EP3038066A1 - An electronic article surveillance device and a method for operating thereof - Google Patents
An electronic article surveillance device and a method for operating thereof Download PDFInfo
- Publication number
- EP3038066A1 EP3038066A1 EP14461605.9A EP14461605A EP3038066A1 EP 3038066 A1 EP3038066 A1 EP 3038066A1 EP 14461605 A EP14461605 A EP 14461605A EP 3038066 A1 EP3038066 A1 EP 3038066A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- tag
- product
- security
- access code
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2465—Aspects related to the EAS system, e.g. system components other than tags
- G08B13/2482—EAS methods, e.g. description of flow chart of the detection procedure
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/2417—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/246—Check out systems combined with EAS, e.g. price information stored on EAS tag
Definitions
- the present invention relates to electronic article surveillance devices, such as security tags.
- EAS Electronic article surveillance
- the method utilizes special tags, usually called security tags, which are fixed to the products and can be removed or deactivated only by authorized persons when certain criteria are met, for example when a client pays from the product at the cashier.
- Detection means can be installed at the exits from the secured area which may trigger an alarm upon attempt to carry out a product with an attached or embedded active security tag.
- EAS systems which utilize tags made of a strip of amorphous metal and a strip of ferromagnetic material. These EAS tags can be activated and deactivated using special equipment emitting magnetic field, which is typically installed at each cashier's desk at store.
- RF labels comprise an LC tank circuit that has a resonance peak at a specific frequency. Deactivation can be achieved by punching a hole, or by detuning the circuit by partially destroying the capacitor. This can be done by submitting the tag to a strong electromagnetic field at the resonant frequency.
- Microwave EAS systems utilize permanent tags which are made of a diode coupled to one microwave and one electrostatic antenna. At the exit, one antenna emits a low-frequency field, and another one emits a microwave field. The tag acts as a mixer reemitting a combination of signals from both fields. These tags are permanent and expensive, typically used in clothing stores. The permanent tags are sometimes called hard tags.
- a US patent US5942978 discloses a hard EAS tag, comprising a first element and a second element adapted for assembly together by snap connection through an article of merchandise, the EAS tag further comprising release means for selectively releasing said snap connection. It further discloses a detacher apparatus comprising a housing with removal means for selectively actuating said release means of the EAS tag to release said snap connection so that said first and second elements may be separated from each other to detach the EAS tag from the article of merchandise. The detacher apparatus further comprises control means for selectively actuating said removal means in response to an identification signal generated by said EAS tag. Therefore, the EAS tag needs to communicate with the detached apparatus via a dedicated proprietary communication link and is therefore not universal to communicate with.
- a US patent US8223022 discloses a security tag assembly and a security system associated therewith to prevent the unauthorized removal of merchandise from a given area, such as a retail establishment.
- the security tag assembly comprises a base and at least one tag member removably connected in an operative position on the merchandise being protected.
- a locking assembly is structured to restrict detachment of the tag member and is forcibly disposed out of a locking orientation relative to said tag member.
- a detachment assembly and a data registering processor may include a two-way communication link which facilitates processing of the merchandise data disposed on the security tag assembly, such as inventory, purchase, location, origin of supplier or manufacturer.
- merchandise data may be transmitted by wireless communication with appropriate receiving facilities associated with a cash register or other check-out facilities. The electronic communication between the security tag and other devices is not explained in details.
- a US patent US6646555 discloses a wireless communication device that attaches using magnetic force in whole or part to an article of manufacture having a magnetic surface portion.
- the wireless communication device contains a form of a magnet to provide magnetic force and attraction.
- the wireless communication device may be detached from the article by altering the magnetic force created by its associated magnet. Altering is accomplished by using an external device or a device internal to the wireless communication device.
- the external device may be used to generate the resonate frequency or the control system of the wireless communication device may be adapted to generate such frequency upon receipt of a communication command.
- an electronic article surveillance system comprising: a tag comprising: a memory configured to store at least a tag identifier; a communication interface configured to communicate with external devices for sending the tag identifier; security mechanism configured to have a locked or unlocked mode; a tag controller configured to set the security mechanism in unlocked mode upon receiving an access code; and a server comprising: a product purchase module configured to receive a tag identifier, execute a product purchase transaction and return an access code for the tag identifier.
- the product purchase module is configured to send the access code for the tag identifier to a store infrastructure which is configured to send the access code to the tag.
- the product purchase module is configured to communicate with a user device via which the user conducts product purchase transaction.
- the product purchase module is configured to send the access code for the tag identifier to the user device via which the product purchase transaction was conducted and which is configured to send the access code to the tag.
- the tag is a hard tag physically attachable to a product and comprises a locking mechanism, wherein the tag controller is configured to unlock the locking mechanism to allow physical detachment of the tag from the product.
- the tag comprises a security inducing mechanism, wherein the tag controller is configured to unlock the security inducing mechanism such that it does not induce store security infrastructure.
- the tag is further configured to receive product-related data to be stored in the memory from the tags programmer.
- the tag is further configured to receive product-related data to be stored in the memory from the store infrastructure.
- the tag further comprises a display configured to display product-related data stored in memory.
- the tag further comprises a display configured to display customer-related data received from the mobile device.
- the tag further comprises a display configured to display customer-related data received from the store infrastructure.
- the tag further comprises a display configured to display information on whether the tag is in unlocked mode.
