MX2007009643A - Techniques to reduce false alarms, invalid security deactivation, and internal theft - Google Patents

Techniques to reduce false alarms, invalid security deactivation, and internal theft

Info

Publication number
MX2007009643A
MX2007009643A MX/A/2007/009643A MX2007009643A MX2007009643A MX 2007009643 A MX2007009643 A MX 2007009643A MX 2007009643 A MX2007009643 A MX 2007009643A MX 2007009643 A MX2007009643 A MX 2007009643A
Authority
MX
Mexico
Prior art keywords
identification code
article
security tag
control signal
information
Prior art date
Application number
MX/A/2007/009643A
Other languages
Spanish (es)
Inventor
R Maitin Steven
Original Assignee
Sensormatic Electronics Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sensormatic Electronics Corporation filed Critical Sensormatic Electronics Corporation
Publication of MX2007009643A publication Critical patent/MX2007009643A/en

Links

Abstract

A system, apparatus, method and article to eliminate false alarms, invalid security deactivation, and internal theft are described. The apparatus may include a first input to receive a first identification code associated with an item, a second input to receive a second identification code associated with the item, and an output to provide a control signal to control the operation of a security label deactivation and detection device based on the first and second identification codes. Other embodiments are described and claimed.

Description

TECHNIQUES TO REDUCE FALSE ALARMS. INVALIDATE DEACTIVATION OF SECURITY AND INTERNAL THEFT Background Surveillance or electronic item recognition (EAS) systems are used to control inventories and to prevent theft or unauthorized removal of items, labeled with a security label, from a controlled area. Such systems may include a transmitter system and a receiver system to establish a surveillance zone (typically entrances and / or exits in retail stores). The surveillance zone is established so that an item removed from or brought to the controlled area must pass through the surveillance zone. An EAS security tag is attached to the controlled item, including, for example, an article of merchandise, product, box, pallet, container and the like. The tag includes a marker or sensor adapted to interact with a first signal that the transmitting system transmits to the surveillance zone. This interaction establishes a second signal in the surveillance zone. The receiving system receives the second signal. If an item labeled with an EAS security label passes through the surveillance zone, the system recognizes the second signal as an unauthorized presence of the item in the controlled area and triggers an alarm. Brief Descion of the Drawings Figure 1 illustrates a first block diagram of a system according to one embodiment. Figure 2 illustrates a second block diagram of a system according to one embodiment. Figure 3 illustrates a first logic diagram according to one embodiment. Figure 4 illustrates a second logic diagram according to one embodiment. Figure 5 illustrates a third logic diagram according to one embodiment. Figure 6 illustrates a fourth logic diagram according to one embodiment. Detailed Descion Figure 1 illustrates a block diagram of a system 100.
System 100 may comprise, for example, a communication system having multiple nodes. Each node may comprise any physical or logical entity having an address in the system 100. Examples of a node may comprise a box, scanner, transceiver, RFID transceiver, deactivator, detector, merchandise items comprising an identification code. , RFID tag, security tag, computer, server, workstation, laptop, ultra-laptop, manual computer, phone, cell phone, personal digital assistant (PDA), router, switch, bridge, cube, door and so on The address may comprise, for example, a network address such as an Internet Protocol (IP) address, a device address such as a Media Access Control (MAC) address, and so on. The modalities are not limited in this context. The nodes of the system 100 may be arranged to communicate different types of information, such as information from control information means. The media information may refer in a very general sense to any data representing content, such as bar code information, RFID information, security label information, voice information, video information, audio information, text, numeric and alphanumeric information, alphanumeric symbols, graphics, images, symbols and so on. The control information can also allude in a very general sense to any data representing commands, instructions or significant control words for an automated system. For example, the control information may be used to interrogate bar codes, RFID tags, security tag, identification RFID tags, route media information through a system, or instruct a node to process the information from means in a certain way. The modalities are not limited in this context. System nodes 100 can communicate media and control information in accordance with one or more protocols. A protocol can comprise a set of predefined rules or instructions to control how nodes communicate information between them. The protocol can be defined by one or more protocol standards as promulgated by a standards organization, such as the Internet Engineering Task Force (IETF), the International Telecommunications Union (ITU), the Institute of Electrical and Electronic Engineers (IEEE) and others. The modalities are not limited in this context. The embodiments of the system 100 may comprise a wire communication system, a wireless communication system, or a combination of both. Although the system 100 can be illustrated using a particular communication means by way of example, it can be appreciated that the principles and techniques discussed herein can be implemented using any type of communication medium and technology attached. The modalities are not limited in this context. When implemented as a wired system, for example, the system modes 100 may include one or more nodes arranged to communicate information in one or more wired communication means. Examples of wired communication means may include a wire, cable, printed circuit board (PCB), backup plane, switch cloth, semiconductor material, twisted pair wire, coaxial cable, optical fibers, and so on. The communication means is connected to a node using an input / output adapter (I / O). The I / O adapter may be arranged to operate with any suitable technique for controlling information signals between nodes using a desired set of protocols, services or communication operation procedures. The I / O adapter may also include the appropriate physical connectors for connecting the I / O adapter to a corresponding communications medium. Examples of an I / O adapter can include a network interface, a network interface card (NIC), disk controller, video driver, audio driver and so on. The modalities are not limited in this context. When implemented as a wireless system, for example, system embodiments 100 may include one or more wireless nodes arranged to communicate information on one or more types of wireless communication media, sometimes referred to herein as shared wireless media. An example of a wireless communication means may include portions of a wireless spectrum, such as the radio frequency (RF) spectrum. The wireless nodes may include components and interfaces suitable for communicating information signals in the designated wireless spectrum, such as one or more antennas, wireless transmitters / receivers ("transceivers"), amplifiers, filters, control logic, and so forth. As used herein, the term "transceivers" may include, in a very general sense, a transmitter, a receiver or a combination of both. Examples of an antenna may include an internal antenna, an omni-directional antenna, a monopole antenna, a dipole antenna, an end-feed antenna, a circularly polarized antenna, a micro-strip antenna, a multiple antenna, a dual antenna, directional antenna, a helical antenna, and so on. The modalities are not limited in this context. Referring again to Figure 1, system 100 may comprise one or more nodes 1, 10, 120, 130, for example, for reading and processing information contained in commodity article 1 40. System 100 may process transactions associated with the article of merchandise 140 along a general path of cash flow indicated by arrow 1 70. Although Figure 1 shows a limited number of nodes arranged in a certain topology, system 1 00 may include fewer or additional nodes arranged in a variety of topologies according to a given modality. The modalities are not limited in this context. The commodity article 140 may comprise, for example, any product, food, drug, component, box, container, stage, coupon, ticket, label, or other means, and any other item traced or controlled. The merchandise article 140 may comprise first article identification code 140, RFI tag 144, and security tag 146 fixed thereto. In addition, the RFI tag 144 may comprise second article identification code and antenna 145. The security tag 1 46 may comprise an EAS tag, for example. In one embodiment, the RFI tag 144 and the security tag 1 46 may be an integral unit 149 or may be separate elements, for example. The first article identification code 142 may comprise, for example, a product identification code associated with the