EP0933741A2 - A bar code reader and a security tag disabling device in combination - Google Patents
A bar code reader and a security tag disabling device in combination Download PDFInfo
- Publication number
- EP0933741A2 EP0933741A2 EP99300773A EP99300773A EP0933741A2 EP 0933741 A2 EP0933741 A2 EP 0933741A2 EP 99300773 A EP99300773 A EP 99300773A EP 99300773 A EP99300773 A EP 99300773A EP 0933741 A2 EP0933741 A2 EP 0933741A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- security tag
- code
- security
- bar code
- code reader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/242—Tag deactivation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2465—Aspects related to the EAS system, e.g. system components other than tags
- G08B13/248—EAS system combined with another detection technology, e.g. dual EAS and video or other presence detection system
Definitions
- the present invention relates to a security system and more specifically to a security system having particular, but not exclusive application in the retail industry. More specifically the present invention relates to a security system comprising a bar code reader and a security tag disabling device in combination.
- a security system comprising a bar code reader and a security tag disabling device in combination.
- Bar code reading systems are widely used throughout the retail industry. Items for sale are marked with a bar code which typically contains a code identifying the product itself and its price. At the sales check-out the bar code is read by a bar code reader and the information contained therein is processed. Bar code reading systems greatly increase efficiency within a retail outlet by speeding up each customer's progress through the sales check-out, reducing transaction errors and providing information to facilitate stock control.
- Security tag systems are also widely used throughout the retail industry. Each item for sale, or more usually the high loss items, carries a security tag which can be detected by stand alone tag detectors placed across the store exit points. When an item is validly purchased the security tag is either disabled or removed from the purchase item at the point of sale. If it is not an alarm device is triggered as the tag is carried past the tag detectors.
- the "soft tag” comprises a tuned circuit that resonates when passed through an electromagnetic field, thus facilitating detection.
- the principle difference between the two is that the "soft tag” is effectively destroyed by subjecting it to a high voltage RF pulse using a tag disabling device positioned at the point of sale, whereas the "hard tag” is removed from the purchase item at the point of sale to be used again on another item.
- the hard tag is only removable from the purchase item using specialist equipment. This acts as a further deterrent to theft in that if the item is stolen with the hard tag still in place its subsequent removal without the specialist equipment usually results in the destruction or mutilation of the product.
- a further problem which can arise is that the security tag is not actually disabled or removed by the check-out operator. When this occurs the customer will attempt to exit the store with a legitimately purchased product still bearing a live tag and the store/customer conflict which may ensue as a result is inevitably embarrassing to both parties.
- a system comprising a code reader and a security tag disabling device in combination, characterised in that the system further comprises a controller which is adapted to interface with code data processing means and which operates to enable the security tag disabling device when a code is read by the code reader which is associated with a security tag and to output data read by the code reader to the data processing means when the security tag has been disabled by the security tag disabling device.
- the code takes the form of a bar code and the code reader that of a bar code reader.
- the bar code itself may contain information signifying the presence of a security tag on the item with which it is used.
- the system may comprise a look-up chart of bar codes and the presence or absence of a security tag may be input to the look-up table against each bar code, as required. In this way the presence of a tag can be verified by checking the bar code read by the bar code reader against the bar code stored in the look-up table.
- the look-up chart may be periodically updated from time to time to take account of changes in security tag practice.
- the system is preferably able to differentiate between different types.
- the security tag is comprised of a tuned circuit
- different types of tag may have different Q factor and the system differentiates between them by measuring the Q factor.
- the so-called "soft-tag” which has a low Q factor
- the so-called “hard tag” which has a high Q factor.
- the Q factor of a security tag is conveniently measured by passing it through an electromagnetic field associated with the security tag de-activation device and measuring the amplitude at which it resonates.
- Each security tag is verified as being appropriate to the item with which it is associated by checking the bar code of that item either directly or in the look-up table.
- the security tag disabling device may operate to disable it by emitting a high voltage R.F. pulse. Where the security tag cannot be disabled in this way, the security tag disabling device may operate to disable it mechanically. This will typically be the case for security tags which are required to be re-used repeatedly.
- the code data processing means typically takes the form of a cash register and a store controller.
- the system of the present invention is not restricted to use in retail environments. It may also be employed in stock control applications. In these no money changes hands when a stock item is taken but some form of code data processing means is still required to log the stock items taken and those still remaining in store.