- the tag further comprises an indicator configured to notify audibly or visually the locked or unlocked mode of the tag.
- a method for operating an electronic article surveillance system with a security infrastructure comprising the steps of: providing a plurality of tags attached to or embedded in products, each tag having a tag identifier and a security mechanism configured to have a locked or unlocked mode, wherein the tags are detectable by the security infrastructure; providing a server configured to execute a product purchase transaction related to a tag identifier and to return an access code for the tag identifier; providing means for allowing a user to communicate with the tag to read the tag identifier and to communicate with the server to conduct the product purchase transaction; and unlocking the security mechanism of a tag after providing the access code to the tag.
- these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system.
- these signals are referred to as bits, packets, messages, values, elements, symbols, characters, terms, numbers, or the like.
- a computer-readable (storage) medium typically may be non-transitory and/or comprise a non-transitory device.
- a non-transitory storage medium may include a device that may be tangible, meaning that the device has a concrete physical form, although the device may change its physical state.
- non-transitory refers to a device remaining tangible despite a change in state.
- example means serving as a non-limiting example, instance, or illustration.
- terms "for example” and “e.g.” introduce a list of one or more non-limiting examples, instances, or illustrations.
- Fig. 1 presents a diagram of the electronic article surveillance system presented herein. It may utilize a wireless data network, which links components of the system.
- a server 140 stores products-related data, such as identification, inventory, pricing, and other data. It communicates with a tags programmer 130 for storing the product-related information on EAS tags 150.
- the tags programmer 130 is configured to write product identifying data and other information into the EAS tags 150 and may be a stationary or portable device communicating with the server 140 via a wired or wireless interface.
- the EAS tags 150 are attached to the products (e.g. they can be hard tags attached to products, or strips glued on the products or inside the products) or embedded in the products (e.g. they are RFID chips embedded in products).
- a security infrastructure 120 may include different types of EAS tag detectors, such as security gates installed at the store entrance/exit.
- the security infrastructure 120 is configured to detect active EAS tags 150 passing nearby specific points of the store, for example configured to detect unauthorized attempts to take a product with an active tag out of the store.
- Figs. 2A, 2B presents a general concept of the method presented herein.
- a user having a mobile device 160 such as a mobile phone running a dedicated purchasing application, may wander through the store looking for products of interest.
- the user may use the mobile device 160 to communicate with the EAS tag 150 to read at least the tag identifier.
- the mobile device may communicate, e.g. via Internet, with the server 140 to read detailed product-related information to which the tag is attached or in which it is embedded, and the product-related information may be presented at the screen of the mobile device 160, wherein the product-related information is provided by a product information module 142.
- the user may initiate a buying operation at the server 140, via a product purchase module 141, e.g. a module enabling communication with a product purchasing application executed at the mobile device 160.
- a product purchase module 141 e.g. a module enabling communication with a product purchasing application executed at the mobile device 160.
- the user may pay for the product, for example by providing credit card information or by any other suitable payment means.
- the server 140 Upon purchase of the product, the server 140 provides an access code for the tag, which allows unlocking the tag 150 which is attached to or embedded in the product.
- the access code along with an unlock command can be then sent to the tag to deactivate the tag, i.e. to make it undetectable for the store security infrastructure 120 or to allow detachment of a permanent tag from the product.
- the unlock command can be sent to the tag 150 via the user's mobile device 160.
- the unlock command 150 may comprise EAS tag identifier and an unlock code.
- the unlock command can be sent to the tag 150 via store infrastructure 170 (as shown in Fig. 2A ), for example a communication device located within the communication range of the tag and communicating via the same means as the tag communicates with the mobile device 160 or other means.
- the store infrastructure communicates with the tag 150 via Bluetooth Low Energy (BTE) protocol.
- BTE Bluetooth Low Energy
- a permanent tag that is detached from the product may be put to a tags basket installed e.g. at the exit of the store, before the security gates.
- a non-permanent tag that is deactivated may be simply carried out of the store without inducing the security gates.
- the EAS tag 150 comprises a tag controller 154 and a memory 155.
- the memory may store computer executable instructions as well as configuration data of the EAS tag 150, such as the state of the EAS tag (i.e. active/inactive), the identifier of the EAS tag, the access code and/or identifier of the product to which the EAS tag is attached or in which the EAS tag is embedded.
- Product identifier may be further accompanied by information related to a method of purchase of the products, such as a link to a website allowing purchase of the product or a reference to a software application allowing such purchase or description of the product, or a photograph of the product or the like.
- the tag controller 154 also executes data communication instruction(s) for communicating with external devices via a communication interface 151, preferably a short-range communication device enabling communication using protocols such as Bluetooth, Bluetooth Low Energy (BLE), Near Field Communication (NFC) or the like.
- a communication interface 151 preferably a short-range communication device enabling communication using protocols such as Bluetooth, Bluetooth Low Energy (BLE), Near Field Communication (NFC) or the like.
- BLE Bluetooth Low Energy
- NFC Near Field Communication
- the memory 155 and the communication interface 151 may be realized as a proximity beacon.
- the communication interface 151 is configured to send tag-related information (such as a tag identifier, state of the tag, product identifier) to external devices, such as store security infrastructure 120, tags programmer 130 or mobile devices 160.
- tag-related information such as a tag identifier, state of the tag, product identifier
- the communication interface 151 is configured to receive tagrelated information from external devices, such as tag programming information form the tags programmer 130 or an unlock command from a mobile device 160 or tags programmer 130.
