US20170169386A9 - Secure self-checkout station - Google Patents

Secure self-checkout station Download PDF

Info

Publication number
US20170169386A9
US20170169386A9 US13/963,896 US201313963896A US2017169386A9 US 20170169386 A9 US20170169386 A9 US 20170169386A9 US 201313963896 A US201313963896 A US 201313963896A US 2017169386 A9 US2017169386 A9 US 2017169386A9
Authority
US
United States
Prior art keywords
product
door
self
patron
checkout
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/963,896
Other versions
US9715672B2 (en
US20150041535A1 (en
Inventor
Michael A. Daily
Rob Simmons
Shea Coakley
Peter Roy, JR.
Original Assignee
Freedom Shopping Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Freedom Shopping Inc filed Critical Freedom Shopping Inc
Priority to US13/963,896 priority Critical patent/US9715672B2/en
Publication of US20150041535A1 publication Critical patent/US20150041535A1/en
Assigned to FREEDOM SHOPPING, INC. reassignment FREEDOM SHOPPING, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DAILY, MIKE, SIMMONS, ROB
Priority to US15/617,957 priority patent/US9864971B2/en
Publication of US20170169386A9 publication Critical patent/US20170169386A9/en
Application granted granted Critical
Publication of US9715672B2 publication Critical patent/US9715672B2/en
Priority to US15/863,652 priority patent/US20180174096A1/en
Assigned to PATRICIA A. ANDERSON REVOCABLE TRUST reassignment PATRICIA A. ANDERSON REVOCABLE TRUST ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FREEDOM SHOPPING, INC.
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47FSPECIAL FURNITURE, FITTINGS, OR ACCESSORIES FOR SHOPS, STOREHOUSES, BARS, RESTAURANTS OR THE LIKE; PAYING COUNTERS
    • A47F9/00Shop, bar, bank or like counters
    • A47F9/02Paying counters
    • A47F9/04Check-out counters, e.g. for self-service stores
    • A47F9/046Arrangement of recording means in or on check-out counters
    • A47F9/047Arrangement of recording means in or on check-out counters for recording self-service articles without cashier or assistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/208Input by product or record sensing, e.g. weighing or scanner processing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • G07G1/0045Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
    • G07G1/0054Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader with control of supplementary check-parameters, e.g. weight or number of articles
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • G07G1/0045Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
    • G07G1/009Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader the reader being an RFID reader

