WO1987004282A1 - Systeme de controle pour inventaire - Google Patents
Systeme de controle pour inventaire Download PDFInfo
- Publication number
- WO1987004282A1 WO1987004282A1 PCT/AU1986/000384 AU8600384W WO8704282A1 WO 1987004282 A1 WO1987004282 A1 WO 1987004282A1 AU 8600384 W AU8600384 W AU 8600384W WO 8704282 A1 WO8704282 A1 WO 8704282A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tag
- signal
- tags
- control system
- alarm
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2428—Tag details
- G08B13/2434—Tag housing and attachment details
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/2417—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
Definitions
- the present invention relates generally to an improvement to an inventory control system for use in locations such as retail outlets, warehouses and so on.
- the invention provides a system which, in its preferred embodiment, can be used to identify individual objects, to allow an inventory of such objects to be maintained and to implement a multi-function security mechanism which reduces the risk of loss or theft of tagged objects.
- tags are provided which cause an alarm to be set off in both situations i.e. when a tag is detached or tampered with inside the store (other than in the approved way at the point of sale) as well as when an intact tag is carried through the exit.
- the tag is uniquely encoded such that information about the item (e.g. type of item, colour, shape, model) from which a tag was detached, as well as its approximate location, can be immediately made available to security personnel in the store when an alarm condition is triggered.
- information about the item e.g. type of item, colour, shape, model
- Bar-code tags for example, can be combined with optical readers to speed the recording of items of stock and to minimise the errors which occur when manual recording and subsequent transcription are used.
- optical readers to speed the recording of items of stock and to minimise the errors which occur when manual recording and subsequent transcription are used.
- the unique code assigned to each tag is used to identify goods for the purposes of stock taking.
- the present invention consists in a security tag comprising attachment means, alarm sensor means associated with the attachment means to signal when the attachment means are disconnected from an article to which the tag was attached and transmitter means to generate a radiated signal in response to the alarm means signalling the disconnection of the attachment means from said goods.
- the tags are provided with encoding means enabling identification of a tag which is transmitting an alarm signal.
- Tags are also preferably provided with enabling and disabling means which are operated in the preferred embodiment by digitally encoded signals transmitted by an enabling transmitter.
- the tags of the preferred embodiment will also include a receiver adapted to respond to a short range transmitted signal to cause the tag to transmit its identifying signal.
- an inventory control system in which the tags of the present invention are used.
- Fig. 1 schematically illustrates an embodiment of a tag according to the invention
- Fig. 2 schematically illustrates an interrogator and control system of an inventory control system which makes, use of the tag of Fig. 1.
- tags to be attached to the objects which are being controlled
- interrogators to be attached to the objects which are being controlled
- computer-based control system which operates the interrogators, maintains the inventory records and * indicates in any required fashion the signalling of an alarm when this becomes necessary.
- the tags should be small (so that they can be inconspicuously and harmlessly attached) , they should be economically priced, they should have an operating life of several years (at least equal to the maximum expected residence time of any one item of stock in a given location) , they should be capable of receiving control signals from interrogators at control points or points of sale and they should be capable of transmitting radio frequency signals over ranges of several tens of metres.
- the tags preferably are capable of implementing the following functions: i) Storing coded identification (ID) information which may be associated, via software in the control system, with the object to be tagged, ii) Repeatedly transmitting by radio the previously- stored ID code and an alarm signal, when the method of attachment of the tag to the object is interfered with, iii) Repeatedly transmitting by radio the previously-stored ID code and an alarm signal when the tag passes through the field of an interrogator at a control point, iv) Transmitting by radio the previously-stored ID code in response to an interrogating signal at the point of sale for the purpose of stock control. v) Enabling or disabling the functions in (ii) , (iii) and (iv) above in response to an appropriate interrogating signal at the point of sale.
- ID coded identification
- the interrogators preferably will be capable of transmitting radio signals to the tags, receiving a number of radio frequency signals and interacting with the control system to perform the variety of required functions.
- the functions of the interrogator will vary depending on whether it is being used to monitor an area for tag detachment alarm signals, to identify each item at an inventory check point or point of sale for the purpose of inventory control, or to carry out a security check at a control point.