- tag programming information form the tags programmer 130 or an unlock command from a mobile device 160 or tags programmer 130.
- an access code may be first required to be transmitted to the tag.
- the tag controller 154 can be configured to control a security mechanism in form of a locking mechanism 152 or a security inducing mechanism 153.
- the tag controller 154 can be configured to drive a locking mechanism 152, if the tag is a permanent tag.
- the locking mechanism is configured to provide strong lock between two parts of the tag, such as to lock the tag to a product, such as a piece of clothing, in a permanent manner. When the EAS tag is locked, it is firmly secured to the product, and when the EAS tag is unlocked, it can be removed from the product.
- the tag controller 154 can be configured to drive a security inducing mechanism 153, such as an antenna transmitting signal of specific frequency, which may induce a security gate at the door of the shopping facility.
- a security inducing mechanism 153 such as an antenna transmitting signal of specific frequency, which may induce a security gate at the door of the shopping facility.
- the tag controller 154 sends a signal to unlock the locking mechanism 152 and/or the security inducing mechanism 153.
- the EAS tag may audibly or visibly notify of its current state via an indicator 157.
- a the indicator 157 may be a diode, wherein a green state of the diode may indicate an inactive, unlocked state while a red state of the diode may indicate an active, locked state. Further, the change of status from locked to unlocked may be indicated by an indicator 157 in form of a loudspeaker playing a sound.
- the internal modules of the EAS tag may communicate via a shared data bus or different data flow paths.
- the EAS tag may 150 further comprise a display 156 configured to display various tag-related or product-related data from memory 155.
- the display 156 may present the status of the security means 152, 153, i.e. whether the tag is in locked or unlocked mode.
- Product-related information may include data such as product name and parameters. For example, if the product is a piece of clothing, the product data may include the material components, size etc. Presentation of information may be invoked upon initiation of communication with the mobile device of the user.
- the product information may be customized depending on the mobile device of the user, for example the mobile device may send commands to display information in a particular language or to display particular type of information.
- the tag 150 or the server 140 may determine user-related data and customize the product information displayed to user data, for example to inform the user whether the user has in possession the same or a similar product. Furthermore, advertising information may be provided, such as information on other products from the same collection of products.
- Fig. 3A shows schematically a scenario where typical tags 150 are attached to products, such as hard EAS tags (e.g. BLE+RF or magneto-acoustic tags) or strip EAS tags (e.g. BLE+RF or magneto-acoustic tags). These tags are detectable by the store security infrastructure 120 and can be deactivated via the BLE communication infrastructure 170 after the user purchases the product via the mobile device 150.
- hard EAS tags e.g. BLE+RF or magneto-acoustic tags
- strip EAS tags e.g. BLE+RF or magneto-acoustic tags
- Fig. 3B shows schematically another scenario, where tags 150 are embedded in products, such as BLE-communicable chips. These tags can be deactivated via the BLE communication infrastructure 170 after the user purchases the product via the mobile device 150. When the tag 150 is not deactivated, it can be non-operable.
- Fig. 4 presents diagram of a method for electronic article surveillance according to a first embodiment.
- the method starts at step 401 from establishing a wireless communication with an EAS tag 150 via the mobile device 160 communicating with the communication interface 151.
- tag identification data is read from the tag, such as a tag identifier and/or product identifying data.
- the information may also include a link to a website where the product may be purchased. If only a tag identifier is read, the mobile device 160 should preferably have a dedicated software application installed that can handle the product identifiers and communicate with a specific server 140. Alternatively, if a link to a website is provided, there is no need for a dedicated application at the mobile device 160 - it is enough for the mobile device 160 to handle a general web browsing application.
- the user may input a request to purchase the product and at step 404 the transaction is executed that may include payment and is suitably confirmed as a completed, valid transaction.
- the transaction is executed that may include payment and is suitably confirmed as a completed, valid transaction.
- Any of known payment mechanisms can be used, such as payment by credit card.
- the user device 160 receives an access code for the EAS tag associated with the particular product that has been just purchased.
- the user device sends the access code along with an unlock command to the EAS tag 150 by communicating with the communication interface 151 of the tag 150.
- the unlocking is executed in step 407 and the EAS tag 150 may audibly or visibly notify the client that the EAS tag may be safely removed from the product and that the purchase is complete.
- information about unlocked tag may be provided to the user via the mobile device 160, when the EAS tag 150, upon completion of the unlocking operation, sends unlocking status via the communication interface to the mobile device 160.
- Fig. 5 presents a diagram of a method for electronic article surveillance according to a first embodiment.
- the method steps 501-504 correspond to the method steps 401-404.
- the server 140 is notified and the server 140 sends in step 405 an unlock command for the particular EAS tag 150 via the tags programmer 130.
- the tags programmer 130 may have a communication range that allows to communicate with a plurality of tags at the store, for example the tags programmer 130 may have a coverage of the whole store or there may be a plurality of tag programmers 130 installed at the store, each having a specific coverage.
- tags programmer 130 installed at a specific place at the store, for example at the cashier's desk or at the exit of the store, so that the user may come with a purchased product to that tags programmer 130 and to deactivate the tag there. Since deactivation of a tag in steps 506 and 507 is a simple procedure as the tag product has been already purchased via electronic transaction, this may minimize the waiting time, even if many customers want to deactivate their tags using the same tags programmer 130.