Definitions

  • This invention relates to a self-checkout kiosk that enables a patron to purchase or checkout a product without the presence of a checkout attendant.
  • the kiosk incorporates a retail security system that can be used separately in conventional retail environments to reduce shrinkage.
  • the term “kiosk” means any area in which product is stored and displayed and which includes a self-checkout station permitting a patron to complete a purchase transaction and a portal incorporating a security system
  • the term “tag” means both tags that are separately applied to a product as well as tags that are an integral part of the product or are integral with packaging.
  • the self-checkout station may be adjacent to and/or integral with the portal, or may be located within the kiosk separate from the portal.
  • a POS typically includes a terminal, bar code reader, a computer, and POS software.
  • the patron scans products using a bar code reader.
  • the computer communicates with the patron via the POS software when the bar code reader has been successfully used to read the Universal Product Code (UPC) and then transmits the UPC information to a host server, which processes the UPC information by comparing it to a database.
  • the database typically includes information such as number of units in stock, price per unit, and any other information which may facilitate the transaction in addition to the UPC.
  • Such an automated sales system has obvious limitations including, by way of example, the lack of security measures working in concert with the system. All sales must be monitored by an attendant to insure that the patron has presented each merchandise item to the bar code scanner. The requirement for an attendant to monitor the sales limits the number of sales terminals that may be operated, as it is not cost effective to have an attendant monitoring such a terminal during periods of low sales volumes. Accordingly, there is a need for an automated shopping system with a security system that avoids the need for an attendant to be present to monitor all transactions which may take less time to consummate the transaction. Additionally, in conventional retail environments in which one or more attendants are present, enhanced security measures are desirable to reduce product shrinkage.
  • RFID Radio Frequency Identification
  • the present invention relates to a self-checkout kiosk for enabling a patron to purchase or allocate a product located in a vending area or space and carrying a Radio Frequency Identification (RFID) tag.
  • RFID Radio Frequency Identification
  • the customer or patron unlocks a door to the kiosk to access the vending space.
  • the kiosk includes a self-checkout station including, for example, a bill acceptor, credit/debit card reader and a computer and computer monitor.
  • the self-checkout station may be either adjacent the door or separated therefrom, and enables the patron to complete a transaction after removing items from the vending space and closing the door.
  • the self-checkout station or process can also be conducted on a mobile device, such as a tablet or smartphone, to complete the transaction on the mobile device.
  • the mobile device may function similar to, or alternatively replace the computer monitor.
  • a doorway includes an RFID reader/antenna for detecting the product being transferred from the vending space and through the doorway.
  • a security system responds to a transfer of product through the doorway without a patron completing a transaction using the self-checkout means.
  • the portal and security system itself is also usable in conventional retail environments when an attendant is present.
  • the product may be located in a walk-in kiosk.
  • a patron unlocks a door to the kiosk to enter a vending space in the kiosk.
  • the doorway includes an RFID reader/antenna which can detect when the product has been passed from the vending space and through the doorway.
  • a self-checkout station which may be near the door, keeps a checkout allows a patron to purchase the removed product or allocate it to an account. If the removed product is not purchased or returned to the vending space within a user-defined set of time, the removed product is treated as a potential theft.
  • FIG. 1 is a view in perspective of a self-checkout kiosk made pursuant to the teachings of the present invention
  • FIG. 2 is a top plan view of a vending area of the kiosk as illustrated in FIG. 1 ;
  • FIG. 3 is a side elevation view of the kiosk illustrated in FIG. 1 ;
  • FIG. 4 is a view similar to FIG. 1 but illustrating another implementation of the invention.
  • FIG. 5 is a view similar to FIGS. 1 and 4 , but illustrating still another implementation of the present invention
  • FIG. 6 is a block diagram illustrating the components of the present invention and their interconnections
  • FIG. 7 is a diagrammatic flow chart of the Point of Sale (POS) software used in the present invention.
  • POS Point of Sale
  • FIG. 8 is a view in perspective of a self-checkout station used in an alternate implementation of the kiosk illustrated in FIG. 1 ;
  • FIG. 9 is a screen view of a self-checkout station depicting an allocate to account option
  • FIG. 10 is a screen view of a self-checkout station depicting options for pairing with a mobile device
  • FIG. 11 is a view of a mobile device paired with a self-checkout station
  • FIG. 12 is a view of a smart shelf in a resting state according to the present inventive concepts.
  • FIG. 13 is a view of a smart shelf detecting a removed product
  • FIG. 14 is a view of a smart shelf in a self-checkout process
  • FIG. 15 is a diagrammatic flow chart of the POS software used in conjunction with a smart shelf
  • FIG. 16 is a table of database records used by the POS software
  • FIG. 17A is a front view of a cabinet store according to an implementation of the present disclosure.
  • FIG. 17B is the cabinet store of FIG. 17A with the door open;
  • FIG. 18A is a front view of a walk-in store according to an implementation of the present disclosure.
  • FIG. 18B is the walk-in store of FIG. 18A with the door open;
  • FIG. 19 is a flowchart of the POS software used in conjunction with a cabinet store or a walk-in store according to an implementation of the present disclosure.
  • FIG. 20 is a screen view of a self-checkout station depicting options to add funds to an account according to an implementation of the present disclosure.
  • a kiosk made according to the present invention illustrated generally by the numeral 10 .
  • the kiosk 10 is intended for use in institutions where availability of product on a twenty-four hour, seven day a week basis is desired. Typical applications include hotels, college dormitories, etc.
  • the kiosk 10 includes a portal defining the entrance into, or egress from, a vending area generally indicated by the numeral 11 .
  • multiple products, each tagged with a Radio Frequency Identification (RFID) tag are displayed for purchase in the vending area 11 .
  • RFID Radio Frequency Identification
  • such products may include soft drinks, snacks, sandwiches, video tapes, and other products.
  • a patron enters the vending area 11 through the portal, selects from one or more of the products displayed, and then exits through the portal after completing a self-checkout transaction at a self-checkout station as will be hereinafter explained.
  • various security measures inhibit a patron from removing products from the vending area without completing a self-checkout transaction, which includes payment for the items or allocating the items to an account.
  • the portal is defined by a pair of facing, substantially parallel side frame members 12 and 14 , which are connected by an upper transverse frame member 16 .
  • the frame members 12 , 14 and 16 are made of any suitable material, such as wood or particle board, and are covered by a decorative covering 18 made of any material which allows passage of radio frequency waves, particularly waves at a frequency of 915 MHZ. Typical materials of the covering 18 include plastic and plywood with a laminate finish. Although only one portal is illustrated, multiple portals may be used to provide entry into and egress from the vending area.
  • the side frame member 14 terminates at a counter 20 , which includes an upper surface or tray 22 upon which product being purchased may be placed, as will hereinafter be explained.
  • the counter 20 provides a locked area for placement of an RFID reader, a DVD recorder, a computer, and a router, all of which will be hereinafter explicitly identified and explained.
  • a touch screen computer monitor 26 is mounted on the side frame member 14 and projects above the tray 22 where it is easily accessible to a patron completing a transaction.
  • a conventional card reading swipe 28 is mounted on the edge of the monitor 26 , which is used to read credit cards and other cards which may be used to process a purchase transaction.
  • a conventional receipt printer 44 is mounted adjacent the tray and/or monitor for printing a receipt confirming a purchase transaction.
  • a conventional bill acceptor 30 available commercially as a ValTech bill acceptor, is mounted on the counter 20 to accept currency to be used in payment for product.
  • a conventional microphone and speaker enable a patron to communicate with an attendant at a remote location. While the kiosk of the invention does not require the presence of an attendant on site, it permits communication with an attendant at a remote location, who is able to supervise several self-checkout kiosks. Together, the counter 20 , touch screen computer monitor 26 , card reading swipe 28 , receipt printer 44 and bill acceptor 30 define a self-checkout station that permits a customer to complete a transaction. A customer may purchase products or may allocate products to an account, as will be explained.
  • a self-checkout station generally indicated at 200 is illustrated as being mounted on a wall within the vending area 11 and is separate from the portal (not shown).
  • the self-checkout station 200 is shown as being mounted on the wall, it could be mounted on a counter, pedestal or similar support within the vending area 11 .
  • FIG. 14 depicts self-checkout station 200 mounted on a pedestal.
  • a transaction on self-checkout station 200 may also be conducted on a mobile device, such as a smartphone or tablet.
  • the mobile device may be the property of the vendor or the customer.
  • a QR code or Near Field Communication (NFC) tag can be used to conveniently pair the mobile device with self-checkout station 200 .
  • FIG. 11 shows smartphone 162 paired with self-checkout station 200 .
  • the pairing mechanism includes an RFID tag (not shown) or other NFC tag readable by smartphone 162 .
  • self-checkout station 200 displays machine readable codes, such as barcodes or QR codes.
  • FIG. 10 illustrates a mobile pairing screen 156 .
  • Mobile pairing screen 156 displays QR code 160 , readable by a camera or other optical scanner on smartphone 162 .
  • Mobile pairing screen 156 also displays pairing button 158 , a virtual button displayed on touch screen computer monitor 26 to initiate mobile pairing.
  • the pairing designates smartphone 162 as the recipient of the item self-checkout information.
  • smartphone 162 displays a self-checkout screen, as seen in FIG. 11 .
  • the self-checkout screen may be the same as displayed by touch screen computer monitor 26 , or as in FIG. 11 is optimized for display on smartphone 162 .
  • the self-checkout screen allows for payment or allocation to an account, similar to self-checkout station 200 .
  • smartphone 162 When the customer completes a transaction on smartphone 162 , smartphone 162 communicates the transaction information to self-checkout station 200 .
  • the item self-checkout information is sent to smartphone 162 instead of displayed on touch screen computer monitor 26 , obviating the need for touch screen computer monitor 26 .
  • conventional security cameras 32 , 34 , and 36 are mounted on the uprights 12 , 14 , and 16 .
  • Security camera 34 is focused on the patron standing near the monitor 26 , and cameras 32 and 36 are trained on the vending area 11 and or the areas adjacent the kiosk 10 .
  • the uprights 12 , 14 , and 16 and the counter 20 cooperate to define a portal 38 through which a patron must leave the vending area 11 .
  • the cameras 32 , 24 , and 26 are aimed to photograph anyone in the vending area 11 , and any patron leaving through the portal 38 .
  • Each of the cameras is connected to a conventional DVD recorder 40 which may be located within the cabinet 20 .
  • a fourth camera (not shown) may be aimed at the monitor.
  • the cameras and DVD recorder are components of a security system available commercially from Everfocus as Everfocus DVSR-400.
  • a conventional motion sensor such as photoelectric motion sensor 42 , which projects a photoelectric beam across the portal 38 and which generates a signal communicated to the computer when the beam is broken, is mounted on the kiosk 10 and projects the beam across the portal 38 to detect movement of a patron through the portal 38 .
  • Electronic signage (not shown) is mounted on the frame member 16 on the edge thereof facing away from the vending area 11 .
  • a receipt printer 44 such as is available from Swecoin, is also mounted adjacent the counter 22 . The receipt printer, bill acceptor, card swipe, the DVD component of the security system, and the RFID reader discussed below are all connected to the computer.
  • the tags may be a 96 bit Lepton chip read many, write once class 1 type tag.
  • the tags are read by a reader, which is well known in the art, such as an Alien Technology Model ALR 9780 indicated at 46 ( FIG. 6 ), and operating at 915 MHZ.
  • the RFID reader is stored within the cabinet 20 , and is connected via appropriate cables to four circular polarized 915 MHZ antennas 48 , 50 , 52 , and 54 .
  • Antenna 48 is mounted in counter 20 immediately below the tray 22 with its polarization facing upwards toward the tray.
  • RFID readers may be desirable or necessary if the self-checkout station is separate from the portal and located at a distance there from that it is desirable that a separate RFID reader be used to be used only for the RFID antenna at the self-checkout station and a separate RFID reader be used for the antennas providing security at the portal.
  • a separate RFID reader be used to be used only for the RFID antenna at the self-checkout station and a separate RFID reader be used for the antennas providing security at the portal.
  • the RFID readers operate in “detect mode.” In “detect mode,” the self-checkout process is activated when an RFID tag is read.
  • the RFID readers each would be connected to the computer.
  • the antenna 50 is mounted in side frame member 14 perpendicular to the antenna 48 and with its polarization facing into the portal 38 .
  • Antennas 48 and 50 provide the strongest tag detection when the vended product is placed on the tray.
  • Antennas 52 and 54 are mounted in the side frame member 12 , with approximately even spacing between the antennas 52 and 54 , between the antenna 52 and the transverse frame member 16 , and between the antenna 54 and the floor. Both antennas 52 and 54 have their polarizations facing into the portal 38 .
  • Each of the antennas 48 - 54 is identical, and each is substantially flat panels with rounded ends and straight sides between the rounded ends.
  • the circular polarizing results in a curtain of radio frequency waves radiating at a 45 degree angle from the circular ends. Accordingly, as illustrated in FIG. 3 the radio frequency curtains radiated by each of the antennas 48 - 54 overlap to form a curtain across the entire portal 38 , so that any attempt to move product through the portal will result in the RFID tag on the product being read.
  • the RFID reader 46 includes multiple input ports 56 , each of which is respectively connected to a corresponding one of the antennas 48 - 54 , and has additional inputs connected to the output 58 of the DVD recorder 40 , and to the sensing output 60 of the photo eye 42 .
  • Reader 46 also has outputs connected, through the appropriate relays, to an alarm or strobe light 61 .
  • An Ethernet port connects the reader 46 to a router, such as a Linksys router, the other ports of which are connected to Ethernet ports on the DVD recorder 40 and on the personal computer.
  • the router 63 includes a port which is connected via a broadband connection to a remote computer.
  • the remote attendant may talk to a patron using the kiosk 10 , but the attendant at a main kiosk can also handle several other remote, non-attended kiosks. It is also contemplated that a local inventory will be maintained on the computer 62 , but through the router 63 and the broadband connection the local inventory will be updated by a master inventory at a remote location or main kiosk for inventory maintenance. The local inventory can also be updated by the remote computer to update for new inventory, restocking, etc.
  • the computer 62 is also connected to speakers 66 and microphone 68 , to provide the aforementioned communication between the patron using the kiosk 10 and the remote attendant, and further includes a driver for the digital sign and has ports connected to the receipt printer 44 and the bill/coin validator/acceptor 30 .
  • a database manages the local inventory.
  • the database may be stored on computer 62 or may be stored at a remote location, accessible through router 63 and the broadband connection.
  • the database assigns a unique identification code for each individual product having its own RFID tag.
  • the database associates the unique identification code to the product data stored in the product's corresponding RFID tag. Rather than storing a count of each type of product, the database stores each individual product as its own record. In the example shown in FIG. 16 , the database stores a record for each individual milk carton, instead of storing a milk carton having a count of 4.
  • table 300 is disclosed, showing the records stored in the database that are associated with milk cartons.
  • Each individual product is given a unique ID within the table, along with other data.
  • the database can store a PURCHASE_STATUS, such as Not Sold, Sold, Allocated, Stolen, or Missing.
  • the database further stores a UPC code, a NAME, a PRICE, and an RFID tag identifier, which corresponds to the product's RFID tag. Storing a record for each individual product allows the database to store additional data associated with each product.
  • the ACCOUNT column stores the account to which the product is allocated or checked out.
  • the LOCATION column may store specific locations, such as “on shelf,” or more general locations, such as “in store” or “unknown,” depending on the placement and availability of RFID readers and RFID antennas.
  • the OTHER column refers to an expiration date for the milk, but may also store other data.
  • the increased level of data stored with each individual product provides the vendor with additional dynamic inventory management options.
  • the expiration dates of the milk cartons stored in OTHER may allow the vendor to not sell (by removing from the database) milk cartons which have expired.
  • the vendor may further elect to discount the prices of milk cartons whose expiration dates are nearing.
  • a flow chart of the software is disclosed, which is a compilation of the software included within the computer 62 and tag reader 46 .
  • the remote computer signals computer 62 to initialize the systems components, as indicated at 72 .
  • the computer 62 reads inventory data from the main terminal as indicated at 74 .
  • the RFID reader or readers are then activated, as indicated at 76 , a test is made at 78 to assure that the RFID reader or readers have been connected, upon which the help button, charge up button, and cancel button on the monitor are activated and the items to purchase display is also activated.
  • a timer is started and a tag is read, as at 80 .
  • a test is made at 82 and 84 , to determine if the beam generated by the photoelectric eye has been broken while one or more tags have been sensed, that have not been marked in the database as being sold, at which time an alarm is sounded and the inventory database is marked for the theft, as indicted at 86 .
  • the DVD recorder is also signaled into an enhanced recording mode, so that the images from the cameras are recorded at 60 frames per second, instead of the normal five frames per second.
  • a test is made to determine if the tag is in the database as at 92 so that pricing can be established and the item and price is added to the array (if not already displayed) on the monitor 26 and/or smartphone 162 , as indicated at 94 and 96 . If the tag is the first tag in the array, as determined at 98 , payment option buttons 100 , 102 , 104 , and 106 are turned on and displayed on the monitor, as indicated at 108 , along with a voice prompt requesting the patron to select a payment method or account to allocate to.
  • the cancel button 110 is always displayed, which permits the patron to cancel the transaction at any time, upon which the screen is cleared as indicated at 112 . If the patron elects to pay with cash by selecting that option at 100 , a receipt is printed as indicated at 114 , the item is removed from the inventory record as indicated at 116 and marked as “sold,” and the screen cleared as indicated at 112 , after, of course deposit of a sufficient amount of currency in the bill acceptor is confirmed. If the patron elects to pay by charging the purchase to a hotel room by choosing 102 , the patron is asked to enter the room number on the keypad as indicated at 118 , after which the transaction is completed by printing a receipt, removing the items purchased from the inventory record as being sold, and clearing the screen as discussed above.
  • the patron elects to pay by credit card by selecting that option at 104 , the patron is requested to swipe the card as indicated at 120 and the normal card verification procedures over the broadband connection through the router 63 are completed, as indicated at 122 .
  • the transaction is completed by printing the receipt, removing the item from inventory, and clearing the screen. If the card is not approved, the patron is so informed on the monitor screen, and the transaction is aborted and the screen cleared.
  • the patron may also elect to pay by using a charge-up card by choosing that option at 106 .
  • Charge-up cards are particularly useful in situations such as college dormitories, where repeated purchases are expected. This option allows the patron to “charge up” a card at one visit and use credits remaining on the card for subsequent visits.
  • option 106 is selected, a test is made at 124 to determine if a current account with sufficient credits exists for the card being used. If so, the patron is requested to enter the corresponding PIN number as indicated at 126 , which is confirmed at 128 . If the PIN number is correct, the transaction is completed by printing a receipt, removing the item from inventory as being sold, and clearing the screen; if the PIN number is incorrect, the patron is requested to re-enter the PIN number.
  • the patron is asked to enter the information necessary to establish the account on the keyboard as indicated at 130 , and the patron is asked to enter a new desired PIN number on the keyboard at 132 , upon which the account must be charged up.
  • a new account may be charged up, or the credits on an existing account increased, by pushing the “charge up” button on the monitor screen, as indicated at 134 .
  • the patron will then be prompted to deposit currency to charge up the account and to enter the PIN number at 136 (the PIN number may be the same as the PIN number just entered at 132 if a new account is being established), the account is charged up and a bill/receipt formed as indicated at 140 , at which time the transaction is completed by clearing the screen.
  • the patron may choose to allocate the items to an account by choosing that option at 152 .
  • the patron may be prompted by allocate screen 154 to select an account.
  • Accounts may be denoted as departments, projects, or other identifiers, such as a room number seen in FIG. 9 .
  • a test is made at 124 to verify the account exists. Allocating to an account further creates an association between the items and the account within the database, as discussed above.