merchandise article 140. In one embodiment, the first article identification code 142 may comprise, for example, a bar code. . The first item identification code 142 may be printed, stamped or otherwise secured to the merchandise item 140. The first item identification code 142 may comprise encoded numeric or alphanumeric information elements associated with the merchandise item 140 and may understand, for example, a system number, a manufacturing number to identify the manufacturer and an article code to identify the article, among others. Each item of information may comprise one or more digits. The first article identification code 142 may also comprise information for verifying the code when it is transferred to a separate device, for example. In one embodiment, the first article identification code 142 may comprise a bar code, for example. A bar code is a symbol of the Universal Product Code (UPC). The bar code facilitates the timely and accurate entry of data into a computer system and allows the grocery and retail industry to track, manage and control the flow of physical products (eg, commodity article 140). A barcode scanner / reader placed on a box counter reads the bar code when it is placed in proximity to it and in view of it. The information elements of the bar code comprise a series of bars and alternating spaces that form a bar pattern and parallel spaces of variable width. The combination of these bar lines and parallel spaces encode information about the article, the product, the container, the medium and the like. Barcode applications include inventory control and cashier scanning. Bar code standards may include, for example, the Universal Product Code A standard, which is widely used by retailers in the United States and Canada, and the most recent code 1 28 (eg, UCC / EAN 128), among others. Each bar code can comprise, for example, a system number, a manufacturing number and an article code, among others. The numeric or alphanumeric code can be used to identify a specific product, and can generally comprise a six-digit code to identify the manufacturer, a six-digit code used by the manufacturer to identify the product, and a two-digit verification code. Checks to verify the accurate transmission of the barcode to the scanner. The United States grocery industry has adopted a 1 2-digit bar code pattern to identify a character of the number system (coded product type), a manufacturer's five-digit number assigned by the UCC, a code of five-digit product assigned by the manufacturer, and a check digit of module 10 as the 1st character. There are two versions of this numeric code including an E version that contains six digits and a D version that contains 1 2 + n digits. The RFI tag D 144 may comprise an integrated circuit (IC) and a second code 1 43 for item identification. In addition, the RFID tag 144 comprises the antenna 145 connected thereto. The RFI tag 1 44 may comprise a variety of chip architectures and the second article identification code 143 may comprise a variety of code formats. The tag 1 44 of RFI D is operable to respond to an RF interrogation signal, which includes some identification information. A code format used in the retail industry is the Electronic Product Code (EPC), for example. The EPC is a globally unique number that identifies a specific item in a supply chain and is stored in an RFI D label 144. The EPC uses a 96-bit scheme recommended by global EPC. Other formats and code techniques can be used. For example, larger or more compact 64-bit codes may be useful depending on the particular mode. These coding schemes are able to uniquely identify trillions of objects and provide more information about the articles, which can not be provided using bar codes alone, for example. Certain companies or retailers authorize specific RFID systems according to the EPC specification, for example.
This specification describes five main components of an RFID system: the EPC, labels, readers, intermediate accessories and the information service. Several aspects of RFID technology make it different from bar code technology. For example, the second item identification code 143 stored in the RFID tag 140 is transmitted by radio waves and does not require visual scanning lines to transfer information. It allows virtually simultaneous and instantaneous reading of multiple tags near the RFID 1 14A transceiver. In addition, each RFID tag 144 may include a unique code that ultimately allows individual identification and counting of each tagged item. The retailers can use RFI D technology to associate the unique RFI D identifiers, such as the second item identification code 143, with other information of interest of fields in a database belonging to various articles and pieces of information. merchandise comprising the RFID tag 144. In one embodiment, the second item identification code 143 may be associated, or correlated, with the first item identification code 142 to determine whether the merchandise article 140 identified by the second article identification code 143 is the same item. according to the first article identification code 142. The second item identification code 143 may comprise, for example, an RFID identification code associated with the commodity article 140. The second article identification code 143 may comprise specific details of the product associated with the commodity article 140. for processing by the system 100. The second identification code 143 may comprise, for example: date of manufacture, time spent in transit, location of the distribution center that has the article, name of the last person who handled the article, quantity per which the item was sold, payment form used when buying the item, expiration date, last service date, warranty period and security label, among others. The second item identification code 143 may provide additional information about the merchandise article 140 and additional functionality on the first item identification code 142. For example, the second item identification code 143 includes more information and the system 100 may change the information during processing. The first and second article identification codes 142, 143 can be correlated by the system 100 to determine whether the merchandise article 140 identified by the first article identification code 142 is or is not the same item identified by the second identification code 143. of article. The box node 1 10 may comprise the scanner 1 12 and the transceiver 1 14A, each connected to the processor 1 18. The cash node 1 10 may be adapted to process several transactions including the processing of purchases of several items, such as article 140 of merchandise, for example. The box node 1 10 can communicate with the merchandise article 140 through wireless connections 148 and 150, for example. In one embodiment, connection 1 48 may be an optical connection and connection 1 50 may be a wireless RF connection. The box node 1 10 is connected to the deactivation node 120 via the connection 1 62. The deactivation node 1 20 is connected to the detection 1 30 through the connection 164. For example, the connections 162 and 164 can be wired or wireless connections. The scanner 1 1 2 may comprise, for example, a box device. Examples of a box device may include an apparatus for processing or registering a purchase of item 140 of merchandise, such as a cash register, a point of sale (POS) terminal, a scanner, and the like, installed at a counter of box in a retail facility. For example, in one embodiment, the scanner 1 12 may comprise an optical device such as a laser device. For example, the 1 1 2 scan modes may comprise counter scanners, canes, handheld devices, projection / vertical scanners. The scanner 1 1 2 may be adapted to read information from article 140 of merchandise. For example, the scanner 1 1 2 may be adapted to read information. In operation, the scanner 1 1 2, such as for example a POS scanner, reads the first article identification code 1 42 on channel 148. The modes are not limited in this context. Accordingly, the channel 148 may be an optical link and the scanner 1 12 is a laser scanner adapted to read the code 142. In one embodiment, the first item identification code 142 is bar code information. In one embodiment, the transceiver 1 14A and the tag 1 44 of RFI D can form an RFID system and communicate with each other over the wireless RF communication channel 1. In one embodiment, the transceiver 1 1 4A may comprise a hardware device for interrogating the RFI tag 144 and initiating the reading of the second article identification code 143. In one embodiment, the 1 1 4A transceiver may comprise an RFI D transceiver adapted to communicate (e.g., read and write) information to the RFI tag 144. In operation, the transceiver 1 14A sends a request for information 143 of identification to tag 1 44 of RFI D by channel 1 50 of RF wireless communication. For example, the tag 1 44 of RFI D responds by transmitting the second identification information 143 to the transceiver 1 14A, which then provides the information to the processor 1 18. Once interrogated by the transceiver 1 14A, the tag 144 of RFI D transmits the second item identification code 143 by means of the RF communication channel 1 50 through the antenna 145. In one embodiment, the transceiver 1 14A is