- the present invention relates to application of EAS tags and merchandising using EAS tags.
- the new approach is useful as it allows to omit a manual detachment of EAS by an employee of a store. Therefore, the invention provides a useful, concrete and tangible result.
- EAS tags as well as the system implementing the present invention are particular machines, therefore the machine or transformation test is fulfilled and that the idea is not abstract.
- the aforementioned method for operating an electronic article surveillance device may be performed and/or controlled by one or more computer programs.
- Such computer programs are typically executed by utilizing the computing resources in a computing device.
- Applications are stored on a non-transitory medium.
- An example of a non-transitory medium is a non-volatile memory, for example a flash memory while an example of a volatile memory is RAM.
- the computer instructions are executed by a processor.
- These memories are exemplary recording media for storing computer programs comprising computer-executable instructions performing all the steps of the computer-implemented method according the technical concept presented herein.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
Abstract
An electronic article surveillance (EAS) system comprising: a tag (150) comprising: a memory (155) configured to store at least a tag identifier; a communication interface (151) configured to communicate with external devices for sending the tag identifier; security mechanism (152, 153) configured to have a locked or unlocked mode; a tag controller (154) configured to set the security mechanism (152, 153) in unlocked mode upon receiving an access code; and a server (140) comprising; a product purchase module (141) configured to receive a tag identifier, execute a product purchase transaction and return an access code for the tag identifier.
Description
- The present invention relates to electronic article surveillance devices, such as security tags.
- Electronic article surveillance (EAS) is a method for preventing unauthorized removal of properties from a secured area, for example for preventing shoplifting from retail stores. The method utilizes special tags, usually called security tags, which are fixed to the products and can be removed or deactivated only by authorized persons when certain criteria are met, for example when a client pays from the product at the cashier. Detection means can be installed at the exits from the secured area which may trigger an alarm upon attempt to carry out a product with an attached or embedded active security tag.
- There are known magnetic and acousto-magnetic EAS systems, which utilize tags made of a strip of amorphous metal and a strip of ferromagnetic material. These EAS tags can be activated and deactivated using special equipment emitting magnetic field, which is typically installed at each cashier's desk at store.
- There are also known radio-frequency EAS systems. RF labels comprise an LC tank circuit that has a resonance peak at a specific frequency. Deactivation can be achieved by punching a hole, or by detuning the circuit by partially destroying the capacitor. This can be done by submitting the tag to a strong electromagnetic field at the resonant frequency.
- Microwave EAS systems utilize permanent tags which are made of a diode coupled to one microwave and one electrostatic antenna. At the exit, one antenna emits a low-frequency field, and another one emits a microwave field. The tag acts as a mixer reemitting a combination of signals from both fields. These tags are permanent and expensive, typically used in clothing stores. The permanent tags are sometimes called hard tags.
- A US patent
US5942978 discloses a hard EAS tag, comprising a first element and a second element adapted for assembly together by snap connection through an article of merchandise, the EAS tag further comprising release means for selectively releasing said snap connection. It further discloses a detacher apparatus comprising a housing with removal means for selectively actuating said release means of the EAS tag to release said snap connection so that said first and second elements may be separated from each other to detach the EAS tag from the article of merchandise. The detacher apparatus further comprises control means for selectively actuating said removal means in response to an identification signal generated by said EAS tag. Therefore, the EAS tag needs to communicate with the detached apparatus via a dedicated proprietary communication link and is therefore not universal to communicate with. - A US patent
US8223022 discloses a security tag assembly and a security system associated therewith to prevent the unauthorized removal of merchandise from a given area, such as a retail establishment. The security tag assembly comprises a base and at least one tag member removably connected in an operative position on the merchandise being protected. A locking assembly is structured to restrict detachment of the tag member and is forcibly disposed out of a locking orientation relative to said tag member. A detachment assembly and a data registering processor may include a two-way communication link which facilitates processing of the merchandise data disposed on the security tag assembly, such as inventory, purchase, location, origin of supplier or manufacturer. Such merchandise data may be transmitted by wireless communication with appropriate receiving facilities associated with a cash register or other check-out facilities. The electronic communication between the security tag and other devices is not explained in details. - A US patent
US6646555 discloses a wireless communication device that attaches using magnetic force in whole or part to an article of manufacture having a magnetic surface portion. The wireless communication device contains a form of a magnet to provide magnetic force and attraction. The wireless communication device may be detached from the article by altering the magnetic force created by its associated magnet. Altering is accomplished by using an external device or a device internal to the wireless communication device. The external device may be used to generate the resonate frequency or the control system of the wireless communication device may be adapted to generate such frequency upon receipt of a communication command. - Currently, when a customer buys a product to which a hard EAS tag is attached, the customer must visit a cashier's desk to pay for the product and to have the tag deactivated and removed from the product in order to safely leave the store with the product bought. This impacts the time to buy the product and often leads to queues formed at the cashier's desks.
- It would be therefore beneficial to improve the current electronic article surveillance devices in order to improve the user experience, in particular to improve the customer experience while shopping.
- There is presented an electronic article surveillance system comprising: a tag comprising: a memory configured to store at least a tag identifier; a communication interface configured to communicate with external devices for sending the tag identifier; security mechanism configured to have a locked or unlocked mode; a tag controller configured to set the security mechanism in unlocked mode upon receiving an access code; and a server comprising: a product purchase module configured to receive a tag identifier, execute a product purchase transaction and return an access code for the tag identifier.
