MXPA99002405A - Electronic article security system for store which uses intelligent security tags and transaction data - Google Patents

Electronic article security system for store which uses intelligent security tags and transaction data

Info

Publication number
MXPA99002405A
MXPA99002405A MXPA/A/1999/002405A MX9902405A MXPA99002405A MX PA99002405 A MXPA99002405 A MX PA99002405A MX 9902405 A MX9902405 A MX 9902405A MX PA99002405 A MXPA99002405 A MX PA99002405A
Authority
MX
Mexico
Prior art keywords
interrogator
security
video
identification information
article
Prior art date
Application number
MXPA/A/1999/002405A
Other languages
Spanish (es)
Inventor
J Clare Thomas
Original Assignee
Checkpoint Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Checkpoint Systems Inc filed Critical Checkpoint Systems Inc
Publication of MXPA99002405A publication Critical patent/MXPA99002405A/en

Links

Abstract

An electronic article security system (10) monitors articles (12) sold by a retail store (16) to detect shrinkage. The articles (12) are tagged with RF-ID security tags (22). Each security tag (22) has a unique or semi-unique serial number for identifying individual products. Transaction records (36) generated from point-of-sale terminals in the store are sent to a remote computer (38). An interrogator (42) and surveillance camera (58) are positioned near the store exit. When an article (12) having the RF-ID security tag (22) is detected as passing through the store exit, the interrogator outputs a signal derived from the security tag (22). The output signal includes the security tag serial number. Also, the camera (58) takes an image of the person moving the tagged article through the exit. The interrogator output signal is sent to the remote computer (38). The remote computer (38) periodically compares the transaction records (36) with the interrogator output signals to detect any discrepancies therebetween. The discrepancies are investigated by viewing the captured video images near the time of the discrepancies.

