n/a
The present invention relates to security systems, and in particular to electronic article surveillance, EAS, system alarming.
Businesses are constantly seeking ways to maximize customer satisfaction while at the same time improving sale finalization, i.e., completing a transaction. Waiting in line for ten to fifteen minutes to purchase items is one of the causes of customer dissatisfaction that may result in a customer abandoning their items, thereby hindering sale finalization. While some customers may re-visit the store during a less crowded period to purchase the abandoned items, others customers may not, thereby reducing the retail store's profits. Moreover, even if a customer chooses to re-visit the store to purchase abandoned items, it is possible that the abandoned items will be purchased by another customer before the re-visit, thereby reducing customer satisfaction. General frustration with long lines at store checkout stands can also harm a retailer's brand and keep new customers from visiting the store.
In order to help minimize issues associated with long wait times and poor sales finalization, some businesses have implemented mobile point of sale, POS, terminals to replace, or to be used in conjunction with, fixed POS terminals. Mobile POS terminals consist of an employee with a mobile device such as a tablet or other small handheld computer that can finalize a sale by allowing a customer to pay for items. Mobile POS terminals allow every employee equipped with the mobile device to have the capability to finalize a sale, such that more sales may be finalized without customers having to endure long wait times.
However, mobile POS terminals are not without faults. For example, some items may have an associated security tag that, when active and within a tag interrogation zone, triggers an alarm. The mobile POS terminal needs to have a dedicated tag deactivator or needs to be located near a tag deactivator in order to be able to disable the security tag. However, requiring a mobile POS terminal to be near a tag deactivator, limits mobility of the mobile POS terminal. Also, while mobile POS terminals may be constructed with a specific type of tag deactivator, e.g., acousto-magnetic tag deactivator, including the deactivator increases the upfront cost associated with mobile POS terminals and cost of upgrading equipment. Also, because tag deactivation is a relatively power intensive process, the use of a tag deactivator attached to and deriving its power from the battery of the mobile POS terminal may greatly increase the frequency with which the mobile POS terminal's battery must be charged. This reduces the convenience and workability of the mobile POS process, from the retail employee's perspective.
The present invention advantageously provides a method, system and apparatus for an electronic article surveillance, EAS, system.
According to one embodiment, an apparatus for inhibiting electronic article surveillance, EAS, system alarming is provided. The apparatus includes a receiver configured to receive captured identification data after a transaction. The apparatus further includes a processor configured to determine whether the captured identification data is associated with the transaction. The processor is further configured to determine whether to inhibit EAS system alarming based at least in part on the determination of whether the captured identification data is associated with the transaction. The determination whether to inhibit EAS system alarming is irrespective whether an active EAS tag is detected. The apparatus further includes a transmitter configured to transmit an authorization message. The authorization message indicates whether to inhibit EAS system alarming.
According to another embodiment, a system for inhibiting electronic article surveillance, EAS, alarming is provided. The system includes an identification device. The identification device includes a capture element configured to capture identification data after a transaction. The system further includes an apparatus in communication with the identification device. The apparatus includes a processor configured to determine whether to inhibit EAS alarming based at least in part on whether the captured identification data is associated with the transaction. The determination of whether to inhibit EAS alarming is irrespective whether an active EAS tag is detected. The apparatus further includes a transmitter configured to transmit an authorization message. The authorization message indicates whether to inhibit EAS alarming.
According to another embodiment, a method for inhibiting electronic article surveillance, EAS, system alarming is provided. Identification data captured after a transaction received. A determination whether the captured identification data is associated with the transaction is made. A determination whether to inhibit EAS system alarming is made based at least in part on the determination whether the captured identification data is associated with the transaction. The determination whether to inhibit EAS system alarming is irrespective whether an active EAS tag is detected.
A more complete understanding of the present invention, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings wherein:
The present invention advantageously provides a system, apparatus and method for electronic article surveillance, EAS, systems. Accordingly, the system, apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
As used herein, relational terms, such as “first” and “second,” “top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements.