- Preferably, the product purchase module is configured to send the access code for the tag identifier to a store infrastructure which is configured to send the access code to the tag.
- Preferably, the product purchase module is configured to communicate with a user device via which the user conducts product purchase transaction.
- Preferably, the product purchase module is configured to send the access code for the tag identifier to the user device via which the product purchase transaction was conducted and which is configured to send the access code to the tag.
- Preferably, the tag is a hard tag physically attachable to a product and comprises a locking mechanism, wherein the tag controller is configured to unlock the locking mechanism to allow physical detachment of the tag from the product.
- Preferably, the tag comprises a security inducing mechanism, wherein the tag controller is configured to unlock the security inducing mechanism such that it does not induce store security infrastructure.
- Preferably, the tag is further configured to receive product-related data to be stored in the memory from the tags programmer.
- Preferably, the tag is further configured to receive product-related data to be stored in the memory from the store infrastructure.
- Preferably, the tag further comprises a display configured to display product-related data stored in memory.
- Preferably, the tag further comprises a display configured to display customer-related data received from the mobile device.
- Preferably, the tag further comprises a display configured to display customer-related data received from the store infrastructure.
- Preferably, the tag further comprises a display configured to display information on whether the tag is in unlocked mode.
- Preferably, the tag further comprises an indicator configured to notify audibly or visually the locked or unlocked mode of the tag.
- There is also presented a method for operating an electronic article surveillance system with a security infrastructure, comprising the steps of: providing a plurality of tags attached to or embedded in products, each tag having a tag identifier and a security mechanism configured to have a locked or unlocked mode, wherein the tags are detectable by the security infrastructure; providing a server configured to execute a product purchase transaction related to a tag identifier and to return an access code for the tag identifier; providing means for allowing a user to communicate with the tag to read the tag identifier and to communicate with the server to conduct the product purchase transaction; and unlocking the security mechanism of a tag after providing the access code to the tag.
- These and other objects of the invention presented herein are accomplished by providing an electronic article surveillance device and a method for operating thereof. Further details and features of the present invention, its nature and various advantages will become more apparent from the following detailed description of the preferred embodiments shown in a drawing, in which:
-
Fig. 1 presents a diagram of an electronic article surveillance system presented herein; -
Fig. 2 presents a general concept of the method presented herein. -
Fig. 3 presents a schematic of an EAS tag; -
Fig. 4 presents a diagram of a method for electronic article surveillance according to a first embodiment; and -
Fig. 5 presents a diagram of a method for electronic article surveillance according to a second embodiment; - Some portions of the detailed description which follows are presented in terms of data processing procedures, steps or other symbolic representations of operations on data bits that can be performed on computer memory. Therefore, a computer executes such logical steps thus requiring physical manipulations of physical quantities.
- Usually these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. For reasons of common usage, these signals are referred to as bits, packets, messages, values, elements, symbols, characters, terms, numbers, or the like.
- Additionally, all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Terms such as "processing" or "creating" or "transferring" or "executing" or "determining" or "detecting" or "obtaining" or "selecting" or "calculating" or "generating" or the like, refer to the action and processes of a computer system that manipulates and transforms data represented as physical (electronic) quantities within the computer's registers and memories into other data similarly represented as physical quantities within the memories or registers or other such information storage.
- A computer-readable (storage) medium, such as referred to herein, typically may be non-transitory and/or comprise a non-transitory device. In this context, a non-transitory storage medium may include a device that may be tangible, meaning that the device has a concrete physical form, although the device may change its physical state. Thus, for example, non-transitory refers to a device remaining tangible despite a change in state.
- As utilized herein, the term "example" means serving as a non-limiting example, instance, or illustration. As utilized herein, the terms "for example" and "e.g." introduce a list of one or more non-limiting examples, instances, or illustrations.
-
Fig. 1 presents a diagram of the electronic article surveillance system presented herein. It may utilize a wireless data network, which links components of the system. - A
server 140 stores products-related data, such as identification, inventory, pricing, and other data. It communicates with atags programmer 130 for storing the product-related information on EAS tags 150. Thetags programmer 130 is configured to write product identifying data and other information into the EAS tags 150 and may be a stationary or portable device communicating with theserver 140 via a wired or wireless interface. - The EAS tags 150 are attached to the products (e.g. they can be hard tags attached to products, or strips glued on the products or inside the products) or embedded in the products (e.g. they are RFID chips embedded in products). The tags which are attached to or embedded in products, which are within the store and have not yet been bought by customers, have active security means 152, 153.