Description

SECURITY SYSTEM FOR ELECTRONIC ITEMS FOR STORES. WHICH USES INTELLIGENT SAFETY LABELS AND DATA OF TRANSACTION FIELD OF THE INVENTION The present invention relates in general to security systems for electronic articles which use resonant security tags.
BACKGROUND OF THE INVENTION Security systems for electronic items (SAE) used to detect and prevent the theft or unauthorized removal of items or goods from a retail establishment and / or other facilities, such as libraries, have become very common. In general, such security systems use a security tag which is insured to, or associated with, an article (or its packaging material), which is typically an item of easy access to potential customers or users of the goods. facilities and, therefore, is susceptible to unauthorized withdrawal. Security labels can be of many different sizes, shapes, and figures depending on the particular type of SAE system being used, the type and size of the article to be protected, and the packaging material of the item, etc. In general, such SAE systems are used to detect the presence (or absence) of a security label and, therefore, of a protected article, within a monitored security area or detection zone. In most cases, the detection zone is located on, or around, an outlet or an entrance to the facility or a portion thereof. One type of SAE system which has gained wide popularity uses a security tag that includes a self-contained passive resonant circuit in the form of a small and generally flat printed circuit that resonates at a predetermined detection frequency within a frequency detection range. A transmitter, which is also tuned to the detection frequency, is used to transmit the electromagnetic energy to the detection zone. A receiver, tuned to the detection frequency, is placed close to the detection zone. Typically, the transmitter and a transmitting antenna are located on one side of an exit or a corridor and the receiver and a receiving antenna are located on the other side of the exit or corridor, so that, to exit the installation, the person must pass between the transmitting and receiving antennas. When an item having a security label attached moves or passes through the detection zone, the security label is exposed to the transmitted energy which causes the resonant circuit of the label to resonate thus providing a detectable output signal by the receiver. The detection of said output signal by the receiver indicates the presence, within the detection zone, of an article having a security label and the receiver activates an alarm to alert the appropriate security personnel or other personnel. It has been shown that existing SAE systems of the type described above and of other types are effective to prevent theft or unauthorized removal of items. However, there are many ways to overcome such systems. For example, the security tag can be removed or prematurely disabled by customers or by store personnel. The transmitter / receiver device (ie the interrogator) can be deactivated temporarily either by a customer or by store personnel. A customer could run away from the store with stolen merchandise even when the interrogator issued a visible or audible alarm. Store personnel may have intimate knowledge of security systems and may know other ways to temporarily defeat the system or help a customer overcome the system. While the mere presence of a visible security system sometimes prevents theft, it also invites smart ways to defeat the system. Another problem with existing SAE systems is that the movement of items outside the store is not correlated with the transaction activity in the cash register. So, it is difficult to determine if an item detected within the detection zone is being stolen or if it was purchased but the security label was not properly deactivated. The security labels used in a particular store, or in a chain of stores, are typically identical. Therefore, all items, regardless of the size or value thereof, which have the security label included, return an identical signal to the interrogator's receiver. Recently, passive resonant safety labels were developed which return unique or semi-unique identification codes. The Patents E.U.A. Nos. 5,446,447 (Carney et al.) Describe three examples of such security labels. Typically, these security tags include an integrated circuit that generates an identification code. While such "intelligent" security tags provide additional information about the item detected in the interrogator zone, they do not allow the movement of items to be correlated with the transaction activity in the cash register. Studies show that store employees are responsible for a large amount of store theft (losses). Typically, one or only a few employees are responsible for the majority of the thefts in a particular store. Sometimes employees take out the stolen goods by working together with friends who act as customers. Theft due to employees is very difficult to detect. As indicated above, SAE systems can be easily defeated by employees. Despite the progress made in reducing theft through the use of SAE systems, there is still a need for an SAE system that can detect and identify more effectively people who steal items from a store. The present invention fills this need.
BRIEF DESCRIPTION OF THE INVENTION The present invention provides a security system for electronic items to be used in conjunction with items that have a security tag attached to them. Security tags include a resonant circuit that is used to detect the presence of the item by receiving an interrogation signal and returning a response signal. The security tag further includes an integrated circuit connected to the resonant circuit for storing the item identification information and for issuing the item identification information together with the response signal after interrogation of the security tag. The system includes one or more terminals at the point of sale (POS), an interrogator and a computer. PDV terminals record item transactions including item purchases.
The transaction recordings include the identification information of a specific product. The interrogator monitors a detection zone for disturbances in the form of a response signal caused by the presence of a security tag within the zone. The interrogator issues an interrogator exit signal when a security tag is detected in the zone. Each output signal of the interrogator includes the identification information of the article stored in the integrated circuit. The computer receives and stores the transaction recordings and the exit signals of the interrogator. The computer includes means for comparing the transaction recordings and the exit signals of the interrogator, including the identification information of the article and the product and detects any discrepancies that may occur between them. The system also includes a video camera and a VCR. The video camera captures the images of the detection zone and emits video signals of the captured images. The video recorder stores the video signals in a video storage medium. The video storage medium is used to investigate the discrepancies detected. Another embodiment of the invention provides a loss detection method by monitoring articles using the apparatus described above.