Referring to the drawing figures in which like reference designators refer to like elements there is shown in
Identification device 14 is configured to communicate identification data and/or trigger indicator 42 (
Detection device 16 is configured to trigger an alarm when an active EAS tag is detected within an interrogation zone produced by detection device 16. Detection device 16 is further configured to inhibit EAS alarming as discussed in detail with respect to
With reference to
Memory 32 includes non-volatile and volatile memory. For example, non-volatile memory may include a hard drive, flash memory, memory stick and the like. Also, volatile memory may include random access memory and others known in the art. Memory 32 may store identification data 34 associated with one or more consumers, e.g., consumer 21. Memory 32 may also store program instructions, which when executed by processor 30, provide the functionality described herein for deactivation module 36. For example, deactivation module 36 includes instructions, which when executed by processor 30, cause processor 30 to perform the deactivation code process, discussed in detail below with reference to
System 10 includes one or more identification devices 14a to 14n (collectively referred to as “identification device 14”). Identification device 14 includes one or more transmitters 38 and one or more receivers 40 configured to communicate with portable device 12, detection device 16 and/or computing apparatus 18. Identification device 14 also includes indicator 42 that is configured to indicate to consumer 21 whether to proceed through an EAS interrogation zone, i.e., indicates whether EAS system alarming has been inhibited. For example, indicator 42 may be one or more light emitting diodes (“LEDs”), audio/video display, audible indicator, combination audio/visual indicator and/or haptic indicator, among other indicators capable of indicating to consumer 21 whether to proceed to exit 22. Identification device 14 also includes capture element 44 that is configured to capture identification data 34 after a completed transaction, e.g., captures identification data 34 as a consumer is walking towards exit 22 after making a purchase. Capture element 44 may be an NFC reader, RFID reader and/or card reader, among other readers configured to receive identification data 34 such as a customer identifier, mobile phone identifier, account number and membership number, among other identifier codes that may be read by capture element 44. In another example, identification data 34 may be an RFID identifier associated with the RFID portion of a combination RFID/EAS tag.
Alternatively, capture device 44 may be a biometric scanner configured to capture identification data from a user's fingerprint or other human characteristic(s) that is measurable by biometric reader that may be used to identify a human. Identification device 14 may include proximity detector 46 configured to detect the presence of consumer 21. Proximity detector 46 may be an infrared detector, among other types of detectors capable of detecting the presence of a human or object within a predefined zone. Identification device 14 also includes processor 48 and memory 50 that generally correspond to components of portable device 12, with size and performance being adjusted based on design need, while providing the functionality described herein with respect to identification device 14. Memory 50 includes indication module 52 that is configured to trigger an indication whether consumer 21 is authorized to enter an EAS interrogation zone produced by detection device 16, i.e., indicates whether consumer 21 is allowed to exit via exit 22. For example, indication module 52 includes program instructions, which when executed by processor 48, cause processor 48 to perform the indication process, discussed in detail below with respect to
Detection device 16 may include transmitter 54, receiver 56, processor 60 and memory 62 in communication with each other. In particular, transmitter 54, receiver 56, processor 60 and memory 62 generally correspond to the components of identification device 14 and/or portable device 12, with size and performance being adjusted based on design needs, while providing the functionality described herein with respect to detection device 16. For example, transmitter 54 and receiver 56 are configured to communicate with identification device 14, portable device 12 and/or computing apparatus 18 using communication protocols known in the art. Detection device 16 also includes EAS detector 58 that is configured to establish an EAS interrogation zone for detecting active EAS tags located within the EAS interrogation zone. EAS detector 58 may be an acousto-magnetic tag detector, among other types of detectors known in the art that detect an EAS portion of tag 24. Memory 62 includes inhibit module 64 that is configured to inhibit EAS alarm signaling. For example, inhibit module 64 includes program instructions, which when executed by processor 60, cause processor 60 to perform the inhibit process, discussed in detail with respect to
Computing apparatus 18 includes transmitter 66, receiver 68, processor 70 and memory 72 in communication with each other. Transmitter 66, receiver 68, processor 70 and memory 72 generally correspond to the components of portable device 12, identification device 14 and/or detection device 16, with size and performance being adjusted based on design needs, while providing the functionality described herein with respect to computing apparatus 18. Transmitter 66 and receiver 68 are configured to communicate information with portable device 12, identification device 14 and/or detection device 16 using one or more communication protocols known in the art. Memory 72 includes verification module 74, video analytics module 76, transaction data 78, disablement criteria 79, warning criteria 80 and video analytics criteria 81. In particular, verification module 74 includes program instructions, which when executed by processor 70, cause processor 70 to perform the verification process, discussed in detail with respect to
Video analytics module 76 includes program instructions, which when executed by processor 70, cause processor 70 to perform the video analytics process, discussed in detail with respect to
An exemplary indication process is described with reference to the flow chart of
If the determination is made identification data 34 has not been captured, Block S100 may be repeated. If the determination is made identification data 34 has been captured, processor 48 causes transmitter 38 to transmit a query message to computing apparatus 18 (Block S102). The query message indicates a request to inhibit EAS system alarming is being made. The query message includes captured identification data 34.