- a purchase item is taken to a sales check-out where it is presented to the code reader and to the security tag disabling device.
- the code reader and the security tag disabling device may be separate from each other, the security tag disabling device is conveniently incorporated with the code reader.
- the code on the purchase item is read by the code reader and the code data is held over in the controller. Once the controller has the purchase item code, the controller will determine whether or not the product is tagged. This information is obtained either directly from the bar code itself or by checking the bar code against a look-up table held in memory. If the product is determined to be one carrying a security tag which must be disabled the controller will enable the security tag disabling device. Once the security tag is successfully disabled the controller outputs the bar code data to the cash register and the purchase of that purchase item is completed. For convenience this may be indicated to the check-out operator and the customer by audible and/or visual indicator means. If, however, during the operation described above the controller determines via the security tag disabling device that the security tag has not been disabled a warning is given by audible and/or visual indicator means., and the bar code is held over by the controller until appropriate action has been taken.
- the controller determines that the product is not intended to have a security tag fitted, but one is detected the further processing of the transaction can be dealt with according to a set of pre-defined rules. For example, the operator may be warned and further processing of the transaction may be halted until the discrepancy has been resolved.
- the system may be operated to allow the security tag to be disabled, but a record of the transaction may be made in a transaction log. This has the benefit of avoiding hold-ups at the check out, whilst allowing for multiple discrepancies associated with a particular check-out or check-out operator to be identified from the transaction log.
- controller Since in many stores bar code readers and security tag disabling devices are already in use the controller is intended to interface with the very minimum of changes to the retail system. No changes to store application software are expected to be needed, only small cabling changes to connect the reader, disabling device and cash register up to the controller.
- the controller is able to support the major interface types and protocols used between bar code readers and cash register systems.
- the four main types being RS232, Parallel, OCIA, (Optically coupled interface adapter) and RS485. Due to this flexibility the controller is not limited to a particular article identification system such as bar code scanning, but limited merely by any future interface changes.
- the security tag system the controller is not limited to any particular type of tagging system.
- the controller has the ability to carry out interface and protocol conversion should this be found useful for a customer to, say, allow a scanner with RS232 communications to be used in conjunction with a cash register supporting only RS485. This feature would apply when a selected type of reader cannot support a cash register interface type or even a certain feature required to suit the store environment.
- a cash register 1 which is connected via a suitable interface to a system according to the present invention.
- the system comprises a controller device 2 to which is connected a flat bed bar code reader 3 and a security tag disabling device 5 in the form of an RF de-activation coil which for explanatory purposes is shown encircling the bar code reader.
- the RF de-activation coil is connected to power supply unit 4.
- Both the bar code reader 3 and the security tag disabling device 5 are of conventional design.
- the controller 2 comprises a key switch 6 and two push switches 11 which enable the controller 2 to be operated by the check-out operator or supervisor as necessary.
- the controller 2 is connected to a server unit 9 via a network 7.
- the server unit 9 and associated network 7 perform two roles. One is to manage the operation of a number of controllers, each connected to a respective branch of the network 7. The other is to provide report printing and transaction data.
- the server can operate in two ways. It can be the source of all the security tagging information and can interact with the controllers in a real time environment or alternatively it can hold data or tagging information which is down loaded to each controller at the beginning of each day. With this mode of operation delays in transactions are kept to a minimum as the controllers only have to advise the server of the results of a transaction, and this can be performed at leisure.
- the controller 2 operates so as to ensure that when an article carrying a bar code is placed in front of the bar code reader 3 the bar code is read. Once read the bar code is held over in the controller 2.
- the system is able to check whether the article should carry a security tag from information contained within the bar code or by checking the bar code against a look-up table stored in memory.
- the system is also able to detect the presence of a security tag within the field of the R.F. deactivation coil where the security tag is of the type which comprises a tuned circuit because the tuned circuit resonates at a set frequency which is then detected. Having established that a security tag is present which requires to be disabled the power supply 4 is operated to send an R.F.
- the system is able to check whether the security tag has been successfully disabled by re-checking to see whether the tuned circuit still resonates at the set frequency.
- the controller 2 determines that the security tag has been disabled it transfers the bar code data held over to the cash register 1 and the transaction is completed.