BRIEF DESCRIPTION OF THE DRAWINGS The above brief description, as well as the following detailed description of the preferred embodiments of the invention will be better understood when read in conjunction with the appended drawings. For the purpose of illustrating the invention, the preferred embodiments of the invention are shown in the drawings. It should be understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown. In the drawings: Figure 1 is a block diagram functional diagram of a security system for electronic items (SAE) in accordance with a first preferred embodiment of the present invention; Figure 2 is a block diagram scheme of a security tag suitable for use with the system of Figure 1; Figure 3 is a sample of the sequence of recordings of the data bank for tracking items with embedded security tags that is used with the system of Figure 1; Figure 4 is a sample of the store transaction recordings generated by the system of Figure 1; Figure 5 (a) shows a sample of recordings for the transaction data bank of a store used in the system of Figure 1; Figure 5 (b) indicates a sample of the recordings for an event data bank used in the system of Figure 1; Figure 5 (c) indicates a sample of a discrepancy report generated from the recordings in the transaction and event data banks of Figures 5 (a) and 5 (b); Figure 6 is a block diagram functional diagram of an interrogator suitable for use with the present invention; Figure 7 is a block diagram functional diagram of a security system for electronic items (SAE) in accordance with a second preferred embodiment of the present invention; and Figure 8 is a modified store floor plan that is used with the SAE system of Figure 1 in accordance with a third preferred embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED MODALITY The terminology employed hereafter is used for convenience only and should not be taken as a limitation on the present invention. In the drawings, the same reference numbers are used to designate the same elements through the various figures. Figure 1 indicates a block diagram functional diagram of a security system for electronic items (SAE) 10 in accordance with a preferred embodiment of the present invention. In the preferred embodiment, the articles 12 are initially housed in a retail distribution center 14. When desired, the articles 12 are supplied to a particular retail store 16 and placed in a storage area or on the shelves of the store. store 16. Information concerning items 12 sent to retail store 16 is sent to a central office of retail store 17, which may be located away from distribution center 14 and retail store 16. Typically customers see floor samples of items 12 on the sales floor of store 16. When a customer wants to buy one or more items 12, the customer approaches the point of sale (POS) terminal or the cash register associated with a PDV system 18 and pays articles 12. Information concerning the transactions of the item (eg, purchases, exchanges, returns) is sent to the central office of the retail store for inventory analysis and management control and loss control. Next, the purchased item (s) 12 are removed from the storage area of the retail store 16 and are delivered to the customer, if they were not previously on the sales floor. The customer leaves store 16 with the items purchased 12 with or without the help of store personnel. While leaving the store 16, the customer passes through a predesignated detection zone 20. An interrogator 42 detects the presence of the purchased item 12 in the detection zone 20 and records the information pertinent thereto, as described further in detail forward. For simplicity, Figure 1 indicates only a distribution center 14 and a retail store 16. However, there may be a plurality of retail stores 16 which receive articles 12 from the distribution center 14 and which send their information about the articles to the central office 17. There may also be a plurality of distribution centers 14 in communication with the central offices 17 and with one or more of the retail stores 16. During the process described above, various data concerning each Article 12, which allows the retail establishment to detect if there is any loss or other irregularity that is presented with respect to the inventory of articles 12. To assist in such detection, each article 12 is provided with a security label 22. security tags 22 are adhered to articles 12 in the distribution center of the retail store 14, or at an earlier stage of the distribution chain, such as at the point of manufacture. Alternatively, security tags 22 may be attached to items 12 in retail store 16. In any scheme, security tags 22 remain attached to items 12 at least until they are purchased and removed from store 16 and preferably for the entire life of article 12. Safety labels 22 are not visible to the naked eye, and are potentially even hidden within articles 12, to minimize awareness of the presence of labels 22 and to prevent the detachment of, or adulteration with, labels 22. Figure 2 indicates the general details of a security tag sample 22 suitable for use with the present invention. The security tag 22 includes a passive resonant radio frequency (RF) circuit 24 which is used to detect the time when the tag 22 is within an area monitored by an interrogator, as is well known in the art. A well-known type of circuit 24 has a coil antenna 82 and a capacitor 84. The energy for the security tag 22 is obtained from the antenna in a conventional manner. The security tag 22 further includes an integrated circuit (Cl) 26 to provide "intelligence" to the security tag 22. The Cl 26 is connected to the circuit 24. The Cl 26 includes a programmable memory 27, such as a memory of 64. bits, to store bits of identification data. The Cl 26 emits a data stream comprised of the 64 bits of data when sufficient energy is applied to it. In one embodiment of the invention, the data stream creates a series of data pulses by switching an extra capacitor through the coil antenna 82 for the duration of the pulse. This changes the resonant frequency of the RF circuit 24 by detuning it to the operational frequency. Therefore, instead of the RF circuit 24 returning a simple