Processor 48 determines whether an authorization message has been received (Block S104). For example, processor 48 determines whether an authorization message has been received from computing apparatus 18 in response to the transmitted query message. If the determination is made an authorization message has not been received, the determination of Block S104 is repeated. Alternatively, processor 48 may cause indicator 42 to prompt customer 21 to reinitiate the capture of identification data 34 in which processor 48 performs the determination of Block S100, e.g., indicator 42 may be a video display that prompts customer to re-bump portable device 12 to identification device 14.
If the determination is made an authorization message has been received, processor 48 determines whether an inhibit criteria 53 are met (Block S106). In particular, the inhibit criteria 53 defines one or more rules that need to be met in order to trigger indicator 42 to indicate to consumer 21 to exit via exit 22. In one example, the inhibit criteria 53 are met when the received authorization message indicates authorization to inhibit EAS alarm signaling is granted. The inhibit criteria 53 are not met when the authorization message indicates authorization to inhibit EAS system alarming is not granted. Alternatively, inhibit criteria 53 are not met when an authorization message is not received within a predefined time period after capturing identification data 34. In another example, inhibit criteria 53 are met when the received authorization message indicates authorization to inhibit EAS alarm signaling and proximity data from proximity detector 46 indicates no other consumers 21 are present within a predefined zone, i.e., proximity detector 46 may be arranged to detect consumers within the interrogation zone or a zone proximate identification device 14.
In one example, inhibit criteria 53 are not met when the received authorization message indicates authorization to inhibit EAS alarm signaling but proximity data from proximity detector 46 indicates consumer 21 is no longer proximate identification device 14 and a second consumer 21 is detected proximate identification device 14. In other words, consumer 21 “bumped” identification device 14 with portable device 12 and kept walking without waiting for indicator 42 to trigger, during which another consumer 21 was detected moving towards exit 22, i.e., second consumer 21 or thief “tailgates” first consumer 21 who had a legitimate purchase hoping EAS system alarming will be inhibited while both first and second consumers walk pass detection device 16 to exit 22. In another example, inhibit criteria 53 may be met when identification data 34 includes a deactivation code such that Blocks S102 and S104 may be skipped, i.e., the received code from portable device 12 matches a predetermined deactivation code stored in memory 50. Inhibit criteria 53 may include other rules for determining whether to trigger indicator 42.
If processor 48 determines inhibit criteria 53 not met, processor 48 causes indicator 42 to trigger an indication not to proceed toward exit 22 (Block S108). If the determination is made that inhibit criteria 53 are met, processor 48 causes indicator 42 to trigger an indication that consumer 21 may proceed to exit 22 (Block S110). After the indication to proceed to exit 22 is triggered, processor 48 may determine whether a warning message has been received (Block S112). The warning message indicates suspicious activity within the EAS interrogation zone after EAS system alarming has been inhibited. For example, the warning message may indicate another consumer 21 is detected in the predefined zone while EAS alarming is inhibited. If the determination is made a warning message is received, indicator 42 is triggered (Block S116). For example, the indicator may warn the other detected consumer to wait or return back to a non-detection zone. In another example, warning message may alert an employee to monitor the predefined zone such as the EAS interrogation zone.