- all interrogators are able to receive and decode identification and alarm signals and pass these codes to the control system.
- interrogators used to perform security check or inventory control functions are able to transmit the appropriate signals to activate the responses in the tags.
- the control system will: i) maintain the list of all items in the inventory and their associated coded tags, ii) control the functions of the interrogators, iii) receive identification and alarm information passed from the tags, and iv) activate any desired form of alarm response when the corresponding signal is transmitted by a tag and processed by an interrogator.
- An interrogator in the stockroom is then used to enable the alarm functions of the tag and read its ID code.
- a keyboard connected to the control system information relating to the tagged item is entered and associated in the control system database with the tag.
- an interrogator transmits a short range coded signal to trigger the identification function of the tag.
- the tag When brought within the field of the interrogator the tag replies with its previously-stored ID code. The interrogator then passes this sales information to the control system. iii) The interrogator then transmits a coded signal to disable the security alarm functions and thus enables the tag to be removed from the item without setting off the alarm. In addition the disabled tag may be taken through a security control point (if necessary) without triggering the corresponding alarm function, iv) At the point of sale following a "no sale” the interrogator may transmit a coded signal to re-enable the alarm functions of the tag. b) Security Control The following description is based on the presence of two interrogators operated by a control system.
- interrogator A is located at some convenient point in the warehouse or retail store, and that interrogator B is at an exit or security control point.
- interrogator A is in receiving mode and the tags attached to the objects secured are in their quiescent state. If the method of attachment of the object to the tag is tampered with (e.g. by breaking the attachment means), the tag repeatedly transmits the previously-stored code and alarm signal to interrogator A. This information is received by interrogator A, decoded and sent to the control system where an alarm function is implemented.
- Interrogator B is placed near the control point and has an antenna structure such that it has a narrow field of view. Interrogator B repeatedly sends the signal which will activate the second alarm function of the tag. When it is in the field of the interrogator and detects the signal the tag repeatedly sends its previously-stored ID code and alarm signal, and the control system decodes this information and activates any desired security action such as ringing bells, visual display on a terminal near the control point, etc.
- security staff know not only that an item is being removed but are also provided immediately with a full description of that item.
- the security control function described above may be enabled or disabled at the stockroom or point of sale as described in (a) above.
- the preferred embodiment of the inventory control system comprises several components: these being a central computer to control the operation of the system, several interrogator units, and individual identification tags to be attached to individual items of stock.
- the interrogators may be divided into two types depending upon their specialised application as point-of-sale interrogators or control-point interrogators. The differences between these types will be discussed later.
- the preferred embodiment of the tag is illustrated schematically in Figure 1.
- a coded electromagnetic signal from the interrogator is picked up on the input antenna 1 which is connected to tuned circuit.2.
- the signal may be situated anywhere in the radio frequency spectrum from LF to UHF but might typically be in the VHF band.
- the information is coded in the form of amplitude modulation of the carrier signal.
- Four different commands are required to be detected and these may be coded in many possible ways but, by way of example, are encoded in the preferred embodiment using an error correcting ' digital code such as a BCH 7/4 code.
- a detector circuit 3 with very low quiescent power consumption detects the presence of a signal at the tuned circuit 2 and causes the signal processing components of the tag to be connected to the battery 4 by the power control switch 5.
- the demodulator 6 in conjunction with the clock recovery circuit 7 extracts the data from the input signal and stores it in the data register 8.
- the function controller 9 causes the appropriate tag response to be performed dependent upon the information in the data register 8 and the state of the transmit enable memory 10.
- Table 1 lists the various inputs and the responses of the tag to these inputs as implemented by the function controller.
- the transmit enable memory is set to "disabled”
- the only response will be to an interrogator command to set the memory to "enabled” .
- the function controller 9 activates the code generator 12 to generate a digital code stream corresponding to the code stored in the ID code storage memory 13 plus.further bits to indicate the nature of the response; i.e. point-of-sale identification, control-point alarm or detachment alarm.
- the code generator generates a binary sequence with error correcting capability such as a
- ID code storage 13 may be implemented in many ways obvious to those skilled in the art but, for example, could be stored in a programmable read only memory programmed at the time of assembly of the tag.