- the security tag is a "rogue" tag which is not disabled by the R.F. pulse or a tag is detected when there should be none, this is determined by the controller 2 which is then able to continue processing the transaction according to a predefined set of rules. These rules may require that the transaction is halted until action is taken by the operator or others to correct the situation. Alternatively, the system may allow the transaction to be completed but with a note of the apparent discrepancy being made in a transaction log.
- the controller 2 may give visual and/or audible warnings of "rogue" tags in the detection field of the security tag disabling device.
- the visual warnings are only indicated by coloured lights for more user friendly environments, and where far more detailed information is required, a remote control option 8 is available.
- the remote control unit 8 overrides the switches on the controller 2 and takes operator control directly. This is a smaller unit, and the intention is to install this within easy reach of the operator and locate the controller and all of its associated wiring away from view.
- the remote unit features controlling switches and an audio output, and also has a much more sophisticated display.
- the system is also able to advise the operator of the presence of non-detectable security tags which must be mechanically removed from the item. The presence of these is indicated in the bar code for that item or in the look-up table and a visual or audible warning of their presence is given to the operator.
- the system of the present invention has been described with reference to security tags of the type which are detected and disabled electronically, e.g., by using an R.F. signal, but is not limited thereto.
- the system may also be used tags which are detected and disabled using mechanical means.
- the system can be used with tags which have to be removed from the item or mechanically broken using a dedicated mechanical device.
- controller and remote control unit are both re-programmable. This can be achieved by one of two means, either through the communication port which connects to the bar code scanner, or by transferring the programs from the server to a controller via the network. In both cases both controller and remote unit programs can be updated.
- Such a system allows updates to be carried out by either a service engineer or by means of a supplied computer disc which the store supervisor would install in the server.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Burglar Alarm Systems (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
Description
- The present invention relates to a security system and more specifically to a security system having particular, but not exclusive application in the retail industry. More specifically the present invention relates to a security system comprising a bar code reader and a security tag disabling device in combination. This specification refers throughout to "bar codes" and "bar code readers". However, it will be understood by the skilled reader that other forms of article identification may be used and that the reader used will be appropriate to this.
- Bar code reading systems are widely used throughout the retail industry. Items for sale are marked with a bar code which typically contains a code identifying the product itself and its price. At the sales check-out the bar code is read by a bar code reader and the information contained therein is processed. Bar code reading systems greatly increase efficiency within a retail outlet by speeding up each customer's progress through the sales check-out, reducing transaction errors and providing information to facilitate stock control.
- Security tag systems are also widely used throughout the retail industry. Each item for sale, or more usually the high loss items, carries a security tag which can be detected by stand alone tag detectors placed across the store exit points. When an item is validly purchased the security tag is either disabled or removed from the purchase item at the point of sale. If it is not an alarm device is triggered as the tag is carried past the tag detectors.
- Basically, there are two types of security tag, these being the "soft tag" and the "hard tag". Both comprise a tuned circuit that resonates when passed through an electromagnetic field, thus facilitating detection. The principle difference between the two is that the "soft tag" is effectively destroyed by subjecting it to a high voltage RF pulse using a tag disabling device positioned at the point of sale, whereas the "hard tag" is removed from the purchase item at the point of sale to be used again on another item. Usually the hard tag is only removable from the purchase item using specialist equipment. This acts as a further deterrent to theft in that if the item is stolen with the hard tag still in place its subsequent removal without the specialist equipment usually results in the destruction or mutilation of the product.
- Although both bar code reading systems and security tag systems are well known and widely used they have, hitherto, always been operated totally independently of one another. In certain circumstances this can mean that the effectiveness of both systems may not be total. A problem commonly experienced by retailers now is that of so-called "sweethearting". In this the check-out operator favours an associate purporting to be a genuine customer by passing certain items, usually expensive ones, through the point of sale without allowing them to be read by the bar code reader. All the security tags are, of course, removed or disabled at the point of sale and the associate is then able to leave the store with all the items, having only paid for a few of them.
- A further problem which can arise is that the security tag is not actually disabled or removed by the check-out operator. When this occurs the customer will attempt to exit the store with a legitimately purchased product still bearing a live tag and the store/customer conflict which may ensue as a result is inevitably embarrassing to both parties.
- It is an object ofthe present invention to provide a system comprising a bar code reader and a security tag disabling device in combination which operates to obviate or at least substantially mitigate the problems referred to hereinabove which are encountered with independently operated bar code reading systems and security tag systems.