response signal, it returns a signal containing a pre-programmed information packet. The information packet (data pulses) is processed by the interrogator receiver circuit and is decoded (if necessary) to provide identification information about item 12. Other methods for using the data in the memory of the Cl 27 to issue the identification data from the security tag 22 is within the scope of the invention. The Cl 26 is preferably also a passive device and is energized in the same manner as the RF circuit 24 (i.e., using the energy received at the antenna 82 from the signal of the interrogating transmitter). The security tag 22 is therefore a so-called "radio frequency smart tag (RFID or RF-ID)", or "intelligent security tag". Preferably the security tag 22 is not physically deactivatable. Referring to Figure 1, the retail store distribution center 14 receives blank 22 security tags (without programming), assigns unique serial numbers or other data to each of the tags 22 by appropriate programming (if appropriate). which were not already pre-assigned), sets labels 22 to articles 12, and creates a data bank which correlates the data number of each security label 22 with the respective product. The programming step is eliminated if the articles 12 arrive at the distribution center 14 pre-labeled and with pre-assigned data or serial numbers, in which case the labels 22 attached to each article are read with an interrogator and the bank is created of correlation data. In the example illustrated here, the retail store distribution center 14 applies security labels 22 to 100 items. Next, a computer 28 of the distribution center is used to update an inventory databank 29 stored there as follows: 1. An article 12 is read by an RF-ID 30 scrutineer which extracts from the security label 22, the unique serial number programmed. 2. A recording of the database for the serial number is added to the inventory database 29. 3. Next, the barcode in article 12 is read by a conventional barcode scanner 32 for Obtain product identification information. This information is added to the new recording in the inventory database 29. Alternatively, the RF-ID tag can easily include such product identification information, in which case, step 3 is not necessary. If RF-ID scanners and bar code scanners are not available, the product identification information can be entered manually. When new items 12 arrive at distribution center 14, the process is repeated using new security tags 22 programmed with new unique security numbers. The most recent inventory data is also provided to an inventory computer 34 located at headquarters 17 which compiles the inventory data into an inventory database of central offices 35. After having been labeled, items 12 are sent to retail store 16 and placed in the store for subsequent purchase by a customer. A store inventory computer (not shown) may be updated to include the new shipment of items 12. Figure 3 indicates a sample of a sequence of database recordings created by the process described above. Each recording includes a field for the identification information of the security label (eg, the serial number of the security label 22) and a field for the product identification information. The identification information of the security tag is also referred to as "item identification information". That is, since the serial number is unique or semi-unique, it can be used to identify the particular item. Alternatively, as previously described, the security tag 22 could contain some other form of product identification information, as opposed to a unique serial number. Referring again to Figure 1, the events that may occur in the retail store 16 are now described in more detail. Once a customer decides to buy an item 12, the customer approaches the point-of-sale (POS) cash register associated with a PDV system 18 and pays for items 12. In some instances, items 12 may be on the floor sales and the customer merely transports article 12 to the POS system 18. In other examples, items 12 must be removed from the store's storage area and taken to the customer after they have been purchased. In yet another instance, the customer must go to a collection area of the store item, which has a separate entrance / exit, as shown in Figure 8, described below. A transaction recording is generated for each sale in a conventional manner, such as, for example, scrutinizing a bar code on item 12 or on a delivery note for item 12 using a conventional bar code scanner, or by writing the product code of the article directly on a PDV board. For simplicity, the customer in Example 7 buys only two items, a television and a car stereo. Figure 4 indicates a sample of a transaction recording 36 generated by the purchase of a television and a car stereo. The transaction recording 36 is issued from a respective PDV recorder of the PDV system 18. The transaction recording 36 includes a field for collection instructions. This field indicates whether purchased items 12 are being taken immediately or at a later time, and it is important to know when correlating transaction recordings 36 with the article's movement data. The transaction recordings (PDV data) 36 for each customer transaction are sent to the inventory computer 34 at the central offices 17, and also to a remote computer 38 located at the central offices 17. Alternatively, the transaction recordings 36 can be sent either to one of the remote computers 38 or to the inventory computer 34 and the receiving computer can send the information to the other computer. The transaction recordings 36 may also be sent to an inventory computer of a local store (not shown). The inventory computer 34 uses the 36 transaction recordings to update the inventory of the entire store chain. Referring to Figure 5 (a), the remote computer 38 compiles a transaction database 40 from the transaction recordings 36. The transaction database 40 includes a recording for each individual item 12 that was submitted to a transaction by the PDV system 18. Preferably each recording includes at least the following information: (1) Type of transaction (eg, purchase, exchange, refund); (2) Product description; (3) Date and time of the purchase; (4) Delivery instructions. After receiving and paying for all items 12, the customer leaves store 16. The outlet is located so that the customer must pass through a pre-designated area 20 before moving on to, or while passing, the exit. Referring to Figure 1, an interrogator 42 monitors zone 20 for disturbances caused by the presence of a security tag 22 within zone 20, and outputs a signal when security tag 22 is detected in zone 20. In the preferred embodiment of the invention, no visible or audible alarm is activated after