A key for a security device is provided. The key may include an electronic component configured to communicate with one or more security devices to initially receive one or more codes associated with each of the security devices. The key may also include a memory configured to store the one or more
A key for a security device is provided. The key may include an electronic component configured to communicate with one or more security devices to initially receive one or more codes associated with each of the security devices. The key may also include a memory configured to store the one or more codes associated with the one or more security devices. The electronic component is configured to communicate with each of the one or more security devices for arming and/or disarming the security devices upon a matching of the code stored by the memory with the code associated with the security device.
대표청구항▼
1. A security system comprising: a programming station;a plurality of security devices each comprising a monitoring circuit; anda plurality of keys each comprising a memory configured to store a code, each of the plurality of keys having a different code,wherein each of the plurality of keys is conf
1. A security system comprising: a programming station;a plurality of security devices each comprising a monitoring circuit; anda plurality of keys each comprising a memory configured to store a code, each of the plurality of keys having a different code,wherein each of the plurality of keys is configured to communicate with any one of the plurality of security devices to disarm the monitoring circuit of the security device,wherein each of the plurality of keys comprises a predetermined number of activations for disarming the plurality of security devices,wherein the programming station is configured to communicate with any one of the plurality of keys to reactivate the key after the predetermined number of activations, andwherein the programming station does not program the code in each of the plurality of keys. 2. The security system of claim 1, wherein the programming station does not program the plurality of security devices. 3. The security system of claim 1, wherein each of the plurality of keys is configured to wirelessly communicate with any one of the plurality of security devices. 4. The security system of claim 1, wherein each of the plurality of keys is configured to wirelessly communicate the code. 5. The security system of claim 1, wherein each of the plurality of keys is configured to transmit power to any one of the plurality of security devices for locking and/or unlocking the security device. 6. The security system of claim 1, wherein each of the plurality of security devices comprises a memory configured to store a code. 7. The security system of claim 6, wherein the memory of each of the plurality of security devices is configured to store a pre-programmed code. 8. The security system of claim 6, wherein each of the plurality of keys is configured to disarm the monitoring circuit of any one of the plurality of security devices if the code of the key matches the code of the security device. 9. The security system of claim 1, wherein each of the plurality of keys is configured to time out after a predetermined time period, and wherein the programming station is configured to communicate with any one of the plurality of keys to reactivate the key after the predetermined time period. 10. The security system of claim 1, wherein each of the plurality of security devices is configured to receive and store the code of each of the plurality of keys. 11. The security system of claim 1, wherein each of the plurality of keys is configured to time out after the predetermined number of activations such that each of the plurality of keys is incapable of disarming the plurality of security devices. 12. The security system of claim 1, wherein each of the plurality of keys is configured to transfer a signal to disarm any one of the plurality of security devices. 13. The security system of claim 1, wherein each of the plurality of keys comprises an actuation member for activating the key, and wherein the actuation member of each of the plurality of keys is configured to be inactivated after the predetermined number of activations. 14. The security system of claim 1, wherein each of the plurality of keys comprises a mechanical component configured to physically engage any one of the plurality of security devices for communication therewith. 15. The security system of claim 14, wherein the mechanical component of each of the plurality of keys is configured to physically engage the programming station for communication therewith. 16. The security system of claim 1, wherein the memory of each of the plurality of keys comprises a permanent memory for storing the code. 17. The security system of claim 1, wherein the code of each of the plurality of keys is a pre-programmed code. 18. The security system of claim 1, wherein the code of each of the plurality of keys is programmed by a manufacturer of the key. 19. The security system of claim 1, wherein the code of each of the plurality of keys is an identification code. 20. The security system of claim 1, wherein an activation comprises a communication between one of the plurality of keys and one of the plurality of security devices. 