- According to the present invention there is provided a system comprising a code reader and a security tag disabling device in combination, characterised in that the system further comprises a controller which is adapted to interface with code data processing means and which operates to enable the security tag disabling device when a code is read by the code reader which is associated with a security tag and to output data read by the code reader to the data processing means when the security tag has been disabled by the security tag disabling device.
- Conveniently, the code takes the form of a bar code and the code reader that of a bar code reader. The bar code itself may contain information signifying the presence of a security tag on the item with which it is used. Alternatively, the system may comprise a look-up chart of bar codes and the presence or absence of a security tag may be input to the look-up table against each bar code, as required. In this way the presence of a tag can be verified by checking the bar code read by the bar code reader against the bar code stored in the look-up table. The look-up chart may be periodically updated from time to time to take account of changes in security tag practice.
- It is known to use different types of security tags for different types of item and the system is preferably able to differentiate between different types. Where the security tag is comprised of a tuned circuit different types of tag may have different Q factor and the system differentiates between them by measuring the Q factor. Typically, there are two types of tag, the so-called "soft-tag" which has a low Q factor and the so-called "hard tag" which has a high Q factor. The Q factor of a security tag is conveniently measured by passing it through an electromagnetic field associated with the security tag de-activation device and measuring the amplitude at which it resonates.
- Each security tag is verified as being appropriate to the item with which it is associated by checking the bar code of that item either directly or in the look-up table.
- Where the security tag is comprised of a tuned circuit the security tag disabling device may operate to disable it by emitting a high voltage R.F. pulse. Where the security tag cannot be disabled in this way, the security tag disabling device may operate to disable it mechanically. This will typically be the case for security tags which are required to be re-used repeatedly.
- When the system according to the present invention is used in a retail environment the code data processing means typically takes the form of a cash register and a store controller. However, the system of the present invention is not restricted to use in retail environments. It may also be employed in stock control applications. In these no money changes hands when a stock item is taken but some form of code data processing means is still required to log the stock items taken and those still remaining in store.
- In use, in a retail environment a purchase item is taken to a sales check-out where it is presented to the code reader and to the security tag disabling device. Although the code reader and the security tag disabling device may be separate from each other, the security tag disabling device is conveniently incorporated with the code reader.
- The code on the purchase item is read by the code reader and the code data is held over in the controller. Once the controller has the purchase item code, the controller will determine whether or not the product is tagged. This information is obtained either directly from the bar code itself or by checking the bar code against a look-up table held in memory. If the product is determined to be one carrying a security tag which must be disabled the controller will enable the security tag disabling device. Once the security tag is successfully disabled the controller outputs the bar code data to the cash register and the purchase of that purchase item is completed. For convenience this may be indicated to the check-out operator and the customer by audible and/or visual indicator means. If, however, during the operation described above the controller determines via the security tag disabling device that the security tag has not been disabled a warning is given by audible and/or visual indicator means., and the bar code is held over by the controller until appropriate action has been taken.
- If the controller determines that the product is not intended to have a security tag fitted, but one is detected the further processing of the transaction can be dealt with according to a set of pre-defined rules. For example, the operator may be warned and further processing of the transaction may be halted until the discrepancy has been resolved. Alternatively, the system may be operated to allow the security tag to be disabled, but a record of the transaction may be made in a transaction log. This has the benefit of avoiding hold-ups at the check out, whilst allowing for multiple discrepancies associated with a particular check-out or check-out operator to be identified from the transaction log.
- With the system according to the present invention it should not be possible for an item to be sold without its security tag being disabled. Nor should it be possible for any person to illegally or inadvertently disable a security tag without this being detected by the controller
- Since in many stores bar code readers and security tag disabling devices are already in use the controller is intended to interface with the very minimum of changes to the retail system. No changes to store application software are expected to be needed, only small cabling changes to connect the reader, disabling device and cash register up to the controller.
- Conveniently, the controller is able to support the major interface types and protocols used between bar code readers and cash register systems. Currently the four main types being RS232, Parallel, OCIA, (Optically coupled interface adapter) and RS485. Due to this flexibility the controller is not limited to a particular article identification system such as bar code scanning, but limited merely by any future interface changes. Similarly regarding the security tag system the controller is not limited to any particular type of tagging system.