detecting said security tag. Each output signal of the interrogator includes an identification information packet (hereinafter "RF-ID data"), as discussed above with respect to FIG. 2. The RF-ID data is appended with the date information and time considered from the moment the security tag 22 was detected, and sent to the remote computer 38 located in the central offices 17. If the RF-ID data is encoded, these could be decoded by a decoder 44 before being sent to the central offices 17. The decoder 44 can be located away from the store 16 and from the central offices 17 to increase the total security of the system 10. After having been decoded, the RF-ID data is sent to the remote computer 38 located at headquarters 17. A sample of decoded output signal consists of a packet of bits. An output signal sample contains the following information: (1) serial number of the security label (i.e., the identification information with respect to the security label itself); (2) product identification information; (3) date and time of detection in zone 20; (4) revision bit (s) for error detection and / or correction. The detection time preferably includes the hour, minute, second, and hundredths of a second when the detection occurred, so that the exact discrepancy analysis can be performed. Referring to Figure 5 (b) the remote computer 38 translates the RF-ID data to extract the data fields and compile a database of events 46 from the translated RF-ID data. The event database 46 includes a recording for each individual item 12 detected by the interrogator 42 due to the presence of a security tag 22 adhered thereto. Each recording in the event database 46 includes at least the following information: (1) serial number of the security tag; (2) date and time of detection in zone 20, preferably including the hour, minute, second and hundredths of a second. The event database can optionally include the product identification information. If so, this information is obtained using the identification information of the serial number extracted from the RF-ID data and retrieving the identification information of the related product from the recordings of the database described in figure 3. The figure 6 is a block diagram scheme of an interrogator 42 suitable for use with the security tag 22 described in FIG. 2. Interrogator 42 and security tag 22 are communicated by inductive coupling, as is well known in the art. The interrogator 42 includes a transmitter 48, receiver 50, antenna assembly 52, and data control and processing circuits 54, each having inputs and outputs. The output of the transmitter 48 is connected to a first input of the receiver 50, and to the output of the antenna assembly 52. The output of the antenna assembly 52 is connected to a second output of the receiver 50.
A first and second output of the control and data processing circuits 54 are connected to the input of the transmitter 48 and to a third input of the receiver 50, respectively. In addition, the output of the receiver 50 is connected to the input of the control and data processing circuits 54. Interrogators having this general configuration can be constructed using the circuits described in US Patents. Nos. 3,752,960, 3,816,708, 4,223,830 and 4,580,041, all issued to Walton, of which all are incorporated herein for reference in their entirety. However, the control and data processing circuits of the interrogator described in these patents are modified to append the time and date data thereof. A clock 56 is provided in the data processing control circuits 54 to append the date and time data. The interrogator 42 can have the physical appearance of a pair of pedestal structures. In Figure 1, only one pedestal structure is shown. However, other physical manifestations of the interrogator 42 are within the scope of the invention. It may be desirable to design the interrogator 42 so that it is not visible to customers or store employees. Referring again to Figure 1, the system 10 further includes a surveillance video camera 58 for capturing an image of the area 20 and outputting a video signal of the image, and a video recorder 60 for storing the video signal on a medium of portable video storage 62, such as a videotape. The VCR 60 performs a continuous recording or a recording oriented to the event of the activity in the area. The video recorder 60 preferably records continuous SMPTE code information (time, date and frame number), or at least time information, on the video storage medium 62. In an alternative embodiment of the invention, a video controller 64 is connected to interrogator 42 and VCR 60. Video controller 64 activates VCR 60 after detecting a security tag 22 in zone 20, and deactivates video recorder 60 in a predetermined period after the security tag 22 is no longer detected within the zone. In this alternative embodiment, the VCR 60 also records SMPTE code information or time information for each detection period. Regardless of which recording scheme is used, the resulting video storage means 62 contains a video image of the movement of each item 12 labeled as it passes through zone 20, as well as the corresponding time information. . The video camera 58 is preferably positioned to capture an image of the article 12, as well as of the person carrying the article 12. It may be preferable to hide the video camera 58, as well as the interrogator 42, so that neither Customers or store employees are aware of any recording or detection activity of the item. At periodic intervals, a comparator 66 on the remote computer 38 compares the PDV data in the transaction database 40 with the data in the event database 46. The comparator 66 is loaded with the appropriate software to perform its function. If necessary, the comparator 66 extracts information from the inventory database 35 before starting the comparison. For example, if the RF-ID data includes serial numbers, but not product identification information, and the comparison is made between the product identification information extracted from the PDV data and the items 12 detected by the interrogator 42, it will be it is necessary to use recordings from the database such as those shown in figure 3 to retrieve the product identification information for the serial numbers corresponding stored in the event database 46 before the comparison is made. The comparator 66 issues a discrepancy report emphasizing potential discrepancies between the recordings stored in the two data banks. Figure 5 (c) indicates a sample of a discrepancy report 68 for a comparison of the event database 46 and the transaction database 40 shown in Figures 5 (a) and 5 (b). (The data banks in Figures 5 (a) and 5 (b) include all event and transaction data for a day of sales at a