WO1987004282A1 - Systeme de controle pour inventaire - Google Patents

Systeme de controle pour inventaire Download PDF

Info

Publication number
WO1987004282A1
WO1987004282A1 PCT/AU1986/000384 AU8600384W WO8704282A1 WO 1987004282 A1 WO1987004282 A1 WO 1987004282A1 AU 8600384 W AU8600384 W AU 8600384W WO 8704282 A1 WO8704282 A1 WO 8704282A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
signal
tags
control system
alarm
Prior art date
Application number
PCT/AU1986/000384
Other languages
English (en)
Inventor
Michael John Yerbury
Gregory Charles Hurst
Original Assignee
Advanced Systems Research Pty. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced Systems Research Pty. Ltd. filed Critical Advanced Systems Research Pty. Ltd.
Publication of WO1987004282A1 publication Critical patent/WO1987004282A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2434Tag housing and attachment details
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS

Definitions

  • the present invention relates generally to an improvement to an inventory control system for use in locations such as retail outlets, warehouses and so on.
  • the invention provides a system which, in its preferred embodiment, can be used to identify individual objects, to allow an inventory of such objects to be maintained and to implement a multi-function security mechanism which reduces the risk of loss or theft of tagged objects.
  • tags are provided which cause an alarm to be set off in both situations i.e. when a tag is detached or tampered with inside the store (other than in the approved way at the point of sale) as well as when an intact tag is carried through the exit.
  • the tag is uniquely encoded such that information about the item (e.g. type of item, colour, shape, model) from which a tag was detached, as well as its approximate location, can be immediately made available to security personnel in the store when an alarm condition is triggered.
  • information about the item e.g. type of item, colour, shape, model
  • Bar-code tags for example, can be combined with optical readers to speed the recording of items of stock and to minimise the errors which occur when manual recording and subsequent transcription are used.
  • optical readers to speed the recording of items of stock and to minimise the errors which occur when manual recording and subsequent transcription are used.
  • the unique code assigned to each tag is used to identify goods for the purposes of stock taking.
  • the present invention consists in a security tag comprising attachment means, alarm sensor means associated with the attachment means to signal when the attachment means are disconnected from an article to which the tag was attached and transmitter means to generate a radiated signal in response to the alarm means signalling the disconnection of the attachment means from said goods.
  • the tags are provided with encoding means enabling identification of a tag which is transmitting an alarm signal.
  • Tags are also preferably provided with enabling and disabling means which are operated in the preferred embodiment by digitally encoded signals transmitted by an enabling transmitter.
  • the tags of the preferred embodiment will also include a receiver adapted to respond to a short range transmitted signal to cause the tag to transmit its identifying signal.
  • an inventory control system in which the tags of the present invention are used.
  • Fig. 1 schematically illustrates an embodiment of a tag according to the invention
  • Fig. 2 schematically illustrates an interrogator and control system of an inventory control system which makes, use of the tag of Fig. 1.
  • tags to be attached to the objects which are being controlled
  • interrogators to be attached to the objects which are being controlled
  • computer-based control system which operates the interrogators, maintains the inventory records and * indicates in any required fashion the signalling of an alarm when this becomes necessary.
  • the tags should be small (so that they can be inconspicuously and harmlessly attached) , they should be economically priced, they should have an operating life of several years (at least equal to the maximum expected residence time of any one item of stock in a given location) , they should be capable of receiving control signals from interrogators at control points or points of sale and they should be capable of transmitting radio frequency signals over ranges of several tens of metres.
  • the tags preferably are capable of implementing the following functions: i) Storing coded identification (ID) information which may be associated, via software in the control system, with the object to be tagged, ii) Repeatedly transmitting by radio the previously- stored ID code and an alarm signal, when the method of attachment of the tag to the object is interfered with, iii) Repeatedly transmitting by radio the previously-stored ID code and an alarm signal when the tag passes through the field of an interrogator at a control point, iv) Transmitting by radio the previously-stored ID code in response to an interrogating signal at the point of sale for the purpose of stock control. v) Enabling or disabling the functions in (ii) , (iii) and (iv) above in response to an appropriate interrogating signal at the point of sale.
  • ID coded identification
  • the interrogators preferably will be capable of transmitting radio signals to the tags, receiving a number of radio frequency signals and interacting with the control system to perform the variety of required functions.
  • the functions of the interrogator will vary depending on whether it is being used to monitor an area for tag detachment alarm signals, to identify each item at an inventory check point or point of sale for the purpose of inventory control, or to carry out a security check at a control point.
  • all interrogators are able to receive and decode identification and alarm signals and pass these codes to the control system.
  • interrogators used to perform security check or inventory control functions are able to transmit the appropriate signals to activate the responses in the tags.
  • the control system will: i) maintain the list of all items in the inventory and their associated coded tags, ii) control the functions of the interrogators, iii) receive identification and alarm information passed from the tags, and iv) activate any desired form of alarm response when the corresponding signal is transmitted by a tag and processed by an interrogator.