- the output of the code generator 12 is passed to the modulater 14 where it modulates a radio frequency (RF) signal generated in the RF source 15.
- the resulting signal is radiated from the output antenna 16.
- the frequency of the RF signal is preferably in the VHF/UHF region for reasons of antenna efficiency but is not limited thereto.
- the frequency may be controlled in many ways obvious to those skilled in the art, for example, by transmission from the interrogator of a reference for synchronisation, by a crystal or by a surface accoustic wave resonator.
- the tag responds to the breaking of its attachment to an object. This is detected by the detachment sensor 11 which activates the function controller 9 if the transmit enable is set to "enabled".
- the detachment detector may be implemented in many ways but two means will be indicated by way of example. Referring to Fig. 3, a preferred embodiment of the tag 20 is attached to an item to be monitored by means of an insulated wire 21 of finite resistance. A very low power comparator incorporated into the detachment detector 11, then monitors the resistance of the wire to detect the occurrence of either an open circuit or a short circuit.
- One end of the wire 21 is connected to the detachment detector 11 by a releasable electrical connection means 22 to enable easy removal of the tag from the article when sold.
- the tag 20 of a second embodiment contains one or more Wiegand wires 25 (refer to Australian Patent Specification No. 479,034) enclosed in a sense coil 23 which is connected to a very low power pulse detector 11.
- the tag is attached to the item to be monitored by one or more pins 28 through the item, or other attachment means such as adhesive, and a magnet 26 is attached to the item adjacent to the tag but on the other side of the item so that the Wiegand wire 25 is in the field of the magnet 26.
- the magnet 26 is carried on a member 27 which also carries the pins 28 and the pins are received in co-operating receprocals 29 in the tag.
- the magnetic thresholds of the wires may be chosen such that an increasing magnetic field strength as well as a decreasing magnetic field strength may be detected. In this way the possibility of circumventing the detachment alarm by bringing another magnet close to the tag prior to detachment is reduced.
- the detector circuitry is only powered up when the transmit enable memory is set to "enabled".
- the power for operation of the tag is supplied by a battery 4 such as a lithium cell. Since the quiescent current drain of the tag may be kept to a level of only a micro-ampere or two a cell with a capacity of 50 to 100 milliampere-hour will have a lifetime of several years. Battery lifetime is maximised by having only necessary circuitry powered up at any time. This is accomplished by the power control module 5 which takes input from the signal detector 3 and the detachment detector 11 and powers the remainder of the tag only when appropriate. Only the signal detector 3 and the transmit enable memory 10 are powered at all times. In the preferred embodiment of the tag almost the entire circuitry is implemented in a single custom-integrated circuit. This makes it possible for the tag to be packaged in a form small enough to have wide application.
- a battery 4 such as a lithium cell. Since the quiescent current drain of the tag may be kept to a level of only a micro-ampere or two a cell with a capacity of 50 to 100 milliampere-hour will have a lifetime of
- a central computer 40 controls a plurality of interrogators 41, 42, 43, 44 distributed throughout the premises which are being monitored for inventory control.
- interrogators are essentially identical in operation in that they consist of a controller/code-generator to generate the appropriate code for transmission, an RF source and a modulation means 46 attached to a transmitting antenna 45. Also they have one or more receivers 47 which receive signals through individual receiving antennas 48, decode the transmission from the tags 20 and pass the relevant data to the central computer. The receivers on all interrogators are at all times "listening" for an alarm signal from any active tag 20.
- the differences between the interrogators relate to the different ways in which they are used: i)
- the point-of-sale (POS) interrogators 41 and 42 are equipped with a transmitting antenna 45a which, in conjunction with a low output power level, confines its interrogation range to a localised region at the POS desk. In normal operation it transmits continuously the point-of-sale identification or IDENTIFY code.
- POS point-of-sale
- IDENTIFY code point-of-sale identification
- the tag 20 responds to the transmitted code by transmitting its ID code.
- the interrogator Upon receipt of the ID code via antenna 48a and receiver 47a, the interrogator sends the DISABLE code and then resumes transmission of the IDENTIFY command.
- the process is repeated until the DISABLE command takes effect or a failure is registered.