  • allocation to an account allows for non-sales transaction. Rather than purchasing the items, the items may be checked out to the account, such as a lamp being checked out by a dorm room. Otherwise, the transaction may be completed similar to paying with an account, as described above.
  • the kiosk 10 has been described as including both a self-checkout station and a portal incorporating security measures, the portal itself may be used in conventional retail environments to control inventory shrinkage.
  • the security portals as described herein may be installed where customers, after proceeding through the checkout lanes (whether attended or unattended) must pass through one of the portals before exiting the retailer.
  • each of the products purchased are removed from the inventory database maintained by the store and marked “sold.”
  • the RFID reader associated with the antennas mounted on the portal sense transfer of product through the portal that has not been marked sold, appropriate security alarms are initiated.
  • the kiosk described above provides a minimum level of security. If an enhanced level of security is desired, the various display cases within the vending area 11 , such as the candy display case 142 in FIG. 4 , is enclosed and provided with sliding doors 144 equipped with magnetically released locks as at 146 . Before product is made available, the patron must swipe a credit card (or charge-up card) to unlock the doors of the display cases. Accordingly, an indication of the patron's identity can be retained. If a still greater level of security is desired, doors, such as the transparent doors 148 in FIG. 5 , are mounted on the side frame members 12 and 14 via hinges. The doors close the portal 38 , and are mounted on the edges of the side frame members that face into the vending area 11 .
  • the doors are latched with magnetically released locks 150 . Since the doors extend across the inside of the kiosk 10 , the monitor 26 and card swipe 28 are outside of the doors and are available to a patron. In order to unlock the doors and enter into the vending area, the patron must swipe a credit card (or a charge-up card) in the card swipe 28 . Accordingly, before the patron even enters the vending area, an indication of the patron's identity is retained.
  • FIG. 12 presents one implementation of smart shelf 166 .
  • Smart shelf 166 comprises merchandise fixture 174 , which may be a shelf, display case, or other fixture which displays products for sale or allocation.
  • the products may include products 172 A, 172 B, 172 C, and 172 D (also collectively referred to as “products 172 A-D”). Similar to the products described above, products 172 A-D each bear an RFID tag to uniquely identify each product 172 A-D.
  • RFID antenna 176 has a limited read range, depicted as read zone perimeter 170 .
  • the read range of read zone perimeter 170 may be appropriate for the size, shape, and location of merchandise fixture 174 . For instance, a small shelf containing small products would have a smaller read zone perimeter than a large shelf holding large products.
  • smart shelf 166 constantly reads and verifies RFID tags. In FIG. 12 , smart shelf 166 expects products 172 A-D to be within read zone perimeter 170 . Smart shelf 166 provides real time tracking of products.
  • Smart shelf 166 may further be utilized to organize products by smart shelves. For example, a small smart shelf may hold printer cartridges and an adjacent large smart shelf may hold printers. If a printer cartridge was left on the large smart shelf, the small smart shelf may detect that the printer cartridge was missing, the large smart shelf may detect the printer cartridge which does not belong, and together the small and large smart shelves may alert the vendor about the misplaced printer cartridge.
  • smart shelf 166 detects products 172 A-D.
  • a customer has removed product 172 C from smart shelf 166 .
  • product 172 C is outside of read zone perimeter 170
  • smart shelf 166 no longer detects product 172 C, which starts the self-checkout process for product 172 C, similar to the self-checkout process described above.
  • Product 172 C and any additional items that are no longer detected are added to the checkout tally. However, if product 172 C is not returned to read zone perimeter 170 or purchased/allocated within a user-defined set of time, product 172 C is flagged as a theft.
  • self-checkout station 200 does not require its own RFID reader. As seen in FIG. 14 , a customer may complete the self-checkout process on self-checkout station 200 not having tray 22 . Self-checkout station 200 may be placed near smart shelf 166 . In addition, a mobile device such as smartphone 162 may pair with self-checkout station 200 . Moreover, smart shelf 166 may be integrated with computer 62 such that self-checkout station 200 is not necessary. Smartphone 162 may instead pair with smart shelf 166 . A customer may then remove product 172 C from smart shelf 166 , and complete the transaction on smartphone 162 before leaving the vending area, without having to stop at self-checkout station 200 .
  • FIG. 15 discloses a flowchart of the software used by smart shelf 166 .
  • FIG. 15 is similar to FIG. 7 in that similarly labeled elements behave similarly. For the sake of brevity, only the differences will be discussed.
  • computer 62 reads data which includes a list of products expected to be on smart shelf 166 .
  • RFID reader 168 is verified at 76 and 78
  • computer 62 gets input from RFID reader 168 at 302 .
  • computer 304 determines whether any expected RFID tags are missing. If no RFID tags are missing, computer 62 returns to 302 to get input from RFID reader 168 .
  • At 306 computer 62 determines whether a timer for each missing tag is running, while resetting and disabling timers of tags that are present. Disabling the timers for present products ensures that a present product does not get falsely flagged as stolen.
  • computer 62 determines whether the timer has passed the user-defined time for returning products to smart shelf 166 . If the time has elapsed, then at 86 the associated product is labeled as “theft,” and the alarm sounds, as described above. Otherwise, computer 62 returns to 302 to get an updated reading of RFID tags.
  • computer 62 If at 306 the timer for the missing tag has not been started, then computer 62 starts the timer at 310 . Then, at 94 , computer 62 starts the self-checkout process as described above. At the end of the self-checkout process, at 116 , computer 62 additionally removes the tag from the list of products expected on smart shelf 166 .
  • FIGS. 17A and 17B depict a cabinet store 1700 .
  • the cabinet store 1700 comprises a cabinet 1710 , a door 1720 , a lock 1725 , a checkout reader 1730 , a card swipe 1735 , a computer 1740 , and an RFID reader 1750 .
  • the cabinet 1710 defines a vending space 1715 and a doorway 1755 , seen in FIG. 17B .
  • a product 1760 with an RFID tag 1765 sits on a shelf 1770 inside the vending space 1715 , as seen in FIG. 17B .
  • the cabinet 1710 may be a cabinet or other similar fixture having a door and an interior storage space.
  • the cabinet 1710 is a refrigerator which keeps the vending space 1715 at a low temperature.
  • the cabinet 1710 may be other specialized storage, producing specific environmental conditions suitable for storage.
  • the cabinet 1710 may be an oven or other similar heated storage unit.
  • the cabinet 1710 may be a cage or clear container allowing patrons to see its contents.
  • the door 1720 is closed.
  • the lock 1725 is normally locked, preventing access to the vending space 1715 .
  • the lock 1725 may be a solenoid lock or any other suitable lock for locking the door 1720 and remotely controllable by the computer 1740 .
  • the checkout reader 1730 , the card swipe 1735 , and the computer 1740 work in conjunction to provide an interface for purchasing items in the vending space 1715 .
  • the checkout reader 1730 may be an RFID reader or similar antenna capable of wireless communication.
  • the card swipe 1735 allows a credit card to be read.
  • the card swipe 1735 may read magnetic stripes of a credit card or other card or may be capable of reading RFID signals from the card.
  • the card swipe 1735 may be configured to accept cash.
  • the computer 1740 may be a tablet computer or other similar computing device having a screen and input device, such as a touchscreen, for providing an interface to a patron.
  • the computer 1740 may connected wired or wirelessly to a network, such as the Internet, for remote communication.
  • the computer 1740 and/or the checkout reader 1730 may be configured to pair with or otherwise communicate with a mobile device, allowing the patron to complete a transaction through their mobile device, as described above.
  • the mobile device may perform the functions of the computer 1740 described below.
  • the computer 1740 includes an authentication mechanism that can automatically lock or unlock the lock 1725 with proper authentication.
  • the computer 1740 validates a patron before unlocking the lock 1725 .
  • the patron may be validated by having a valid credit card, or, an account having a minimum balance.
  • the patron may swipe a credit card through the card swipe 1735 . Once the computer 1740 determines that the credit card is valid, the computer 1740 unlocks the lock 1725 .
  • the patron can also be validated by having an account with the minimum balance.
  • the minimum balance may be a predetermined amount, such as $5 or $20, which may be appropriately selected.
  • the minimum balance may vary.
  • the minimum balance may vary based on patron. Certain patrons may have bad credit or a history of problems with self-checkout and may have a higher minimum balance requirement. Certain patrons may have a reduced minimum balance as part of a promotion or other suitable reasons.
  • the minimum balance may correspond to a value of the products in the vending space 1715 .
  • the minimum balance may be 50% or 100% of the value of the products in the vending space 1715 .
  • the patron may have a charge card.
  • the computer 1740 determines if the charge card has a sufficient balance.
  • the patron may have a member card that is swiped.
  • the member card may be associated with a vendor, such as the operator of the cabinet store 1700 .
  • the member card may be associated with a student account at a university operating the cabinet store 1700 , or may be associated with a hotel room number at a hotel operating the cabinet store 1700 .
  • the computer 1740 may additionally prompt a PIN or password to log into the account.
  • the computer 1740 may then determine whether there is sufficient balance to proceed. If the balance is too low, the computer 1740 may prompt the patron to charge up the account.
  • FIG. 20 illustrates an exemplary screen 2000 for prompting a charge up.
  • the patron may be presented with his current balance, and options to add additional funds to the account.
  • the funds may be paid by credit card, as in FIG. 20 .
  • the funds may be paid by cash, or other suitable means.
  • the computer 1740 validates the patron once the balance meets the minimum balance.
  • the patron may be validated by other means.
  • the computer 1740 may include a biometric sensor to identify the patron.
  • the computer 1740 may include a video camera or other video sensor to identify the patron.
  • the computer 1740 When the computer 1740 has validated the patron, the computer 1740 unlocks the lock 1725 . The patron may then open the door 1720 , as seen in FIG. 17B . While the door 1720 is open, the transaction is pending.
  • the computer 1740 may display a screen similar to FIG. 9 or FIG. 11 summarizing the items for purchase.
  • Opening the door 1720 exposes the vending space 1715 .
  • the vending space 1715 is defined by the cabinet 1710 .
  • the doorway 1755 forms a boundary of the vending space 1715 , the only opening through which items such as the product 1760 can pass through. As such, monitoring which items pass through the doorway 1755 effectively determines what items are removed.
  • the RFID reader 1750 is located above the door 1720 when closed, as seen in FIG. 17A . However, when the door 1720 is opened, the RFID reader 1750 remains over the doorway 1755 .
  • the RFID reader 1750 is configured to detect RFID tags, such as the RFID tag 1765 , which pass through the doorway 1755 .
  • a radio frequency curtain radiated by the RFID reader 1750 forms a curtain across the entire doorway 1755 .
  • the RFID reader 1750 may be located elsewhere in order to detect RFID tags passing through the doorway 1755 .
  • the RFID reader 1750 may be located on a sidewall or bottom of the cabinet 1710 , or alternatively be located just inside or right along the doorway 1755 .
  • more than one RFID reader may be placed around the doorway 1755 such that the radio frequency curtains radiated the RFID readers overlap to form a curtain across the entire doorway 1755 , so that any attempt to move a product through the doorway 1755 will result in the RFID tag on the product being read.
  • the shelf 1770 may be a fixture capable of holding various products 1760 .
  • the shelf 1770 may be a smart shelf with its own RFID reader, as described above.
  • the shelf 1770 may alert the computer 1740 if an item is removed from the shelf by determining that the RFID tag 1765 is away from the shelf 1770 .
  • a video camera or other video sensor may help determine which items were removed.
  • the product 1760 When the patron removes the product 1760 from the vending space 1715 , the product 1760 must move through the doorway 1755 .
  • the RFID reader 1750 detects the RFID tag 1765 passing through the doorway 1755 and communicates this information to the computer 1740 .
  • the computer 1740 may then add the product 1760 to a checkout tally.
  • the checkout tally may already have the product 1760 added.
  • the RFID reader 1750 may instead confirm that the product 1760 is being purchased. For example, if the product 1760 was removed from the shelf 1770 but not returned to the shelf 1770 or passed through the doorway 1755 within a predetermined amount of time, such as 20 minutes, the computer 1740 may determine that the product 1760 is lost, missing, or stolen, and appropriately notify a system manager and update a database of products, as described above.
  • the checkout reader 1730 may also be used to confirm items in the checkout tally.
  • the patron may remove the product 1760 from the vending space 1715 , and present it to the checkout reader 1730 .
  • the patron may remove various items from the vending space 1715 , swipe the desired items across the checkout reader 1730 , and return unwanted items back to the vending space 1715 .
  • the computer 1740 includes a purchasing mechanism to accept valid payment by prompting the patron to complete the transaction, displaying a screen similar to FIGS. 9 and 11 . The patron may then confirm payment using the previously validated payment. If the patron is using an account with an insufficient balance to complete the transaction, the patron may be prompted with a screen such as the screen 2000 in FIG. 20 to charge up the account. Alternatively, rather than purchase the items, the patron may allocate the items to his account, similar to the allocation described above. The computer 1740 finalizes the transaction and may further update the database.
  • the computer 1740 may automatically close or cancel the transaction. For example, if items are detected as removed from the vending space 1715 , but not otherwise paid for, i.e. with a completed transaction within a predetermined amount of time such as 15 minutes, the computer 1740 may activate security measures. The computer. 1740 may mark the items as “stolen” or “missing” in the database. The computer 1740 may notify the system manager of potential theft or an otherwise faulty transaction. By default, the computer 1740 will sell and/or assign the items to the patron that was previously validated.
  • the computer 1740 may have an idle timer to time out the transaction if no activity is detected within a predetermined amount of time, such as 10 minutes. For instance, if no items were passed through the doorway 1755 or no actions were taken on the computer 1740 within the predetermined amount of time, the computer 1740 may time out the transaction. When the transaction times out, the computer 1740 forces the transaction to close by completing the transaction and charging the items in the checkout tally as if the patron had actively completed the transaction. The computer 1740 may further alert the system manager about the timed out transaction. In certain implementations, the computer 1740 may present a timer screen displaying a countdown to when the computer 1740 will automatically close the transaction.
  • a predetermined amount of time such as 10 minutes. For instance, if no items were passed through the doorway 1755 or no actions were taken on the computer 1740 within the predetermined amount of time, the computer 1740 may time out the transaction. When the transaction times out, the computer 1740 forces the transaction to close by completing the transaction and charging the items in the checkout
  • the door 1720 may be motorized such that the computer 1740 can close the door 1720 when the transaction times out.
  • the door 1720 may further have a sensor, such as a pressure sensor or video sensor, to prevent the door 1720 from closing on the patron.
  • the predetermined amount of time may any suitable period of time.
  • the predetermined amount of time may be 5 minutes.
  • the predetermined amount of time may be selected as a time to prevent the items from spoiling from having the door 1720 open, such as 30 minutes.
  • the computer 1740 may actively manage an inventory inside the vending space 1715 , and keep the database updated.
  • the computer 1740 may be aware of what items passed through the doorway 1755 .
  • the computer 1740 may further determine which direction the items passed, e.g. into the vending space 1715 or out of the vending space 1715 .
  • the shelf 1770 is a smart shelf
  • the computer 1740 can determine whether an item was removed or added.
  • the cabinet 1710 may have additional sensors or RFID readers such that the computer 1740 can determine a current inventory.
  • the computer 1740 may dynamically update the database.
  • FIGS. 18A and 18B depict a walk-in store 1800 .
  • the walk-in store 1800 comprises a room 1810 , a door 1820 , a lock 1825 , a checkout reader 1830 , a card swipe 1835 , a computer 1840 , and an RFID reader 1850 .
  • the room 1810 defines a vending space 1815 and a doorway 1855 , seen in FIG. 18B .
  • a product 1860 with an RFID tag 1865 sits on a shelf 1870 inside the vending space 1815 , as seen in FIG. 18B .
  • the walk-in store 1800 operates similarly to the cabinet store 1700 in that similarly numbered elements may behave similarly. For the sake of brevity, the differences will be discussed.
  • the room 1810 may be a room or other similar structure having a door and an interior storage space.
  • the room 1810 may be large enough for the patron to enter and peruse the items in the vending space 1815 .
  • the room 1810 is a small room such as a cage or a closet sized glass box.
  • the room 1810 may have at least one wall that is substantially transparent to allow the patron to view the vending space 1815 .
  • the room 1810 may be other specialized storage, managing specific environmental conditions suitable for storage such as temperature, moisture, humidity, or light.
  • the room 1810 may be a refrigerated room or a heated room.
  • the room 1810 may be an add-on to an existing structure.
  • the checkout reader 1830 , the card swipe 1835 , and the computer 1840 are similar to the checkout reader 1730 , the card swipe 1735 , and the computer 1740 , respectively.
  • the patron may use a mobile device in place of the computer 1840 , or to complete the transaction as described above.
  • the door 1820 is closed.
  • the lock 1825 is normally locked, preventing access to the vending space 1815 .
  • the lock 1825 may be a solenoid lock or any other suitable lock for locking the door 1820 and remotely controllable by the computer 1840 .
  • the computer 1840 unlocks the lock 1825 after validating a patron, who may be validated by having a valid credit card or a valid account with the minimum balance. The patron may be prompted with the screen 2000 to charge up the account if the current balance is insufficient.
  • the computer 1840 unlocks the lock 1825 .
  • the patron may open the door 1820 , as seen in FIG. 18B . Similar to the cabinet store 1700 , the transaction is pending while the door 1820 is open and the computer 1840 may display a screen similar to FIG. 9 or FIG. 11 .
  • the room 1810 defines the vending space 1815 .
  • the doorway 1855 forms a boundary of the vending space 1815 , the only opening through which items such as the product 1860 can pass through.
  • the RFID reader 1850 is configured such that its radio frequency curtain forms a curtain across the entire doorway 1855 .
  • the RFID reader 1850 is located adjacent the doorway 1855 and above the door 1820 . In other implementations, the RFID reader 1850 may be located along other sides of the doorway 1855 , or may comprise multiple RFID readers along the doorway 1855 .
  • the patron may enter the room 1810 .
  • the door 1820 closes and the lock 1825 locks.
  • the door 1820 may close automatically, such as through a spring or pneumatic or motorized mechanism which may also be controlled by the computer 1840 . Closing and locking the door 1820 and the lock 1825 limits unauthorized access, in particular with respect to the patron's credit card or account. In certain implementations, additional security features, such as a turnstile or a camera, may further limit unauthorized access.
  • the lock 1825 is unlockable from inside the room 1810 .
  • a panel 1827 which may be on the inside of the door 1820 as in FIG.
  • the panel 1827 may be another computer or tablet computer, similar to the computer 1840 , which allows further system interaction to unlock the lock 1825 .
  • the door 1820 may be pushed from the inside to unlock the lock 1825 , for instance if the walk-in store 1800 lost power.
  • the patron removes the product 1860 , having the RFID tag 1865 , from the shelf 1870 to purchase it.
  • the shelf 1870 may be a smart shelf, as described above, capable of detecting when the product 1860 has been removed.
  • the patron may re-open the door 1820 and exits through the doorway 1855 .
  • the RFID reader 1850 detects the items carried through the doorway 1855 and accordingly updates a checkout tally.
  • the lock 1825 automatically re-engages to lock the vending space 1815 .
  • the patron may then complete the transaction to purchase or allocate the items in the checkout tally on the computer 1840 , which may display a screen similar to FIGS. 9 and 11 .
  • the patron may be presented with the screen 2000 if the account has insufficient balance for the transaction.
  • the computer 1840 may automatically close or cancel the transaction, activate security measures when needed, and update the database accordingly.
  • FIG. 19 presents a simplified flowchart 1900 of a POS software logic that may be used by the computer 1740 or the computer 1840 .
  • the transaction begins. For instance, the patron may approach the computer 1740 or 1840 .
  • the computer checks for a valid credit card. If a valid credit card was presented, the computer unlocks the door, such as the door 1720 or 1820 , at 1950 .
  • the computer checks for a valid account. For example, the patron may input a member ID or swipe a member card and provide a password and/or PIN. The computer may allow the patron several tries for a valid account. If the account was not valid, then at 1940 the patron may have the option to create a new account. Alternatively, if the patron does not create a new account or fails to otherwise be validated, the transaction will end.
  • the lock such as the lock 1725 or 1825
  • an RFID reader such as the RFID reader 1750 or 1850
  • the RFID reader 1750 or 1850 detects items passing through the doorway, such as the doorway 1755 or 1855 .
  • the transaction is completed based on the items detected at 1960 .
  • the payment comes from the previously used validation, which may be a credit card or an account balance.