  • An interrogator in the stockroom is then used to enable the alarm functions of the tag and read its ID code.
  • a keyboard connected to the control system information relating to the tagged item is entered and associated in the control system database with the tag.
  • an interrogator transmits a short range coded signal to trigger the identification function of the tag.
  • the tag When brought within the field of the interrogator the tag replies with its previously-stored ID code. The interrogator then passes this sales information to the control system. iii) The interrogator then transmits a coded signal to disable the security alarm functions and thus enables the tag to be removed from the item without setting off the alarm. In addition the disabled tag may be taken through a security control point (if necessary) without triggering the corresponding alarm function, iv) At the point of sale following a "no sale” the interrogator may transmit a coded signal to re-enable the alarm functions of the tag. b) Security Control The following description is based on the presence of two interrogators operated by a control system.
  • interrogator A is located at some convenient point in the warehouse or retail store, and that interrogator B is at an exit or security control point.
  • interrogator A is in receiving mode and the tags attached to the objects secured are in their quiescent state. If the method of attachment of the object to the tag is tampered with (e.g. by breaking the attachment means), the tag repeatedly transmits the previously-stored code and alarm signal to interrogator A. This information is received by interrogator A, decoded and sent to the control system where an alarm function is implemented.
  • Interrogator B is placed near the control point and has an antenna structure such that it has a narrow field of view. Interrogator B repeatedly sends the signal which will activate the second alarm function of the tag. When it is in the field of the interrogator and detects the signal the tag repeatedly sends its previously-stored ID code and alarm signal, and the control system decodes this information and activates any desired security action such as ringing bells, visual display on a terminal near the control point, etc.
  • security staff know not only that an item is being removed but are also provided immediately with a full description of that item.
  • the security control function described above may be enabled or disabled at the stockroom or point of sale as described in (a) above.
  • the preferred embodiment of the inventory control system comprises several components: these being a central computer to control the operation of the system, several interrogator units, and individual identification tags to be attached to individual items of stock.
  • the interrogators may be divided into two types depending upon their specialised application as point-of-sale interrogators or control-point interrogators. The differences between these types will be discussed later.
  • the preferred embodiment of the tag is illustrated schematically in Figure 1.
  • a coded electromagnetic signal from the interrogator is picked up on the input antenna 1 which is connected to tuned circuit.2.
  • the signal may be situated anywhere in the radio frequency spectrum from LF to UHF but might typically be in the VHF band.
  • the information is coded in the form of amplitude modulation of the carrier signal.
  • Four different commands are required to be detected and these may be coded in many possible ways but, by way of example, are encoded in the preferred embodiment using an error correcting ' digital code such as a BCH 7/4 code.
  • a detector circuit 3 with very low quiescent power consumption detects the presence of a signal at the tuned circuit 2 and causes the signal processing components of the tag to be connected to the battery 4 by the power control switch 5.
  • the demodulator 6 in conjunction with the clock recovery circuit 7 extracts the data from the input signal and stores it in the data register 8.
  • the function controller 9 causes the appropriate tag response to be performed dependent upon the information in the data register 8 and the state of the transmit enable memory 10.
  • Table 1 lists the various inputs and the responses of the tag to these inputs as implemented by the function controller.
  • the transmit enable memory is set to "disabled”
  • the only response will be to an interrogator command to set the memory to "enabled” .
  • the function controller 9 activates the code generator 12 to generate a digital code stream corresponding to the code stored in the ID code storage memory 13 plus.further bits to indicate the nature of the response; i.e. point-of-sale identification, control-point alarm or detachment alarm.
  • the code generator generates a binary sequence with error correcting capability such as a
  • ID code storage 13 may be implemented in many ways obvious to those skilled in the art but, for example, could be stored in a programmable read only memory programmed at the time of assembly of the tag.
  • the output of the code generator 12 is passed to the modulater 14 where it modulates a radio frequency (RF) signal generated in the RF source 15.
  • the resulting signal is radiated from the output antenna 16.
  • the frequency of the RF signal is preferably in the VHF/UHF region for reasons of antenna efficiency but is not limited thereto.
  • the frequency may be controlled in many ways obvious to those skilled in the art, for example, by transmission from the interrogator of a reference for synchronisation, by a crystal or by a surface accoustic wave resonator.
  • the tag responds to the breaking of its attachment to an object. This is detected by the detachment sensor 11 which activates the function controller 9 if the transmit enable is set to "enabled".
  • the detachment detector may be implemented in many ways but two means will be indicated by way of example. Referring to Fig. 3, a preferred embodiment of the tag 20 is attached to an item to be monitored by means of an insulated wire 21 of finite resistance. A very low power comparator incorporated into the detachment detector 11, then monitors the resistance of the wire to detect the occurrence of either an open circuit or a short circuit.
  • One end of the wire 21 is connected to the detachment detector 11 by a releasable electrical connection means 22 to enable easy removal of the tag from the article when sold.