If the determination is made that a warning message has not been received, processor 48 determines whether a predefined time threshold has been reached (Block S114). The predefined time threshold corresponds to an amount of time EAS system alarm signaling is inhibited. In other words, processor 48 monitors for receipt of warning message while EAS system alarm signaling is inhibited. If processor 48 determines the predefined time threshold has not been reached, processor 48 performs the determination of Block S112 again. However, if the determination is made the predefined time threshold has been reached, i.e., EAS system alarm signal is not longer inhibited, the indication process may end or return to Block S100. In an alternative embodiment, Block S112-S116 may be omitted based on design need.
An exemplary verification process is described with reference to
Another rule in the disablement criteria 79 may include disabling EAS system alarming when received identification data in the query message is associated with transaction data 78 and proximity data received in query message indicates no other people are proximate the predefined zone. Another rule may be based on the number of times identification data 34 has been captured by detection device 14. For example, EAS system alarming will not be disabled or inhibited if the RFID identifier has been capture more than a predetermined number of times. Another rule may include disabling EAS system alarming is the received code, i.e., identification data 34, matches a code stored in memory 50. Also, disablement criteria 79 may include one or more rules from warning criteria 80 and/or video analytics criteria 81 discussed below. For example, disablement criteria 79 may include a rule for determining whether the customer or user associated with the transaction interacted with merchandise, i.e., un-purchased items, along the path trace of the customer in which the path trace is from a transaction location to a predetermined location different from the transaction location such as the location of identification device 14. The path trace may be generated by video analysis and/or wireless sensor network as discussed below.
If the determination is made that the disablement criteria 79 is not met, processor 70 causes transmitter 66 to transmit an authorization message indicating permission to inhibit EAS system alarming is not granted, i.e., EAS system alarming is kept active (Block S122). For example, transmitter 66 may transmit the authorization message to identification device such that indicator 42 is triggered, as discussed above with respect to Blocks S108 and S110. Alternatively, processor 70 does not transmit an authorization message if the disablement criteria are not met such that detection device 16 will remain active, i.e., detection device 16 keeps EAS interrogation zone active if an authorization message is not received. One or more authorization messages indicating EAS system alarming remains active may be transmitted to identification device 14, portable device 12 and/or detection device 16 using one or more communication protocols.
If processor 70 determines disablement criteria 79 is met, processor 70 cause transmitter 66 to transmit an authorization message indicating permission to inhibit EAS system alarming is granted (Block S124). For example, detection device 16 inhibits EAS system alarming when a received authorization message indicates to inhibit the alarming, as discussed in detail with respect to
One or more authorization messages indicating to inhibit EAS system alarming may be transmitted to detection device 16, identification device 14 and/or portable device 12 using one or more communication protocols. Also, identification device 14 and/or portable device 12 may indicate to consumer 21 to proceed to exit 22 when the authorization message indicates permission to inhibit EAS system alarming is granted. Processor 70 monitors the EAS interrogation zone for suspicious activity as discussed in detail with respect to
After the image of the customer associated with the transaction has been captured, processor 70 determines whether the customer associated with the transaction is exiting the store, i.e., whether customer 21 is proximate a predefined zone such as an EAS interrogation zone and is walking towards exit 22 (Block S130). For example, processor 70 uses video images captured from one or more video cameras located proximate exit 22 to determine whether the customer is proximate the EAS interrogation zone. In another example, processor 70 may track the customer throughout the building or retail store using one or more in-store video cameras such that processor 70 is able to determine whether the customer is proximate the EAS interrogation zone and walking towards exit 22. For example, processor 70 performs video analysis to generate a path of the customer from a transaction location to a predetermined location different from the transaction location such as a location of identification device 14 or exit 22.