Abstract

A self-checkout kiosk enables a patron to purchase or allocate to an account a product displayed in a vending area and carrying a Radio Frequency Identification (RFID) tag. The patron exits the vending area through a security portal. The kiosk, a bill acceptor, a computer monitor and/or a mobile device enables the patron to complete a purchase or allocate transaction prior to exiting the vending area through the portal. The portal includes RFID reading antennas for marking products stolen when transferred through the portal without a transaction. Alternatively, a smart shelf keeps track of products on the smart shelf and keeps a checkout tally of removed products. If the patron does not complete a purchase or allocate transaction, or returns the product to the smart shelf within a user-defined set of time, the smart shelf will mark the product as stolen. A security system responds to products marked as stolen.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation-in-part of U.S. patent application Ser. No. 13/683,983, filed Nov. 21, 2012, which is a continuation of U.S. patent application Ser. No. 13/488,202, filed Jun. 4, 2012, which is a continuation of U.S. patent application Ser. No. 11/910,436, filed Jun. 13, 2008, now U.S. Pat. No. 8,191,780, which is a 371 Application of PCT/US2005/047149 filed Dec. 27, 2005, which claims the benefit and priority of U.S. Provisional Application Ser. No. 60/669,183, filed Apr. 7, 2005.
  • FIELD
  • This invention relates to a self-checkout kiosk that enables a patron to purchase or checkout a product without the presence of a checkout attendant. The kiosk incorporates a retail security system that can be used separately in conventional retail environments to reduce shrinkage. As used herein, the term “kiosk” means any area in which product is stored and displayed and which includes a self-checkout station permitting a patron to complete a purchase transaction and a portal incorporating a security system, and the term “tag” means both tags that are separately applied to a product as well as tags that are an integral part of the product or are integral with packaging. The self-checkout station may be adjacent to and/or integral with the portal, or may be located within the kiosk separate from the portal.
  • BACKGROUND OF THE INVENTION
  • Self-checkout point of sale (POS) systems are well known in the art. One example of such a system is found in grocery stores having self-checkout lanes. A POS typically includes a terminal, bar code reader, a computer, and POS software. The patron scans products using a bar code reader. The computer communicates with the patron via the POS software when the bar code reader has been successfully used to read the Universal Product Code (UPC) and then transmits the UPC information to a host server, which processes the UPC information by comparing it to a database. The database typically includes information such as number of units in stock, price per unit, and any other information which may facilitate the transaction in addition to the UPC.
  • Such an automated sales system has obvious limitations including, by way of example, the lack of security measures working in concert with the system. All sales must be monitored by an attendant to insure that the patron has presented each merchandise item to the bar code scanner. The requirement for an attendant to monitor the sales limits the number of sales terminals that may be operated, as it is not cost effective to have an attendant monitoring such a terminal during periods of low sales volumes. Accordingly, there is a need for an automated shopping system with a security system that avoids the need for an attendant to be present to monitor all transactions which may take less time to consummate the transaction. Additionally, in conventional retail environments in which one or more attendants are present, enhanced security measures are desirable to reduce product shrinkage.
  • Recently, inventory control systems using Radio Frequency Identification (RFID) systems have become available for inventory control. Unlike bar code systems, in which the bar code must be directly displayed to the bar code reader, RFID systems use radio waves to read a tag anywhere within the field generated by the reader, regardless of the orientation of a particular tag.
  • SUMMARY OF THE INVENTION
  • The present invention relates to a self-checkout kiosk for enabling a patron to purchase or allocate a product located in a vending area or space and carrying a Radio Frequency Identification (RFID) tag. In one implementation, the customer or patron unlocks a door to the kiosk to access the vending space. The kiosk includes a self-checkout station including, for example, a bill acceptor, credit/debit card reader and a computer and computer monitor. The self-checkout station may be either adjacent the door or separated therefrom, and enables the patron to complete a transaction after removing items from the vending space and closing the door. The self-checkout station or process can also be conducted on a mobile device, such as a tablet or smartphone, to complete the transaction on the mobile device. The mobile device may function similar to, or alternatively replace the computer monitor. A doorway includes an RFID reader/antenna for detecting the product being transferred from the vending space and through the doorway. A security system responds to a transfer of product through the doorway without a patron completing a transaction using the self-checkout means. The portal and security system itself is also usable in conventional retail environments when an attendant is present.
  • In another implementation, the product may be located in a walk-in kiosk. A patron unlocks a door to the kiosk to enter a vending space in the kiosk. The doorway includes an RFID reader/antenna which can detect when the product has been passed from the vending space and through the doorway. A self-checkout station, which may be near the door, keeps a checkout allows a patron to purchase the removed product or allocate it to an account. If the removed product is not purchased or returned to the vending space within a user-defined set of time, the removed product is treated as a potential theft.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a view in perspective of a self-checkout kiosk made pursuant to the teachings of the present invention;
  • FIG. 2 is a top plan view of a vending area of the kiosk as illustrated in FIG. 1;
  • FIG. 3 is a side elevation view of the kiosk illustrated in FIG. 1;
  • FIG. 4 is a view similar to FIG. 1 but illustrating another implementation of the invention;
  • FIG. 5 is a view similar to FIGS. 1 and 4, but illustrating still another implementation of the present invention;
  • FIG. 6 is a block diagram illustrating the components of the present invention and their interconnections;
  • FIG. 7 is a diagrammatic flow chart of the Point of Sale (POS) software used in the present invention;
  • FIG. 8 is a view in perspective of a self-checkout station used in an alternate implementation of the kiosk illustrated in FIG. 1;
  • FIG. 9 is a screen view of a self-checkout station depicting an allocate to account option;
  • FIG. 10 is a screen view of a self-checkout station depicting options for pairing with a mobile device;
  • FIG. 11 is a view of a mobile device paired with a self-checkout station;
  • FIG. 12 is a view of a smart shelf in a resting state according to the present inventive concepts;
  • FIG. 13 is a view of a smart shelf detecting a removed product;
  • FIG. 14 is a view of a smart shelf in a self-checkout process;
  • FIG. 15 is a diagrammatic flow chart of the POS software used in conjunction with a smart shelf;
  • FIG. 16 is a table of database records used by the POS software;
  • FIG. 17A is a front view of a cabinet store according to an implementation of the present disclosure;
  • FIG. 17B is the cabinet store of FIG. 17A with the door open;
  • FIG. 18A is a front view of a walk-in store according to an implementation of the present disclosure;
  • FIG. 18B is the walk-in store of FIG. 18A with the door open;
  • FIG. 19 is a flowchart of the POS software used in conjunction with a cabinet store or a walk-in store according to an implementation of the present disclosure; and
  • FIG. 20 is a screen view of a self-checkout station depicting options to add funds to an account according to an implementation of the present disclosure.
  • DETAILED DESCRIPTION
  • Referring now to FIGS. 1 and 2, a kiosk made according to the present invention illustrated generally by the numeral 10. The kiosk 10 is intended for use in institutions where availability of product on a twenty-four hour, seven day a week basis is desired. Typical applications include hotels, college dormitories, etc. As shown in FIG. 2, the kiosk 10 includes a portal defining the entrance into, or egress from, a vending area generally indicated by the numeral 11. As illustrated, multiple products, each tagged with a Radio Frequency Identification (RFID) tag, are displayed for purchase in the vending area 11. As illustrated, such products may include soft drinks, snacks, sandwiches, video tapes, and other products. According to the invention, a patron enters the vending area 11 through the portal, selects from one or more of the products displayed, and then exits through the portal after completing a self-checkout transaction at a self-checkout station as will be hereinafter explained. As will also be explained, various security measures inhibit a patron from removing products from the vending area without completing a self-checkout transaction, which includes payment for the items or allocating the items to an account.
  • The portal is defined by a pair of facing, substantially parallel side frame members 12 and 14, which are connected by an upper transverse frame member 16. The frame members 12, 14 and 16 are made of any suitable material, such as wood or particle board, and are covered by a decorative covering 18 made of any material which allows passage of radio frequency waves, particularly waves at a frequency of 915 MHZ. Typical materials of the covering 18 include plastic and plywood with a laminate finish. Although only one portal is illustrated, multiple portals may be used to provide entry into and egress from the vending area. The side frame member 14 terminates at a counter 20, which includes an upper surface or tray 22 upon which product being purchased may be placed, as will hereinafter be explained.
  • The counter 20 provides a locked area for placement of an RFID reader, a DVD recorder, a computer, and a router, all of which will be hereinafter explicitly identified and explained. A touch screen computer monitor 26 is mounted on the side frame member 14 and projects above the tray 22 where it is easily accessible to a patron completing a transaction. A conventional card reading swipe 28 is mounted on the edge of the monitor 26, which is used to read credit cards and other cards which may be used to process a purchase transaction. A conventional receipt printer 44 is mounted adjacent the tray and/or monitor for printing a receipt confirming a purchase transaction. A conventional bill acceptor 30 available commercially as a ValTech bill acceptor, is mounted on the counter 20 to accept currency to be used in payment for product. A conventional microphone and speaker enable a patron to communicate with an attendant at a remote location. While the kiosk of the invention does not require the presence of an attendant on site, it permits communication with an attendant at a remote location, who is able to supervise several self-checkout kiosks. Together, the counter 20, touch screen computer monitor 26, card reading swipe 28, receipt printer 44 and bill acceptor 30 define a self-checkout station that permits a customer to complete a transaction. A customer may purchase products or may allocate products to an account, as will be explained.
  • Although the self-checkout station is illustrated in the implementation of FIG. 1 as being integral with the portal, it will be understood that the self-checkout station may be separated from the portal, and may be located anywhere within the vending area. For example, and referring to FIG. 8, a self-checkout station generally indicated at 200 is illustrated as being mounted on a wall within the vending area 11 and is separate from the portal (not shown). Although the self-checkout station 200 is shown as being mounted on the wall, it could be mounted on a counter, pedestal or similar support within the vending area 11. FIG. 14 depicts self-checkout station 200 mounted on a pedestal.
  • A transaction on self-checkout station 200 may also be conducted on a mobile device, such as a smartphone or tablet. The mobile device may be the property of the vendor or the customer. A QR code or Near Field Communication (NFC) tag can be used to conveniently pair the mobile device with self-checkout station 200. For example, FIG. 11 shows smartphone 162 paired with self-checkout station 200. To facilitate and accelerate communication, which may include downloading a self-checkout application onto smartphone 162, between self-checkout station 200 and smartphone 162, self-checkout 200 has a pairing mechanism. The pairing mechanism includes an RFID tag (not shown) or other NFC tag readable by smartphone 162. Alternatively, or in addition to the RFID tag, self-checkout station 200 displays machine readable codes, such as barcodes or QR codes.
  • FIG. 10 illustrates a mobile pairing screen 156. Mobile pairing screen 156 displays QR code 160, readable by a camera or other optical scanner on smartphone 162. Mobile pairing screen 156 also displays pairing button 158, a virtual button displayed on touch screen computer monitor 26 to initiate mobile pairing. The pairing designates smartphone 162 as the recipient of the item self-checkout information. Once paired, smartphone 162 displays a self-checkout screen, as seen in FIG. 11. The self-checkout screen may be the same as displayed by touch screen computer monitor 26, or as in FIG. 11 is optimized for display on smartphone 162. The self-checkout screen allows for payment or allocation to an account, similar to self-checkout station 200. When the customer completes a transaction on smartphone 162, smartphone 162 communicates the transaction information to self-checkout station 200. In alternative implementations, the item self-checkout information is sent to smartphone 162 instead of displayed on touch screen computer monitor 26, obviating the need for touch screen computer monitor 26.
  • Turning back to the portal, conventional security cameras 32, 34, and 36 are mounted on the uprights 12, 14, and 16. Security camera 34 is focused on the patron standing near the monitor 26, and cameras 32 and 36 are trained on the vending area 11 and or the areas adjacent the kiosk 10. The uprights 12, 14, and 16 and the counter 20 cooperate to define a portal 38 through which a patron must leave the vending area 11. The cameras 32, 24, and 26 are aimed to photograph anyone in the vending area 11, and any patron leaving through the portal 38. Each of the cameras is connected to a conventional DVD recorder 40 which may be located within the cabinet 20. A fourth camera (not shown) may be aimed at the monitor. The cameras and DVD recorder are components of a security system available commercially from Everfocus as Everfocus DVSR-400. A conventional motion sensor, such as photoelectric motion sensor 42, which projects a photoelectric beam across the portal 38 and which generates a signal communicated to the computer when the beam is broken, is mounted on the kiosk 10 and projects the beam across the portal 38 to detect movement of a patron through the portal 38. Electronic signage (not shown) is mounted on the frame member 16 on the edge thereof facing away from the vending area 11. A receipt printer 44, such as is available from Swecoin, is also mounted adjacent the counter 22. The receipt printer, bill acceptor, card swipe, the DVD component of the security system, and the RFID reader discussed below are all connected to the computer.
  • As discussed above, all products available in the vending area 11 bearing RFID tags. The tags may be a 96 bit Lepton chip read many, write once class 1 type tag. The tags are read by a reader, which is well known in the art, such as an Alien Technology Model ALR 9780 indicated at 46 (FIG. 6), and operating at 915 MHZ. The RFID reader is stored within the cabinet 20, and is connected via appropriate cables to four circular polarized 915 MHZ antennas 48, 50, 52, and 54. Antenna 48 is mounted in counter 20 immediately below the tray 22 with its polarization facing upwards toward the tray. Although only a single RFID reader is illustrated, it will be understood that multiple RFID readers may be desirable or necessary if the self-checkout station is separate from the portal and located at a distance there from that it is desirable that a separate RFID reader be used to be used only for the RFID antenna at the self-checkout station and a separate RFID reader be used for the antennas providing security at the portal. Of course, if multiple portals are used, it may be desirable to use RFID readers to accommodate each portal.
  • In this implementation, the RFID readers operate in “detect mode.” In “detect mode,” the self-checkout process is activated when an RFID tag is read. The RFID readers each would be connected to the computer. The antenna 50 is mounted in side frame member 14 perpendicular to the antenna 48 and with its polarization facing into the portal 38. Antennas 48 and 50 provide the strongest tag detection when the vended product is placed on the tray. Antennas 52 and 54 are mounted in the side frame member 12, with approximately even spacing between the antennas 52 and 54, between the antenna 52 and the transverse frame member 16, and between the antenna 54 and the floor. Both antennas 52 and 54 have their polarizations facing into the portal 38. Each of the antennas 48-54 is identical, and each is substantially flat panels with rounded ends and straight sides between the rounded ends. The circular polarizing results in a curtain of radio frequency waves radiating at a 45 degree angle from the circular ends. Accordingly, as illustrated in FIG. 3 the radio frequency curtains radiated by each of the antennas 48-54 overlap to form a curtain across the entire portal 38, so that any attempt to move product through the portal will result in the RFID tag on the product being read.
  • Referring now to FIG. 6, the RFID reader 46 includes multiple input ports 56, each of which is respectively connected to a corresponding one of the antennas 48-54, and has additional inputs connected to the output 58 of the DVD recorder 40, and to the sensing output 60 of the photo eye 42. Reader 46 also has outputs connected, through the appropriate relays, to an alarm or strobe light 61. An Ethernet port connects the reader 46 to a router, such as a Linksys router, the other ports of which are connected to Ethernet ports on the DVD recorder 40 and on the personal computer. The router 63 includes a port which is connected via a broadband connection to a remote computer.
  • Through a voice-over-internet protocol, the remote attendant may talk to a patron using the kiosk 10, but the attendant at a main kiosk can also handle several other remote, non-attended kiosks. It is also contemplated that a local inventory will be maintained on the computer 62, but through the router 63 and the broadband connection the local inventory will be updated by a master inventory at a remote location or main kiosk for inventory maintenance. The local inventory can also be updated by the remote computer to update for new inventory, restocking, etc. The computer 62 is also connected to speakers 66 and microphone 68, to provide the aforementioned communication between the patron using the kiosk 10 and the remote attendant, and further includes a driver for the digital sign and has ports connected to the receipt printer 44 and the bill/coin validator/acceptor 30.
  • A database manages the local inventory. The database may be stored on computer 62 or may be stored at a remote location, accessible through router 63 and the broadband connection. The database assigns a unique identification code for each individual product having its own RFID tag. The database associates the unique identification code to the product data stored in the product's corresponding RFID tag. Rather than storing a count of each type of product, the database stores each individual product as its own record. In the example shown in FIG. 16, the database stores a record for each individual milk carton, instead of storing a milk carton having a count of 4.
  • Referring to FIG. 16, table 300 is disclosed, showing the records stored in the database that are associated with milk cartons. Each individual product is given a unique ID within the table, along with other data. For example, the database can store a PURCHASE_STATUS, such as Not Sold, Sold, Allocated, Stolen, or Missing. The database further stores a UPC code, a NAME, a PRICE, and an RFID tag identifier, which corresponds to the product's RFID tag. Storing a record for each individual product allows the database to store additional data associated with each product. The ACCOUNT column stores the account to which the product is allocated or checked out. The LOCATION column may store specific locations, such as “on shelf,” or more general locations, such as “in store” or “unknown,” depending on the placement and availability of RFID readers and RFID antennas. In table 300, the OTHER column refers to an expiration date for the milk, but may also store other data.
  • The increased level of data stored with each individual product provides the vendor with additional dynamic inventory management options. In table 300, the expiration dates of the milk cartons stored in OTHER may allow the vendor to not sell (by removing from the database) milk cartons which have expired. The vendor may further elect to discount the prices of milk cartons whose expiration dates are nearing.
  • Referring now to FIG. 7, a flow chart of the software is disclosed, which is a compilation of the software included within the computer 62 and tag reader 46. Upon the kiosk 10 being available to patrons, the remote computer signals computer 62 to initialize the systems components, as indicated at 72. At that time, the computer 62 reads inventory data from the main terminal as indicated at 74. The RFID reader or readers are then activated, as indicated at 76, a test is made at 78 to assure that the RFID reader or readers have been connected, upon which the help button, charge up button, and cancel button on the monitor are activated and the items to purchase display is also activated. At that time a timer is started and a tag is read, as at 80. A test is made at 82 and 84, to determine if the beam generated by the photoelectric eye has been broken while one or more tags have been sensed, that have not been marked in the database as being sold, at which time an alarm is sounded and the inventory database is marked for the theft, as indicted at 86. The DVD recorder is also signaled into an enhanced recording mode, so that the images from the cameras are recorded at 60 frames per second, instead of the normal five frames per second.
  • If a theft has not been flagged at 82, and a tag is detected at 88 and 90, a test is made to determine if the tag is in the database as at 92 so that pricing can be established and the item and price is added to the array (if not already displayed) on the monitor 26 and/or smartphone 162, as indicated at 94 and 96. If the tag is the first tag in the array, as determined at 98, payment option buttons 100, 102, 104, and 106 are turned on and displayed on the monitor, as indicated at 108, along with a voice prompt requesting the patron to select a payment method or account to allocate to. The cancel button 110 is always displayed, which permits the patron to cancel the transaction at any time, upon which the screen is cleared as indicated at 112. If the patron elects to pay with cash by selecting that option at 100, a receipt is printed as indicated at 114, the item is removed from the inventory record as indicated at 116 and marked as “sold,” and the screen cleared as indicated at 112, after, of course deposit of a sufficient amount of currency in the bill acceptor is confirmed. If the patron elects to pay by charging the purchase to a hotel room by choosing 102, the patron is asked to enter the room number on the keypad as indicated at 118, after which the transaction is completed by printing a receipt, removing the items purchased from the inventory record as being sold, and clearing the screen as discussed above. If the patron elects to pay by credit card by selecting that option at 104, the patron is requested to swipe the card as indicated at 120 and the normal card verification procedures over the broadband connection through the router 63 are completed, as indicated at 122. Upon card approval, the transaction is completed by printing the receipt, removing the item from inventory, and clearing the screen. If the card is not approved, the patron is so informed on the monitor screen, and the transaction is aborted and the screen cleared.
  • The patron may also elect to pay by using a charge-up card by choosing that option at 106. Charge-up cards are particularly useful in situations such as college dormitories, where repeated purchases are expected. This option allows the patron to “charge up” a card at one visit and use credits remaining on the card for subsequent visits. If option 106 is selected, a test is made at 124 to determine if a current account with sufficient credits exists for the card being used. If so, the patron is requested to enter the corresponding PIN number as indicated at 126, which is confirmed at 128. If the PIN number is correct, the transaction is completed by printing a receipt, removing the item from inventory as being sold, and clearing the screen; if the PIN number is incorrect, the patron is requested to re-enter the PIN number. If an account does not exist, the patron is asked to enter the information necessary to establish the account on the keyboard as indicated at 130, and the patron is asked to enter a new desired PIN number on the keyboard at 132, upon which the account must be charged up. A new account may be charged up, or the credits on an existing account increased, by pushing the “charge up” button on the monitor screen, as indicated at 134. The patron will then be prompted to deposit currency to charge up the account and to enter the PIN number at 136 (the PIN number may be the same as the PIN number just entered at 132 if a new account is being established), the account is charged up and a bill/receipt formed as indicated at 140, at which time the transaction is completed by clearing the screen.