placed in the box node 1 10. In other embodiments, the 1 1 4A transceiver may be located away from the box node 1 1 0 and may be mounted on door frames, attached to hoists, manually, or even built on shelves to read articles tagged with RFID. For example, to read a plurality of RFID tags placed in a general area, a plurality of RFID transceivers may be located in a whole controlled area. The transceiver 114A also communicates with data processing equipment, such as the processor 118. For example, the processor 118 may comprise intermediate equipment for transforming the raw feed information received from the RFID tag 144, for example, into useful information. of business. In one embodiment, for example, the processor 118 may comprise one or more inputs 117A, B and at least one output 119. The first input 117A is connected to the scanner 112 and the second input 117B is connected to the transceiver 114A. Processor 118 is adapted to communicate with nodes 120, 130 of system 100 through output 119 and connection 162. Inputs 117A, B may be adapted to transfer first and second identification codes 142, 143 of items associated with Article 140 of merchandise. For example, the input 117A may be adapted to transmit information associated with the first item identification code 142 received by the scanner 112 and the input 117B may be adapted to transmit information associated with the second item identification code 143 received by the 114A transceiver. At least one output 119 is connected to elements downstream of the system 100, such as, for example, the deactivation node 120 through the connection 162. At least one output 119 may be adapted to communicate media information and control downstream of the cash flow area indicated by arrow 170, such as nodes 120, 130, for example. The information may take the form of analog or digital signals, electrical signals, a sequence of bits or bytes, for example, among other forms of information, formatted to exchange information between electrical equipment, processors and / or computers located at nodes 1 10. , 120, 130. In operation, the system 100 may correlate the information contained in the first article identification code 142 and the information contained in the second article identification code 143 associated with the article 140 of merchandise. The system 100 processes the first and second item identification codes 142, 143 to determine whether an article of merchandise identified by the first identification code 142 is the same as the merchandise article 140 identified by the second identification 143. After the correlation of the first and second codes 142, 143 on this basis, the system 100 determines to activate or deactivate elements and / or nodes of the system 100 on a real time basis. For example, the system 100 can control the activation or deactivation of EAS technology elements of the system 100 based on the results of the correlation of the first and second item identification codes 142, 143 to reduce the occurrence of theft type ". enamored "and false alarms of the exit system. The term "lovers" refers to employees who make merchandise discounts to their friends by partially registering a sale, recording a sale with a much lower price and making it look like an "innocent" transaction. In one embodiment, the processor 118 can process the first article identification code 142 received from the scanner 112 and the second article identification code 143 received by the transceiver 114A through the outputs 117A and 117B, respectively, to control the operation of deactivation node 120. For example, whether the security tag 146 is deactivated or not when it is located in proximity to the deactivation node 120. For example, the processor 118 can process the information received from the scanner 112 and the transceiver 114A, and if there is a predetermined correlation between the first and second item identification codes 142, 143, the processor 118 transmits a signal to activate the node 120. deactivating and deactivating the security tag 146 to disable the alarm 138 in the detection node 130. In one embodiment, the RFID transceiver 114A and the scanner 112 can form an integral unit, generally shown at 116, to register the merchandise item 140 in the system 100. In one embodiment, the system 100 can include the deactivation node 120. , which may comprise an apparatus for deactivating the security tag 146 fixed to article 140 of merchandise, for example. In one embodiment, the deactivation node 120 may comprise an EAS deactivator, for example. The box node 110 may communicate correlated information associated with the first and second item identification codes 142, 143 of the merchandise article 140 to the deactivation node 120 via the connection 1 62. The deactivation node 120 may use this information correlated to determine whether or not to activate the label • 1 46 of security as it moves along the path indicated by arrow 170. In one embodiment, deactivation node 120 may also comprise operable peeler / deactivator 122 to remove and deactivate security tag 146 of article 1 40 of merchandise, for example. In one embodiment, the stripper / deactivator 122 may be placed in or near the box counter. Disengagement / deactivator 122 may also function as a data writer and writer with respect to security tag 146. The connection 1 62 can provide a communication path between the detacher / deactivator 1 22 and the box node 1 1 0. In one embodiment, the deactivation node 120 may also comprise the transceiver 1 14B for communicating information associated with the second article identification code 143 between the RFID tag 144. The transceiver 1 14B may also comprise an RFI D transceiver and may substantially comprise functionality similar to that of the 1 14A transceiver. the connection 1 52 provides a wireless communication channel for transferring the second item identification codes 143 to the deactivation node 1. The second article identification code 1 43, among other information, can be transferred between the deactivation node 1 and the box node 1 via the communication connection 1 62, for example. In one embodiment, for example, the box node 1 10 and the deactivation node 1 20 can form an integral unit 1 60. In one embodiment, the deactivation node 1 20 comprising the transceiver 1 14B of RFI D, can be placed with the box node 1 10 in the shopping transaction flow area or can be placed away from it. In one embodiment, the deactivation node 120 reads the presence of the security tag 146 as well as the second item identification code 143 from the RFI D tag 144. The box node 1 1 0 may combine scanning and deactivation functionality, generally shown as 1 60, for example. However, other modalities may be provided. For example, in one embodiment the deactivation node 120 may be positioned following, but in line with, the general direction indicated by the arrow 1 70 of the cash flow area in which the item 140 may be processed in the system 1 00 of merchandise In one embodiment, system 100 may comprise a detection node 1 for detecting the presence of a live or active security tag 146. The equipment of the detection node 1 may include, for example, one or more antenna pedestals 1 32, 134 and receiver / detection electronics 1 36 and an alarm 1 38. In one embodiment, the detection node 1 30 may comprise EAS detector equipment to form an EAS detection system. In one embodiment, the detection node 1 may comprise a magneto-mechanical EAS system. In addition, in one embodiment, the system 100 may comprise, for example, elements of an article surveillance and item identification system combined and installed in a retail facility. The detection equipment located in the detection node 1 may be positioned, for example, near or in an exit / entry location of a retail store. In one embodiment, the detection node 1 may also comprise the transceiver 1 14C to communicate with the RFID tag 144 to transfer information associated with the second item identification code 143. The 1 14C transceiver may also comprise an RFI D transceiver, it may provide a functionality substantially similar to that of the 1 1 4A, B transceivers. The second article identification code 1 43 may be transferred to the detection node 130 through communication connection 1 54, which provides a wireless communication channel. The second RFI D item identification code 143 can be transferred to the deactivation node 120 via the communication channel 164, for example, and to the box node 1 1 0 via communication channel 1 62, for example. In one embodiment, for example, the first and second item identification codes 142, 143 and the information of the security tag 146 can be exchanged between the box node 1 1 0, the deactivation node 120 and the node 1. of detection on a real-time basis. Accordingly, in one embodiment, the functionality of the RFID transceiver 114A, B and C can be integrated with any of these nodes 110, 120, 130 and / or the scanner 112. In one embodiment, the second item identification code 143 can be be transmitted to the deactivation node 120 or to the detection node 130 during or at the end of a box operation in the box node 110, depending on the particular mode of the system 100. In one embodiment, the system 100 may include one or more communication means 148, 150, 152, 154, 162, 