- Conveniently, the controller has the ability to carry out interface and protocol conversion should this be found useful for a customer to, say, allow a scanner with RS232 communications to be used in conjunction with a cash register supporting only RS485. This feature would apply when a selected type of reader cannot support a cash register interface type or even a certain feature required to suit the store environment.
- An embodiment of the present invention will now be described, by way of example, with reference to the accompanying drawing which shows a general schematic view of a cash register connected to a system in accordance with the present invention;
- Referring to the drawing there is shown a cash register 1 which is connected via a suitable interface to a system according to the present invention. The system comprises a
controller device 2 to which is connected a flat bedbar code reader 3 and a securitytag disabling device 5 in the form of an RF de-activation coil which for explanatory purposes is shown encircling the bar code reader. The RF de-activation coil is connected topower supply unit 4. Both thebar code reader 3 and the securitytag disabling device 5 are of conventional design. Thecontroller 2 comprises a key switch 6 and two push switches 11 which enable thecontroller 2 to be operated by the check-out operator or supervisor as necessary. - The
controller 2 is connected to aserver unit 9 via anetwork 7. Theserver unit 9 and associatednetwork 7 perform two roles. One is to manage the operation of a number of controllers, each connected to a respective branch of thenetwork 7. The other is to provide report printing and transaction data. As regards controlling management the server can operate in two ways. It can be the source of all the security tagging information and can interact with the controllers in a real time environment or alternatively it can hold data or tagging information which is down loaded to each controller at the beginning of each day. With this mode of operation delays in transactions are kept to a minimum as the controllers only have to advise the server of the results of a transaction, and this can be performed at leisure. - In use, the
controller 2 operates so as to ensure that when an article carrying a bar code is placed in front of thebar code reader 3 the bar code is read. Once read the bar code is held over in thecontroller 2. The system is able to check whether the article should carry a security tag from information contained within the bar code or by checking the bar code against a look-up table stored in memory. The system is also able to detect the presence of a security tag within the field of the R.F. deactivation coil where the security tag is of the type which comprises a tuned circuit because the tuned circuit resonates at a set frequency which is then detected. Having established that a security tag is present which requires to be disabled thepower supply 4 is operated to send an R.F. pulse of sufficient strength and duration through thecoil 5 as to "blow" the security tag. The system is able to check whether the security tag has been successfully disabled by re-checking to see whether the tuned circuit still resonates at the set frequency. When thecontroller 2 determines that the security tag has been disabled it transfers the bar code data held over to the cash register 1 and the transaction is completed. - If the security tag is a "rogue" tag which is not disabled by the R.F. pulse or a tag is detected when there should be none, this is determined by the
controller 2 which is then able to continue processing the transaction according to a predefined set of rules. These rules may require that the transaction is halted until action is taken by the operator or others to correct the situation. Alternatively, the system may allow the transaction to be completed but with a note of the apparent discrepancy being made in a transaction log. - The
controller 2 may give visual and/or audible warnings of "rogue" tags in the detection field of the security tag disabling device. However, the visual warnings are only indicated by coloured lights for more user friendly environments, and where far more detailed information is required, aremote control option 8 is available. Theremote control unit 8 overrides the switches on thecontroller 2 and takes operator control directly. This is a smaller unit, and the intention is to install this within easy reach of the operator and locate the controller and all of its associated wiring away from view. The remote unit features controlling switches and an audio output, and also has a much more sophisticated display. - The system is also able to advise the operator of the presence of non-detectable security tags which must be mechanically removed from the item. The presence of these is indicated in the bar code for that item or in the look-up table and a visual or audible warning of their presence is given to the operator.
- The system of the present invention has been described with reference to security tags of the type which are detected and disabled electronically, e.g., by using an R.F. signal, but is not limited thereto. The system may also be used tags which are detected and disabled using mechanical means. In this regard, the system can be used with tags which have to be removed from the item or mechanically broken using a dedicated mechanical device.
- The other main feature of the system is its total flexibility. The intention is that the controller and remote control unit are both re-programmable. This can be achieved by one of two means, either through the communication port which connects to the bar code scanner, or by transferring the programs from the server to a controller via the network. In both cases both controller and remote unit programs can be updated. Such a system allows updates to be carried out by either a service engineer or by means of a supplied computer disc which the store supervisor would install in the server.
