This invention generally relates to retail store security systems.
To deter retail theft and catch shoplifters, retail stores frequently employ electronic article surveillance (EAS) assemblies at strategic locations such as their exit doors. An example of such an EAS assembly is described in U.S. Pat. No. 5,387,900 the entire teachings of which are incorporated herein by reference. EAS assemblies may create an interrogation zone also known as security zones into which the EAS may transmit a signal that saturates the security zone. Items of retail merchandise are given tags which are passively or actively detectable as they pass through the EAS security zone. EAS systems utilize, for example, radio frequency identification (RFID) tags, radio frequency (RF) tags, acoustic magnetic (AM) tags and even microwave tags. These tags are removed or deactivated at the time of purchase. Thus, in general, the tags remain only on stolen items of retail merchandise. As the tagged item of retail merchandise passes through the interrogation zone of the EAS, it is detected and an alarm is triggered that notifies store personnel of the theft.
Retail merchants generally instruct store personnel not to endanger themselves by chasing the thief. They are typically instructed to notify and wait for security personnel or the police to respond. Often times the thief is able to escape from the store into an awaiting vehicle without further pursuit. Store personnel are left to review video surveillance, if there has been any taken, and or to give a verbal description of the thief to the police. Unfortunately, at times the video or oral description or both are simply not clear. Even if they are clear, it remains difficult to locate an unnamed thief and correlate identification based on imperfect video or a deficient oral description of the thief's person. Thus, the thief's personal identification can elude retailers and security and make prosecution for the theft difficult if not impossible.
Security systems that are much more regional and even global in scope are also known that utilize the transmission and unique identifiers of cellular phones. Such systems and methods are described for example in U.S. Patent Publication No. 2011/0134240, the entire teachings of which are incorporated herein by reference. In such systems passive and active detection of unique cellular phone identifiers are collected to identify, track, and locate cell phone users. Unfortunately, these systems are costly and intended for large law enforcement agencies in a post 9-11 terrorism environment. Such systems are impractical for a retail merchant.
Accordingly, there is a need for a low cost but effective security system for retail merchants that is able to assist in identification of a retail thief for later apprehension and eventual prosecution.
The invention provides such a security system. These and other advantages of the invention, as well as additional inventive features, will be apparent from the description of the invention provided herein.
In one aspect, the invention provides a security system that includes an electronic article surveillance assembly (EAS). A cellular phone identification assembly is communicatively coupled to the electronic surveillance assembly. A computer is communicatively coupled to the assemblies. The assemblies define a security zone. Upon detection of a tagged item of retail merchandise by the EAS, the cellular phone identification assembly captures an at least one unique cellular phone identifier for storage within a storage device of the computer.
The EAS is at least one of a radio frequency (RF) system, a radio frequency identification system (RFID), or an acoustic magnetic (AM) system. The EAS may further include a transmitter in an antenna frame that is in opposed space relation to a receiver in a second antennae frame of the EAS. The cellular phone identification assembly may be a stand-alone assembly or may be located within one of the first or second antennae frames.
In yet other embodiments the EAS may include a transmitter and receiver in a same antenna frame and the cellular phone identification assembly may be either a stand-alone assembly or may be located within the same antenna frame.
In certain embodiments the cellular phone identification assembly may include at least one stand-alone transceiver for active and passive detection of the at least one unique cellular phone identifier.
The captured at least one unique cellular phone identifier may be one of a Bluetooth identifier, a WiFi media access control (MAC) address, a Near Field Communication (NFC) identifier, and a Wireless Communication Network (WCN) identifier.
In certain embodiments a video surveillance system may be communicatively coupled to the assemblies and the computer.
Another aspect of the present invention is directed towards a method of capturing a unique cellular phone identifier of a suspected retail thief. The method includes detecting a tagged item of retail merchandise carried by the suspected retail thief within the security zone. The detection is communicated to a cellular phone identification assembly located within the security zone and to an alarm system. An at least one unique identifier of a cellular phone of the suspected retail thief is captured by the cellular phone identification assembly. A computer stores for later retrieval and analysis a detection time, the at least one unique cellular phone identifier and a capture time of the at least one unique cellular phone identifier. The security zone is provided by an electronic article surveillance assembly (EAS) and a cellular phone identification assembly communicatively coupled to the EAS.
The EAS may be one of at least a radio frequency (RF) system, a radio frequency identification system (RFID), or an acoustic magnetic (AM) system. In certain embodiments the cellular phone identification assembly is comprised of a transceiver and a receiver. The security zone may be located both inside and outside of a retail store.