164. The communication means 162, 164 can be used to communicate information between the various nodes of the system 100, such as the nodes 110, 120, 130. For example, the communication means 162, 164 may comprise wire communication means, means of wireless communication or a combination of both, as desired for a given implementation. Communication means 148, 150, 152, 154 can be used to communicate information between node 140 and nodes 110, 120, 130 of system 100. For example, communication means 148, 150, 152, 154 may comprise means of communication. wire communication, wireless communication media or a combination of both, as desired for a given implementation. The modalities are not limited in this context. In one embodiment, the system 100 can be implemented to prevent internal theft by employees, "in love", false alarms, and to reduce the work related to security tag 146 transactions at nodes 1 1 0, 1 20, 1 30 and to reduce the labor and cost associated with return transactions associated with merchandise items. This type of theft is difficult to detect. Retail sellers currently consider domestic theft and "in love" as the largest percentage of losses. To handle employee theft, the security tag 146 may be linked to the box node 1 10 (eg, scanners / bar code readers) to avoid disabling the security tag 146 until the first code 1 42 The identification of the article associated with the product has been scanned and read by the scanner 1 1 2. This technique alone, however, does not correlate the first scanned item identification code 1 42 with the security tag 146 fixed to the product and not there is validation that the first article identification code 142 corresponds to article 140 of merchandise being purchased. Therefore, in a form of "in love" theft, the first article identification code 142 associated with a relatively inexpensive item can be fraudulently fixed to a much more expensive item, which is subsequently scanned and, presumably, allowed to be the deactivation of the security tag 1 46 and allowing the buyer to go out with the expensive item without activating the alarm 138 of the security tag. In addition, there is currently no protection or prevention technique to eliminate false alarms. For example, when an EAS tag is not properly deactivated it can trigger an alarm event even when the customer has paid for the product. Logs or databases can be maintained to identify problem products that typically cause false alarms to sound, and in some of these cases corrective actions must be taken, such as discontinuing the use of a security label on the product or implementing special management instructions. . False alarms can also be triggered when a customer enters a retail store to return a product. A security tag that is in an active state can be referred to as a live tag. These live EAS tags that enter a store (referred to as tag contamination) with an EAS detection system will cause a false alarm. False alarms are a source of bad publicity for EAS customers, cause a drop in productivity and in some cases can prevent the client from returning to the business. This can result in decreased income. Security label contamination is also a significant problem with current EAS systems as a cause that leads to false alarms. This is a situation where a product is purchased at a location without an EAS system, but that product is already "ready for EAS", having been most likely labeled at a distributor of its production source. This process will eliminate false alarms due to "label contamination". The modalities can solve these and other problems by correlating the RFI D information read by the RFI D transceiver 1 14A (or 1 14B, C depending on the particular mode of the system 100) with the information of the first item identification code 1 42. , for example, and / or the information of security tag 146, for example. In one embodiment, system 1 00 can be used to implement a cash process, for example. The article 140 of merchandise comprising the RFI tag D 144 is presented to the box node 1 10 of the system 1 00. When the attempt to purchase the merchandise article 140 is recorded by the scanner 1 12, the RFI transceiver 1 14A D reads the information associated with commodity article 140 and immediately (eg, real time) sends that information to security tag deactivation node 120 via connection 1 62 and security tag detection node 1. In one embodiment, the deactivation node 1 20 with transponder 1 14B of RFI D, which is co-located in the commodity cash flow area, also reads the presence of the security tag 146 and the associated RFI D information. with article 140 of merchandise. If the RFI D information matches that of an item that the scanner 1 12 recorded during the current transaction, the deactivation node 120 deactivates the security tag 1 46, otherwise the deactivation node 1 20 is uninhabited at all times thus avoiding the theft of "lovers". This will eliminate the need to look for individual products as well as having a lot of security personnel in an exit system, thus reducing the time and work for the retailer. The system 1 00 comprising the detection node 1 monitoring outputs of a company, such as, for example, a retail company. When an item 140 of merchandise leaves the company or leaves the area of the box node 10 (wherever the exit system may be located), the detection node 1 interrogates the firms associated with the security tag 146. of article 140 of merchandise. In the event that article 1 40 of the merchandise still contains an active or live security tag 146, the signature detection node 1 30 will activate alarm 138. At that time, the person wearing merchandise item 1 40 may present the purchase transaction receipt of article 1 40 of merchandise and the article itself to transceiver 1 14C of RFI D (or transceivers 1 1 4A, B, for example), which may be co-located with or in proximity of node 1 30 detection. If the reading ranges for the RFI D label 144 technology and the security label 1 46 are significantly different, the article 1 40 of merchandise can be located in the vicinity of the RFI D transceiver 1 1 4C to confirm the purchase of the RFI D transponder. Article 140 of merchandise. If the read ranges of the RFI D tag 1 44 and the security tag 1 46 match or are close, the detection node 1 30 interrogates the RFI tag 144 simultaneously with the security tag 146 and does not activate the security tag. alarm 1 38. The system 1 00 can then compare the interrogation information of the tag 1 44 of RFI D and the security tag 1 46 with the information associated with article 140 of the merchandise provided by the scanner 1 12 to determine the validity of the current purchase transaction. If the alarm 138 was activated by the detection node 1 30 in a live security tag 146 (for example, not deactivated), but the purchase of the product is validated, the information associated with the failure to deactivate the security tag 146 can be provided to the scanner 12 or the box node 10 so that appropriate corrective actions can be taken. The system 100 comprising the detection node 30 monitors the entries of a company, such as, for example, a retail company. If an item 140 of merchandise enters the company and the detection node 1 30 detects a live security tag 146, the detection node 1 30 will activate the alarm 1 38. Accordingly, the person wearing article 1 40 of merchandise it can be located in proximity to the 1 14C transponder of RFI D. If the RFI signature D (eg, second identification code 143) indicates that article 140 of merchandise was not purchased at that particular retail location, help can be given to deactivate the product causing the alarm, this being an appropriate action. If the entry detection node 1 30 is in alarm by a live security tag 146, but the purchase of the article 140 of merchandise is validated, the information of the failure to deactivate the security tag 1 46 can be communicated to the node 1 1 0 of POS box so that appropriate actions can be taken.
The system 100 comprising the detection node 1 can be used to monitor the entries of a company, such as, for example, a retail company, to detect merchandise items that cross the retail vendor's entrance for carry out a process of return of merchandise. Retail sellers use time and personnel during a return process. In addition, retailers may not wish to make a return transaction process for items of merchandise purchased at a different retail outlet or different facility from the same retailer. A return process may comprise presenting the commodity article 140 to the RFI D transceiver 1 1 4C to initiate a return transaction. Based on the RFI D information (for example, the second article information code 1 43), if article 140 of merchandise was validly purchased at the retail seller's location, the person carrying article 1 40 of Merchandise may be prosecuted to an appropriate area to process the return transaction or it may receive a credit for the return in a "self-exit" process. Figure 2 illustrates a block diagram of a system 200.