particular store., only the transactions in figure 5 (a) are considered as what happened for the whole day). The example of Figures 5 (a) - (c) reveals a discrepancy, namely that the PDV data recorded only one purchase of a car stereo at 14:20, but the 42 interrogator detected two car stereos going almost simultaneously through zone 20 soon after. The likely event that led to this discrepancy is that the customer or the employee withdrew two car stereos from store 16 at the same time, but only paid for one. Therefore the discrepancy reveals that a car stereo was improperly removed from the store at 2: 31: 43: 20 or 14: 31: 43: 30. The video storage medium 62 is then investigated to locate the captured video image for 6-14-96 at about 14:31 and identify the customer or employee who removed the car stereos. The software in comparator 66 includes enough intelligence to make accurate comparisons. For example, if a product is purchased for immediate collection, there is a recording in the event database shortly after the transaction was completed. If there are additional transactions detected by PDV of the same product at about the same time, the event database shows several items 12 passing through zone 20 shortly thereafter. However, items 12 may not pass through zone 20 in the exact same order of purchase due to delays in the item retrieval process or delays of the customer's activity within the store. If an item is purchased and its collection is delayed, the comparator 66 should expect the recording in the event database to appear much later, or on another day. Therefore, while the system can not always definitively determine which customer or employees have inappropriately removed an item from the store or exactly which item is the one that was improperly removed, the suspected wrongdoers can be significantly reduced to a few culprits when the system is used. of the present invention. The discrepancy analysis can be of varying levels of sophistication, as desired. For example, the discrepancy analysis can be programmed to report each discrepancy, either serious or minor. Store personnel can then analyze the report to determine which discrepancies justify the time and effort of watching the video recording. If a store has an extremely large number of transactions, it would be desirable to report only the major or major discrepancies, or discrepancies associated with expensive items. Many variations to the system 10 are possible which are within the scope of the invention. Figure 7 shows a variation of a system 10 '. The inventory computer 34 and the transaction database 40 of FIG. 1 are incorporated into a single central computer 70 at the central offices 17. All the PDV data are received in the central computer 70 and stored in a database of transaction 71. The RF-ID data is received in a computer dedicated to events 72, translated by a translator 74 to extract the information fields, and stored in an event database 76 thereof. Periodically, the event database 76 is downloaded to the central computer 70 for comparison of data by a comparator 78. The comparator 78 issues a discrepancy report. The event database 76 can be downloaded directly to the central computer 70, or it can be downloaded to a floppy disk 80 which is then inserted and read by the central computer 70. The remaining parts of the system 10 'are identical to the of system 10 of figure 1. Figure 8 shows a modified plan for store floor to be used with another embodiment of the present invention. In this mode, store 100 includes some items that are labeled with smart security tags RF-ID 22, and other items which are labeled with conventional physically inactive, resonant safety labels (not intelligent). For example, the store can label large, expensive or frequently stolen items 12 with security labels 22, while you can label small or cheap items 12 with conventional security tags. In the modified floor plan, there are two exits for customers leaving the store. A main outlet 102 and a commodity outlet 104. The customer leaves through the main outlet 102 and he or she purchases an item labeled with a conventional security tag. (The client also goes through the main exit 102 if an unlabeled item is purchased, or if items are not purchased). During the purchase transaction, the vendor physically disables the conventional security tag, as is well known in the art. The main input is monitored by a pair of conventional interrogators 106 which detect conventional resonant safety labels that have not been physically disabled. An alarm is triggered if the customer passes through the exit with an item that has a conventional security label that was not properly deactivated. If the customer purchases an item labeled with an RF-ID 22 smart security tag or an item of the type that could be labeled with an RF-ID 22 smart security tag, the customer is sent to a collection desk by the customer 108 and article 12 is brought to the customer from the storage area. After the article 12 is picked up, the customer is directed to a passage 110 to leave the store through the merchandise outlet 104. The merchandise exit 104 is monitored by an interrogator 42 and the output processing circuits of the related interrogator, and the video recording equipment (camera 58, VCR 60, video controller 64). Figure 8 shows the interrogator 42, and the camera 58 of the video recording equipment. The loading platform (not shown) of the store also includes the same monitoring equipment shown in Figure 1. The remaining parts of the system used in the floor plan of Figure 8 are the same as in the embodiment of Figure 1 The intelligent security tags 22 are more expensive than the conventional deactivable security tags. The modality of Figure 8 allows a store to use smart security tags for select items while relying more on conventional security tags to control theft in other items. In an alternative embodiment of Figure 8, the customer pick-up counter 108 is located in a room which can be on another floor, in another building, or in another part of the same building that contains store 100. In this modality, a client who is collecting an item 12 labeled with RF-ID leaves store 100 through main exit 102, walks to the room, picks up article 12, and leaves the room with item 12. The interrogation and video recording shown in figure 8 is located at the exit of the room.
