The present subject matter relates to radio frequency identification (“RFID”) devices. More particularly, the present subject matter relates to controlling the trigger thresholds of RFID devices used in an electronic article surveillance (“EAS”) system.
In retail stores, an accurate count of the products on display and/or in inventory is important. Additionally, it is important to have an effective anti-theft system in place. RFID tags and labels (which may be collectively referred to herein as “RFID devices”) have been employed to perform both of these functions.
An EAS system employing RFID technology typically has two primary read zones, each of which includes an associated RFID reader. One of the read zones is an area in the store where the products are presented to the consumer (which may be referred to herein as “inventory zone”), while the other read zone is an area at the exit of the store where any RFID devices that have not been suitably deactivated may be detected (which may be referred to herein as a “detection zone”) to trigger some type of alarm, indicating that an attempt is being made to steal the product(s). Typically, when a customer properly purchases an item, the cashier either removes or deactivates the RFID device associated with it. If the RFID device is not removed or deactivated, an RFID reader or readers will read the device and cause an alarm or other alert to trigger in the detection zone.
Although the above-described systems are widespread, there are certain disadvantages. When using RFID devices/systems for an EAS system, one common problem is that the read range of an RFID device in certain circumstances can be large enough that an RFID device in the inventory zone can be read in the detection zone or vice versa. To reduce this risk, a transition zone is frequently provided between the inventory zone and the detection zone to physically separate the two read zones. However, on account of different RFID devices having greater sensitivity at an operating frequency and/or different articles having different effects on the performance of the associated RFID devices, it is necessary for the transition zone to be relatively large. Large transition zones mean smaller inventory zones which means less physical space for the retailer to present merchandise to consumers and therefore lost sales (revenue).
There exists a need for an inventory management/EAS system in which the inventory zone is maximized while the transition zone is reduced or minimized yet still effective at detecting theft and reducing or minimizing false alarms.
It would, thus, be advantageous to provide an EAS system that is configured in a way that allows for the size of the transition zone to be reduced and/or for the incidence of false alarms to be reduced.
There are several aspects of the present subject matter which may be embodied separately or together in the devices, systems, and methods described and claimed below. These aspects may be employed alone or in combination with other aspects of the subject matter described herein, and the description of these aspects together is not intended to preclude the use of these aspects separately or the claiming of such aspects separately or in different combinations as may be set forth in the claims appended hereto.
In one aspect, an electronic article surveillance system includes a first read zone having an associated RFID reader and a second read zone having an associated RFID reader configured to detect an RFID device at a trigger threshold. The system further includes a controller configured to set the trigger threshold based at least in part on a factor selected from the group consisting of a value of a sensor of an RFID device, a number of times that an RFID device is detected in the first read zone, and whether an RFID device is detected in the first read zone under predetermined conditions.
In another aspect, a method is provided for controlling an electronic article surveillance system having first and second read zones, with an RFID device being detected in the second read zone at a trigger threshold. The method includes setting the trigger threshold based at least in part on a factor selected from the group of a value of a sensor of an RFID device, a number of times that an RFID device is detected in the first read zone, whether an RFID device is detected in the first read zone under predetermined conditions, and combinations thereof.
In yet another aspect, an electronic article surveillance system includes a first read zone including an associated RFID reader, with a piece of infrastructure at least partially positioned within the first read zone. An RFID guard device is secured with respect to the piece of infrastructure. A second read zone of the systems includes an associated RFID reader configured to detect an RFID inventory device associated with a piece of inventory removably associated with the piece of infrastructure at a trigger threshold. The system also includes a controller configured to, when the RFID guard device is detected by the RFID reader, initiate a response selected from the group consisting of modifying the trigger threshold, modifying an amount of power transmitted by the RFID reader associated with the second read zone, modifying a direction in which power is transmitted by the RFID reader associated with the second read zone, and transmitting a signal indicative of a need to move the piece of infrastructure away from the second read zone.