  • Additionally, the patron may choose to allocate the items to an account by choosing that option at 152. As seen in FIG. 9, the patron may be prompted by allocate screen 154 to select an account. Accounts may be denoted as departments, projects, or other identifiers, such as a room number seen in FIG. 9. Similar to paying with an account, a test is made at 124 to verify the account exists. Allocating to an account further creates an association between the items and the account within the database, as discussed above. Moreover, allocation to an account allows for non-sales transaction. Rather than purchasing the items, the items may be checked out to the account, such as a lamp being checked out by a dorm room. Otherwise, the transaction may be completed similar to paying with an account, as described above.
  • Although the kiosk 10 has been described as including both a self-checkout station and a portal incorporating security measures, the portal itself may be used in conventional retail environments to control inventory shrinkage. For example, in traditional retailers having attended checkout lanes, one or more of the security portals as described herein may be installed where customers, after proceeding through the checkout lanes (whether attended or unattended) must pass through one of the portals before exiting the retailer. When the customer proceeds through checkout, each of the products purchased are removed from the inventory database maintained by the store and marked “sold.” When the RFID reader associated with the antennas mounted on the portal sense transfer of product through the portal that has not been marked sold, appropriate security alarms are initiated.
  • The kiosk described above provides a minimum level of security. If an enhanced level of security is desired, the various display cases within the vending area 11, such as the candy display case 142 in FIG. 4, is enclosed and provided with sliding doors 144 equipped with magnetically released locks as at 146. Before product is made available, the patron must swipe a credit card (or charge-up card) to unlock the doors of the display cases. Accordingly, an indication of the patron's identity can be retained. If a still greater level of security is desired, doors, such as the transparent doors 148 in FIG. 5, are mounted on the side frame members 12 and 14 via hinges. The doors close the portal 38, and are mounted on the edges of the side frame members that face into the vending area 11. The doors are latched with magnetically released locks 150. Since the doors extend across the inside of the kiosk 10, the monitor 26 and card swipe 28 are outside of the doors and are available to a patron. In order to unlock the doors and enter into the vending area, the patron must swipe a credit card (or a charge-up card) in the card swipe 28. Accordingly, before the patron even enters the vending area, an indication of the patron's identity is retained.
  • The implementations described above operate in “detect mode.” However, in an alternative implementation, the need for a security gate, such as portal 38, may be obviated by the use of a “smart shelf.” Whereas in “detect mode,” the software of self-checkout station 200 becomes active when an RFID tag is read, the software of the smart shelf detects when an RFID tag is not read. FIG. 12 presents one implementation of smart shelf 166. Smart shelf 166 comprises merchandise fixture 174, which may be a shelf, display case, or other fixture which displays products for sale or allocation. The products may include products 172A, 172B, 172C, and 172D (also collectively referred to as “products 172A-D”). Similar to the products described above, products 172A-D each bear an RFID tag to uniquely identify each product 172A-D.
  • In order to detect products 172A-D, merchandise fixture 174 is integrated with RFID reader 168 and RFID antenna 176 (not shown to scale in FIGS. 12 and 13). RFID antenna 176 has a limited read range, depicted as read zone perimeter 170. The read range of read zone perimeter 170 may be appropriate for the size, shape, and location of merchandise fixture 174. For instance, a small shelf containing small products would have a smaller read zone perimeter than a large shelf holding large products. During a normal, or resting state, smart shelf 166 constantly reads and verifies RFID tags. In FIG. 12, smart shelf 166 expects products 172A-D to be within read zone perimeter 170. Smart shelf 166 provides real time tracking of products. Smart shelf 166 may further be utilized to organize products by smart shelves. For example, a small smart shelf may hold printer cartridges and an adjacent large smart shelf may hold printers. If a printer cartridge was left on the large smart shelf, the small smart shelf may detect that the printer cartridge was missing, the large smart shelf may detect the printer cartridge which does not belong, and together the small and large smart shelves may alert the vendor about the misplaced printer cartridge.
  • Returning to FIG. 12, smart shelf 166 detects products 172A-D. In FIG. 13, a customer has removed product 172C from smart shelf 166. Because product 172C is outside of read zone perimeter 170, smart shelf 166 no longer detects product 172C, which starts the self-checkout process for product 172C, similar to the self-checkout process described above. Product 172C and any additional items that are no longer detected are added to the checkout tally. However, if product 172C is not returned to read zone perimeter 170 or purchased/allocated within a user-defined set of time, product 172C is flagged as a theft.
  • Because smart shelf 166 has already added product 172C to the checkout tally, self-checkout station 200 does not require its own RFID reader. As seen in FIG. 14, a customer may complete the self-checkout process on self-checkout station 200 not having tray 22. Self-checkout station 200 may be placed near smart shelf 166. In addition, a mobile device such as smartphone 162 may pair with self-checkout station 200. Moreover, smart shelf 166 may be integrated with computer 62 such that self-checkout station 200 is not necessary. Smartphone 162 may instead pair with smart shelf 166. A customer may then remove product 172C from smart shelf 166, and complete the transaction on smartphone 162 before leaving the vending area, without having to stop at self-checkout station 200.
  • Referring now to FIG. 15, FIG. 15 discloses a flowchart of the software used by smart shelf 166. FIG. 15 is similar to FIG. 7 in that similarly labeled elements behave similarly. For the sake of brevity, only the differences will be discussed. At 74, computer 62 reads data which includes a list of products expected to be on smart shelf 166. Once the RFID reader 168 is verified at 76 and 78, computer 62 gets input from RFID reader 168 at 302. Next, at 304, computer 62 determines whether any expected RFID tags are missing. If no RFID tags are missing, computer 62 returns to 302 to get input from RFID reader 168. If an RFID tag or tags are missing, at 306 computer 62 determines whether a timer for each missing tag is running, while resetting and disabling timers of tags that are present. Disabling the timers for present products ensures that a present product does not get falsely flagged as stolen.
  • If a timer for a missing tag is running, then at 308 computer 62 determines whether the timer has passed the user-defined time for returning products to smart shelf 166. If the time has elapsed, then at 86 the associated product is labeled as “theft,” and the alarm sounds, as described above. Otherwise, computer 62 returns to 302 to get an updated reading of RFID tags.
  • If at 306 the timer for the missing tag has not been started, then computer 62 starts the timer at 310. Then, at 94, computer 62 starts the self-checkout process as described above. At the end of the self-checkout process, at 116, computer 62 additionally removes the tag from the list of products expected on smart shelf 166.
  • Turning now to another implementation, FIGS. 17A and 17B depict a cabinet store 1700. The cabinet store 1700 comprises a cabinet 1710, a door 1720, a lock 1725, a checkout reader 1730, a card swipe 1735, a computer 1740, and an RFID reader 1750. The cabinet 1710 defines a vending space 1715 and a doorway 1755, seen in FIG. 17B. A product 1760 with an RFID tag 1765 sits on a shelf 1770 inside the vending space 1715, as seen in FIG. 17B.
  • The cabinet 1710 may be a cabinet or other similar fixture having a door and an interior storage space. In an exemplary implementation, the cabinet 1710 is a refrigerator which keeps the vending space 1715 at a low temperature. In other implementations, the cabinet 1710 may be other specialized storage, producing specific environmental conditions suitable for storage. For example, the cabinet 1710 may be an oven or other similar heated storage unit. Alternatively, the cabinet 1710 may be a cage or clear container allowing patrons to see its contents.
  • In FIG. 17A, the door 1720 is closed. When the door 1720 is closed, the lock 1725 is normally locked, preventing access to the vending space 1715. The lock 1725 may be a solenoid lock or any other suitable lock for locking the door 1720 and remotely controllable by the computer 1740. The checkout reader 1730, the card swipe 1735, and the computer 1740 work in conjunction to provide an interface for purchasing items in the vending space 1715. The checkout reader 1730 may be an RFID reader or similar antenna capable of wireless communication. The card swipe 1735 allows a credit card to be read. For example, the card swipe 1735 may read magnetic stripes of a credit card or other card or may be capable of reading RFID signals from the card. In certain implementations, the card swipe 1735 may be configured to accept cash. The computer 1740 may be a tablet computer or other similar computing device having a screen and input device, such as a touchscreen, for providing an interface to a patron. The computer 1740 may connected wired or wirelessly to a network, such as the Internet, for remote communication. In certain implementations, the computer 1740 and/or the checkout reader 1730 may be configured to pair with or otherwise communicate with a mobile device, allowing the patron to complete a transaction through their mobile device, as described above. Alternatively, the mobile device may perform the functions of the computer 1740 described below.
  • The computer 1740 includes an authentication mechanism that can automatically lock or unlock the lock 1725 with proper authentication. The computer 1740 validates a patron before unlocking the lock 1725. The patron may be validated by having a valid credit card, or, an account having a minimum balance. The patron may swipe a credit card through the card swipe 1735. Once the computer 1740 determines that the credit card is valid, the computer 1740 unlocks the lock 1725.
  • The patron can also be validated by having an account with the minimum balance. The minimum balance may be a predetermined amount, such as $5 or $20, which may be appropriately selected. Alternatively, the minimum balance may vary. For example, the minimum balance may vary based on patron. Certain patrons may have bad credit or a history of problems with self-checkout and may have a higher minimum balance requirement. Certain patrons may have a reduced minimum balance as part of a promotion or other suitable reasons. Alternatively, the minimum balance may correspond to a value of the products in the vending space 1715. For example, the minimum balance may be 50% or 100% of the value of the products in the vending space 1715.
  • As stated above, the patron may have a charge card. Once swiped, the computer 1740 determines if the charge card has a sufficient balance. Alternatively, the patron may have a member card that is swiped. The member card may be associated with a vendor, such as the operator of the cabinet store 1700. For example, the member card may be associated with a student account at a university operating the cabinet store 1700, or may be associated with a hotel room number at a hotel operating the cabinet store 1700. The computer 1740 may additionally prompt a PIN or password to log into the account. The computer 1740 may then determine whether there is sufficient balance to proceed. If the balance is too low, the computer 1740 may prompt the patron to charge up the account. FIG. 20 illustrates an exemplary screen 2000 for prompting a charge up. The patron may be presented with his current balance, and options to add additional funds to the account. The funds may be paid by credit card, as in FIG. 20. Alternatively, the funds may be paid by cash, or other suitable means. The computer 1740 validates the patron once the balance meets the minimum balance.
  • In yet other implementations, the patron may be validated by other means. For example, the computer 1740 may include a biometric sensor to identify the patron. Alternatively, the computer 1740 may include a video camera or other video sensor to identify the patron.
  • When the computer 1740 has validated the patron, the computer 1740 unlocks the lock 1725. The patron may then open the door 1720, as seen in FIG. 17B. While the door 1720 is open, the transaction is pending. The computer 1740 may display a screen similar to FIG. 9 or FIG. 11 summarizing the items for purchase.
  • Opening the door 1720 exposes the vending space 1715. The vending space 1715 is defined by the cabinet 1710. The doorway 1755 forms a boundary of the vending space 1715, the only opening through which items such as the product 1760 can pass through. As such, monitoring which items pass through the doorway 1755 effectively determines what items are removed. The RFID reader 1750 is located above the door 1720 when closed, as seen in FIG. 17A. However, when the door 1720 is opened, the RFID reader 1750 remains over the doorway 1755. The RFID reader 1750 is configured to detect RFID tags, such as the RFID tag 1765, which pass through the doorway 1755. A radio frequency curtain radiated by the RFID reader 1750 forms a curtain across the entire doorway 1755. Although in FIGS. 17A and 17B the RFID reader 1750 is above the door 1720, in other implementations the RFID reader 1750 may be located elsewhere in order to detect RFID tags passing through the doorway 1755. For instance, the RFID reader 1750 may be located on a sidewall or bottom of the cabinet 1710, or alternatively be located just inside or right along the doorway 1755. In alternative implementations, more than one RFID reader may be placed around the doorway 1755 such that the radio frequency curtains radiated the RFID readers overlap to form a curtain across the entire doorway 1755, so that any attempt to move a product through the doorway 1755 will result in the RFID tag on the product being read.
  • If the patron wishes to purchase the product 1760, the patron removes the product 1760 from the shelf 1770. The shelf 1770 may be a fixture capable of holding various products 1760. In certain implementations, the shelf 1770 may be a smart shelf with its own RFID reader, as described above. For example, the shelf 1770 may alert the computer 1740 if an item is removed from the shelf by determining that the RFID tag 1765 is away from the shelf 1770. In alternate implementations, a video camera or other video sensor may help determine which items were removed.
  • When the patron removes the product 1760 from the vending space 1715, the product 1760 must move through the doorway 1755. The RFID reader 1750 detects the RFID tag 1765 passing through the doorway 1755 and communicates this information to the computer 1740. The computer 1740 may then add the product 1760 to a checkout tally.
  • In implementations in which the shelf 1770 is a smart shelf, the checkout tally may already have the product 1760 added. The RFID reader 1750 may instead confirm that the product 1760 is being purchased. For example, if the product 1760 was removed from the shelf 1770 but not returned to the shelf 1770 or passed through the doorway 1755 within a predetermined amount of time, such as 20 minutes, the computer 1740 may determine that the product 1760 is lost, missing, or stolen, and appropriately notify a system manager and update a database of products, as described above.
  • The checkout reader 1730 may also be used to confirm items in the checkout tally. The patron may remove the product 1760 from the vending space 1715, and present it to the checkout reader 1730. For instance, the patron may remove various items from the vending space 1715, swipe the desired items across the checkout reader 1730, and return unwanted items back to the vending space 1715.
  • When the door 1720 is closed, the lock 1725 automatically re-engages to lock the vending space 1715. Closing the door 1720 further signifies that the patron wishes to complete the transaction by purchasing the items in the checkout tally. The computer 1740 includes a purchasing mechanism to accept valid payment by prompting the patron to complete the transaction, displaying a screen similar to FIGS. 9 and 11. The patron may then confirm payment using the previously validated payment. If the patron is using an account with an insufficient balance to complete the transaction, the patron may be prompted with a screen such as the screen 2000 in FIG. 20 to charge up the account. Alternatively, rather than purchase the items, the patron may allocate the items to his account, similar to the allocation described above. The computer 1740 finalizes the transaction and may further update the database.
  • In certain situations, the computer 1740 may automatically close or cancel the transaction. For example, if items are detected as removed from the vending space 1715, but not otherwise paid for, i.e. with a completed transaction within a predetermined amount of time such as 15 minutes, the computer 1740 may activate security measures. The computer. 1740 may mark the items as “stolen” or “missing” in the database. The computer 1740 may notify the system manager of potential theft or an otherwise faulty transaction. By default, the computer 1740 will sell and/or assign the items to the patron that was previously validated.
  • In addition, the computer 1740 may have an idle timer to time out the transaction if no activity is detected within a predetermined amount of time, such as 10 minutes. For instance, if no items were passed through the doorway 1755 or no actions were taken on the computer 1740 within the predetermined amount of time, the computer 1740 may time out the transaction. When the transaction times out, the computer 1740 forces the transaction to close by completing the transaction and charging the items in the checkout tally as if the patron had actively completed the transaction. The computer 1740 may further alert the system manager about the timed out transaction. In certain implementations, the computer 1740 may present a timer screen displaying a countdown to when the computer 1740 will automatically close the transaction. In certain other implementations, the door 1720 may be motorized such that the computer 1740 can close the door 1720 when the transaction times out. The door 1720 may further have a sensor, such as a pressure sensor or video sensor, to prevent the door 1720 from closing on the patron.
  • The predetermined amount of time may any suitable period of time. For example, for security reasons, the predetermined amount of time may be 5 minutes. Alternatively, the predetermined amount of time may be selected as a time to prevent the items from spoiling from having the door 1720 open, such as 30 minutes.
  • In certain implementations, the computer 1740 may actively manage an inventory inside the vending space 1715, and keep the database updated. The computer 1740 may be aware of what items passed through the doorway 1755. The computer 1740 may further determine which direction the items passed, e.g. into the vending space 1715 or out of the vending space 1715. For example, if the shelf 1770 is a smart shelf, the computer 1740 can determine whether an item was removed or added. In addition, the cabinet 1710 may have additional sensors or RFID readers such that the computer 1740 can determine a current inventory. The computer 1740 may dynamically update the database.
  • FIGS. 18A and 18B depict a walk-in store 1800. The walk-in store 1800 comprises a room 1810, a door 1820, a lock 1825, a checkout reader 1830, a card swipe 1835, a computer 1840, and an RFID reader 1850. The room 1810 defines a vending space 1815 and a doorway 1855, seen in FIG. 18B. A product 1860 with an RFID tag 1865 sits on a shelf 1870 inside the vending space 1815, as seen in FIG. 18B. The walk-in store 1800 operates similarly to the cabinet store 1700 in that similarly numbered elements may behave similarly. For the sake of brevity, the differences will be discussed.
  • The room 1810 may be a room or other similar structure having a door and an interior storage space. The room 1810 may be large enough for the patron to enter and peruse the items in the vending space 1815. In an exemplary implementation, the room 1810 is a small room such as a cage or a closet sized glass box. The room 1810 may have at least one wall that is substantially transparent to allow the patron to view the vending space 1815. In other implementations, the room 1810 may be other specialized storage, managing specific environmental conditions suitable for storage such as temperature, moisture, humidity, or light. For example, the room 1810 may be a refrigerated room or a heated room. Alternatively, the room 1810 may be an add-on to an existing structure.
  • The checkout reader 1830, the card swipe 1835, and the computer 1840 are similar to the checkout reader 1730, the card swipe 1735, and the computer 1740, respectively. In addition, the patron may use a mobile device in place of the computer 1840, or to complete the transaction as described above.
  • In FIG. 18A, the door 1820 is closed. When the door 1820 is closed, the lock 1825 is normally locked, preventing access to the vending space 1815. The lock 1825 may be a solenoid lock or any other suitable lock for locking the door 1820 and remotely controllable by the computer 1840. Similar to the cabinet store 1700, the computer 1840 unlocks the lock 1825 after validating a patron, who may be validated by having a valid credit card or a valid account with the minimum balance. The patron may be prompted with the screen 2000 to charge up the account if the current balance is insufficient.
  • Once the patron is validated, as described above with respect to the cabinet store 1700, the computer 1840 unlocks the lock 1825. The patron may open the door 1820, as seen in FIG. 18B. Similar to the cabinet store 1700, the transaction is pending while the door 1820 is open and the computer 1840 may display a screen similar to FIG. 9 or FIG. 11. The room 1810 defines the vending space 1815. The doorway 1855 forms a boundary of the vending space 1815, the only opening through which items such as the product 1860 can pass through. The RFID reader 1850 is configured such that its radio frequency curtain forms a curtain across the entire doorway 1855. The RFID reader 1850 is located adjacent the doorway 1855 and above the door 1820. In other implementations, the RFID reader 1850 may be located along other sides of the doorway 1855, or may comprise multiple RFID readers along the doorway 1855.
  • However, unlike the cabinet store 1700, the patron may enter the room 1810. Once the patron enters the room 1810, the door 1820 closes and the lock 1825 locks. The door 1820 may close automatically, such as through a spring or pneumatic or motorized mechanism which may also be controlled by the computer 1840. Closing and locking the door 1820 and the lock 1825 limits unauthorized access, in particular with respect to the patron's credit card or account. In certain implementations, additional security features, such as a turnstile or a camera, may further limit unauthorized access. For safety reasons, the lock 1825 is unlockable from inside the room 1810. A panel 1827, which may be on the inside of the door 1820 as in FIG. 18B, or on an inside wall of the room 1810, allows the patron to unlock the lock 1825. The panel 1827 may be another computer or tablet computer, similar to the computer 1840, which allows further system interaction to unlock the lock 1825. The door 1820 may be pushed from the inside to unlock the lock 1825, for instance if the walk-in store 1800 lost power.
  • Similar to the cabinet store 1700, the patron removes the product 1860, having the RFID tag 1865, from the shelf 1870 to purchase it. The shelf 1870 may be a smart shelf, as described above, capable of detecting when the product 1860 has been removed. After the patron removes all the desired items, the patron may re-open the door 1820 and exits through the doorway 1855. The RFID reader 1850 detects the items carried through the doorway 1855 and accordingly updates a checkout tally. When the door 1820 is closed, the lock 1825 automatically re-engages to lock the vending space 1815. The patron may then complete the transaction to purchase or allocate the items in the checkout tally on the computer 1840, which may display a screen similar to FIGS. 9 and 11. The patron may be presented with the screen 2000 if the account has insufficient balance for the transaction. Similar to the computer 1740, the computer 1840 may automatically close or cancel the transaction, activate security measures when needed, and update the database accordingly.
  • FIG. 19 presents a simplified flowchart 1900 of a POS software logic that may be used by the computer 1740 or the computer 1840. At 1910, the transaction begins. For instance, the patron may approach the computer 1740 or 1840. At 1920, the computer checks for a valid credit card. If a valid credit card was presented, the computer unlocks the door, such as the door 1720 or 1820, at 1950.
  • If no valid credit card was presented, at 1930 the computer checks for a valid account. For example, the patron may input a member ID or swipe a member card and provide a password and/or PIN. The computer may allow the patron several tries for a valid account. If the account was not valid, then at 1940 the patron may have the option to create a new account. Alternatively, if the patron does not create a new account or fails to otherwise be validated, the transaction will end.
  • At 1950, the lock, such as the lock 1725 or 1825, on the door is unlocked after the patron is validated. At 1960, an RFID reader, such as the RFID reader 1750 or 1850, detects items passing through the doorway, such as the doorway 1755 or 1855. Then, at 1970, the transaction is completed based on the items detected at 1960. The payment comes from the previously used validation, which may be a credit card or an account balance.
  • The previous description of the disclosed examples is provided to enable any person of ordinary skill in the art to make or use the disclosed methods and apparatus. Various modifications to these examples will be readily apparent to those skilled in the art, and the principles defined herein may be applied to other examples without departing from the spirit or scope of the disclosed method and apparatus. The described implementations are to be considered in all respects only as illustrative and not restrictive and the scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims (20)