- A
security infrastructure 120 may include different types of EAS tag detectors, such as security gates installed at the store entrance/exit. Thesecurity infrastructure 120 is configured to detectactive EAS tags 150 passing nearby specific points of the store, for example configured to detect unauthorized attempts to take a product with an active tag out of the store. -
Figs. 2A, 2B presents a general concept of the method presented herein. A user having amobile device 160, such as a mobile phone running a dedicated purchasing application, may wander through the store looking for products of interest. When a product of interest is found, the user may use themobile device 160 to communicate with theEAS tag 150 to read at least the tag identifier. Then the mobile device may communicate, e.g. via Internet, with theserver 140 to read detailed product-related information to which the tag is attached or in which it is embedded, and the product-related information may be presented at the screen of themobile device 160, wherein the product-related information is provided by aproduct information module 142. - In case the user is interested in the product, the user may initiate a buying operation at the
server 140, via aproduct purchase module 141, e.g. a module enabling communication with a product purchasing application executed at themobile device 160. - The user may pay for the product, for example by providing credit card information or by any other suitable payment means. Upon purchase of the product, the
server 140 provides an access code for the tag, which allows unlocking thetag 150 which is attached to or embedded in the product. The access code along with an unlock command can be then sent to the tag to deactivate the tag, i.e. to make it undetectable for thestore security infrastructure 120 or to allow detachment of a permanent tag from the product. - The unlock command can be sent to the
tag 150 via the user'smobile device 160. Theunlock command 150 may comprise EAS tag identifier and an unlock code. - Alternatively, the unlock command can be sent to the
tag 150 via store infrastructure 170 (as shown inFig. 2A ), for example a communication device located within the communication range of the tag and communicating via the same means as the tag communicates with themobile device 160 or other means. Preferably, the store infrastructure communicates with thetag 150 via Bluetooth Low Energy (BTE) protocol. - A permanent tag that is detached from the product, may be put to a tags basket installed e.g. at the exit of the store, before the security gates. A non-permanent tag that is deactivated may be simply carried out of the store without inducing the security gates.
- On the other hand, as shown in
Fig. 2B , when thetag 150 is not deactivated, it will induce thestore security infrastructure 120. - The
EAS tag 150 comprises atag controller 154 and amemory 155. The memory may store computer executable instructions as well as configuration data of theEAS tag 150, such as the state of the EAS tag (i.e. active/inactive), the identifier of the EAS tag, the access code and/or identifier of the product to which the EAS tag is attached or in which the EAS tag is embedded. Product identifier may be further accompanied by information related to a method of purchase of the products, such as a link to a website allowing purchase of the product or a reference to a software application allowing such purchase or description of the product, or a photograph of the product or the like. - The
tag controller 154 also executes data communication instruction(s) for communicating with external devices via acommunication interface 151, preferably a short-range communication device enabling communication using protocols such as Bluetooth, Bluetooth Low Energy (BLE), Near Field Communication (NFC) or the like. In one embodiment, thememory 155 and thecommunication interface 151 may be realized as a proximity beacon. - The
communication interface 151 is configured to send tag-related information (such as a tag identifier, state of the tag, product identifier) to external devices, such asstore security infrastructure 120,tags programmer 130 ormobile devices 160. - Furthermore, the
communication interface 151 is configured to receive tagrelated information from external devices, such as tag programming information form thetags programmer 130 or an unlock command from amobile device 160 ortags programmer 130. In order to change the state of the tag, i.e. to write new product information to the tag or to change the tag to an unlocked state, an access code may be first required to be transmitted to the tag. - The
tag controller 154 can be configured to control a security mechanism in form of alocking mechanism 152 or asecurity inducing mechanism 153. - The
tag controller 154 can be configured to drive alocking mechanism 152, if the tag is a permanent tag. The locking mechanism is configured to provide strong lock between two parts of the tag, such as to lock the tag to a product, such as a piece of clothing, in a permanent manner. When the EAS tag is locked, it is firmly secured to the product, and when the EAS tag is unlocked, it can be removed from the product. - Further, the
tag controller 154 can be configured to drive asecurity inducing mechanism 153, such as an antenna transmitting signal of specific frequency, which may induce a security gate at the door of the shopping facility. When the EAS tag is locked, it induces thesecurity infrastructure 120, and when the EAS tag is unlocked, its communication with thesecurity infrastructure 120 may be disabled. - When the EAS tag is to be unlocked, the
tag controller 154 sends a signal to unlock thelocking mechanism 152 and/or thesecurity inducing mechanism 153. - The EAS tag may audibly or visibly notify of its current state via an
indicator 157. For example, a theindicator 157 may be a diode, wherein a green state of the diode may indicate an inactive, unlocked state while a red state of the diode may indicate an active, locked state. Further, the change of status from locked to unlocked may be indicated by anindicator 157 in form of a loudspeaker playing a sound. - The internal modules of the EAS tag may communicate via a shared data bus or different data flow paths.