  • the tag 20 of a second embodiment contains one or more Wiegand wires 25 (refer to Australian Patent Specification No. 479,034) enclosed in a sense coil 23 which is connected to a very low power pulse detector 11.
  • the tag is attached to the item to be monitored by one or more pins 28 through the item, or other attachment means such as adhesive, and a magnet 26 is attached to the item adjacent to the tag but on the other side of the item so that the Wiegand wire 25 is in the field of the magnet 26.
  • the magnet 26 is carried on a member 27 which also carries the pins 28 and the pins are received in co-operating receprocals 29 in the tag.
  • the magnetic thresholds of the wires may be chosen such that an increasing magnetic field strength as well as a decreasing magnetic field strength may be detected. In this way the possibility of circumventing the detachment alarm by bringing another magnet close to the tag prior to detachment is reduced.
  • the detector circuitry is only powered up when the transmit enable memory is set to "enabled".
  • the power for operation of the tag is supplied by a battery 4 such as a lithium cell. Since the quiescent current drain of the tag may be kept to a level of only a micro-ampere or two a cell with a capacity of 50 to 100 milliampere-hour will have a lifetime of several years. Battery lifetime is maximised by having only necessary circuitry powered up at any time. This is accomplished by the power control module 5 which takes input from the signal detector 3 and the detachment detector 11 and powers the remainder of the tag only when appropriate. Only the signal detector 3 and the transmit enable memory 10 are powered at all times. In the preferred embodiment of the tag almost the entire circuitry is implemented in a single custom-integrated circuit. This makes it possible for the tag to be packaged in a form small enough to have wide application.
  • a battery 4 such as a lithium cell. Since the quiescent current drain of the tag may be kept to a level of only a micro-ampere or two a cell with a capacity of 50 to 100 milliampere-hour will have a lifetime of
  • a central computer 40 controls a plurality of interrogators 41, 42, 43, 44 distributed throughout the premises which are being monitored for inventory control.
  • interrogators are essentially identical in operation in that they consist of a controller/code-generator to generate the appropriate code for transmission, an RF source and a modulation means 46 attached to a transmitting antenna 45. Also they have one or more receivers 47 which receive signals through individual receiving antennas 48, decode the transmission from the tags 20 and pass the relevant data to the central computer. The receivers on all interrogators are at all times "listening" for an alarm signal from any active tag 20.
  • the differences between the interrogators relate to the different ways in which they are used: i)
  • the point-of-sale (POS) interrogators 41 and 42 are equipped with a transmitting antenna 45a which, in conjunction with a low output power level, confines its interrogation range to a localised region at the POS desk. In normal operation it transmits continuously the point-of-sale identification or IDENTIFY code.
  • POS point-of-sale
  • IDENTIFY code point-of-sale identification
  • the tag 20 responds to the transmitted code by transmitting its ID code.
  • the interrogator Upon receipt of the ID code via antenna 48a and receiver 47a, the interrogator sends the DISABLE code and then resumes transmission of the IDENTIFY command.
  • the process is repeated until the DISABLE command takes effect or a failure is registered.
  • the ID information is sent to the central computer which notes that the item is about to be sold.
  • the price details are registered on the cash register.
  • a "beeper" indicates to the cashier that all details about the item have been recorded in the central computer and that the tag 20 may be removed safely. If a sale is not completed before the tag is removed, the cashier can ENABLE the tag again and cancel the information at the central computer (or simply record a NO SALE with the information) before restoring the item with its tag to the shop floor.
  • all POS interrogators are synchronised by the control computer such that they trigger the ID code transmissions simultaneously at all points of sale and at roughly half second intervals. Thus there are regular "quiet" periods during which alarm signals can be received reliably.
  • a version of the POS interrogator is used to ENABLE each tag and identify it after attachment to a new item of stock.
  • the ID number is associated in the central computer with a detailed description of the item, ii)
  • a control-point interrogator is positioned at all access points through which it is desired to detect the carriage of active tags 20.
  • the antenna 45b is thus positioned to localise the transmitted signal to the region and the control-point signal is transmitted continually. In the event of an active tag 20 entering the region, the tag will respond by transmitting its ID code plus a control-point alarm signal, continually.
  • Some receivers 47 in the vicinity will detect the alarm but from the relative strength of the received signal at the receivers in question and the recognition of the alarm as a control-point alarm, the precise location of the potential theft can be determined by the computer.
  • the tag ID is passed to the computer by the interrogators and thus a description of the stolen item is immediately available.
  • Interrogators installed in a store or warehouse are equipped with sufficient receivers 47 and their associated receiving antennas 48 to adequately cover the entire area to be controlled.
  • one or more receivers 47 at one or more interrogators 41, 42, 43, 44 will receive and demodulate the signal and pass the decoded information to the central computer 40.
  • the central computer will be able to signal to security staff via an appropriate terminal 50 the nature of the alarm and a precise description of the item in question. From the known location of the receivers that received the signal the computer may also indicate the approximate location of the tag.
  • the central computer 40 maintains the inventory of tags 20 in use, controls the functions of the interrogators 41, 42, 43, 44 and interprets all alarm information for implementation of security functions. TABLE 1
  • Control-point signal enabled transmit ID code with control-point alarm bit set