- the ID information is sent to the central computer which notes that the item is about to be sold.
- the price details are registered on the cash register.
- a "beeper" indicates to the cashier that all details about the item have been recorded in the central computer and that the tag 20 may be removed safely. If a sale is not completed before the tag is removed, the cashier can ENABLE the tag again and cancel the information at the central computer (or simply record a NO SALE with the information) before restoring the item with its tag to the shop floor.
- all POS interrogators are synchronised by the control computer such that they trigger the ID code transmissions simultaneously at all points of sale and at roughly half second intervals. Thus there are regular "quiet" periods during which alarm signals can be received reliably.
- a version of the POS interrogator is used to ENABLE each tag and identify it after attachment to a new item of stock.
- the ID number is associated in the central computer with a detailed description of the item, ii)
- a control-point interrogator is positioned at all access points through which it is desired to detect the carriage of active tags 20.
- the antenna 45b is thus positioned to localise the transmitted signal to the region and the control-point signal is transmitted continually. In the event of an active tag 20 entering the region, the tag will respond by transmitting its ID code plus a control-point alarm signal, continually.
- Some receivers 47 in the vicinity will detect the alarm but from the relative strength of the received signal at the receivers in question and the recognition of the alarm as a control-point alarm, the precise location of the potential theft can be determined by the computer.
- the tag ID is passed to the computer by the interrogators and thus a description of the stolen item is immediately available.
- Interrogators installed in a store or warehouse are equipped with sufficient receivers 47 and their associated receiving antennas 48 to adequately cover the entire area to be controlled.
- one or more receivers 47 at one or more interrogators 41, 42, 43, 44 will receive and demodulate the signal and pass the decoded information to the central computer 40.
- the central computer will be able to signal to security staff via an appropriate terminal 50 the nature of the alarm and a precise description of the item in question. From the known location of the receivers that received the signal the computer may also indicate the approximate location of the tag.
- the central computer 40 maintains the inventory of tags 20 in use, controls the functions of the interrogators 41, 42, 43, 44 and interprets all alarm information for implementation of security functions. TABLE 1
- Control-point signal enabled transmit ID code with control-point alarm bit set
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- Burglar Alarm Systems (AREA)
- Warehouses Or Storage Devices (AREA)
Abstract
Des étiquettes de contrôle pour inventaire comprennent un détecteur de détachement (11), auxquels est associé un moyen de fixation de l'étiquette sur un article, de telle sorte que le détachement de l'étiquette produit un signal d'alarme émis par un émetteur (14, 15, 16). Le signal d'alarme est codé par un générateur de codes (12), destiné à fournir un signal codé unique qui identifie l'étiquette à partir de laquelle il est produit. Lesdites étiquettes comprennent également un récepteur (1, 2, 3), destiné à recevoir des signaux d'interrogation en réponse auxquels l'étiquette émet son signal d'identification codé. Lesdites étiquettes peuvent également être commutées sur une position désactivée et à partir de celle-ci, lorsque des signaux d'invalidation/validation codés sont reçus. Ces signaux d'invalidation/validation permettent à une mémoire de validation émettrice (10) de prendre l'un des deux états possibles, afin de valider et d'invalider les opérations des circuits du générateur de code (12) et de l'émetteur (14, 15, 16).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPH4077 | 1986-01-03 | ||