The system 200 comprises the functionality according to the system 1 00, discussed above with respect to Figure 1. The system 200, however, comprises the host central computing node 21 0. Accordingly, the box node 1 10 can communicate with the guest node 21 0 via the connection 21 2. The deactivation node 1 20 can communicate with the guest node 21 0 via the link 214. The detection node 130 can be communicating with host node 210 via connection 216. System 200 is suitable for use according to system description 1 00 as previously described. The embodiment is not limited, however, to the example given in Figure 2. In addition, the host 210 may comprise the functionality of the processor 1 1 8 and may be adapted to receive information associated with the article 140 of merchandise, such as, for example , the first and second codes 142, 143 of article identification and the information of security tag 1 46, among other information. The host 210 may be adapted to process this information and on that basis control the operation of the nodes 1 10, 1 20, 1 30 and all the elements comprising in the modes 1 1 0, 1 20, 1 30, for example. Referring to Figures 1 and 2, nodes 1 1, 120, 1 30, 140 and 21 0 of the systems 100 and 200 may each comprise multiple elements. These elements may comprise, for example, a processor. The processor can be implemented as a general-purpose processor, such as a general purpose processor made by I ntel® Corporation, Santa Clara, California. In another example, the processor may include a dedicated processor, such as a controller, a microcontroller, a built-in processor, a digital signal processor (DSP), a programmable field port array (FPGA), a logic device programmable (PLD), a network processor, an I / O processor, and so on. The modalities are not limited in this context. In one embodiment, the nodes 1 1 0, 1 20, 1 30, 140 and 21 0 of the systems 100 and 200 may each comprise additional multiple elements. These additional elements may comprise a memory. The memory may include any machine-readable or computer-readable medium capable of storing information, including both volatile and non-volatile memory. For example, the memory may include read only memory (ROM), random access memory (RAM), dynamic RAM (DRAM), dual information rate DRAM (DDRAM), synchronous DRAM (SDRAM), static RAM (SRAM) , Programmable ROM (PROM), programmable Erasable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash memory (fleeting), polymer memory such as ferroelectric polymer memory, ovoid memory, phase change or ferroelectric memory, silicon-oxide-nitride-oxide-silicon memory (SONOS), magnetic or optical cards, or any other type of medium suitable for storing information. The modalities are not limited in this context. In addition, each of the elements comprising the nodes 1, 10, 120, 1 30, 1 40 and 210 of the systems 1 00 and 200 as well as the sub-elements 1 12, 1 14 A, B, C, 1 22, 1 32, 1 34, 136, 1 38, 142, 144, 146 according to one embodiment, may comprise multiple elements. These elements may comprise, or be implemented as one or more circuits, components, recorders, processors, software sub-routines, modules, or any combination thereof, as desired for a given set of design or performance constraints. Although Figures 1 and 2 show a limited number of elements by way of example, those skilled in the art will appreciate that fewer elements or additional elements may be used as desired for a given implementation. The modalities are not limited in this context. The operations of the systems, nodes, apparatuses, elements and / or subsystems above can be described further with reference to the following Figures and attached examples. Some of the Figures may include a programming logic. Although such Figures presented herein may include a particular programming logic, it may be appreciated that the programming logic provides only one example of how the general functionality, as described herein, may be implemented. In addition, the given programming logic does not necessarily have to be executed in the order presented, unless otherwise indicated. In addition, the given programming logic can be implemented by means of a hardware element, a software element executed by a processor, or any combination thereof. The modalities are not limited in this context. Figure 3 illustrates a logical flow diagram representative of a cash and / or output process according to a modality. In one embodiment, Figure 3 may illustrate a programming logic 300.
Programming logic 300 may be representative of operations performed by one or more structures described herein, such as systems 100 and 200. For example, operations performed by nodes 110, 120, 130, 140 and 210 of the systems 100 and 200 as well as sub-elements 112, 114A, B, C, 122, 132, 134, 136, 138, 142, 144, 146. As shown in diagram 300, the operation of the systems 100, 200 described above and the associated programming logic can be better understood by way of example. Accordingly, in block 310, an article, such as article 140 of merchandise, which includes an RFID tag 144, a first item identification code 142 and a security tag 146, such as an EAS security tag , is presented to | box node 110 comprising the scanner 112 and the RFID transceiver 114A. In block 312, the system 100, 200 scans the first item identification code 142 and reads the RFID tag 144. In block 314, the box node 110 sends the first article identification code 142 to the deactivation node 120 and to the detection node 130. In block 316, the deactivation node 120 reads the presence of the security tag 146. If the deactivation node 120 comprises the RFID transceiver 114B, it also reads the RFID tag 144. Otherwise, the information of the RFID tag 144 read in the box node 110 is used. In the decision block 318, either the box node 110 or the deactivation node 120 determines whether the first article identification code 142 matches the information of the RFI tag 1 44. If the first identification code 142 The article does not match the information associated with the RFI D tag 144, the processing proceeds by the "no" branch to the block 324, and the deactivation node 120 does not disable the security tag 146. In block 326, deactivation node 120 reports the non-deactivation of security tag 1 46 to box node 1 10. In one embodiment, the deactivation node 1 also reports any alarm information to the box node 10. If the first item identification code 142 matches the information associated with the RFI tag D 144, the processing progresses through the "yes" branch to the block 320 and the deactivation node 20 deactivates the security tag 146. In block 322, the deactivation node sends information from the RFI tag 144 to the detection node 30. In the decision block 328, the detection node 30 determines whether the security tag 146 has been successfully deactivated. If the security tag 146 has been deactivated, the process continues through the "yes" branch and the process ends. Alternatively, if the security tag 146 has not been deactivated, the process continues through the "yes" branch and in the block 330 the detection node 30 reports the failure to deactivate and / or any alarm information to the node 1. of box. If the detection node 1 comprises the 1 1 C transceiver of RFI D, in the block 332 the transceiver 1 1 4C reads the information of the tag 146 of RFI D and in the block 334 of decision, it determines whether the alarm is valid . If the alarm is not valid, the process continues through the branch "no" and in the block 336 the deactivation node 120 is notified of the failure to deactivate the security label 146. Otherwise, if the alarm is valid, the process continues through the branch of "yes" and in block 338, alarm 138 is activated and the process ends. Figure 4 illustrates a logical flow diagram representative of an entry process to a retail facility according to a modality. In one embodiment, Figure 4 can illustrate a programming logic 400. Programming logic 400 may be representative of operations performed by one or more structures described herein, such as the systems 1 00 and 200. For example, the operations executed by the nodes 1 1 0, 1 20, 1 30, 140 and 210 of the systems 100 and 200 as well as the sub-elements 1 1 2, 1 14A, B, C, 122, 1 32, 1 34, 1 36, 1 38, 142, 144, 146. As shown in diagram 400, the operation of the systems 100, 200 described above and the associated programming logic they can be better understood by way of example. Accordingly, in block 410, a user enters an installation with an cle comprising RFI D tag 1 44 and security tag 146. In block 412, detection node 30 triggers alarm 1 38. In decision block 414, system 1 00, 200 determines whether the item was purchased in the retail facility. If the item was purchased at the retail facility, the process continues through the "yes" branch and the security tag 146 is deactivated at block 41 6. In block 418, an error report is sent to the node 1 1 0 of cash. If the item was not purchased at the retail facility, the process continues through the "no" branch and in the decision block 420, the system 1 00, 200 determines if the item was offered for sale at the facility. retail sale. If the item was offered for sale in the retail facility, processing continues through the "yes" branch and in block 424 the retailer decides whether to deactivate alarm 1 38. If the item was not offered for sale in the retail installation, processing continues through the "no" branch and in block 422 the security personnel of the retailer is involved in the transaction. Figure 5 illustrates a logical flow diagram representative of an cle return process in a retail facility according to a modality. In one embodiment, Figure 5 may illustrate a programming logic 500. Programming logic 500 may be representative of operations performed by one or more structures described herein, such as systems 1 00 and 200. For example, operations executed by nodes 1 1 0, 1 20, 1 30, 1 40 and 210 of the systems 100 and 200 as well as the sub-elements 1 1 2, 1 14 A, B, C, 122, 1 32, 1 34, 1 36, 1 38, 142, 144, 146. shown in diagram 500, the operation of the systems 1 00, 200 described above and the associated programming logic can be better understood by way of example.
