in an engaged position and release the security pin when in a released position. The magnetic lock is within the tag body and has a magnetic lock aperture. The magnetic lock is adapted to engage the security pin when in an engaged position and to release the security pin when in a release position. The spring lock and the magnetic lock need to both be in the released position to successfully remove the security pin form the security device. A detaching device to move the spring lock and the magnetic lock into the released such that they are both in the release position at the same time is also shown.

Download PDF Learn More

Rfid security tag based monitoring system and detachers for use therewith

A smart detacher includes a detacher and an RFID reader. The smart detacher may be a handheld detacher or a secondary detacher. A method of monitoring using a security tag with an RFID chip therein and an detacher having an RFID reader operably connected thereto comprising the steps of: writing information onto the RFID chip; attaching the security tag to a product; detaching the security tag from the product and reading the information on the RFID chip; and forwarding the information to a control system.

Learn More

Dimpled reusable security pin

FIG. 1 is a top perspective view of an anti-theft security pin for store merchandise showing my new design;

FIG. 2 is a side elevational view thereof, with the opposite side being a mirror image;

FIG. 3 is a front elevational view thereof, with the opposite side being a mirror image; and,

FIG. 4 is a top plan view thereof.

Download PDF Learn More

Security package

Provided is a security package which generally comprises a casing for housing a product and a collar for locking the casing. The collar generally has a locked and unlocked configuration and comprises a first locking member having at least one male locking mechanism, and a second locking member having at least one female locking mechanism lockable to the at least one male locking mechanism. The casing generally has an open and closed configuration, and comprises a cavity shaped to substantially conform to the product. In the locked configuration the collar secures the casing in the closed configuration. The casing may comprise a first and second casing portion, and these may be integrally formed with the one or more of the first and second locking members. The collar may form a perimeter around the casing, may be adjustable, and may house a security device such as an RFID (radio-frequency identification) tag.

Download PDF Learn More

Retractable coil unit for tags

A retractable coil unit is for use in association with a tag. The retractable coil unit and the tag in combination are used to hold a pair of items together. The retractable coil unit includes a coil unit, a retractable wire and a tag attachment device. The retractable wire has one end retractably housed in the coil unit and the other end having a wire attachment device. The tag attachment device is operably connected to the coil unit. The retractable coil is for use in association with tags that are generally either security tags or inventory control tags.

Download PDF Learn More