21. A security system comprising: a programming station;a plurality of security devices; anda plurality of keys each comprising a memory configured to store a pre-programmed code, each of the plurality of keys having a different pre-programmed code,wherein each of the plurality of keys is configured to communicate with any one of the plurality of security devices for controlling the security device,wherein any one of the plurality of keys is configured to communicate with the programming station for reauthorizing the key, andwherein the programming station does not program the pre-programmed code in each of the plurality of keys. 22. The security system of claim 21, wherein the programming station is not configured to program the plurality of security devices. 23. The security system of claim 21, wherein each of the plurality of keys is configured to time out after a predetermined number of activations, and wherein the programming station is configured to communicate with any one of the plurality of keys to reactivate the key after the predetermined number of activations. 24. The security system of claim 21, wherein each of the plurality of keys is configured to time out, and wherein the programming station is configured to communicate with any one of the plurality of keys to reactivate the key after the key has timed out. 25. The security system of claim 21, wherein each of the plurality of keys is configured to disarm any one of the plurality of security devices using the pre-programmed code. 26. The security system of claim 21, wherein the pre-programmed code of each of the plurality of keys is programmed by a manufacturer of the key. 27. The security system of claim 21, wherein the memory of each of the plurality of keys comprises a permanent memory for storing the pre-programmed code. 28. The security system of claim 21, wherein the pre-programmed code of each of the plurality of keys is an identification code. 29. The security system of claim 21, wherein each of the plurality of keys comprises a predetermined number of activations for controlling the plurality of security devices. 30. The security system of claim 29, wherein an activation comprises a communication between any one of the plurality of keys and any one of the plurality of security devices. 31. The security system of claim 21, wherein each of the plurality of keys is configured to communicate with the same programming station for reauthorizing the key. 32. A method for securing items of merchandise from theft, the method comprising: storing a different code in a memory of each of a plurality of keys;disarming any one of a plurality of security devices when any one of the plurality of keys is activated; andreauthorizing any one of the plurality of keys using a programming station, wherein the programming station does not program the different codes in the plurality of keys. 33. The method of claim 32, wherein disarming comprises communicating between one of the plurality of keys and one of the plurality of security devices. 34. The method of claim 32, wherein disarming comprises activating one of plurality of keys to disarm a monitoring circuit associated with one of the plurality of security devices. 35. The method of claim 32, wherein disarming comprises transferring a signal from one of the plurality of keys to disarm one of the plurality of security devices. 36. The method of claim 32, wherein disarming comprises establishing communication in response to engagement of one of the plurality of keys with one of the plurality of security devices. 37. The method of claim 32, wherein disarming comprises activating any one of the plurality of keys to disarm any one of the plurality of security devices. 38. The method of claim 32, further comprising storing a predetermined number of activations in a memory of each of the plurality of keys. 39. The method of claim 38, wherein disarming comprises activating one of the plurality of keys to disarm one of the plurality of security devices if the key has not exceeded the predetermined number of activations. 40. The method of claim 32, wherein reauthorizing comprises refreshing any one of plurality of keys using the programming station following a predetermined number of activations. 41. The method of claim 32, wherein reauthorizing comprises reactivating any one of plurality of keys using the programming station following a predetermined number of activations. 42. The method of claim 32, wherein activating comprises activating any one of plurality of keys to disarm a monitoring circuit associated with any one of the plurality of security devices using the code of the key. 43. The method of claim 32, wherein reauthorizing comprises reauthorizing each of the plurality of keys using the same programming station.
Baro Anthony (Boca Raton FL) Willard Alan E. (Coral Springs FL) Narlow Doug (Coral Springs FL), Alarm tag for an electronic article surveillance system.
Pilat Eugene R. (2035 Audubon Dr. Glendale Heights IL 60137) Franks ; Jr. George J. (261 Whitehall Dr. Palatine IL 60072) Dyben Jerry F. (541 Kirkmore Dr. New Haven IN 46779), Electronic security device and method.
Benore Randolph C. (North Canton OH) Gagliano Joseph (Canton OH) Gibson Shawn (Newago MI) Grosswiller Leo J. (East Canton OH) McGeorge Gram (Spring Lake MI) Neidlinger Donald (Grand Haven MI), Electronic security system.
Kilman ; deceased John (late of Atlanta GA by Mary Helen Kilman ; co-executor) Falkenstein Kent C. (Orangevale CA) Beckstead Donal O. (Folsom CA) Myers Phillip L. (Lithonia GA), Key and bolt lock device.
Siegel Marvin (East Lansing MI) Donohue William (Haslett MI) Francois Michael J. (Cedar Rapids IA), Miniaturized data communication and identification system.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
Fawcett, Christopher J.; Grant, Jeffrey A.; Belden, Jr., Dennis D.; Marsilio, Ronald M.; Scott, Ian R., Programmable security system and method for protecting merchandise.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.