Accordingly, in block 51 0, a user enters an installation with an article comprising RFI tag D 144 and security tag 146. In block 512, detection node 30 reads RFI tag 144. In decision block 514, system 100, 200 determines whether the item was purchased in the retail facility. If the item was not purchased at the retail facility, the process continues through the "no" branch and in block 520 the return authorization for the item is denied. If the item was purchased at the retail facility, the process continues through the "yes" branch and in decision block 516, system 1 00, 200 determines if the item is qualified for self-exit, the process it continues through the branch of "yes" and in block 522 the system 100, 200 can process an automatic reimbursement. If the article is not qualified for self-exit, the process continues through the branch of "no" and in block 51 8 the user is prosecuted to the return area for further processing. Figure 6 illustrates a logic diagram according to one embodiment. Figure 6 illustrates a programming logic 600. Programming logic 600 may be representative of operations performed by one or more structures described herein, such as systems 100 and 200. For example, operations performed by nodes 1, 10, 1, 30, 1 40 and 210 of the 1 00 and 200 systems as well as the sub-elements 1 1 2, 1 14 A, B, C, 122, 1 32, 1 34, 1 36, 1 38, 1 42, 144, 146. shows in programming logic 600, in block 610 the system receives a first identification code associated with an article. Block 61 2 the system receives a second identification code associated with the article. In block 61 4, the system processes the first and second identification codes. In the decision block 616, the system determines whether the first identification code is correlated with the second identification code associated with the article. If there is a correlation between the codes, the process continues through the "yes" branch and in block 61 8, a system module produces a control signal to deactivate a security label. In block 620, another system module receives the control signal to deactivate the security label and in block 622 deactivates the security label. If there is no correlation between the codes, the process continues through the branch of "no" and in block 624, and no deactivation control signal is produced. The process continues in block 626, where the system monitors the security label and in decision block 628 the activation status of the security label is determined, for example, if the security label is still active. If the system determines that the security tag is not active, the process continues by branching "no" to block 634 and does not activate the alarm. If, in block 628, the system determines that the tag is still active, the process continues by branching "yes" to decision block 630. In the decision block 630, the system determines whether the output of the decision block 61 6 was "yes". In other words, it determines whether the first identification code is correlated with the second identification code. If the first identification code is correlated with the second identification code, the process continues by branching "yes" to block 632 and notifying the system of the failure to deactivate the security label. The alarm, however, is not activated. If, in the decision block 630, the system determines whether the output of the decision block 616 was "no" and there is no correlation between the first and second identification codes, the system advances by the "no" branch to the block 636 and activate the alarm. A number of specific details have been set forth herein to provide a complete understanding of the modalities. It will be understood by those skilled in the art, however, that the modalities can be practiced without these specific details. In other cases, well-known operations, components and circuits have not been described in detail so as not to obscure the modalities. It can be appreciated that the specific structural and functional details described herein may be representative and do not necessarily limit the scope of the modalities. It is also worth noting that any reference to "a modality" means that a particular aspect, structure or characteristic described in relation to the modality is included in at least one modality. The occurrences of the phrase "in one modality" in several places in the specification do not all necessarily refer to the same modality.
Some modalities can be implemented using an architecture that can vary according to any number of factors, such as computing regime, power levels, heat tolerances, processing cycle budget, input information regimes, output information regimes , memory resources, data bar speeds and other desired performance constraints. For example, a modality can be implemented using software executed by a general-purpose processor or special purpose. In another example, a modality can be implemented as dedicated hardware, such as a circuit, a specific application integrated circuit (ASIC), a Programmable Logic Device (PLD) or digital signal processor (DSP), and so on. In yet another example, a modality can be implemented by any combination of programmed general-purpose computer components and customary hardware components. The modalities are not limited in this context. Some modalities can be described using the expression "coupled" and "connected" together with their derivatives. It should be understood that these terms are not used as synonyms between them. For example, some modalities can be described using the term "connected" to indicate that two or more elements are in direct physical or electrical contact with each other. In another example, some modalities can be described using the term "coupled" to indicate that two or more elements are in direct physical or electrical contact. The term "coupled", however, can also mean that two or more elements are not in direct contact with each other, but still cooperate or interact with each other. The modalities are not limited in this context. Some embodiments may be implemented, for example, by using a machine readable medium or article which may store an instruction or a set of instructions which, if executed by a machine, may cause the machine to perform a method and / or operations of according to the modalities. Such a machine may include, for example, any processing platform, computing platform, computing device, processing device, computer system, processing system, computer, suitable processor or the like, and may be implemented using any suitable combination of hardware and / or software. The machine readable medium or article may include, for example, any suitable type of memory unit, memory device, memory item, memory medium, storage device and / or storage unit, eg, memory, removable media or non-removable, media that can be erased or not, writing or rewriting media, digital or analog media, hard disk, soft disk, Compact Disc Only Memory (CD-ROM), Compact Re-Recordable Disc ( CD-R), Compact Rewrite Disc (CD-RW), optical disc, magnetic media, magneto-optical media, cards or removable memory discs, various types of Digital Versatile Disc (DVD), a tape, a cassette or the similar ones. The instructions may include any suitable type of code, such as a source code, compiled code, interpreted code, executable code, static code, dynamic code and the like. The instructions can be implemented using any high level programming language, low level, objective oriented, visual, compiled and / or interpreted, suitable, such as C, C ++, Java, BASIC, Perl, Matlab, Pascal, Visual BASIC, assembly language, machine code and so on. The modalities are not limited in this context. Unless specifically indicated otherwise, it may be appreciated that terms such as "processing", "computation", "calculation", "determination", or the like, refer to the action and / or processes of a computer or a computer system, or similar electronic computing device, which manipulates and / or transforms data represented as physical (e.g., electronic) quantities in the recorders and / or memories of the computer system into other data similarly represented as quantities physical in the memories, recorders or other such devices of storage, transmission or deployment of information, of the computer system. The modalities are not or are limited in this context. Although certain aspects of the embodiments have been illustrated as described herein, many modifications, substitutions, changes and equivalents will occur to those skilled in the art. Therefore, it is understood that the appended claims are intended to cover all such modifications and changes that fall within the true spirit of the modalities.