If the determination is made the customer associated with the transaction is not exiting or not proximate the EAS interrogation zone, the determination of Block S130 is repeated. If the determination is made the customer associated with the transaction is exiting, processor 70 determines whether video analytics criteria 81 is met (Block S131). Video analytics criteria 81 may include one or more rules for determining whether to grant authorization to inhibit EAS system alarming. One rule in video analytics criteria 81 may include determining whether the customer or user associated with the transaction interacted with merchandise along the path trace of the customer. The path trace of the customer may indicate the customer stopped and picked up an item after the transaction but before reaching identification device 14 such that authorization may not be granted to inhibit EAS system alarming. If the path trace of the customer indicates the customer did not have interaction with merchandise along the path trace of the customer, EAS system alarming may be inhibited. The parameters for determining whether an interaction took place along the path trace may be predefined by a system provider, management employee and/or user with authorization to set the parameters. The parameters may include an amount of time the customer is stopped and/or body, e.g., arm, movement by the customer, among other parameters that may be tracked by one or more cameras that indicate the customer is interacting with un-purchased items.
If the determination is made that video analytics criteria 81 is met, processor 70 causes transmitter 66 to transmit an authorization message indicating permission to inhibit EAS system alarming has been granted (Block S132). For example, one or more authorization messages are transmitted to detection device 16, identification device 14 and/or portable device 12 using one or more communication protocols. In other words, the determination whether to inhibit EAS system alarming is made without regard to whether an active EAS tag 20 is detected. If processor 70 determines the video analytics, processor 70 causes transmitter 66 to transmit an authorization message indicating permission to inhibit EAS system alarming has not been granted (Block S133). Returning to Block S132, after the authorization message indicating permission has been granted is transmitted, processor 70 monitors the EAS interrogation zone for suspicious behavior as discussed in detail with respect to
An exemplary monitoring process is described with respect to
Another rule in warning criteria 80 may include determining whether the path trace of a customer associated with the transaction indicates the customer interacted with merchandise along the path trace and/or whether the path taken by the customer is suspicious. For example, the customer associated with the transaction may be given a wireless sensor node based tag or token that the customer will eventually dropped off near identification device 14 or exit 22. The path trace created by the wireless sensor node based tag that is being carried around by the customer is used to determine whether this path trace based rule is met. For example, the path trace created by a wireless sensor node tag may indicate the user interacted with one or more un-purchased item based at least in part on a predefined amount of time the customer was stopped along the path trace, i.e., warning criteria 80 is met.
In other example, the path trace created by the wireless sensor node may indicate the customer took an unconventional path to exit 22 such as a path where the customer visits multiple locations in the store after the transaction. Further, the path trace may be determined to be unconventional by processor 70 if the path trace indicates the customer visited a predetermined location after the transaction such as jewelry or expensive merchandise location within the store. Furthermore, the path trace generated by video analysis may be compared to the path trace generated by the wireless sensor node in which processor 70 can compare the two path traces for consistency. If one path trace substantially deviates from the other, warning criteria 80 may be met. Another rule in warning criteria 80 may include determining whether the wireless sensor node tag was dropped off at exit 22. For example, if the wireless sensor node tag that is given to the customer after a transaction is not dropped off at exit 22, as sensed by the wireless sensor network, warning criteria 80 is met. If the wireless sensor node tag is dropped off at or near exit 22 and/or identification device 14, warning criteria 80 may not be met.
If the determination is made that warning criteria 80 are not met, processor 70 determines whether a predefined time threshold has been reached (Block S138). For example, the predefined time threshold corresponds to an amount of time EAS system alarm signaling is inhibited similar to Block S114 such that processor 70 monitors the EAS interrogation zone while EAS system alarming is inhibited.
Referring back to Block S136, if the determination is made that warning criteria 80 are met, processor 70 causes transmitter 66 to transmit a warning and/or receive message to identification device 14, portable device 12 and/or detection device 16 (Block S140). For example, identification device 14 may trigger indicator 42 based at least in part on the received warning message, as discussed in Blocks S112. The warning message may trigger video monitoring of the predefined zone/area. Also, the warning message may be transmitted to an employee in order to notify the employee to monitor the predefined zone. A resume message may be transmitted to detection device 16 to cause detection device 16 to reinitiate EAS system alarming before the predefined time is reached in the case where warning criteria 80 are met.