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Burglar Alarm Systems (AREA)
  • Warehouses Or Storage Devices (AREA)

Abstract

Des étiquettes de contrôle pour inventaire comprennent un détecteur de détachement (11), auxquels est associé un moyen de fixation de l'étiquette sur un article, de telle sorte que le détachement de l'étiquette produit un signal d'alarme émis par un émetteur (14, 15, 16). Le signal d'alarme est codé par un générateur de codes (12), destiné à fournir un signal codé unique qui identifie l'étiquette à partir de laquelle il est produit. Lesdites étiquettes comprennent également un récepteur (1, 2, 3), destiné à recevoir des signaux d'interrogation en réponse auxquels l'étiquette émet son signal d'identification codé. Lesdites étiquettes peuvent également être commutées sur une position désactivée et à partir de celle-ci, lorsque des signaux d'invalidation/validation codés sont reçus. Ces signaux d'invalidation/validation permettent à une mémoire de validation émettrice (10) de prendre l'un des deux états possibles, afin de valider et d'invalider les opérations des circuits du générateur de code (12) et de l'émetteur (14, 15, 16).
PCT/AU1986/000384 1986-01-03 1986-12-17 Systeme de controle pour inventaire WO1987004282A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPH4077 1986-01-03
AUPH407786 1986-01-03