In another aspect, a method is provided for controlling an electronic article surveillance system having first and second read zones, with a piece of infrastructure at least partially positioned within the first read zone and having an associated RFID guard device, and with an RFID inventory device associated with a piece of inventory removably associated with the piece of infrastructure being detected in the second read zone at a trigger threshold. The method includes, upon detecting the RFID guard device in the second read zone, initiating a response selected from the group consisting of modifying the trigger threshold, modifying an amount of power transmitted by an RFID reader associated with the second read zone, modifying a direction in which power is transmitted by an RFID reader associated with the second read zone, and transmitting a signal indicative of a need to move the piece of infrastructure away from the second read zone.
As required, detailed embodiments of the present invention are disclosed herein; however, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriate manner.
As explained above, the inventory zone 12 represents an area in the store where products are presented to the consumer, while the detection zone 14 represents an area at the exit of the store where any RFID inventory devices that have not been suitably deactivated may be detected to trigger some type of alarm, indicating that an attempt is being made to steal them. When a customer properly purchases an item, the cashier either removes or deactivates the RFID inventory device associated with it. If the RFID inventory device is not removed or deactivated, it will be detected in the detection zone 14, which causes an alarm or other alert to trigger and notify store personnel.
Each piece of inventory 24, 26 is shown in
The EAS system 10 of
It should be understood that the configuration illustrated in
Regardless of the particular configuration of the EAS system, the transition zone 16 is ideally sized and configured such that RFID devices (especially RFID inventory devices) positioned in the inventory zone 12 are only detected by the RFID reader 20 associated with the inventory zone 12 and not by the RFID reader 22 associated with the detection zone 14 (or, in the case of the system 10′ of
According to one aspect of the present disclosure, the size of the transition zone 16 may be decreased by instead adjusting the level at which an RFID inventory device is detected in the detection zone 14 (which level may be referred to herein as the “trigger threshold”). While this aspect of the present disclosure is described in terms of adjustment of the trigger threshold of the detection zone 14 (to prevent false alarms when an RFID inventory device in the inventory zone 12 is detected in the detection zone 14), it should be understood that the trigger threshold of the inventory zone 12 may be similarly adjusted to prevent situations in which an RFID device in the detection zone 14 is detected in the inventory zone 12.
There are several factors that can affect the performance characteristics of an RFID device (and, thus, whether such an RFID device is detected in a separate read zone), such that there are various conditions that may warrant a change in the trigger threshold for a particular RFID device. According to one approach, an RFID inventory device may include a sensor that records a particular value that may be transmitted to the controller 18 of the EAS system 10, 10′. Depending on the value of the sensor, the controller 18 may determine whether to adjust the trigger threshold for the RFID inventory device in which the sensor is associated, which may include decreasing the trigger threshold (e.g., if the value indicates that the piece of inventory associated with the RFID inventory device is at risk of being stolen) or increasing the trigger threshold (e.g., if the value indicates that the piece of inventory associated with the RFID inventory device is not at risk of being stolen). The various RFID inventory devices may each be programmed with a unique identity to allow the controller 18 to assign an appropriate trigger threshold to the proper RFID inventory device.
The sensor may be variously configured without departing from the scope of the present disclosure. In one exemplary embodiment, the value of the sensor is a capacitance. Such a sensor may be particularly useful for an auto-tunable RFID device, which is configured to vary its capacitance in order to optimize performance of the RFID device. For example, when an auto-tunable RFID device is associated with a low loss material (e.g., a t-shirt or other light garment), the RFID device will tend to auto-tune to a relatively high capacitance to decrease performance peak into a desired RFID reader operating band. In contrast, when an auto-tunable RFID device is associated with or placed into the proximity of a high loss material (e.g., an item having a high water content, such as a human body), the RFID device will tend to auto-tune to a relatively low capacitance to increase performance peak. A relatively high capacitance will call for adjustment of the trigger threshold in one direction, while a relatively low capacitance will call for adjustment of the trigger threshold in the opposite direction. It may also be the case that the sensed capacitance is at a level that requires no adjustment to the trigger threshold.