- The EAS tag may 150 further comprise a
display 156 configured to display various tag-related or product-related data frommemory 155. For example, thedisplay 156 may present the status of the security means 152, 153, i.e. whether the tag is in locked or unlocked mode. Product-related information may include data such as product name and parameters. For example, if the product is a piece of clothing, the product data may include the material components, size etc. Presentation of information may be invoked upon initiation of communication with the mobile device of the user. The product information may be customized depending on the mobile device of the user, for example the mobile device may send commands to display information in a particular language or to display particular type of information. Moreover, based on the user identifier, thetag 150 or theserver 140 may determine user-related data and customize the product information displayed to user data, for example to inform the user whether the user has in possession the same or a similar product. Furthermore, advertising information may be provided, such as information on other products from the same collection of products. -
Fig. 3A shows schematically a scenario wheretypical tags 150 are attached to products, such as hard EAS tags (e.g. BLE+RF or magneto-acoustic tags) or strip EAS tags (e.g. BLE+RF or magneto-acoustic tags). These tags are detectable by thestore security infrastructure 120 and can be deactivated via theBLE communication infrastructure 170 after the user purchases the product via themobile device 150. -
Fig. 3B shows schematically another scenario, wheretags 150 are embedded in products, such as BLE-communicable chips. These tags can be deactivated via theBLE communication infrastructure 170 after the user purchases the product via themobile device 150. When thetag 150 is not deactivated, it can be non-operable. -
Fig. 4 presents diagram of a method for electronic article surveillance according to a first embodiment. The method starts atstep 401 from establishing a wireless communication with anEAS tag 150 via themobile device 160 communicating with thecommunication interface 151. - Subsequently, at
step 402 tag identification data is read from the tag, such as a tag identifier and/or product identifying data. The information may also include a link to a website where the product may be purchased. If only a tag identifier is read, themobile device 160 should preferably have a dedicated software application installed that can handle the product identifiers and communicate with aspecific server 140. Alternatively, if a link to a website is provided, there is no need for a dedicated application at the mobile device 160 - it is enough for themobile device 160 to handle a general web browsing application. - Next, at
step 403, the user may input a request to purchase the product and atstep 404 the transaction is executed that may include payment and is suitably confirmed as a completed, valid transaction. Any of known payment mechanisms can be used, such as payment by credit card. - Further, at
step 405, theuser device 160 receives an access code for the EAS tag associated with the particular product that has been just purchased. - Subsequently, at
step 406, the user device sends the access code along with an unlock command to theEAS tag 150 by communicating with thecommunication interface 151 of thetag 150. When the unlock code is received by theEAS tag 150, the unlocking is executed instep 407 and theEAS tag 150 may audibly or visibly notify the client that the EAS tag may be safely removed from the product and that the purchase is complete. Alternatively, information about unlocked tag may be provided to the user via themobile device 160, when theEAS tag 150, upon completion of the unlocking operation, sends unlocking status via the communication interface to themobile device 160. -
Fig. 5 presents a diagram of a method for electronic article surveillance according to a first embodiment. The method steps 501-504 correspond to the method steps 401-404. When a purchase transaction is complete, theserver 140 is notified and theserver 140 sends instep 405 an unlock command for theparticular EAS tag 150 via thetags programmer 130. In one embodiment, thetags programmer 130 may have a communication range that allows to communicate with a plurality of tags at the store, for example thetags programmer 130 may have a coverage of the whole store or there may be a plurality oftag programmers 130 installed at the store, each having a specific coverage. In another embodiment, there may be atags programmer 130 installed at a specific place at the store, for example at the cashier's desk or at the exit of the store, so that the user may come with a purchased product to that tagsprogrammer 130 and to deactivate the tag there. Since deactivation of a tag insteps same tags programmer 130. - The present invention relates to application of EAS tags and merchandising using EAS tags. The new approach is useful as it allows to omit a manual detachment of EAS by an employee of a store. Therefore, the invention provides a useful, concrete and tangible result.
- EAS tags as well as the system implementing the present invention are particular machines, therefore the machine or transformation test is fulfilled and that the idea is not abstract.
- It can be easily recognized, by one skilled in the art, that the aforementioned method for operating an electronic article surveillance device may be performed and/or controlled by one or more computer programs. Such computer programs are typically executed by utilizing the computing resources in a computing device. Applications are stored on a non-transitory medium. An example of a non-transitory medium is a non-volatile memory, for example a flash memory while an example of a volatile memory is RAM. The computer instructions are executed by a processor. These memories are exemplary recording media for storing computer programs comprising computer-executable instructions performing all the steps of the computer-implemented method according the technical concept presented herein.
- While the invention presented herein has been depicted, described, and has been defined with reference to particular preferred embodiments, such references and examples of implementation in the foregoing specification do not imply any limitation on the invention. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader scope of the technical concept. The presented preferred embodiments are exemplary only, and are not exhaustive of the scope of the technical concept presented herein.
- Accordingly, the scope of protection is not limited to the preferred embodiments described in the specification, but is only limited by the claims that follow.
Claims (14)
- An electronic article surveillance (EAS) system comprising:- a tag (150) comprising:- a memory (155) configured to store at least a tag identifier;- a communication interface (151) configured to communicate with external devices for sending the tag identifier;- security mechanism (152, 153) configured to have a locked or unlocked mode;- a tag controller (154) configured to set the security mechanism (152, 153) in unlocked mode upon receiving an access code; and- a server (140) comprising:- a product purchase module (141) configured to receive a tag identifier, execute a product purchase transaction and return an access code for the tag identifier.
- The system according to claim 1, wherein the product purchase module (141) is configured to send the access code for the tag identifier to a store infrastructure (170) which is configured to send the access code to the tag (150).
- The system according to claim 1, wherein the product purchase module (141) is configured to communicate with a user device (160) via which the user conducts product purchase transaction.
- The system according to claim 3, wherein product purchase module (141) is configured to send the access code for the tag identifier to the user device (160) via which the product purchase transaction was conducted and which is configured to send the access code to the tag (150).
- The system according to any of previous claims, wherein the tag (150) is a hard tag physically attachable to a product and comprises a locking mechanism (152), wherein the tag controller (154) is configured to unlock the locking mechanism (152) to allow physical detachment of the tag (150) from the product.
- The system according to any of previous claims, wherein the tag (150) comprises a security inducing mechanism (153), wherein the tag controller (154) is configured to unlock the security inducing mechanism (153) such that it does not induce store security infrastructure (120).