Publications (1)

Publication Number Publication Date
WO1987004282A1 true WO1987004282A1 (fr) 1987-07-16

Family

ID=3771429

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU1986/000384 WO1987004282A1 (fr) 1986-01-03 1986-12-17 Systeme de controle pour inventaire

Country Status (3)

Country Link
JP (1) JPS63502697A (fr)
AU (1) AU588957B2 (fr)
WO (1) WO1987004282A1 (fr)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0311036A2 (fr) * 1987-10-07 1989-04-12 TEMIC TELEFUNKEN microelectronic GmbH Dispositif de surveillance d'articles et ou de personnes
GB2193359B (en) * 1986-07-31 1990-07-11 Multitone Electronics Plc Area communications systems
EP0516713A1 (fr) * 1990-02-21 1992-12-09 ISRAEL, Marcia Etiquette commerciale electronique anti-vol amelioree
EP0723692A1 (fr) * 1993-10-05 1996-07-31 Pac/Scan, Inc. Dispositif d'information et de prevention des vols a l'etalage
EP0727752A2 (fr) * 1995-02-15 1996-08-21 International Computers Limited Système d'identification électronique
NL1001770C2 (nl) * 1995-11-29 1997-05-30 Nedap Nv Deactiveerbaar artikelbewakingslabel met gegevensdragerfunctie.
WO1998033155A1 (fr) * 1997-01-25 1998-07-30 Philip Noel Leonard Dispositifs d'identification ou de controle
EP0915439A2 (fr) * 1997-09-16 1999-05-12 Meto International GmbH Procédé et dispositif pour identifier et déactiver une étiquette de sécurité
EP0933741A2 (fr) * 1998-02-03 1999-08-04 KTP Limited Lecteur de codes à barres et dispositif de désactivation d'étiquettes de sécurité
WO1999045512A1 (fr) * 1998-03-05 1999-09-10 Siemens Aktiengesellschaft Procede permettant de proteger l'identite d'objets et dispositif permettant de mettre en oeuvre ce procede
WO2000039613A1 (fr) * 1998-12-24 2000-07-06 Gemplus Tag Australia Pty Ltd Systeme de controle d'objets et de documents
WO2001045063A1 (fr) * 1999-12-15 2001-06-21 Eident Limited Etiquette
GB2357611A (en) * 1999-12-21 2001-06-27 Ibm Electronic location tag
GB2357612A (en) * 1999-12-21 2001-06-27 Ibm Electronic inventory tag
US6719202B1 (en) * 1998-12-08 2004-04-13 Fujitsu Limited Commodity information management system

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE451906B (sv) * 1986-02-13 1987-11-02 Intermodulation & Safety Syste Larmanordning innefattande en av tva delar bestaende larmbricka vilken i ett aktivt lege avger en akustisk signal da delarna fjermar sig fran varandra
NZ219982A (en) * 1986-04-15 1990-02-26 Bi Inc Personnel monitoring tag transmits verification of presence of flesh
JPH05250374A (ja) * 1992-03-05 1993-09-28 Kubota Corp 商品管理方法とその装置

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3493955A (en) * 1968-04-17 1970-02-03 Monere Corp Method and apparatus for detecting the unauthorized movement of articles
US3500373A (en) * 1966-05-06 1970-03-10 Nat Bank Of North America The Method and apparatus for article theft detection
US3521280A (en) * 1969-01-16 1970-07-21 Gen Res Corp Coded labels
US3665448A (en) * 1970-08-03 1972-05-23 Hugh A Mcglinchey Electronic shoplifting prevention system
US3713133A (en) * 1971-02-16 1973-01-23 R Nathans Rf and sonic systems for preventing shoplifting of goods and unauthorized removal of capsules affixed thereto for protecting goods
US3774205A (en) * 1971-08-02 1973-11-20 Ncr Co Merchandise mark sensing system
US3859652A (en) * 1972-06-26 1975-01-07 North American Systems Corp Method and apparatus for detecting the theft of articles
US4060040A (en) * 1975-05-03 1977-11-29 Friedrich Karl Johnssen Antitheft system for sales areas
AU3712784A (en) * 1983-12-29 1985-07-04 Revlon Inc. Inventory acquisition system
NL8304413A (nl) * 1983-12-22 1985-07-16 Nedap Nv Universele alarmwafer.