With respect to
If processor 60 determines not to inhibit EAS system alarming based at least in part on the received authorization message, processor 60 repeats the determination of Block S142. If the determination is made to inhibit EAS system alarming based at least in part on the received authorization message, processor 60 inhibits EAS system alarming (Block S146). For example, EAS system alarming may be inhibited by deactivating or disabling EAS detector 58 such that an active EAS security tag is not detected when located within EAS interrogation zone. In another example, the EAS alarm may be inhibited by disabling the EAS alarm while EAS detector 58 continues to detect active EAS security tags in the EAS interrogation zone, i.e., system 10 does not trigger a visual and/or audible alarm in response to detecting an active EAS security tag 24. Alternatively, inhibiting EAS system alarming may include altering the EAS alarm, i.e., making EAS alarming only visual, a short less obtrusive audio signal or a text message to the customer and/or employee. Inhibiting the alarm may also include switching off the power to the audio and/or light flashing sub-circuits of the alarm. This would also be accompanied by the generation of a suppression flag in the firmware or software code running on processor 60 such that no silent alarms or alarm log events would be created and sent to external servers or applications running on a local network or remote network.
After EAS system alarming has been inhibited, processor 60 determines whether a predefined time has been reached, i.e., EAS system alarming is inhibited for up to the predefined time (Block S146). The predefined time is also described with respect to Block S114 and may be defined by a management employee or other authorized person. If processor 60 determines the predefined time has not been reached, processor 60 determines whether a resume message has been received (Block S150). A resume message indicates to detection device 16 to reinitiate EAS system alarming, i.e., EAS system alarming may be reinitiated before the predetermined time is reached when warning criteria 80 are met as discussed in detail with respect to Block S140. If the determination is made a resume message has not been received, processor 60 repeats the determination of Block S148.
If the determination is made a resume message has been received, processor 60 enables or actives previously disabled EAS system alarming (Block S152). For example, processor 60 enables the previously disabled EAS detector 58. Referring back to Block S148, if the determination made the predefined time has been reached, processor 60 enables previously disabled EAS system alarming such that EAS system alarming is temporarily inhibited long enough for customer 21 to reach exit 22 without triggering an EAS alarm, i.e., performs Block S152.
An exemplary deactivation code process is illustrated in
If processor 30 determines deactivation has been requested, processor 30 determines whether transaction criteria are met (Block S156). The transaction criteria stored in memory 32 includes one or more rules that must be met in order for the program application to generate a deactivation code. For example, one rule in transaction criteria may include whether an electronic receipt for a transaction has been received by portable device 12. Another rule may include whether the deactivation request occurred within a predefined time period from the time the transaction occurred in which the received electronic receipt indicates when the transaction occurred. Another rule may include whether the items listed in the received electronic receipt includes at least one item associated with a security tag. In other words, portable device 12 receives completed transaction data such as via an electronic receipt such that processor 30 determines whether the transaction criteria are met. If the transaction criteria are determined not to be met, the deactivation process may end or the user may be prompted to reinitiate the deactivation code process. If the transaction criteria are met, processor 30 generates a deactivation code (Block S158). For example, processor 30 may generate a quick response (“QR”) code or other optically scanable code that indicates permission to inhibit EAS system alarming has been granted. Alternatively, processor 30 may generate an alpha, numeric or alpha-numeric code that may be input via an input element on detection device 16 such as a keypad. In other words, the generation of the deactivation code to inhibit EAS system alarming is made without regard to whether an active EAS tag is detected. After the deactivation code has been generated, portable device may display the generated code via portable device 12 display such as a mobile device display. The displayed code may be captured by capture element 44 (Block S158).
It will be appreciated by persons skilled in the art that the present invention is not limited to what has been particularly shown and described herein above. In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. A variety of modifications and variations are possible in light of the above teachings without departing from the scope and spirit of the invention, which is limited only by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
377/DEL/2013 | Feb 2013 | IN | national |