What is claimed is:
1. An unattended checkout system comprising:
a cabinet having a doorway and defining a vending space within the cabinet;
a door having a lock and attached to the cabinet, the door configured to close over the doorway to cover the vending space;
at least one product configured for placement in the vending space;
a radio frequency identification (RFID) tag attached to the at least one product;
an RFID reader adjacent the door and configured to read a product data from the RFID tag and detect if the at least one product passed through the doorway;
a self-checkout apparatus having an authentication mechanism that unlocks the lock when a valid payment is detected and a purchasing mechanism that accepts the valid payment for the at least one product after the RFID reader detects that the at least one product passed from the vending space and through the doorway; and
a database coupled to the self-checkout apparatus and storing an inventory of items located in the vending space, the items including the at least one product;
wherein each of the items has a different identification code and corresponds to a unique database record within the database, the database receives the product data from the RFID reader and updates the database record for the at least one product.
2. The unattended checkout system of claim 1, wherein the cabinet comprises a refrigerator.
3. The unattended checkout system of claim 1, wherein the lock is configured to be automatically locked when the door is closed over the doorway.
4. The unattended checkout system of claim 1, wherein the self-checkout apparatus is located on an exterior wall of the cabinet.
5. The unattended checkout system of claim 1, wherein the valid payment comprises a valid credit card.
6. The unattended checkout system of claim 1, wherein the valid payment comprises a valid account.
7. The unattended checkout system of claim 1, wherein the purchasing mechanism comprises a mobile device paired to the self-checkout apparatus.
8. An unattended checkout system comprising:
a room having a doorway and defining a vending space within the room;
a door having a lock and attached to the room, the door configured to close over the doorway to cover the vending space;
at least one product configured for placement in the vending space;
a radio frequency identification (RFID) tag attached to the at least one product;
an RFID reader adjacent the door and configured to read a product data from the RFID tag and detect if the at least one product passed through the doorway;
a self-checkout apparatus having an authentication mechanism that unlocks the lock when a valid payment is detected and a purchasing mechanism that accepts the valid payment for the at least one product after the RFID reader detects that the at least one product passed from the vending space and through the doorway; and
a database coupled to the self-checkout apparatus and storing an inventory of items located in the vending space, the items including the at least one product;
wherein each of the items has a different identification code and corresponds to a unique database record within the database, the database receives the product data from the RFID reader and updates the database record for the at least one product.
9. The unattended checkout system of claim 8, wherein at least one wall of the room is substantially transparent.
10. The unattended checkout system of claim 8, wherein the lock is configured to be automatically locked when the door is closed over the doorway.
11. The unattended checkout system of claim 8, wherein the lock is configured to be unlockable from the vending space such that the door can be opened from the vending space.
12. The unattended checkout system of claim 8, wherein the self-checkout apparatus is located on an exterior wall of the room.
13. The unattended checkout system of claim 8, wherein the valid payment comprises a valid credit card or a valid account.
14. The unattended checkout system of claim 8, wherein the purchasing mechanism comprises a mobile device paired to the self-checkout apparatus.
15. A method for purchasing products comprising:
receiving a transaction request on a self-checkout apparatus;
validating a payment request;
automatically unlocking a lock of a door to an enclosed vending space when the payment request is valid, the enclosed vending space housing a product having a radio frequency identification (RFID) tag;
detecting, using an RFID reader adjacent to the door, the product leaving the enclosed vending space;
accepting the payment request for the product.
16. The method of claim 15, wherein the enclosed vending space is defined by a refrigerator.
17. The method of claim 15, wherein the enclosed vending space is defined by a room.
18. The method of claim 15, wherein the lock is configured to be automatically locked when the door is closed over the doorway.
19. The method of claim 15, wherein the valid payment comprises a valid credit card or a valid account.
20. The method of claim 15, further comprising automatically accepting the payment request for the product after a predetermined amount of time.
US13/963,896 2005-04-07 2013-08-09 Secure self-checkout station Expired - Fee Related US9715672B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/963,896 US9715672B2 (en) 2005-04-07 2013-08-09 Secure self-checkout station
US15/617,957 US9864971B2 (en) 2005-04-07 2017-06-08 Secure self-checkout station
US15/863,652 US20180174096A1 (en) 2005-04-07 2018-01-05 Secure self-checkout station

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US66918305P 2005-04-07 2005-04-07
PCT/US2005/047149 WO2006110189A1 (en) 2005-04-07 2005-12-27 Self checkout kiosk and retail security system
US91043608A 2008-06-13 2008-06-13
US13/488,202 US8328096B2 (en) 2005-04-07 2012-06-04 Self checkout kiosk and retail security system
US13/683,983 US8818885B2 (en) 2005-04-07 2012-11-21 Self checkout kiosk and retail security system
US13/963,896 US9715672B2 (en) 2005-04-07 2013-08-09 Secure self-checkout station

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/683,983 Continuation-In-Part US8818885B2 (en) 2005-04-07 2012-11-21 Self checkout kiosk and retail security system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/617,957 Continuation US9864971B2 (en) 2005-04-07 2017-06-08 Secure self-checkout station

Publications (3)

Publication Number Publication Date
US20150041535A1 US20150041535A1 (en) 2015-02-12
US20170169386A9 true US20170169386A9 (en) 2017-06-15
US9715672B2 US9715672B2 (en) 2017-07-25

Family

ID=37087331

Family Applications (7)

Application Number Title Priority Date Filing Date
US11/910,436 Active 2027-07-23 US8191780B2 (en) 2005-04-07 2005-12-27 Self checkout kiosk and retail security system
US13/488,202 Active US8328096B2 (en) 2005-04-07 2012-06-04 Self checkout kiosk and retail security system
US13/683,983 Expired - Fee Related US8818885B2 (en) 2005-04-07 2012-11-21 Self checkout kiosk and retail security system
US13/685,497 Expired - Fee Related US8469269B2 (en) 2005-04-07 2012-11-26 Self checkout kiosk and retail security system
US13/963,896 Expired - Fee Related US9715672B2 (en) 2005-04-07 2013-08-09 Secure self-checkout station
US15/617,957 Expired - Fee Related US9864971B2 (en) 2005-04-07 2017-06-08 Secure self-checkout station
US15/863,652 Abandoned US20180174096A1 (en) 2005-04-07 2018-01-05 Secure self-checkout station

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US11/910,436 Active 2027-07-23 US8191780B2 (en) 2005-04-07 2005-12-27 Self checkout kiosk and retail security system
US13/488,202 Active US8328096B2 (en) 2005-04-07 2012-06-04 Self checkout kiosk and retail security system
US13/683,983 Expired - Fee Related US8818885B2 (en) 2005-04-07 2012-11-21 Self checkout kiosk and retail security system
US13/685,497 Expired - Fee Related US8469269B2 (en) 2005-04-07 2012-11-26 Self checkout kiosk and retail security system

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/617,957 Expired - Fee Related US9864971B2 (en) 2005-04-07 2017-06-08 Secure self-checkout station
US15/863,652 Abandoned US20180174096A1 (en) 2005-04-07 2018-01-05 Secure self-checkout station

Country Status (7)

Country Link
US (7) US8191780B2 (en)
EP (1) EP1869616A4 (en)
JP (1) JP4542186B2 (en)
AU (1) AU2005330521B2 (en)
CA (1) CA2603639C (en)
NZ (1) NZ562245A (en)
WO (1) WO2006110189A1 (en)