The step of providing the security zone include may further include installing and communicatively coupling the cellular phone identification assembly in a pre-existing EAS within a retail store. In yet other embodiments the step of providing the security zone may include providing a stand-alone cellular phone identification assembly that is communicatively coupled to a pre-existing EAS within a retail store. The capturing of the at least one unique identifier may be one of at least a Bluetooth identifier, a WiFi media access control (MAC) address, a Near Field Communication (NFC) identifier, and a Wireless Communication Network (WCN) identifier.
The method may further include the step of notifying a jurisdictional law enforcement agency and retrieving from the computer storage, the transmission time, the at least one unique cellular phone identifier and the capture time of the at least one unique cellular phone identifier.
In yet another aspect of the present invention a method for capturing a unique cellular phone identifier of a retail thief is provided. The method includes providing a security zone. The security zone includes an electronic article surveillance assembly (EAS) and a cellular phone identification assembly that is communicatively coupled to the assemblies and to a computer. A transmission is detected from a tagged item of retail merchandise by the EAS as the retail merchandise passes through the security zone. A notification of the detection is communicated to the computer and to the cellular phone identification assembly. An at least one of a unique cellular phone identifier is captured by the cellular phone identification assembly. The capture of the at least one unique cellular phone identifier is communicated to the computer for storage. The computer stores for later retrieval a detection time, the at least one unique cellular phone identifier and a time of capture of the at least one of a unique cellular phone identifier. The method may include the additional step of communicating the detection time, the at least one unique cellular phone identifier and the time of capture to law enforcement personnel.
In yet another aspect prior to the step of communicating a notification of the transmission to the computer, the notification is sent to a controller for further notification to the cellular phone identification assembly.
Notification to the cellular phone identification assembly may trigger the cellular phone identification assembly to capture the at least one unique cellular phone identifier. The method may provide that the cellular phone identification assembly is located inside a retail store and outside the retail store. The cellular phone identification assembly may be comprised of at least one transceiver. The EAS may be at least one of a radio frequency (RF) system, a radio frequency identification system (RFID), or an acoustic magnetic (AM) system. The at least at least one unique identifier may be one of a Bluetooth identifier, a WiFi media access control (MAC) address, a Near Field Communication (NFC) identifier, and a Wireless Communication Network (WCN) identifier.
The accompanying drawings incorporated in and forming a part of the specification illustrate several aspects of the present invention and, together with the description, serve to explain the principles of the invention. In the drawings:
While the invention will be described in connection with certain preferred embodiments, there is no intent to limit it to those embodiments. On the contrary, the intent is to cover all alternatives, modifications and equivalents as included within the spirit and scope of the invention as defined by the appended claims.
Turning now to the drawings and with reference to
It may be that where a store has a pre-existing EAS 22 in place, it may be one utilizing a single antenna frame 46 that includes both the EAS 22 transmitter and receiver for detection of the tagged item of retail merchandise 38. (See for example
Upon detection by the EAS 22 of a tagged item of retail merchandise 38, notification of the detection, in an embodiment, may be sent to an alarm 52. The alarm 52 may be one of any number of alarm types known, for example, a light readily seen by store personnel on one or both of the antenna frame members 24, 26. In yet other embodiment the alarm 52 may be a light in combination with an audible alarm.
In certain embodiments, as shown here for example, the EAS 22 may be communicatively coupled 48 to a controller 34 that transmits the detection as a signal to the alarm 52 and then to computer 36 for processing the signal so as to alert store employees and/or security personnel within the store 12 via a computer network within the store, that is each check out screen (not shown) may show the alarm of a retail theft is in progress. The computer 36 stores the time of the detection for later retrieval and coordination with a capture time of a unique cellular phone identifier. Further, in certain embodiments the EAS 22 sends notification of the detection directly to the CPIA 28 in addition to the computer 36.
In the embodiment of
Some retail stores 12 may have pre-existing video surveillance systems 42. In an embodiment, security system 10 may be communicatively coupled to the video surveillance system 42. Further, the controller 34 may be utilized in certain embodiments to send a notification signal to the video surveillance system 42 to begin (if not already doing so) to begin to record video and to send the video to computer 36 for storage and later retrieval. Thus, for example, as shown here, video surveillance system 42 has omni directional cameras 44. Upon detection of a tagged item of retail merchandise 38 by the EAS 22, the EAS sends a notification signal of the detection to controller 34. Controller 34 signals the video surveillance system 42 to both begin recording and to store the video for later retrieval in computer 36.