Claims (14)
- A system comprising a code reader and a security tag disabling device in combination, characterised in that the system further comprises a controller which is adapted to interface with code data processing means and which operates to enable the security tag disabling device when a code is read by the code reader which is associated with a security tag and to output data read by the code reader to the data processing means when the security tag has been disabled by the security tag disabling device.
- A system according to Claim 1, characterised in that the code takes the form of a bar code and the code reader that of a bar code reader.
- A system according to Claim 1 or 2, characterised in that code contains information signifying the presence of a security tag on the item with which it is used.
- A system according to Claim 1 or 2, characterised in that a look-up table is provided in memory which indicates for each code the presence or absence of a security tag.
- A system according to any preceding Claim, characterised in that the system further comprises means for detecting the presence of a security tag.
- A system according to Claim 5, characterised in that the security tag detecting means is able to detect the resonant frequency of a tuned circuit.
- A system according to Claim 5 or 6, characterised in that the security tag detecting means is able to differentiate between different types of security tag.
- A system according to Claim 6 and 7, characterised in that the security tag detecting means is able to determine the Q factor of a tuned circuit.
- A system according to any preceeding Claim, characterised in that the security tag disabling means operates electronically to disable security tags.
- A system according to Claim 9, characterised in that the security tag generates an R.F. pulse to disable security tags.
- A system according to any of Claims 1 to 9, characterised in that the security tag disabling means operates mechanically to disable security tags.
- A system according to any preceding Claim, wherein, the controller is able to support the major interface types and protocols used between bar code readers and cash register systems.
- A system according to Claim 12, wherein the protocol used is one of RS232, Parallel, OCIA, (Optically coupled interface adapter) and RS485.
- A system according to Claim 12 or 13, wherein the controller is able to carry out interface and protocol conversion.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9802166.0A GB9802166D0 (en) | 1998-02-03 | 1998-02-03 | A bar code reader and a secutiy tag disabling device in combination |
GB9802166 | 1998-02-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0933741A2 true EP0933741A2 (en) | 1999-08-04 |
EP0933741A3 EP0933741A3 (en) | 1999-12-08 |
Family
ID=10826286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99300773A Withdrawn EP0933741A3 (en) | 1998-02-03 | 1999-02-02 | A bar code reader and a security tag disabling device in combination |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP0933741A3 (en) |
GB (1) | GB9802166D0 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2799292A1 (en) * | 1999-10-01 | 2001-04-06 | Dynamic Shopping Sa | Product identification and validation device includes label reader, memory, and label marker changing label status after reading |
EP1335336A2 (en) * | 2002-02-01 | 2003-08-13 | Ncr International Inc. | Checkout device |
NL1023226C2 (en) * | 2003-04-18 | 2004-10-19 | Johan Dijkstra | Security system for shop, particularly for selling clothes, comprises label fixable to product saleable by shop, which can be removed and deactivated |
WO2011126697A1 (en) * | 2010-04-08 | 2011-10-13 | Checkpoint Systems, Inc. | Auto -accreting database for eas-rf applications |
CN102509139A (en) * | 2011-11-25 | 2012-06-20 | 杭州中瑞思创科技股份有限公司 | Commodity protection method and system with internal theft prevention function |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1987004282A1 (en) * | 1986-01-03 | 1987-07-16 | Advanced Systems Research Pty. Ltd. | Inventory control system |
WO1990005968A1 (en) * | 1988-11-14 | 1990-05-31 | Checkpoint Systems, Inc. | Method and apparatus for integrated data capture and electronic article surveillance |
US5151684A (en) * | 1991-04-12 | 1992-09-29 | Johnsen Edward L | Electronic inventory label and security apparatus |
US5418354A (en) * | 1993-08-20 | 1995-05-23 | Halling; Leonard W. | Self service cart system |
GB2286275A (en) * | 1994-01-11 | 1995-08-09 | Robert Benjamin Franks | Retail goods check-out apparatus |
US5594228A (en) * | 1988-08-25 | 1997-01-14 | Symbol Technologies, Inc. | Self-checkout, point-of-transaction system including deactivatable electro-optically coded surveillance tags |