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3500373A (en) * 1966-05-06 1970-03-10 Nat Bank Of North America The Method and apparatus for article theft detection
US3493955A (en) * 1968-04-17 1970-02-03 Monere Corp Method and apparatus for detecting the unauthorized movement of articles
US3521280A (en) * 1969-01-16 1970-07-21 Gen Res Corp Coded labels
US3665448A (en) * 1970-08-03 1972-05-23 Hugh A Mcglinchey Electronic shoplifting prevention system
US3713133A (en) * 1971-02-16 1973-01-23 R Nathans Rf and sonic systems for preventing shoplifting of goods and unauthorized removal of capsules affixed thereto for protecting goods
US3774205A (en) * 1971-08-02 1973-11-20 Ncr Co Merchandise mark sensing system
US3859652A (en) * 1972-06-26 1975-01-07 North American Systems Corp Method and apparatus for detecting the theft of articles
US4060040A (en) * 1975-05-03 1977-11-29 Friedrich Karl Johnssen Antitheft system for sales areas
NL8304413A (nl) * 1983-12-22 1985-07-16 Nedap Nv Universele alarmwafer.
AU3712784A (en) * 1983-12-29 1985-07-04 Revlon Inc. Inventory acquisition system

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2193359B (en) * 1986-07-31 1990-07-11 Multitone Electronics Plc Area communications systems
US4851815A (en) * 1987-10-07 1989-07-25 Thomas Enkelmann Computer Device for the monitoring of objects and/or persons
EP0311036A3 (fr) * 1987-10-07 1991-01-16 TEMIC TELEFUNKEN microelectronic GmbH Dispositif de surveillance d'articles et ou de personnes
EP0311036A2 (fr) * 1987-10-07 1989-04-12 TEMIC TELEFUNKEN microelectronic GmbH Dispositif de surveillance d'articles et ou de personnes
EP0516713A1 (fr) * 1990-02-21 1992-12-09 ISRAEL, Marcia Etiquette commerciale electronique anti-vol amelioree
EP0516713A4 (en) * 1990-02-21 1993-02-24 Marcia Israel Improved electronic anti-theft merchandise tag
EP0723692A1 (fr) * 1993-10-05 1996-07-31 Pac/Scan, Inc. Dispositif d'information et de prevention des vols a l'etalage
EP0723692A4 (fr) * 1993-10-05 1997-05-28 Pac Scan Inc Dispositif d'information et de prevention des vols a l'etalage
AU696800B2 (en) * 1995-02-15 1998-09-17 International Computers Limited Electronic identification system
EP0727752A2 (fr) * 1995-02-15 1996-08-21 International Computers Limited Système d'identification électronique
EP0727752A3 (fr) * 1995-02-15 1997-05-28 Int Computers Ltd Système d'identification électronique
US6549119B1 (en) 1995-02-15 2003-04-15 International Computers Limited Electronic identification system
US6181248B1 (en) * 1995-11-29 2001-01-30 N.V. Nederlandsche Apparatenfabriek Nedap Deactivatable article security label with data carrier function
WO1997022085A1 (fr) * 1995-11-29 1997-06-19 N.V. Nederlandsche Apparatenfabriek Nedap Etiquette de securite pour article comportant une fonction de type support de donnees et pouvant etre desactivee
NL1001770C2 (nl) * 1995-11-29 1997-05-30 Nedap Nv Deactiveerbaar artikelbewakingslabel met gegevensdragerfunctie.
WO1998033155A1 (fr) * 1997-01-25 1998-07-30 Philip Noel Leonard Dispositifs d'identification ou de controle
US6329917B1 (en) 1997-01-25 2001-12-11 Philip Noel Leonard Identification or control arrangements
AU724795B2 (en) * 1997-01-25 2000-09-28 Philip Noel Leonard Identification or control arrangements
EP0915439A2 (fr) * 1997-09-16 1999-05-12 Meto International GmbH Procédé et dispositif pour identifier et déactiver une étiquette de sécurité
US6592037B1 (en) 1997-09-16 2003-07-15 Meto International Gmbh Method and device for the detection and deactivation of a deactivatable security element
EP0915439A3 (fr) * 1997-09-16 1999-12-08 Meto International GmbH Procédé et dispositif pour identifier et déactiver une étiquette de sécurité
EP0933741A3 (fr) * 1998-02-03 1999-12-08 KTP Limited Lecteur de codes à barres et dispositif de désactivation d'étiquettes de sécurité
EP0933741A2 (fr) * 1998-02-03 1999-08-04 KTP Limited Lecteur de codes à barres et dispositif de désactivation d'étiquettes de sécurité
WO1999045512A1 (fr) * 1998-03-05 1999-09-10 Siemens Aktiengesellschaft Procede permettant de proteger l'identite d'objets et dispositif permettant de mettre en oeuvre ce procede
US6719202B1 (en) * 1998-12-08 2004-04-13 Fujitsu Limited Commodity information management system
WO2000039613A1 (fr) * 1998-12-24 2000-07-06 Gemplus Tag Australia Pty Ltd Systeme de controle d'objets et de documents
WO2001045063A1 (fr) * 1999-12-15 2001-06-21 Eident Limited Etiquette
GB2357611A (en) * 1999-12-21 2001-06-27 Ibm Electronic location tag
GB2357612A (en) * 1999-12-21 2001-06-27 Ibm Electronic inventory tag
US6288645B1 (en) 1999-12-21 2001-09-11 International Business Machines Corp. Electronic location tag
GB2357611B (en) * 1999-12-21 2004-06-02 Ibm Electronic location tag

