The present subject matter relates to merchandise security tags. More particularly, the present subject matter relates to systems and methods for detecting the removal of a security tag, which may be an identification or labeling tag, such as a hang tag or a sewn-in-place tag, from a piece of merchandise.
It is known to employ radio frequency identification (“RFID”) technology in an area (for example within a store or other retail environment) for various purposes. In one example, an RFID reader is associated with a point-of-sale location or check-out counter of a store and detects a tag associated with an item being purchased to register the price of the item. In another example, an RFID-readable tag or transponder is attached to each piece of merchandise in a store or storage area. The tags are scanned using an RFID reader to keep proper count of the product inventory. In yet another example, RFID technology is used as a security measure.
In a typical RFID-based security system for a store, one or more RFID readers are installed adjacent to an exit, while guard tags are associated with (often by means of a hang tag or label) individual items sold in the store. When a customer purchases an item, the cashier will either remove or otherwise deactivate the guard tag associated therewith. If the guard tag has not been removed or deactivated (for example if a customer attempts to remove the item from the store without paying for it), the RFID reader or readers in the read field will sense the guard tag as the customer is exiting the store. Upon sensing the guard tag, the read field causes an alarm or other alert to trigger, thereby alerting store personnel to possible theft of the item. If, in an effort to avoid detection, the label or tag has been removed by a customer in an attempt to pilfer the associated piece of merchandise, the label or tag will not be read by the RFID reader and the customer may be able to exit the store without paying for the merchandise. Accordingly, it would be advantageous to provide a hang tag or the like which triggers an alarm when it has been removed from the merchandise by a customer while the merchandise remains in the store or otherwise is removed before being moved to a location where detection is to take place.
There are several aspects of the present subject matter which may be embodied separately or together in the devices and systems described and claimed below. These aspects may be employed alone or in combination with other aspects of the subject matter described herein, and the description of these aspects together is not intended to preclude the use of these aspects separately or the claiming of such aspects separately or in different combinations as may be set forth in the claims appended hereto.
In one aspect, a merchandise security tag such as a hang tag or the like comprises a substrate and an RFID chip affixed to the substrate. An antenna and a protection circuit are electrically connected to the RFID chip. An attachment element is associated with the substrate and configured such that removal of the hang tag from a piece of merchandise will damage the protection circuit. The RFID chip is configured to generate a first signal which triggers an alarm if the first signal is received by an RFID reader of a security system. The RFID chip is also configured to generate a second signal if the protection circuit is damaged, thereby triggering an alarm if the second signal is received by an RFID reader of a security system.
In another aspect, a merchandise security tag such as a hang tag or the like comprises a substrate and an RFID chip affixed to the substrate. An antenna and a protection circuit are electrically connected to the RFID chip. An attachment element is associated with the substrate and configured such that removal of the hang tag from a piece of merchandise will damage the protection circuit. The RFID chip is configured to generate a first signal which triggers an alarm if the first signal is received by an RFID reader of a security system. The RFID chip is also configured to generate a second signal unless the protection circuit is damaged, thereby triggering an alarm if the second signal is not received by an RFID reader of a security system.
In yet another aspect, a method is provided for detecting the attempted theft of a piece of merchandise. A merchandise security such as a hang tag or the like is provided, with the hang tag comprising an RFID chip and a protection circuit electrically connected to the RFID chip. The hang tag is connected to a piece of merchandise. If a first signal generated by the RFID chip is received by an RFID reader of a security system, an alarm is triggered. An alarm is also triggered if the protection circuit is damaged.
These, as well as other objects and advantages of this invention, will be more completely understood and appreciated by referring to the following more detailed description of the presently preferred exemplary embodiments of the invention in conjunction with the accompanying drawings, of which:
As required, detailed embodiments of the present invention are disclosed herein; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriate manner.
As security tags are used to prevent theft of merchandise, a thief has an incentive to remove the tag prior to passing through an area monitored by an RFID reader of a security system (typically located at or adjacent to the exit to the store). Illustrative security tags are shown in
The security tags 10 and 10a differ principally in how they are connected to a piece of merchandise 12 by an attachment element. The hang tag 10 of
The security tags 10 and 10a include an RFID chip 22 affixed to the substrate 16. The RFID chip 22 may be variously configured, for example, including an integrated circuit for controlling RF communication and other functions of the security tag.
An antenna 24 is electrically connected or coupled to the RFID chip 22. The RFID chip 22 and antenna 24 may be provided on an RFID inlay which can then be applied to a card stock to form the hang tag. RFID inlays, tags and labels are available from Avery Dennison RFID Company, Clinton, SC.
The antenna 24 is adapted to receive energy from an RF field and emit a signal which is transmitted back to one or more external devices, such as the RFID reader of a security system, which receives and analyzes the signal. In one embodiment, the RFID chip 22 is configured to generate at least a first signal and a second signal which are emitted by the antenna 24. The first signal triggers an alarm if it is received by the RFID reader of a security system, functioning according to typical electronic article surveillance principles. That is, the RFID security tag is in a read range of the RFID reader so that the reader can trigger the alarm of the electronic article surveillance device. Thus, if a customer attempts to leave the store without having the security tag properly removed or deactivated by store personnel, the RFID reader of a suitably positioned security system, such as at an exit of the store, will receive the first signal, resulting in an alarm or alert. The second signal is related to an anti-removal feature which triggers an alarm if the security tag is removed by a customer in the shopping area, as will be described in greater detail below.