Families Citing this family (96)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8191780B2 (en) * 2005-04-07 2012-06-05 Freedom Shopping, Inc. Self checkout kiosk and retail security system
US20080186184A1 (en) * 2005-09-28 2008-08-07 Visible Assets Inc. Networked security tags for portable devices
US7559467B2 (en) 2005-11-09 2009-07-14 Ncr Corporation Item checkout apparatus including integrated complimentary antennas
US20080211671A1 (en) * 2007-01-11 2008-09-04 Dagosi, Llc Smart rfid checkout kiosk
US20110288938A1 (en) * 2007-03-02 2011-11-24 Store Kraft Interactive display system
US9092951B2 (en) * 2008-10-01 2015-07-28 Ncr Corporation Surveillance camera assembly for a checkout system
DE102009003988B4 (en) * 2009-01-07 2018-02-01 Wincor Nixdorf International Gmbh Apparatus and method for detecting goods at a self-service checkout system
US9922167B2 (en) * 2009-11-20 2018-03-20 Versus Technology, Inc. Context-aware method and system for facilitating the delivery of healthcare to patients within a clinical environment monitored by real-time locating apparatus
US10977965B2 (en) 2010-01-29 2021-04-13 Avery Dennison Retail Information Services, Llc Smart sign box using electronic interactions
EP2529366B1 (en) 2010-01-29 2016-11-09 Avery Dennison Corporation Smart sign box using electronic interactions
US10430871B2 (en) * 2010-05-21 2019-10-01 Ncr Corporation Self-service terminal
FR2966954B1 (en) 2010-11-02 2018-06-08 Ier DEVICE AND METHOD FOR AUTOMATEDLY READING / WRITING RFID LABELS.
ES2381724B1 (en) * 2010-11-05 2013-02-05 Novosoft Sistemas Informáticos S.L. AUTOMATIC COLLECTION CASE.
US8381979B2 (en) 2011-01-31 2013-02-26 Metrologic Instruments, Inc. Bar code symbol reading system employing EAS-enabling faceplate bezel
AU2012236870A1 (en) * 2011-03-25 2013-05-02 Visa International Service Association In-person one-tap purchasing apparatuses, methods and systems
US20120323621A1 (en) * 2011-06-17 2012-12-20 International Business Machines Corporation Assisting Customers At A Self-Checkout Terminal
CN104025556B (en) 2011-09-01 2018-08-10 艾利丹尼森公司 Equipment, system and method for consumer's tracking
US8630908B2 (en) * 2011-11-02 2014-01-14 Avery Dennison Corporation Distributed point of sale, electronic article surveillance, and product information system, apparatus and method
US9854925B2 (en) * 2011-12-19 2018-01-02 Machinery Verification & Documentation Service Inc. Home baking kit with computer interface
WO2013126391A1 (en) * 2012-02-22 2013-08-29 Bar Code Specialties, Inc. (Dba Bcs Solutions) Overhead antenna live inventory locating system
US20130297461A1 (en) * 2012-05-02 2013-11-07 Nulogy Corporation Method, system and apparatus for integrating order management and warehouse management
US9367865B2 (en) 2012-07-03 2016-06-14 Adam Phillip TREISER System and method for providing consumers with access to an article while preventing theft thereof
JP5612645B2 (en) * 2012-09-06 2014-10-22 東芝テック株式会社 Information processing apparatus and program
US9734365B2 (en) 2012-09-10 2017-08-15 Avery Dennison Retail Information Services, Llc Method for preventing unauthorized diversion of NFC tags
US9830632B2 (en) 2012-10-10 2017-11-28 Ebay Inc. System and methods for personalization and enhancement of a marketplace
US10540527B2 (en) 2012-10-18 2020-01-21 Avery Dennison Retail Information Services Llc Method, system and apparatus for NFC security
EP2795950B1 (en) 2012-11-19 2018-09-05 Avery Dennison Corporation Nfc security system and method for disabling unauthorized tags
EP2930661A4 (en) * 2012-12-04 2016-07-20 Nec Corp Product promotion system and non-transitory computer-readable medium in which program therefor is stored
WO2014087559A1 (en) * 2012-12-04 2014-06-12 日本電気株式会社 Marketing data collection system and non-temporary computer-readable medium to which program therefor is stored
US9892289B2 (en) * 2012-12-07 2018-02-13 Hand Held Products, Inc. Reading RFID tags in defined spatial locations
US10638198B2 (en) 2013-03-15 2020-04-28 Ebay Inc. Shoppable video
US20140365341A1 (en) * 2013-06-05 2014-12-11 Ebay Inc. Store of the future
US10192208B1 (en) * 2013-07-08 2019-01-29 Ecr Software Corporation Systems and methods for an improved self-checkout with loss prevention options
US20150161712A1 (en) * 2013-12-10 2015-06-11 12 Retail (HK) Limited Unifying shopping experience system
US20150173478A1 (en) 2013-12-19 2015-06-25 The Procter & Gamble Company Methods for Shaping Fibrous Material and Treatment Compositions Therefor
US9877559B2 (en) 2013-12-19 2018-01-30 The Procter & Gamble Comany Methods for shaping fibrous material and treatment compositions therefor
US20150174793A1 (en) 2013-12-19 2015-06-25 The Procter & Gamble Company Methods for Shaping Fibrous Material and Treatment Compositions Therefor
US9918921B2 (en) 2013-12-19 2018-03-20 The Procter & Gamble Company Methods for shaping fibrous material and treatment compositions therefor
US20150174432A1 (en) 2013-12-19 2015-06-25 The Procter & Gamble Company Methods for Shaping Fibrous Material and Treatment Compositions Therefor
US10423998B2 (en) * 2014-01-31 2019-09-24 Paypal, Inc. Product information system
WO2015121833A1 (en) * 2014-02-14 2015-08-20 Visa International Service Association Security tag deactivation
WO2015133051A1 (en) * 2014-03-07 2015-09-11 日本電気株式会社 Article management system
USD748196S1 (en) 2014-08-27 2016-01-26 Outerwall Inc. Consumer operated kiosk for sampling products
CN105407071A (en) 2014-08-29 2016-03-16 阿里巴巴集团控股有限公司 Information displaying method, client, server, and system
WO2016033033A1 (en) * 2014-08-29 2016-03-03 Alibaba Group Holding Limited Method and system for presenting information
US9675989B2 (en) 2014-09-08 2017-06-13 The Procter & Gamble Company Structure modifying apparatus
US9751070B2 (en) 2014-09-08 2017-09-05 The Procter & Gamble Company Structure modifying apparatus
US10849442B2 (en) * 2014-10-24 2020-12-01 Leer, Inc. Ice merchandiser with sensing capabilities
US20170011606A1 (en) * 2015-07-07 2017-01-12 Stefano Ceccon Systems, Devices, and/or Methods for Managing Transactions
WO2017075042A1 (en) * 2015-10-26 2017-05-04 Withme Nevada, Inc. Walk-through chekout system
ES2574354B1 (en) * 2015-12-18 2017-03-23 Buy Yourself, S.L. System and procedure to automatically decouple a security device associated with a product.
DE102015226198A1 (en) * 2015-12-21 2017-06-22 Robert Bosch Gmbh Electronic authorization device
CN107491908B (en) * 2016-06-13 2022-11-04 阿里巴巴集团控股有限公司 Cargo monitoring method, equipment and system
WO2018013046A1 (en) * 2016-07-11 2018-01-18 Itab Shop Products Ab Self-checkout system
SG10201609114YA (en) * 2016-11-01 2018-06-28 Mastercard International Inc Apparatus and method for self-checkout and payment
JP2018120367A (en) * 2017-01-24 2018-08-02 パナソニックIpマネジメント株式会社 Shopping support system
US11157886B2 (en) 2017-02-03 2021-10-26 Viatouch Media Inc. Cantilevered weight sensitive shelf, rail, and mounting system
US20200019949A1 (en) * 2017-03-06 2020-01-16 Freedom Shopping, Inc. Automatic checkout system
US10445779B2 (en) * 2017-04-26 2019-10-15 International Business Machines Corporation Boundary-specific electronic offers
US10650365B2 (en) * 2017-06-02 2020-05-12 Visa International Service Association Automated point of sale system
CN111951501A (en) * 2017-06-23 2020-11-17 创新先进技术有限公司 Settlement method and device
KR101858530B1 (en) * 2017-07-14 2018-05-17 주식회사 코리아세븐 Unattended store system, method for controlling the system, computer program for executing the method, and unattended payment device
CN207233023U (en) * 2017-10-16 2018-04-13 广东顺德哈士奇冰箱制造有限公司 A kind of new automatic vending machine
JP2019091188A (en) * 2017-11-14 2019-06-13 東芝テック株式会社 Checkout system
US11783647B2 (en) 2017-12-21 2023-10-10 Skeleton Key Systems, LLC System and method for securing, releasing, and managing inventory
JP7026323B2 (en) * 2018-01-09 2022-02-28 パナソニックIpマネジメント株式会社 Wireless reading system and shopping support system equipped with it
WO2019152587A1 (en) * 2018-02-01 2019-08-08 Halo Maritime Defense Systems, Inc. Presence-based automatic gate operation for marine barriers and gate systems
WO2019213418A1 (en) * 2018-05-02 2019-11-07 Walmart Apollo, Llc Systems and methods for transactions at a shopping cart
US11030441B2 (en) 2018-05-25 2021-06-08 International Business Machines Corporation Customer tracking and inventory management in a smart store
WO2020006553A1 (en) 2018-06-29 2020-01-02 Ghost House Technology, Llc System, apparatus and method of item location, list creation, routing, imaging and detection
CN109165884A (en) * 2018-07-11 2019-01-08 安徽云图信息技术有限公司 A kind of warehouse management system based on mobile terminal
CN110866429B (en) 2018-08-28 2024-03-08 阿里巴巴集团控股有限公司 Missing scanning identification method, device, self-service cashing terminal and system
WO2020072537A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) * 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
CN109508990A (en) 2018-10-10 2019-03-22 阿里巴巴集团控股有限公司 Payment processing method, device and self-checkout equipment
US10891586B1 (en) 2018-11-23 2021-01-12 Smart Supervision System LLC Systems and methods of detecting, identifying and classifying objects positioned on a surface
CN109615038A (en) 2018-11-30 2019-04-12 阿里巴巴集团控股有限公司 Information processing method and device
US11880877B2 (en) 2018-12-07 2024-01-23 Ghost House Technology, Llc System for imaging and detection
CN113631067A (en) * 2018-12-07 2021-11-09 鬼屋技术有限责任公司 System, apparatus and method for item location, inventory creation, routing, imaging and detection
CN110009324A (en) * 2019-02-01 2019-07-12 阿里巴巴集团控股有限公司 Self-help settlement methods, devices and systems under a kind of line
WO2020171773A1 (en) * 2019-02-21 2020-08-27 Olam International Limited Method and system for product tracking
US11558539B2 (en) 2019-03-13 2023-01-17 Smart Supervision System LLC Systems and methods of detecting and identifying an object
GB2600577A (en) * 2019-07-26 2022-05-04 Indyme Solutions Llc System providing self-service access to locked merchandise
US10964176B2 (en) * 2019-08-08 2021-03-30 Toshiba Tec Kabushiki Kaisha Security apparatus in a shopping environment, and a method thereof
US11354966B2 (en) 2019-09-03 2022-06-07 Pepsico, Inc. Handles and displays for product vending system
JP7372099B2 (en) * 2019-09-24 2023-10-31 東芝テック株式会社 Information processing device, information processing system, information processing method, and information processing program
US20210133715A1 (en) * 2019-10-30 2021-05-06 Toshiba Global Commerce Solutions Holdings Corporation Real-Time Bio-Metric / Environmental Capture and Timed Rematch
EP3839859A1 (en) * 2019-12-17 2021-06-23 Wincor Nixdorf International GmbH Self-service registration terminal, method and control device
US11044279B1 (en) 2019-12-19 2021-06-22 Capital One Services, Llc Systems and methods for secure browser session transfer
US11651664B2 (en) 2020-02-10 2023-05-16 Nec Corporation Neural network classifier trained for purchasing differentiation
US11314955B2 (en) 2020-04-14 2022-04-26 Iorush Optimized RFID system having chip-based novel SRAP and DSRAP processes and chip-less frequency-time coded tags for inventory management
US11829990B2 (en) 2020-09-11 2023-11-28 Sensormatic Electronics, LLC Method and system for self-checkout in a retail environment
US11861997B2 (en) * 2020-10-19 2024-01-02 Toshiba Global Commerce Solutions Holdings Corporation Theft detection system
US11288652B1 (en) * 2020-10-30 2022-03-29 Toshiba Global Commerce Solutions Holdings Corporation Radio-frequency-identification-based checkout process
WO2023180887A1 (en) * 2022-03-23 2023-09-28 Frescofrigo S.R.L. Product dispenser and method of distributing products using a product dispensing device
JP2024031000A (en) * 2022-08-25 2024-03-07 東芝テック株式会社 Accounting devices and programs