Also Published As

Publication number Publication date
AU6734587A (en) 1987-07-28
AU588957B2 (en) 1989-09-28
JPS63502697A (ja) 1988-10-06

Similar Documents

Publication Publication Date Title
AU588957B2 (en) Inventory control system
EP1382009B1 (fr) Systeme et procede de commande de dispositifs distants
EP2377076B1 (fr) Procédé et système pour une étiquette rfid uhf au niveau d'un article avec une alimentation assistée basse fréquence
US5955951A (en) Combined article surveillance and product identification system
US5745036A (en) Electronic article security system for store which uses intelligent security tags and transaction data
US5099226A (en) Intelligent security system
US5942978A (en) Wireless transmitter key for EAS tag detacher unit
EP1010152B1 (fr) Etiquettes rfid pouvant etre reactivees par un procede electronique, physique ou virtuel
KR101782437B1 (ko) Rfid 특징들을 갖는 eas 알람 태그
EP1625558B1 (fr) Etiquettes dures d'identification eas/rfid
EP1849144B1 (fr) Enquete d'alarme au moyen d'une identification par radiofrequence
EP2603906B1 (fr) Étiquette de sécurité à système eas et élément magnétique de captage d'énergie intégrés
EP1510985A2 (fr) Méthode et dispositif pour détecter plusieurs étiquettes de sécurité
CA2372756A1 (fr) Systeme de controle et d'enregistrement automatiques par identification rfid et surveillance electronique d'articles
US20090189768A1 (en) Combination security tag using a perimeter rfid antenna surrounding an eas element and method thereof
EP2831856B1 (fr) Système et procédé permettant de détecter la présence d'un objet
CA2176232A1 (fr) Dispositif d'information et de prevention des vols a l'etalage
KR20180025608A (ko) Rfid 태그와 이를 이용한 보안 관리 시스템
US20070046437A1 (en) Electronic Transmission Device for Activation of Electronic Article Surveillance Systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE FR GB IT LU NL SE