A protection circuit or anti-tamper loop 26 is also electrically connected to the RFID chip 22. In the illustrated embodiments, the protection circuit 26 is a conductor which substantially encircles the RFID chip 22 and the antenna 24. Other configurations, such as a protection circuit 26 which encircles only the RFID chip 22, only the antenna 24, only a portion of the RFID chip 22, only a portion of the antenna 24, a portion of both the RFID chip 22 and the antenna 24, or neither, may also be employed, individually or together in combinations of two or more such configurations, without departing from the scope of the present disclosure. The protection circuit 26 that is specifically illustrated provides an anti-removal feature by interacting with the RFID chip 22 in one of a number of different possible ways.
For example, in one embodiment, when the protection circuit 26 is intact, it will allow the RFID chip 22 to generate a second signal that is emitted by the antenna 24. The second signal is treated as an “all clear” signal which is received by the RFID reader of a security system monitoring at least a portion of the shopping area. As long as the RFID reader is receiving the second signal (i.e., as long as the protection circuit 26 remains intact), there will be no alarm condition because the security tag, for example hang tag 10 or sewn-in tag 10a remains properly attached to the piece of merchandise 12. If the protection circuit 26 is damaged (typically by the security tag being removed from the piece of merchandise 12, as will be described in greater detail below), the RFID chip 22 will be unable to generate the second signal. In the absence of the expected second signal, the RFID reader of the security system will trigger an alarm, which is indicative of the security tag having been improperly removed by a customer in the zone monitored by the RFID reader (e.g., in a changing room).
In an alternative version of the preceding embodiment, damaging the protection circuit 26 causes the RFID chip 22 to generate a third signal instead of the expected second signal. The third signal is treated as a “tampering” or “alert” signal by the RFID reader of a security system monitoring the shopping area. When the RFID reader of the security system receives the third signal it will trigger an alarm, which is indicative of the security tag having been improperly removed by a customer in the zone monitored by the RFID reader.
In yet another embodiment, when the protection circuit 26 is intact it will prevent the RFID chip 22 from generating a second signal. In the absence of the second signal, there will be no alarm condition because the security tag remains properly attached to the piece of merchandise. If the protection circuit 26 is damaged (e.g., by the security tag having been removed from the piece of merchandise 12), it will allow the RFID chip 22 to generate a second signal. The second signal is treated as a “tampering” or “alert” signal by the RFID reader of a security system monitoring the shopping area. When the RFID reader of the security system receives the second signal it will trigger an alarm, which is indicative of the security tag having been improperly removed by a customer in the zone monitored by the RFID reader.
As an example, the most common way to remove a hang tag or a security tag or label is to grip it and abruptly pull in a direction away from the attachment element. Preferably, the attachment element is positioned and oriented such that removing the security tag from the associated piece of merchandise 12 will cause the attachment element to damage the protection circuit 26. For example, in the embodiment of
Damaging the protection circuit 26 while in a monitored shopping area leads to an alarm (as generally described above). It will be appreciated that, by properly positioning and orienting the attachment element, tampering with or removing the hang tag 10 and/or the sewn-in-place tag 10a inside of the store or secure area will trigger an alarm.
The protection circuit 26 as can be seen from the figures extends substantially peripherally around RFID antenna 24 to substantially enclose the RFID antenna 24 on the substrate to which it has been applied. Which the figures illustrate an inverted “U” shape extending above a sever line it should be understood that circuit 26 may include any other shape such that at least a portion of the circuit 26 extends over the cover line.
While the substrate on which the circuit and antenna are provided is shown in a generally rectangular or quadrate shape, other configurations are of course possible, such as those that might be used to highlight a brand or feature of the article to which it is attached.
The security tag of the present invention while shown with the security circuit exposed may be covered with a blank of material such as to form an enclosed label or hang tag. The security circuit may be inserted into another pocket or envelope or the security circuit may be exposed so that a would be thief can readily see the device is present and thereby provide a visual deterrent. The hang tag of the present invention may be provided with indicia such as that identifying a brand owner or other printed information such as pricing and care instructions for the article to which it is attached.
In another embodiment, severing of the circuit 26 will still allow the RFID circuit to function such that if a legitimate purchase is made, the RFID device can be returned to inventor when a inventory clerk scans or reads the information encoded on the chip.
Other embodiments, besides those illustrated in
It will be understood that the embodiments described above are illustrative of some of the applications of the principles of the present subject matter. Numerous modifications may be made by those skilled in the art without departing from the spirit and scope of the claimed subject matter, including those combinations of features that are individually disclosed or claimed herein. For these reasons, the scope hereof is not limited to the above description but is as set forth in the following claims, and it is understood that claims may be directed to the features hereof, including as combinations of features that are individually disclosed or claimed herein.
The present application claims the benefit of U.S. Provisional Application No. 61/556,861 filed Nov. 8, 2011, which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61556861 | Nov 2011 | US |