Security system and method for protecting merchandise
First Claim
1. A security system for protecting items of merchandise comprising:
- a) a programmable key;
b) a programming station for generating a security code into the key; and
c) a security device for attachment to the item of merchandise, said security device being initially programmed with the security code from the key and subsequently being controlled by the key upon matching the security code of the key with the security code in the security device.
2 Assignments
0 Petitions
Accused Products
Abstract
A security system for protecting items of merchandise includes a programmable key, a programming station for generating a security disarm code (SDC) into the key, and a security device attached to the item of merchandise. The security device is initially programmed with the SDC from the key and is subsequently disarmed by the key upon matching the SDC of the key with the SDC stored in the security device. A wireless interface is provided in the programming station, programmable key and security device for programming the SDC into the key and for matching the SDC of the key with the SDC of the alarm module. An internal timer in the key invalidates the SDC in the key after a predetermined time period to prevent use of the key for disarming a security device after the time period has expired. The programming station initially generates a unique SDC which remains in the programming station for use with the programmable keys and alarm modules. Each retail store will have its own programming station so that each store has its own unique SDC usable only in that store and with the keys programmed therein.
-
Citations
20 Claims
-
1. A security system for protecting items of merchandise comprising:
-
a) a programmable key; b) a programming station for generating a security code into the key; and c) a security device for attachment to the item of merchandise, said security device being initially programmed with the security code from the key and subsequently being controlled by the key upon matching the security code of the key with the security code in the security device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of protecting an object including the steps of:
-
attaching an alarm module to the object; programming a key with a security code; programming the security code into the alarm module from the key; controlling the alarm module by verifying the security code in the key with the security code in the alarm module by wireless communication between the key and alarm module; and invalidating the security code in the key after a period of time to prevent subsequent disarming of the alarm module by said key unless the security code is refreshed in the key within said period of time. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A security system for protecting an item of merchandise comprising:
-
a) a key containing a code; b) a security device for protecting the item of merchandise, said security device being responsive to the code contained in the key; and c) a timer mechanism to deactivate the code in the key after a certain time period. - View Dependent Claims (20)
-
Specification