AUPH407786 | 1986-01-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1987004282A1 true WO1987004282A1 (fr) | 1987-07-16 |
Family
ID=3771429
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU1986/000384 WO1987004282A1 (fr) | 1986-01-03 | 1986-12-17 | Systeme de controle pour inventaire |
Country Status (3)
Country | Link |
---|---|
JP (1) | JPS63502697A (fr) |
AU (1) | AU588957B2 (fr) |
WO (1) | WO1987004282A1 (fr) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0311036A2 (fr) * | 1987-10-07 | 1989-04-12 | TEMIC TELEFUNKEN microelectronic GmbH | Dispositif de surveillance d'articles et ou de personnes |
GB2193359B (en) * | 1986-07-31 | 1990-07-11 | Multitone Electronics Plc | Area communications systems |
EP0516713A1 (fr) * | 1990-02-21 | 1992-12-09 | ISRAEL, Marcia | Etiquette commerciale electronique anti-vol amelioree |
EP0723692A1 (fr) * | 1993-10-05 | 1996-07-31 | Pac/Scan, Inc. | Dispositif d'information et de prevention des vols a l'etalage |
EP0727752A2 (fr) * | 1995-02-15 | 1996-08-21 | International Computers Limited | Système d'identification électronique |
NL1001770C2 (nl) * | 1995-11-29 | 1997-05-30 | Nedap Nv | Deactiveerbaar artikelbewakingslabel met gegevensdragerfunctie. |
WO1998033155A1 (fr) * | 1997-01-25 | 1998-07-30 | Philip Noel Leonard | Dispositifs d'identification ou de controle |
EP0915439A2 (fr) * | 1997-09-16 | 1999-05-12 | Meto International GmbH | Procédé et dispositif pour identifier et déactiver une étiquette de sécurité |
EP0933741A2 (fr) * | 1998-02-03 | 1999-08-04 | KTP Limited | Lecteur de codes à barres et dispositif de désactivation d'étiquettes de sécurité |
WO1999045512A1 (fr) * | 1998-03-05 | 1999-09-10 | Siemens Aktiengesellschaft | Procede permettant de proteger l'identite d'objets et dispositif permettant de mettre en oeuvre ce procede |
WO2000039613A1 (fr) * | 1998-12-24 | 2000-07-06 | Gemplus Tag Australia Pty Ltd | Systeme de controle d'objets et de documents |
WO2001045063A1 (fr) * | 1999-12-15 | 2001-06-21 | Eident Limited | Etiquette |
GB2357611A (en) * | 1999-12-21 | 2001-06-27 | Ibm | Electronic location tag |
GB2357612A (en) * | 1999-12-21 | 2001-06-27 | Ibm | Electronic inventory tag |
US6719202B1 (en) * | 1998-12-08 | 2004-04-13 | Fujitsu Limited | Commodity information management system |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE451906B (sv) * | 1986-02-13 | 1987-11-02 | Intermodulation & Safety Syste | Larmanordning innefattande en av tva delar bestaende larmbricka vilken i ett aktivt lege avger en akustisk signal da delarna fjermar sig fran varandra |
NZ219982A (en) * | 1986-04-15 | 1990-02-26 | Bi Inc | Personnel monitoring tag transmits verification of presence of flesh |
JPH05250374A (ja) * | 1992-03-05 | 1993-09-28 | Kubota Corp | 商品管理方法とその装置 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3493955A (en) * | 1968-04-17 | 1970-02-03 | Monere Corp | Method and apparatus for detecting the unauthorized movement of articles |
US3500373A (en) * | 1966-05-06 | 1970-03-10 | Nat Bank Of North America The | Method and apparatus for article theft detection |
US3521280A (en) * | 1969-01-16 | 1970-07-21 | Gen Res Corp | Coded labels |
US3665448A (en) * | 1970-08-03 | 1972-05-23 | Hugh A Mcglinchey | Electronic shoplifting prevention system |
US3713133A (en) * | 1971-02-16 | 1973-01-23 | R Nathans | Rf and sonic systems for preventing shoplifting of goods and unauthorized removal of capsules affixed thereto for protecting goods |
US3774205A (en) * | 1971-08-02 | 1973-11-20 | Ncr Co | Merchandise mark sensing system |