In another exemplary embodiment, the sensor may be configured as a dielectric sensor, in which case the value of the sensor is a dielectric permittivity. Such a sensor may be advantageous when an RFID device is not auto-tunable and instead has a performance that is only affected by external factors (e.g., the nature of the associated piece of inventory). Dielectric loading may be determined, in one example, by measuring a value associated with the RFID device, such as received signal strength, as the RFID reader changes frequency. When an RFID device is associated with a light dielectric, read performance will tend to increase with increasing read frequency, whereas read performance will tend to decrease with increasing read frequency for an RFID device associated with a heavy dielectric. When the sensor value indicates association of the RFID device with a light dielectric, the trigger threshold may be increased to prevent false alarms (without increasing the risk that the RFID device will not be properly detected). Conversely, when the sensor value indicates association of the RFID device with a heavy dielectric, the RFID device will have a lower performance, in which case the trigger threshold may be decreased to allow for proper detection of the RFID device without increasing the risk of false alarms. It may also be the case that the sensed dielectric permittivity is at a level that requires no adjustment to the trigger threshold.
In yet another exemplary embodiment, the sensed value may be a temperature. A piece of merchandise is typically held close to a person when it is being stolen, which tends to increase the sensed temperature. Accordingly, an increase in the temperature of an RFID inventory device indicates that there is an increased risk that an attempt is being made to steal the associated merchandise, in which case the controller 18 may act to decrease the trigger threshold to better ensure that the RFID inventory device is properly detected if it is moved into the detection zone 14 without being deactivated.
In another exemplary embodiment, the sensed value is a degree of movement. A product being stolen will be in motion towards the store exit (and towards the detection zone 14), whereas items on display in the inventory zone 12 are likely to be stationary. Accordingly, an increase in the degree of movement experienced by an RFID inventory device indicates that there is an increased risk that an attempt is being made to steal the associated merchandise, in which case the controller 18 may act to decrease the trigger threshold to better ensure that the RFID inventory device is properly detected if it is moved into the detection zone 14 without being deactivated. Exemplary motion detectors could be moving objects, such as beams or flaps, that either change a value such as a voltage on a port of the RFID chip of the RFID device, or similar devices that modulate the input impedance of the RFID chip and, therefore, impose a modulation on its response. Materials such as piezoelectric plastics, resistive materials that change when stretched or are compressed, or forms of parallel plate capacitors in which the plate separation is affected by motion may also be used.
However, while it may generally be proper to decrease the trigger threshold upon sensing movement, that is not always the case. For example, it may be the case that a particular RFID device is associated with a piece of inventory intended to be used to replenish the stock of merchandise in the inventory zone 12 at a time when the EAS system 10, 10′ is active. This may be true of an RFID inventory device that has most recently been detected or read in the initial or preliminary read zone 40, as such an RFID inventory device has not yet been moved into the inventory zone 12 for display and consideration of the associated merchandise by customers. For a defined period (e.g., between 15 and 60 minutes), the trigger threshold for such an RFID inventory device may be set to a maximum (or at least elevated) level, as movement of such an RFID inventory device is not indicative of possible theft of the associated merchandise, but is instead indicative of the merchandise being moved into the inventory zone 12. After that time has elapsed, the controller 18 may treat the RFID inventory device as described above, which may include subsequent movement of the RFID inventory device causing the controller 18 to decrease the trigger threshold to better prevent theft of the merchandise associated with the RFID inventory device.