- The system according to any of previous claims, wherein the tag (150) is further configured to receive product-related data to be stored in the memory (155) from the tags programmer (130).
- The system according to any of previous claims, wherein the tag (150) is further configured to receive product-related data to be stored in the memory (155) from the store infrastructure (170).
- The system according to claim 7 or 8, wherein the tag (150) further comprises a display (156) configured to display product-related data stored in memory (155).
- The system according to any of previous claims, wherein the tag (150) further comprises a display (156) configured to display customer-related data received from the mobile device (160).
- The system according to any of previous claims, wherein the tag (150) further comprises a display (156) configured to display customer-related data received from the store infrastructure (170).
- The system according to any of previous claims, wherein the tag (150) further comprises a display (156) configured to display information on whether the tag is in unlocked mode.
- The system according to any of previous claims, wherein the tag (150) further comprises an indicator (157) configured to notify audibly or visually the locked or unlocked mode of the tag (150).
- A method for operating an electronic article surveillance (EAS) system with a security infrastructure (120), comprising the steps of:- providing a plurality of tags (150) attached to or embedded in products, each tag (150) having a tag identifier and a security mechanism (152, 153) configured to have a locked or unlocked mode, wherein the tags (150) are detectable by the security infrastructure (120);- providing a server (140) configured to execute a product purchase transaction related to a tag identifier and to return an access code for the tag identifier;- providing means for allowing a user to communicate with the tag (150) to read the tag identifier and to communicate with the server (140) to conduct the product purchase transaction; and- unlocking the security mechanism (152, 153) of a tag after providing the access code to the tag (150).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14461605.9A EP3038066A1 (en) | 2014-12-22 | 2014-12-22 | An electronic article surveillance device and a method for operating thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14461605.9A EP3038066A1 (en) | 2014-12-22 | 2014-12-22 | An electronic article surveillance device and a method for operating thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3038066A1 true EP3038066A1 (en) | 2016-06-29 |
Family
ID=52282598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14461605.9A Withdrawn EP3038066A1 (en) | 2014-12-22 | 2014-12-22 | An electronic article surveillance device and a method for operating thereof |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP3038066A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018033720A1 (en) * | 2016-08-19 | 2018-02-22 | Jook Ltd | A tag for an item of apparel |
WO2021071754A1 (en) * | 2019-10-08 | 2021-04-15 | Sensormatic Electronics, LLC | Methods and apparatuses for removing a security tag |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013153282A1 (en) * | 2012-04-11 | 2013-10-17 | Marisense Oy | Electronic label tag and electronic label tag system |
WO2014009617A2 (en) * | 2012-07-12 | 2014-01-16 | Exaqtworld | System and method for managing the unlocking of an anti-theft device |
WO2014046760A1 (en) * | 2012-09-21 | 2014-03-27 | Tyco Fire & Security Gmbh | Mobile retail peripheral platform for handheld devices |
-
2014
- 2014-12-22 EP EP14461605.9A patent/EP3038066A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013153282A1 (en) * | 2012-04-11 | 2013-10-17 | Marisense Oy | Electronic label tag and electronic label tag system |
WO2014009617A2 (en) * | 2012-07-12 | 2014-01-16 | Exaqtworld | System and method for managing the unlocking of an anti-theft device |
WO2014046760A1 (en) * | 2012-09-21 | 2014-03-27 | Tyco Fire & Security Gmbh | Mobile retail peripheral platform for handheld devices |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018033720A1 (en) * | 2016-08-19 | 2018-02-22 | Jook Ltd | A tag for an item of apparel |
WO2021071754A1 (en) * | 2019-10-08 | 2021-04-15 | Sensormatic Electronics, LLC | Methods and apparatuses for removing a security tag |
US11526684B2 (en) | 2019-10-08 | 2022-12-13 | Sensormatic Electronics, LLC | Methods and apparatuses for removing a security tag |
US11625549B2 (en) | 2019-10-08 | 2023-04-11 | Sensormatic Electronics, LLC | Methods and apparatuses for removing a security tag |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102653929B1 (en) | Self-disconnection of anti-theft devices using power removal stations | |
EP3308366B1 (en) | Alarming smart magnetic tag | |
CN107667395B (en) | Automatic removal anti-theft device for retail environments | |
US10078947B2 (en) | Control tag with environmentally selected conditional response | |
CN107924451B (en) | Wearable radio frequency identification enabled device | |
EP2759975B1 (en) | Tag system, sellable item and method for facilitating the purchase of a sellable item | |
EP3391348B1 (en) | Method and system for detaching a taga from an article | |
US20180040219A1 (en) | Tag detection using waveform radiating devices | |
JP2007535027A (en) | System and method for authenticated removal of product tags | |
US20170287297A1 (en) | Security System for a Retail Environment | |
US20180365952A1 (en) | System and method for automatically decoupling a security device associated with a product | |
WO2019168943A1 (en) | Systems and methods for security tag detachment or deactivation | |
US11922786B2 (en) | Article surveillance tag attach/detach mechanism | |
EP3038066A1 (en) | An electronic article surveillance device and a method for operating thereof | |
EP3766053B1 (en) | Systems and methods for deactivation of acousto-magnetic electronic article surveillance markers | |
US11263882B2 (en) | Internal power generating circuit for EAS hard tags | |
MXPA06009509A (en) | System and method for authenticated detachment of product tags |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20170103 |