US3859652A (en) * | 1972-06-26 | 1975-01-07 | North American Systems Corp | Method and apparatus for detecting the theft of articles |
US4060040A (en) * | 1975-05-03 | 1977-11-29 | Friedrich Karl Johnssen | Antitheft system for sales areas |
AU3712784A (en) * | 1983-12-29 | 1985-07-04 | Revlon Inc. | Inventory acquisition system |
NL8304413A (nl) * | 1983-12-22 | 1985-07-16 | Nedap Nv | Universele alarmwafer. |
-
1986
- 1986-12-17 JP JP50018587A patent/JPS63502697A/ja active Pending
- 1986-12-17 WO PCT/AU1986/000384 patent/WO1987004282A1/fr unknown
- 1986-12-17 AU AU67345/87A patent/AU588957B2/en not_active Ceased
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3500373A (en) * | 1966-05-06 | 1970-03-10 | Nat Bank Of North America The | Method and apparatus for article theft detection |
US3493955A (en) * | 1968-04-17 | 1970-02-03 | Monere Corp | Method and apparatus for detecting the unauthorized movement of articles |
US3521280A (en) * | 1969-01-16 | 1970-07-21 | Gen Res Corp | Coded labels |
US3665448A (en) * | 1970-08-03 | 1972-05-23 | Hugh A Mcglinchey | Electronic shoplifting prevention system |
US3713133A (en) * | 1971-02-16 | 1973-01-23 | R Nathans | Rf and sonic systems for preventing shoplifting of goods and unauthorized removal of capsules affixed thereto for protecting goods |
US3774205A (en) * | 1971-08-02 | 1973-11-20 | Ncr Co | Merchandise mark sensing system |
US3859652A (en) * | 1972-06-26 | 1975-01-07 | North American Systems Corp | Method and apparatus for detecting the theft of articles |
US4060040A (en) * | 1975-05-03 | 1977-11-29 | Friedrich Karl Johnssen | Antitheft system for sales areas |
NL8304413A (nl) * | 1983-12-22 | 1985-07-16 | Nedap Nv | Universele alarmwafer. |
AU3712784A (en) * | 1983-12-29 | 1985-07-04 | Revlon Inc. | Inventory acquisition system |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2193359B (en) * | 1986-07-31 | 1990-07-11 | Multitone Electronics Plc | Area communications systems |
US4851815A (en) * | 1987-10-07 | 1989-07-25 | Thomas Enkelmann Computer | Device for the monitoring of objects and/or persons |
EP0311036A3 (fr) * | 1987-10-07 | 1991-01-16 | TEMIC TELEFUNKEN microelectronic GmbH | Dispositif de surveillance d'articles et ou de personnes |
EP0311036A2 (fr) * | 1987-10-07 | 1989-04-12 | TEMIC TELEFUNKEN microelectronic GmbH | Dispositif de surveillance d'articles et ou de personnes |
EP0516713A1 (fr) * | 1990-02-21 | 1992-12-09 | ISRAEL, Marcia | Etiquette commerciale electronique anti-vol amelioree |
EP0516713A4 (en) * | 1990-02-21 | 1993-02-24 | Marcia Israel | Improved electronic anti-theft merchandise tag |
EP0723692A1 (fr) * | 1993-10-05 | 1996-07-31 | Pac/Scan, Inc. | Dispositif d'information et de prevention des vols a l'etalage |
EP0723692A4 (fr) * | 1993-10-05 | 1997-05-28 | Pac Scan Inc | Dispositif d'information et de prevention des vols a l'etalage |
AU696800B2 (en) * | 1995-02-15 | 1998-09-17 | International Computers Limited | Electronic identification system |
EP0727752A2 (fr) * | 1995-02-15 | 1996-08-21 | International Computers Limited | Système d'identification électronique |
EP0727752A3 (fr) * | 1995-02-15 | 1997-05-28 | Int Computers Ltd | Système d'identification électronique |
US6549119B1 (en) | 1995-02-15 | 2003-04-15 | International Computers Limited | Electronic identification system |
US6181248B1 (en) * | 1995-11-29 | 2001-01-30 | N.V. Nederlandsche Apparatenfabriek Nedap | Deactivatable article security label with data carrier function |
WO1997022085A1 (fr) * | 1995-11-29 | 1997-06-19 | N.V. Nederlandsche Apparatenfabriek Nedap | Etiquette de securite pour article comportant une fonction de type support de donnees et pouvant etre desactivee |
NL1001770C2 (nl) * | 1995-11-29 | 1997-05-30 | Nedap Nv | Deactiveerbaar artikelbewakingslabel met gegevensdragerfunctie. |
WO1998033155A1 (fr) * | 1997-01-25 | 1998-07-30 | Philip Noel Leonard | Dispositifs d'identification ou de controle |