Claims (9)

  1. CLAIMS 1. An apparatus, comprising: a first entry to receive a first identification code associated with an article; a second entry to receive a second identification code associated with said article; and an output for providing a control signal for controlling the operation of a security tag deactivation device based on said first and second identification codes. The apparatus of claim 1, further comprising a scanner for receiving said first identification code, said scanner providing said first identification code to said first input. The apparatus of claim 1, further comprising a transceiver for receiving said second identification code, said transceiver providing said second identification code to said second input. The apparatus of claim 1, further comprising a processor for receiving said first and second identification codes associated with said article, said processor processing said first and second identification codes to provide said control signal to said output if said first identification code is correlated with said second identification code. 5. The apparatus of claim 1, further comprising a deactivation device in communication with said output, said deactivation device receiving said control signal to deactivate said security tag if said first identification code is correlated with said second identification code. . 6. A system, comprising: an antenna; a first entry to receive a first identification code associated with an article; a second entry to receive a second identification code associated with said article; and an output for providing a control signal for controlling the operation of a security tag deactivation device based on said first and second identification codes. The system of claim 6, further comprising a security tag deactivation device adapted to receive said control signal and to control the deactivation of said security tag based on said control signal. The system of claim 6, further comprising a detection device in communication with said deactivation device, said detection device for monitoring said security tag and for activating an alarm if said security tag is alive. 9. The system of claim 8, wherein said detection device activates said alarm if said article identification code correlates with said information associated with said article. The system of claim 6, further comprising a host computer in communication with said output, said host computer for providing said control signal to a security tag detection device. eleven . A method comprising: receiving a first identification code associated with an article; receive a second identification code associated with said article; and providing a control signal for controlling the operation of a security tag deactivation device based on said first and second identification codes. The method of claim 1, further comprising: processing said first and second identification codes to determine whether said first identification code is correlated with said second identification code associated with said article; and wherein, providing said control signal to said output comprises providing said control signal to said output if said first identification code correlates with said second identification code. The method of claim 1, further comprising: receiving said control signal to deactivate said security tag; and deactivating said security tag if said first identification code is correlated with said second identification code. The method of claim 1, further comprising: monitoring said security tag; and activate an alarm if said security label is active. The method of claim 14, wherein activating said alarm comprises activating said alarm if said first identification code does not correlate with said second identification code. 1 6. An article comprising a machine-readable storage medium containing instructions that if executed enable a system to: receive a first identification code associated with an article; receive a second identification code associated with said article; and providing a control signal for controlling the operation of a security tag deactivation device based on said first and second identification codes. 7. The article of claim 16, further comprising instructions that if executed enable the system to: process said first and second identification codes to determine whether said first identification code is correlated with said second identification code associated with said article; and wherein, providing said control signal to said output, comprises providing said control signal to said output if said first identification code is correlated with said second identification code. 18. The article of claim 16, further comprising instructions that if executed enable the system to: receive said control signal to deactivate said security tag; and deactivating said security tag if said first identification code is correlated with said second identification code. 19. The article of claim 1 6, further comprising instructions that if executed enable the system to: monitor said security tag; and activate an alarm if said security label is active. 20. The article of claim 1 6, further comprising instructions that if executed enable the system to: activate said alarm comprises activating said alarm if said first identification code does not correlate with said second identification code.
MX/A/2007/009643A 2005-02-10 2007-08-09 Techniques to reduce false alarms, invalid security deactivation, and internal theft MX2007009643A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11055293 2005-02-10