Family Cites Families (126)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5238968A (en) 1991-04-24 1993-08-24 Mitsui Toatsu Chemicals, Inc. Process for preparing a degradable high polymer network
US5500650A (en) 1992-12-15 1996-03-19 Micron Technology, Inc. Data communication method using identification protocol
US5539775A (en) 1993-03-17 1996-07-23 Micron Technology, Inc. Modulated spread spectrum in RF identification systems method
JPH08221661A (en) * 1995-02-15 1996-08-30 Tec Corp Commodity sale registration data processor
EP0811958A3 (en) * 1996-06-05 2004-09-29 NCR International, Inc. Self-service checkout apparatus and methods
US7107221B1 (en) * 1996-09-05 2006-09-12 Symbol Technologies, Inc. Method and system for presenting item information using a portable data terminal
US7040541B2 (en) * 1996-09-05 2006-05-09 Symbol Technologies, Inc. Portable shopping and order fulfillment system
US6837436B2 (en) * 1996-09-05 2005-01-04 Symbol Technologies, Inc. Consumer interactive shopping system
US5745036A (en) 1996-09-12 1998-04-28 Checkpoint Systems, Inc. Electronic article security system for store which uses intelligent security tags and transaction data
JP3457816B2 (en) * 1996-11-27 2003-10-20 東芝テック株式会社 Commodity sales data registration processing device having data rewriting function of non-contact communication type storage medium
US5963134A (en) 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
US6025780A (en) 1997-07-25 2000-02-15 Checkpoint Systems, Inc. RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system
US6118789A (en) 1998-02-19 2000-09-12 Micron Technology, Inc. Method of addressing messages and communications system
GB9725577D0 (en) * 1997-12-04 1998-02-04 Int Computers Ltd Retail security system
US6459726B1 (en) 1998-04-24 2002-10-01 Micron Technology, Inc. Backscatter interrogators, communication systems and backscatter communication methods
US6101483A (en) * 1998-05-29 2000-08-08 Symbol Technologies, Inc. Personal shopping system portable terminal
US6147604A (en) 1998-10-15 2000-11-14 Intermec Ip Corporation Wireless memory device
US6179206B1 (en) * 1998-12-07 2001-01-30 Fujitsu Limited Electronic shopping system having self-scanning price check and purchasing terminal
US7416117B1 (en) * 1998-12-21 2008-08-26 Ncr Corporation Method and apparatus for determining if a user walks away from a self-service checkout terminal during operation thereof
US6651053B1 (en) 1999-02-01 2003-11-18 Barpoint.Com, Inc. Interactive system for investigating products on a network
US6169483B1 (en) 1999-05-04 2001-01-02 Sensormatic Electronics Corporation Self-checkout/self-check-in RFID and electronics article surveillance system
AU5732600A (en) 1999-06-11 2001-01-02 Creative Golf Designs, Inc. Inventory control system
US6598790B1 (en) 1999-06-22 2003-07-29 Douglas B. Horst Self-service checkout
US20050027611A1 (en) 1999-08-26 2005-02-03 Wharton Brian K. Electronic commerce systems and methods providing multiple-vendor searches
JP2001076261A (en) 1999-08-31 2001-03-23 Hitachi Ltd Self-registering system
JP2001103453A (en) * 1999-09-30 2001-04-13 Toshiba Lighting & Technology Corp Monitoring camera system and controller for the monitoring camera system
DE10055602A1 (en) 1999-12-30 2001-07-12 Ibm Exit control system for supermarket or department store, produces receipt based on contactlessly received information and updates payment status
US20070124216A1 (en) 2000-03-07 2007-05-31 Michael Lucas Systems and methods for locating and purchasing proximal inventory items
BR0110648A (en) 2000-05-08 2003-04-01 Checkpoint Systems Inc Radio Frequency Detection and Identification System
JP2001325647A (en) * 2000-05-16 2001-11-22 Taisei Corp Unmanned settlement system
US7580378B2 (en) 2000-06-06 2009-08-25 Alien Technology Corporation Distance/ranging determination using relative phase data
US6868073B1 (en) 2000-06-06 2005-03-15 Battelle Memorial Institute K1-53 Distance/ranging by determination of RF phase delta
US6294998B1 (en) 2000-06-09 2001-09-25 Intermec Ip Corp. Mask construction for profile correction on an RFID smart label to improve print quality and eliminate detection
US6750771B1 (en) * 2000-08-10 2004-06-15 Savi Technology, Inc. Antenna system and method for reading low frequency tags
US6486783B1 (en) 2000-09-19 2002-11-26 Moore North America, Inc. RFID composite for mounting on or adjacent metal objects
JP2002117459A (en) * 2000-10-06 2002-04-19 Oki Electric Ind Co Ltd Cashless sales system
US6696954B2 (en) * 2000-10-16 2004-02-24 Amerasia International Technology, Inc. Antenna array for smart RFID tags
US6883710B2 (en) 2000-10-11 2005-04-26 Amerasia International Technology, Inc. Article tracking system and method
US6648232B1 (en) 2000-10-24 2003-11-18 Moore North America, Inc. High temperature tag having enclosed transceiver
US7185809B2 (en) 2001-01-12 2007-03-06 Wm. Wrigley Jr. Company RF point of purchase apparatus and method of using same
US6598791B2 (en) * 2001-01-19 2003-07-29 Psc Scanning, Inc. Self-checkout system and method including item buffer for item security verification
US7328170B2 (en) 2001-02-02 2008-02-05 Optimal Robotics Corporation Multi-device supervisor support for self-checkout systems
US7108183B1 (en) 2001-02-12 2006-09-19 Cox Jr David W Verification system for the purchase of a retail item and method of using same
US6497362B2 (en) * 2001-02-15 2002-12-24 New Check Corporation Method and apparatus for wireless assistance for self-service checkout
JP3941402B2 (en) * 2001-02-20 2007-07-04 カシオ計算機株式会社 Product sales system and program
US6554187B2 (en) 2001-03-23 2003-04-29 Ncr Corporation Method of detecting and managing RFID labels on items brought into a store by a customer
US6557760B2 (en) 2001-03-30 2003-05-06 Ncr Corporation System and method of managing expired products
US6547040B2 (en) 2001-04-02 2003-04-15 Ncr Corporation Self-service checkout system with RFID capability
US6703935B1 (en) * 2001-05-14 2004-03-09 Amerasia International Technology, Inc. Antenna arrangement for RFID smart tags
US6507279B2 (en) 2001-06-06 2003-01-14 Sensormatic Electronics Corporation Complete integrated self-checkout system and method
US6994252B2 (en) 2001-11-05 2006-02-07 Frich Mark R Combination library patron-supervisor self check-in/out workstation
US6825766B2 (en) * 2001-12-21 2004-11-30 Genei Industries, Inc. Industrial data capture system including a choke point portal and tracking software for radio frequency identification of cargo
US7034679B2 (en) * 2001-12-31 2006-04-25 Ncr Corporation System and method for enhancing security at a self-checkout station
US6681989B2 (en) 2002-01-15 2004-01-27 International Business Machines Corporation Inventory control and point-of-sale system and method
JP2003272072A (en) * 2002-03-13 2003-09-26 Mitsubishi Electric Corp Mobile theft reporting device
JP2003317158A (en) * 2002-04-19 2003-11-07 Ishida Co Ltd Shoplifting prevention system
JP2004024724A (en) 2002-06-28 2004-01-29 Biopol Co Ltd Micro-porous foam dressing material with multilayer structure, and production method therefor
US6937153B2 (en) 2002-06-28 2005-08-30 Appleton Papers Inc. Thermal imaging paper laminate
US6975229B2 (en) 2002-08-09 2005-12-13 Battelle Memorial Institute K1-53 System and method for acquisition management of subject position information
US7113088B2 (en) 2002-08-30 2006-09-26 Sap Ag RFID activated information kiosk
US20040143505A1 (en) 2002-10-16 2004-07-22 Aram Kovach Method for tracking and disposition of articles
US20040103034A1 (en) 2002-11-21 2004-05-27 Kimberly-Clark Worldwide, Inc. RFID system and method for purchase item accountability
US20040220860A1 (en) * 2002-12-20 2004-11-04 Michael Persky Self-checkout system having integrated RFID reader
US6940408B2 (en) 2002-12-31 2005-09-06 Avery Dennison Corporation RFID device and method of forming
JP4095467B2 (en) * 2003-02-26 2008-06-04 東芝テック株式会社 Wireless tag reader
US7652636B2 (en) 2003-04-10 2010-01-26 Avery Dennison Corporation RFID devices having self-compensating antennas and conductive shields
DE10323691A1 (en) 2003-05-22 2004-12-23 Wincor Nixdorf International Gmbh Self-service checkout
US6829520B1 (en) * 2003-06-03 2004-12-07 The Boeing Company Time-and-temperature sensitive material tracking
US7672872B2 (en) 2003-08-22 2010-03-02 Smurfit-Stone Container Enterprises, Inc. Point-of-purchase display with RFID inventory control
US20050049914A1 (en) 2003-08-25 2005-03-03 Parish David H. Systems and methods for a retail system
US7012528B2 (en) 2003-09-19 2006-03-14 International Business Machines Corporation Using radio frequency identification with transaction-specific correlator values written on transaction receipts to detect and/or prevent theft and shoplifting
US7005988B2 (en) 2003-09-19 2006-02-28 International Business Machines Corporation Using radio frequency identification to detect and/or prevent theft and shoplifting
US6989749B2 (en) * 2003-11-21 2006-01-24 The United States Of America As Represented By The Secretary Of The Navy Electronic check out system
US7259678B2 (en) 2003-12-08 2007-08-21 3M Innovative Properties Company Durable radio frequency identification label and methods of manufacturing the same
JP4370896B2 (en) 2003-12-12 2009-11-25 セイコーエプソン株式会社 Image protective film and method for producing recorded matter using the same
JP2005210676A (en) 2003-12-25 2005-08-04 Hitachi Ltd Wireless ic tag, and method and apparatus for manufacturing the same
TW200540216A (en) 2004-01-16 2005-12-16 Otsuka Chemical Co Ltd Flame retardant agent and flame retardant resin composition
US20050173527A1 (en) 2004-02-11 2005-08-11 International Business Machines Corporation Product checkout system with anti-theft device
JP3871215B2 (en) 2004-03-29 2007-01-24 高千穂交易株式会社 Information processing apparatus and computer program
JP2005301637A (en) 2004-04-12 2005-10-27 Hitachi Ltd Merchandise management system and merchandise management method
WO2005104739A2 (en) 2004-04-28 2005-11-10 Precision Dynamics Corporation Rfid reader/writer device
US7466232B2 (en) 2004-05-05 2008-12-16 Trenstar Tracking Solutions, Inc. Radio frequency identification asset management system and method
US7325734B2 (en) * 2004-05-13 2008-02-05 Cisco Technology, Inc. Methods and devices for assigning RFID device personality
US7617128B2 (en) * 2004-06-15 2009-11-10 Revolutionary E-Commerce Systems, Inc. Online transaction hosting apparatus and system
US20070008138A1 (en) 2004-07-20 2007-01-11 Precision Dynamics Corporation Coordinated identification of persons and/or articles via radio frequency identification cross-identification
US7380711B2 (en) 2004-07-23 2008-06-03 Checkpoint Systems, Inc. Self-check system and method for protecting digital media
US7150395B1 (en) 2004-09-17 2006-12-19 Ncr Corporation Method of identifying items for checkout
US7156303B1 (en) 2004-09-23 2007-01-02 Ncr Corporation Shopping system and method
US7123146B1 (en) 2004-09-23 2006-10-17 Ncr Corporation Security method for theft prone areas of a retail store
US7221269B2 (en) * 2004-10-29 2007-05-22 Kimberly-Clark Worldwide, Inc. Self-adjusting portals with movable data tag readers for improved reading of data tags
US7170415B2 (en) 2004-12-01 2007-01-30 Avery Dennison Corporation RFID tags with modifiable operating parameters
US20060122934A1 (en) 2004-12-07 2006-06-08 Ncr Corporation Radio frequency identification (RFID) system
US7504998B2 (en) 2004-12-08 2009-03-17 Electronics And Telecommunications Research Institute PIFA and RFID tag using the same
TWI255510B (en) * 2004-12-21 2006-05-21 Ind Tech Res Inst Method of forming ultra thin oxide layer by ozonated water
US7229015B2 (en) 2004-12-28 2007-06-12 International Business Machines Corporation Self-checkout system
US7591422B2 (en) 2005-02-10 2009-09-22 Sensormatic Electronic Corporation Techniques to reduce false alarms, invalid security deactivation, and internal theft
US20060231611A1 (en) 2005-03-23 2006-10-19 Chakiris Phil M Radio frequency identification purchase transactions
US8191780B2 (en) 2005-04-07 2012-06-05 Freedom Shopping, Inc. Self checkout kiosk and retail security system
CN1855156A (en) 2005-04-19 2006-11-01 国际商业机器公司 Method for self checkout
US7301458B2 (en) 2005-05-11 2007-11-27 Alien Technology Corporation Method and apparatus for testing RFID devices
US7315248B2 (en) 2005-05-13 2008-01-01 3M Innovative Properties Company Radio frequency identification tags for use on metal or other conductive objects
JP4736529B2 (en) 2005-05-13 2011-07-27 オムロン株式会社 Imaging control apparatus, imaging control method, control program, recording medium recording control program, imaging control system, and information processing system
WO2006135779A2 (en) 2005-06-10 2006-12-21 American Express Travel Related Services Company, Inc. System and method for mass transit merchant payment
US20060289637A1 (en) 2005-06-28 2006-12-28 Media Cart Holdings, Inc. Media enabled shopping cart system with basket inventory
ITPN20050044A1 (en) * 2005-07-07 2007-01-08 Electrolux Professional Spa "METHOD FOR MONITORING THE PASSAGE OF OBJECTS THROUGH A VERSION OF ENTRY-EXIT OF A DELIMITED SPACE AND EQUIPMENT TO REALIZE THIS METHOD"
US7694878B2 (en) 2005-08-11 2010-04-13 International Business Machines Corporation RFID checkout system with tags
US20070114279A1 (en) 2005-09-01 2007-05-24 Pieter Lessing System and method for capturing and storing rfid/serialized item tracking information in a relational database system
US20070061210A1 (en) 2005-09-09 2007-03-15 Li Chen Methods for reducing retail out-of-stocks using store-level RFID data
US7450007B2 (en) 2005-10-03 2008-11-11 Chep Technology Pty Limited RFID asset identification systems
US7559467B2 (en) 2005-11-09 2009-07-14 Ncr Corporation Item checkout apparatus including integrated complimentary antennas
US7388504B2 (en) 2005-12-02 2008-06-17 Brady Worldwide, Inc. RFID standoff label and method of use
CN101385202A (en) 2005-12-14 2009-03-11 堪萨斯州立大学 Microstrip antenna for rfid device
US20080131133A1 (en) 2006-05-17 2008-06-05 Blunt Shannon D Low sinr backscatter communications system and method
JP4860375B2 (en) 2006-06-30 2012-01-25 富士通株式会社 RFID tag
JP2008022161A (en) 2006-07-11 2008-01-31 Canon Inc Printer, print method, and program
US7487913B2 (en) 2006-07-12 2009-02-10 International Business Machines Corporation Method and system for reducing waste due to product spoilage within a grocery environment
US20080024305A1 (en) 2006-07-28 2008-01-31 Deavours Daniel D Planar microstrip antenna integrated into container
US20080058985A1 (en) * 2006-08-24 2008-03-06 Nicholas Alcov Vending distribution system
JP2008221661A (en) 2007-03-14 2008-09-25 Ricoh Co Ltd Liquid jet head, method for manufacturing liquid jet head, head cartridge, and image forming apparatus
DE102007013237A1 (en) * 2007-03-15 2008-09-18 Joint Analytical Systems Gmbh storage system
US8669844B2 (en) * 2010-09-23 2014-03-11 Blackberry Limited Radio frequency identification (RFID) system providing meeting room reservation and scheduling features and related methods
US8695872B2 (en) * 2010-10-04 2014-04-15 Zachary L. Braunstein Apparatus improving item transactions with real-time controls and navigation
US8880100B2 (en) * 2011-03-23 2014-11-04 Radium, Inc. Proximity based social networking
US8482413B2 (en) * 2011-09-09 2013-07-09 Coinstar, Inc. Access monitoring systems for use with consumer-operated kiosks and other enclosures
US20140180856A1 (en) * 2012-12-21 2014-06-26 Research In Motion Limited System providing wireless network access responsive to completed transaction payment and related methods
US9349238B2 (en) * 2013-03-13 2016-05-24 Pantry Retail, Inc. Vending kit and method

Also Published As

Publication number Publication date
AU2005330521A1 (en) 2006-10-19
US8818885B2 (en) 2014-08-26
US20130080279A1 (en) 2013-03-28
AU2005330521B2 (en) 2009-10-29
CA2603639A1 (en) 2006-10-19
US8469269B2 (en) 2013-06-25
US9715672B2 (en) 2017-07-25
CA2603639C (en) 2015-05-19
JP2008537825A (en) 2008-09-25
NZ562245A (en) 2011-01-28
WO2006110189A1 (en) 2006-10-19
JP4542186B2 (en) 2010-09-08
US20150041535A1 (en) 2015-02-12
EP1869616A4 (en) 2012-10-24
EP1869616A1 (en) 2007-12-26
US20180174096A1 (en) 2018-06-21
US20120241518A1 (en) 2012-09-27
US8191780B2 (en) 2012-06-05
US20080249883A1 (en) 2008-10-09
US20130080278A1 (en) 2013-03-28
US20170278060A1 (en) 2017-09-28
US8328096B2 (en) 2012-12-11
US9864971B2 (en) 2018-01-09

Similar Documents

Publication Publication Date Title
US9864971B2 (en) Secure self-checkout station
KR102001806B1 (en) Smart vending machine with product selection after opening door
JP2017521780A5 (en)
US20080211671A1 (en) Smart rfid checkout kiosk
US8181865B2 (en) Radio frequency identification point of sale unassisted retail transaction and digital media kiosk
JP6581751B1 (en) Payment processing system, payment processing apparatus, and payment processing method
WO2020011165A1 (en) Open-type self-service vending method based on buyer positioning, and system
US10402804B1 (en) Apparatus, system and method of obtaining items from a vending machine with an electronic benefits transfer card
CA2683986C (en) Radio frequency identification point of sale unassisted retail transaction and digital media kiosk
US6842115B1 (en) System and method for self-checkout of video media in a rental store
US9189812B2 (en) Kiosk and method for renting carpet cleaning machines
KR20230084765A (en) Self-Service Stand
TW202143134A (en) Unattended vending machine and vending method thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: FREEDOM SHOPPING, INC., NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DAILY, MIKE;SIMMONS, ROB;SIGNING DATES FROM 20130930 TO 20131101;REEL/FRAME:041934/0352

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: PATRICIA A. ANDERSON REVOCABLE TRUST, NORTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FREEDOM SHOPPING, INC.;REEL/FRAME:053220/0437

Effective date: 20200709

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210725