US6329917B1 (en) | 1997-01-25 | 2001-12-11 | Philip Noel Leonard | Identification or control arrangements |
AU724795B2 (en) * | 1997-01-25 | 2000-09-28 | Philip Noel Leonard | Identification or control arrangements |
EP0915439A2 (fr) * | 1997-09-16 | 1999-05-12 | Meto International GmbH | Procédé et dispositif pour identifier et déactiver une étiquette de sécurité |
US6592037B1 (en) | 1997-09-16 | 2003-07-15 | Meto International Gmbh | Method and device for the detection and deactivation of a deactivatable security element |
EP0915439A3 (fr) * | 1997-09-16 | 1999-12-08 | Meto International GmbH | Procédé et dispositif pour identifier et déactiver une étiquette de sécurité |
EP0933741A3 (fr) * | 1998-02-03 | 1999-12-08 | KTP Limited | Lecteur de codes à barres et dispositif de désactivation d'étiquettes de sécurité |
EP0933741A2 (fr) * | 1998-02-03 | 1999-08-04 | KTP Limited | Lecteur de codes à barres et dispositif de désactivation d'étiquettes de sécurité |
WO1999045512A1 (fr) * | 1998-03-05 | 1999-09-10 | Siemens Aktiengesellschaft | Procede permettant de proteger l'identite d'objets et dispositif permettant de mettre en oeuvre ce procede |
US6719202B1 (en) * | 1998-12-08 | 2004-04-13 | Fujitsu Limited | Commodity information management system |
WO2000039613A1 (fr) * | 1998-12-24 | 2000-07-06 | Gemplus Tag Australia Pty Ltd | Systeme de controle d'objets et de documents |
WO2001045063A1 (fr) * | 1999-12-15 | 2001-06-21 | Eident Limited | Etiquette |
GB2357611A (en) * | 1999-12-21 | 2001-06-27 | Ibm | Electronic location tag |
GB2357612A (en) * | 1999-12-21 | 2001-06-27 | Ibm | Electronic inventory tag |
US6288645B1 (en) | 1999-12-21 | 2001-09-11 | International Business Machines Corp. | Electronic location tag |
GB2357611B (en) * | 1999-12-21 | 2004-06-02 | Ibm | Electronic location tag |
Also Published As
Publication number | Publication date |
---|---|
AU6734587A (en) | 1987-07-28 |
AU588957B2 (en) | 1989-09-28 |
JPS63502697A (ja) | 1988-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU588957B2 (en) | Inventory control system | |
EP1382009B1 (fr) | Systeme et procede de commande de dispositifs distants | |
EP2377076B1 (fr) | Procédé et système pour une étiquette rfid uhf au niveau d'un article avec une alimentation assistée basse fréquence | |
US5955951A (en) | Combined article surveillance and product identification system | |
US5745036A (en) | Electronic article security system for store which uses intelligent security tags and transaction data | |
US5099226A (en) | Intelligent security system | |
US5942978A (en) | Wireless transmitter key for EAS tag detacher unit | |
EP1010152B1 (fr) | Etiquettes rfid pouvant etre reactivees par un procede electronique, physique ou virtuel | |
KR101782437B1 (ko) | Rfid 특징들을 갖는 eas 알람 태그 | |
EP1625558B1 (fr) | Etiquettes dures d'identification eas/rfid | |
EP1849144B1 (fr) | Enquete d'alarme au moyen d'une identification par radiofrequence | |
EP2603906B1 (fr) | Étiquette de sécurité à système eas et élément magnétique de captage d'énergie intégrés | |
EP1510985A2 (fr) | Méthode et dispositif pour détecter plusieurs étiquettes de sécurité | |
CA2372756A1 (fr) | Systeme de controle et d'enregistrement automatiques par identification rfid et surveillance electronique d'articles | |
US20090189768A1 (en) | Combination security tag using a perimeter rfid antenna surrounding an eas element and method thereof | |
EP2831856B1 (fr) | Système et procédé permettant de détecter la présence d'un objet | |
CA2176232A1 (fr) | Dispositif d'information et de prevention des vols a l'etalage | |
KR20180025608A (ko) | Rfid 태그와 이를 이용한 보안 관리 시스템 | |
US20070046437A1 (en) | Electronic Transmission Device for Activation of Electronic Article Surveillance Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE FR GB IT LU NL SE |