Publications (1)

Publication Number Publication Date
MX2007009643A true MX2007009643A (en) 2008-09-26

Family

ID=

Similar Documents

Publication Publication Date Title
US7591422B2 (en) Techniques to reduce false alarms, invalid security deactivation, and internal theft
US10497237B2 (en) Security tag for inventory and anti-theft alarm system
US10332117B2 (en) System and method for mobile device self-checkout for retail transactions with loss protection
US7097098B2 (en) Point-of-sale system and method for processing product-specific information and item-specific information
CN100595804C (en) System and method for integrating point of sale and electronic article surveillance data
US20040220860A1 (en) Self-checkout system having integrated RFID reader
US20020134834A1 (en) Method of detecting and managing RFID labels on items brought into a store by a customer
US20080195517A1 (en) Customer interaction with inventory via rfid
US7619525B2 (en) Method and system for providing security using RFID tagged items exiting or entering a retail establishment
US7012528B2 (en) Using radio frequency identification with transaction-specific correlator values written on transaction receipts to detect and/or prevent theft and shoplifting
WO2007147250A1 (en) Identification and surveillance device, system and method for individual item level tracking
KR20000036086A (en) Electronic article security system for store which uses intelligent security tags and transaction data
US20120024943A1 (en) Merchandise security tag for an article of merchandise
Kommey et al. A Supermarket Anti-Theft RFID Scanner: digiSCAN
KR20070106846A (en) Process for managing a commodity and system therefor
MX2007009643A (en) Techniques to reduce false alarms, invalid security deactivation, and internal theft
US20230106047A1 (en) Rfid detection of articles without a database
CN111295682B (en) Predictive analysis of data from multiple test scenarios for improved read accuracy
KR101111299B1 (en) System for Confirming the Change of RFID Information
KR20060027989A (en) System and method for confirming the change of rfid information, recording medium