The security tag interrogators used in the present invention can detect a plurality of items 12 that pass simultaneously therethrough. In most cases, each of the articles 12 receives and responds to the interrogation signal at different times, even when the articles 12 are physically close to each other. The chain of returned signals is processed to separate the individual identifications. However, if two items 12 return an identification signal at exactly the same time, the interrogator may also separate the returned signals to retrieve the two different identification numbers. Other variations of the present invention without limitation, are listed below: (1) A single computer can be used to perform all the functions performed in the central offices. (2) All the functions carried out in the central offices can be developed by computers located in the retail store 16. (3) The central offices 17 of the retail store can be located in the distribution center 14 of the retail store and a single inventory computer can be used. (4) The RF-ID and / or PDV data can be stored locally in the store 16 and be downloaded at regular intervals to the central offices 17. (5) The video signals emitted by the VCR 60 can be sent directly to the central offices 17 for a faster discrepancy analysis. (6) Comparator 66 can perform its function on a basis close to real time instead of at periodic intervals. By making comparisons continuously throughout the day, a more rapid discrepancy analysis can be presented. In effect, the system 10 can be configured to develop anticipatory analysis. Since the transaction data provides all the information about which items must pass through the interrogator 42 the system 10 can "anticipate" what the RF-ID data should be. If the RF-ID data does not correspond to that of a completed transaction, the system 10 immediately knows that suspicious activity occurred. (7) The additional apparatus for detecting articles can be placed on the loading ramp of store 16, or on the other entrances and exits of store 16. Figure 1 shows an interrogator 42 'and a video camera 58' monitoring the activity in an area close to the store's loading ramp. The signals emitted by the interrogator 42 'and by the video camera 58' are processed in the same way as the signals emitted by the interrogator 42 and the video camera 58. Therefore the event database 46 will include the activity detected in FIG. all entries or exits. (8) The security tag 22 may have two resonant frequencies, one that is physically deactivatable by store personnel after the purchase of item 12, and one that is not or can not be physically disabled. In this scheme the security tag 22 will be visible and accessible to store personnel, as is known in the prior art. Interrogator 42 will also be visible. A resonance frequency will be physically deactivated after the purchase. The other resonant frequency will be used for the detection of articles and the capture of images, as described in the previous preferred modalities. An advantage of this scheme is that the interrogator 42 can be used with a visible or audible alarm to detect the theft of items in real time. Another advantage of this scheme is that an employee who has inappropriately deactivated the frequency that triggers the visible or audible alarm (to steal an item or to assist a customer in stealing an item) can still be picked up by the system 10 performing said activity. . (9) Communications between the parts of the system 10 can be developed using any appropriate wired or wireless means. (10) The discrepancy vision software could be used to automatically advance the video storage medium to the points of discrepancy. One or two screens could be used simultaneously to display the video, along with the discrepancy data. A scheme as such is relatively easy to implement when a randomly accessing video storage medium is used for the portable video storage medium 62 such as a writable CD-ROM. (11) The security tag 22 may be hidden in any part or in the box or wrap associated with the article or it may be attached to the product itself, either inside or on the product. (12) The security tag 22 can be an active device. (13) The security tag 22 and the interrogator 42 can operate at different frequencies from the radio frequencies. (14) The inventory update can be done using transaction data or RFID data. If the transaction data is used, as described in the preferred embodiments above, the inventory data must be periodically modified to reflect any discrepancies, such as losses, that are detected by the RF-ID data. (15) If security labels 22 are affixed to the articles themselves, labels 22 may also be used to monitor transactions involving exchanges or returns, and to ensure that the customer actually brought article 12 back to the store 16 (16) System 10 can be used by libraries or video stores to monitor rental items such as books or videotapes. The only significant modification that might be necessary to the system 10 is that the PDV data should be replaced by customer review information and the customer could present some identification card at the registration desk. The checked rental items could be assigned to the customer's identification number. (17) The security tags 22 can be attached to the articles 12 at the point of manufacture and the memory 27 can be encoded with the data identifying the product, in addition to the serial number data. In this alternative scheme, it may not be necessary to create the database of Figure 3 or access the database of Figure 3 when building the event database. (18) The registers in the PDV 18 system can be equipped with artifacts that scan a bar code on an article 12 while simultaneously reading the security label RF-ID 22. The serial number of article 22 becomes a part of the transaction recording shown in Figure 4. When the customer leaves the store and passes through the interrogation zone 20, the serial number of article 22 is re-read and is immediately checked against the item serial numbers 22 purchased in the PDV 18 system using the transaction recordings. (19) Interrogators 42 and 42 'may be designed to detect both conventional (non-intelligent) deactivable resonance security labels and security labels 22. In this form, the same interrogator may be used to detect the removal of conventionally labeled items. that have not been properly deactivated. Similarly, interrogators 106 in FIG. 8 may be designed to detect both security tags 22 and conventional deactivatable (non-intelligent) resonant security tags. In this way, an item labeled with RF-ID that is removed from store 100 through main outlet 102, instead of being pulled through merchandise outlet 104, detection will not escape. It will be appreciated by those skilled in the art what changes can be made to the embodiments described above without departing from the broad inventive concept thereof. It is understood, therefore, that this invention is not limited to the particular embodiments described, but is intended to cover modifications within the essence and scope of the present invention as defined by the appended claims.