-
1998
- 1998-02-03 GB GBGB9802166.0A patent/GB9802166D0/en not_active Ceased
-
1999
- 1999-02-02 EP EP99300773A patent/EP0933741A3/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1987004282A1 (en) * | 1986-01-03 | 1987-07-16 | Advanced Systems Research Pty. Ltd. | Inventory control system |
US5594228A (en) * | 1988-08-25 | 1997-01-14 | Symbol Technologies, Inc. | Self-checkout, point-of-transaction system including deactivatable electro-optically coded surveillance tags |
WO1990005968A1 (en) * | 1988-11-14 | 1990-05-31 | Checkpoint Systems, Inc. | Method and apparatus for integrated data capture and electronic article surveillance |
US5151684A (en) * | 1991-04-12 | 1992-09-29 | Johnsen Edward L | Electronic inventory label and security apparatus |
US5418354A (en) * | 1993-08-20 | 1995-05-23 | Halling; Leonard W. | Self service cart system |
GB2286275A (en) * | 1994-01-11 | 1995-08-09 | Robert Benjamin Franks | Retail goods check-out apparatus |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2799292A1 (en) * | 1999-10-01 | 2001-04-06 | Dynamic Shopping Sa | Product identification and validation device includes label reader, memory, and label marker changing label status after reading |
WO2001025981A1 (en) * | 1999-10-01 | 2001-04-12 | Dynamic Shopping Sa | System for identifying and validating data, in particular loyalty points for promoting sales outlets |
EP1335336A2 (en) * | 2002-02-01 | 2003-08-13 | Ncr International Inc. | Checkout device |
EP1335336A3 (en) * | 2002-02-01 | 2006-05-10 | Ncr International Inc. | Checkout device |
NL1023226C2 (en) * | 2003-04-18 | 2004-10-19 | Johan Dijkstra | Security system for shop, particularly for selling clothes, comprises label fixable to product saleable by shop, which can be removed and deactivated |
WO2011126697A1 (en) * | 2010-04-08 | 2011-10-13 | Checkpoint Systems, Inc. | Auto -accreting database for eas-rf applications |
US8537007B2 (en) | 2010-04-08 | 2013-09-17 | Checkpoint Systems, Inc. | Autoaccreting database for EAS-RF applications |
CN102509139A (en) * | 2011-11-25 | 2012-06-20 | 杭州中瑞思创科技股份有限公司 | Commodity protection method and system with internal theft prevention function |
Also Published As
Publication number | Publication date |
---|---|
EP0933741A3 (en) | 1999-12-08 |
GB9802166D0 (en) | 1998-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5239167A (en) | Checkout system | |
US5151684A (en) | Electronic inventory label and security apparatus | |
AU2003231038B2 (en) | System and method for managing assets using a portable combined electronic article surveillance system and barcode scanner | |
CA2597286C (en) | Alarm investigation using rfid | |
EP1849145B1 (en) | Techniques to reduce false alarms, invalid security deactivation, and internal theft | |
US6554187B2 (en) | Method of detecting and managing RFID labels on items brought into a store by a customer | |
US7398923B2 (en) | System to detect false purchases with a consumer service device | |
EP2122595B1 (en) | Method for monitoring, tracking and theft protecting of objects to be secured | |
US9547966B2 (en) | Uncoupling device and method | |
EP0407506A1 (en) | Method and apparatus for integrated data capture and electronic article surveillance. | |
MX2007006209A (en) | System and method for integrating point of sale and electronic article surveillance data. | |
US20150187193A1 (en) | Commodity information input apparatus, exit detection apparatus, and system including the same | |
JP4328154B2 (en) | Article management system using RFID tag | |
JP5358409B2 (en) | Self-checkout terminal device, self-checkout system, detector activation state notification method, and commodity transaction restriction method | |
US20090237219A1 (en) | Security apparatus, system and method of using same | |
EP0933741A2 (en) | A bar code reader and a security tag disabling device in combination | |
KR20080003356A (en) | Trade item sales data processing device | |
US20120024943A1 (en) | Merchandise security tag for an article of merchandise | |
JP2017117298A (en) | Commodity reading device and program for controlling the same | |
US11263637B2 (en) | Registration apparatus, a method for registering commodity information, and a non-transitory computer readable medium | |
JP2008299404A (en) | Wireless tag commodity management system | |
IL282896A (en) | A flexible point of sale and antitheft system | |
JPH08161638A (en) | Sales price check system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB NL |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
17P | Request for examination filed |
Effective date: 20000602 |
|
AKX | Designation fees paid |
Free format text: DE FR GB NL |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Withdrawal date: 20001011 |