Still with reference to
More specifically, one or more of the unique cellular phone identifiers may be the associated the cell phone's 40 use of wireless communication networks (WCN). The cell phone 40 in communicating within the WCN utilizes unique identifiers. These WCN identifiers may be the cell phone's telephone number, the electronic serial number (ESN), the MIN (mobile identification number), the international mobile equipment identifier (IMEI). The list is not exhaustive. Those skilled in the art will recognize that there are other unique cellular phone identifiers for any given cell phone, and all such unique cellular phone identifiers are encompassed herein. These standardized identifiers are available over the radio signaling interface between the mobile phone 40 and the wireless communication network. Thus, at times the cellular phone 40 when passing into the security zone 18 might very well be actively communicating with the WCN. Such communication and in particular the unique cellular phone identifiers associated with the cell phone's use of the WCN are captured by the CPIA 28 when notified to do so by the EAS 22 after the EAS 22 has detected a tagged item of retail merchandise 38 passing through the security zone 18. Such WCN detections of WCN identifiers are possible at ranges of up to 50 meters.
Cellular phones 40 also utilize short range communications systems such as WiFi and Bluetooth and Near Field Communications (NFC). Thus, unique identifiers, in addition to those associated with WCN transmissions, may also be obtained in certain embodiments of security system 10 from one or more WiFi, Bluetooth or NFC transmissions from the cell phone passing through security zone 18.
Each cell phone 40 that has Bluetooth capability has a unique Bluetooth identifier. Each cell phone that has WiFi capability has a WiFi network interface that typically provides the cellular phones media access control (MAC) address. The MAC address is unique to each cellular phone's wireless network interface controller. Further each cell phone 40 that has NFC capability has a unique NFC identifier.
The cell phone's 40 unique cellular identifier associated with Bluetooth may be detectable up to 100 meters from the receiver 31. WiFi may be detectable up to 100 meters, while Near Field transmissions may be detectable at 5 meters.
In the embodiment of
The CPIA 28 is composed of a transceiver 30 and two receivers 31, 32. Receiver 31 is located inside 14 retail store 12 and receiver 32 located outside 16 retail store 12. The CPIA 28 is placed downstream 54 of the EAS 22. The EAS 22 is communicatively coupled to the CPIA 28. Both assemblies 22, 28 are communicatively coupled to the computer 36. As previously discussed, such communicative coupling may include a controller 34.
When a tagged item of retail merchandise 38 passes through the security zone 18 it is detected by the EAS 22. The EAS 22 sends a notification signal either through controller 34 or directly to the CPIA 28. Transceiver 30 and receivers 31, 32 of the CPIA 28 are triggered to actively, in the case of transceiver 30, or passively, in the case of receivers 31, 32 to capture one of the unique identifiers of a cellular phone 40 passing through the security zone 18.
Thus, cellular phones utilizing a WCN or engaged in Bluetooth, WiFi and/or NFC or actively queried to engage in such transmissions by transceiver 30, transmit signals that are unique cellular phone identifiers that can be captured by the CPIA 28 assembly. Once the unique identifier is captured it is transmitted to the computer 36 for storage and later retrieval. Thus, at this point, the computer 36 has stored the EAS 22 detection time, the unique cellular phone identifier and the time of capture of the unique cellular phone identifier.
In a preferred embodiment the transceiver seeks to obtain the WiFi unique identifiers. The WiFi identifier is preferred because processing times associated with WiFi are much faster than the slower communications of Bluetooth and NFC.
In certain embodiments the CPIA 28 is passive only. Accordingly, only a passive receiver or receivers 30, 31 are utilized. The receivers 30, 31 are triggered 30, 31 by the EAS 22 either directly or via the controller 34 or computer 36 to capture a short range communication of the unique cellular phone identifier from one of or a combination of WiFi, Bluetooth, or NFC from the cell phone 40.
Also depicted in
As depicted in
Meanwhile, in light of the alarm 52, store personnel typically will have time to obtain their own visual identification of the thief and to contact law enforcement for apprehension. Where the thief has made an escape and has left the store 12 and its vicinity, for example via car, law enforcement personnel upon arrival at the store 12, may retrieve with the help of store personnel from the computer 36 a transmission time, the unique cellular phone identifier, and the digital video surveillance.
Correlation between the transmission time, the unique cellular phone identifier and the video is then made. It would not be uncommon that the CPIA 28 has captured more than one unique identifier because of the large security zone 18. However, between the video, timing, and verbal description of the thief the unique identifier can be narrowed down to a few if not sole suspect.
Turning now to
In
All references, including publications, patent applications, and patents cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
The use of the terms “a” and “an” and “the” and similar referents in the context of describing the invention (especially in the context of the following claims) is to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
Preferred embodiments of this invention are described herein, including the best mode known to the inventors for carrying out the invention. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate, and the inventors intend for the invention to be practiced otherwise than as specifically described herein. Accordingly, this invention includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the invention unless otherwise indicated herein or otherwise clearly contradicted by context.