Claims (19)

NOVELTY OF THE INVENTION CLAIMS
1. - A security system for electronic items that is used in conjunction with items that have a security tag attached to them, wherein the security tag includes a resonant circuit that is used to detect the presence of an item by receiving of an interrogation signal and the return of a response signal, and an integrated circuit connected to the resonant circuit to store the identification information of the article and to issue the identification information of the article with the response signal after interrogation to the security tag, the system comprising: (a) one or more point of sale terminals for recording item transactions including item purchases, and transaction recordings include specific product identification information; (b) an interrogator to monitor a detection zone for disturbances in the form of a response signal caused by the presence of a security label within the zone, with the interrogator issuing an interrogator exit signal when a security is detected in the area, including each exit signal of the interrogator the identification information of the item stored in the integrated circuit, the interrogator's output signal being obtained in a different place and time to the place and time in which the transactions were recorded from the article; and (c) a computer for receiving and storing the transaction recordings and the interrogator output signals, including the computer a comparator for comparing the transaction recordings and the interrogator output signals, which include the product identification information and of the article, and the detection of any discrepancy that may arise between them.
2. - A system according to claim 1 characterized in that each output signal of the interrogator is encoded, in addition the system includes a decoder for decoding the interrogator output signals, the decoder having an input connected to the interrogator output signal and an output connected to the computer.
3. - A system in accordance with the claim 2, characterized in that the decoder is located away from the interrogator.
4. - A system in accordance with the claim 3, characterized in that the decoder is also located away from the computer.
5. - A system in accordance with the claim 1, characterized in that it comprises: (d) a video camera for capturing images of the detection zone and for emitting video signals of the captured images; and (e) a video recorder for storing the video signals in a video storage medium, the video storage medium being used to investigate the discrepancies detected.
6. A system according to claim 5, characterized in that the video recorder performs continuous recordings of the activity in the detection zone.
7. A system according to claim 5, characterized in that it comprises: (f) a video controller for activating the VCR after the detection of a security label in the detection zone, and the deactivation of the VCR for a period of time; predetermined after the security tag is no longer detected in the detection zone, in which the video storage medium records the time of each activation.
8. - A system in accordance with the claim 1, characterized in that the transaction recordings include the time-of-purchase data, and the interrogator output signals include the detection time of the security label, and the comparator also compares the data of purchase time and detection time. the security label and detect any discrepancy between them.
9. A system according to claim 8, characterized in that it comprises: (d) a video camera for capturing images of the detection zone and the emission of video signals of the captured images; and (e) a video recorder for storing the video signals in a video storage medium, this video storage means being used to investigate the detected discrepancies, characterized in that the video recorder stores the time information in the video storage medium. to be used in the investigation of detected discrepancies by reviewing captured video signals close to the time of the detected discrepancy.
10. A system according to claim 1 characterized in that the identification information of the article includes identification information pertinent to the security label itself, the identification information for each unique or semi-unique security label.
11. A system according to claim 1, characterized in that the computer includes inventory data considering the items monitored by the system, and the inventory data is updated in response to the transaction recordings received from one or more terminals of point of sale.
12. A system in accordance with the claim 1, characterized in that the interrogator includes a transmitter, a receiver, and an antenna assembly to interrogate the detection zone and to receive an unprocessed output signal from it, and means to process and control the data for processing the signals emitted without processing to obtain the output signal that will be sent to the computer.
13. A system according to claim 1, characterized in that the security label is a passive type radio frequency intelligent label.
14. A system according to claim 1, characterized in that the computer is located far from one or more point of sale terminals and far from the interrogator.
15. A system in accordance with the claim 1, characterized in that the identification information of the article includes the identification information regarding the security tag itself, the identification information for each security tag is unique or semi-unique, and the computer also includes a memory that stores the data correlating each security label with its respective product identification, being the respective product identification used by the comparator.
16. - A method to monitor losses in a set of items, each item in the set having a security label attached to it including the security label a resonant circuit to be used in detecting the presence of the item by the reception of an interrogation signal and the return of a response signal, and an integrated circuit connected to the resonant circuit for storing the identification information of the article and for issuing the article identification information with the response signal after interrogation of the security label by an interrogator of an electronic article security system, including the method of the steps of: (a) recording the transactions of the article, including the purchases of articles, to one or more point of sale terminals, including the transaction recordings the identification information of the specific product; (b) monitoring a detection zone with the interrogator to look for disturbances in the form of a response signal caused by the presence of a security tag within the zone, the interrogator emitting an interrogator exit signal when a security tag is detected in the area, including each signal issued by the interrogator the identification information of the item stored in the integrated circuit, the output signal of the interrogator being obtained in a place and time that is different from the place and time in which the transactions of the article are recorded; (c) sending the transaction recordings and the exit signals of the interrogator to one or more computers for storage in them; and (d) comparing stored transaction recordings and interrogator output signals on a computer, including information identifying the product and article, and detecting any discrepancies that may occur between them.
17. - A method according to claim 16, characterized in that the transaction recordings include the purchase time data, and the interrogator output signals include the detection time of the security label, and the comparison step (d) it includes comparing the data of purchase time and detection time of the security labels and detecting any discrepancies between them.
18. A method according to claim 17, characterized in that it comprises the steps of: (e) capturing images of the detection zone using a video camera and emitting video signals of the captured images; and (f) recording the video signals and time-related information in a video storage medium, the video storage medium being used to investigate the discrepancies detected by reviewing captured video signals near the time of the discrepancy. detected.
19. A method according to claim 16, characterized in that it comprises the steps of: (e) capturing images of the detection zone using a video camera and emitting video signals of the captured images; and (f) recording the video signals on a video storage medium, which is used to investigate the discrepancies detected. 20.- A method in accordance with the claim 19, characterized in that it comprises the step of recording the video signal after the detection of a security label in the area, and stopping the recording at predetermined periods of time after a security label is no longer detected as present in the detection zone, recording said video storage medium the time of each activation. 21. A method according to claim 19, characterized in that the recording in step (f) is a continuous recording of the activity in the detection zone. 22. A method according to the claim 16, characterized in that each output signal of the interrogator is encoded, the method further comprising the step of decoding the interrogator output signals in a decoder, the decoder having an input connected to the interrogator output signal and an output connected to an interrogator. or more computers. 23. A method according to claim 16, characterized in that one or more computers include the inventory data pertinent to the items monitored by the system, the method further comprising the step of updating the inventory data in response to the recordings of transaction received from one or more point of sale terminals. 24. - A method according to claim 16, characterized in that the identification information of the article includes the identification information pertinent to the security labels themselves, with the identification information for each unique security label, the method also includes the step of storing the data correlating each security tag with its respective product identification, this respective product identification being used in the comparison step (d).
MXPA/A/1999/002405A 1996-09-12 1999-03-11 Electronic article security system for store which uses intelligent security tags and transaction data MXPA99002405A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08712746 1996-09-12

Publications (1)

Publication Number Publication Date
MXPA99002405A true MXPA99002405A (en) 1999-09-01

Family

ID=

Similar Documents

Publication Publication Date Title
EP0928468B1 (en) Electronic article security system for store which uses intelligent security tags and transaction data
EP0996941B1 (en) Inventory system using articles with rfid tags
EP1175666B1 (en) Self-checkout/self-check-in rfid and electronic article surveillance system
JP4100867B2 (en) Electronic security system and method for using a predetermined set of passive radio frequency identification tags in an electronic security system
MXPA99002405A (en) Electronic article security system for store which uses intelligent security tags and transaction data