According to another aspect of the present disclosure, the trigger threshold may be adjusted based on the performance of an RFID inventory device in the initial or preliminary read zone 40. For example, if the initial or preliminary read zone 40 is configured as an RFID read chamber, each RFID device will be read or detected a certain number of times (due to the RFID read chamber including a plurality of antennas configured to emit signals within the RFID read chamber), which may vary based on a number of factors, including the nature of the associated piece of inventory. The number of times that an RFID inventory device is read may be encoded into the RFID device or stored in a database that is accessible by the controller 18 of the EAS system 10, 10′. The controller 18 may adjust the trigger threshold for a particular RFID inventory device based on the number of times that it is read in the RFID read chamber. A low number of reads may indicate that an RFID device is associated with a difficult-to-read product (e.g., merchandise having a high water content), whereas a high number of reads may indicate that an RFID device is associated with an easy-to-read product (e.g., a light garment). For an RFID inventory device having a low number of reads, the trigger threshold may be decreased to better ensure that the RFID inventory device is properly read (without increasing the risk of false alarms). For an RFID inventory device having a high number of reads, the trigger threshold may be increased to decrease the risk of false alarms without increasing the risk that the RFID inventory device will not be properly read or detected.
According to yet another aspect of the present disclosure, the trigger threshold may be adjusted upon the controller 18 determining that an RFID inventory device has been detected by the RFID reader associated with the read zone in which the RFID inventory device is positioned under predetermined conditions. For example, an RFID inventory device may be read or detected in the inventory zone 12 at a time when there are no people (or at least no customers) in the inventory zone 12 (e.g., as determined by a camera or other means associated with the controller 18) or when there are no RFID inventory devices being moved between the inventory zone 12 and the detection zone 14. RFID inventory devices detected in the inventory zone 12 under these conditions can be considered as being associated with merchandise that is at a lower risk of being stolen (compared to RFID inventory devices detected in the inventory zone 12 while customers are present). The trigger thresholds of such RFID inventory devices may be increased by the controller 18 to better ensure that such RFID inventory devices do not cause false alarms. Upon a customer entering the inventory zone 12, the trigger thresholds for the RFID inventory devices in the inventory zone 12 may be decreased by the controller 18, on account of the risk of theft increasing.
In some embodiments, any combination of capacitance, dielectric permittivity, temperature, and degree of movement may be used to adjust the trigger threshold.
While the preceding discussion has been specific to RFID inventory devices, it should be understood that a response or change in the operation of an EAS system may be initiated upon detection of an RFID guard device in the detection zone 14. As described above, an RFID guard device 36, 38 is intended to be positioned and remain within the inventory zone 12, associated with a piece of infrastructure 32, 34 used to display and/or support one or more pieces of inventory 24, 26. Thus, if an RFID guard device is detected in the detection zone 14, it may be indicative of an attempt to steal the associated piece of infrastructure (possibly along with any pieces of inventory associated with the piece of infrastructure) or indicative of the piece of infrastructure being placed too close to the detection zone 14, which may result in a false alarm being caused by an RFID inventory device associated with a piece of inventory associated with the piece of infrastructure corresponding to the RFID guard device.
Regardless of the circumstances under which an RFID guard device is detected in the detection zone 14, any of a number of responses may be initiated by the system controller 18 to prevent or reduce the likelihood of a false alarm. For example, one possible response is for the controller 18 to modify the trigger threshold of one or more RFID inventory devices associated with pieces of inventory associated with the piece of infrastructure corresponding to the RFID guard device (e.g., adjusting the trigger threshold of an RFID device secured to a shirt being worn by a mannequin in the inventory zone 12), which may include increasing the trigger threshold to reduce false alarms. Another possible response is modifying the amount of power transmitted by the RFID reader associated with the detection zone 14 and/or (if an antenna of the RFID reader is steerable) modifying the direction in which power is transmitted by the RFID reader to avoid detecting the RFID guard device. Yet another possible response is the controller 18 transmitting a signal indicative of a need for store personnel to move the piece of infrastructure associated with the RFID guard device (or the merchandise associated with the piece of infrastructure) away from the detection zone 14. In exemplary embodiments, the signal may be via a company network or via a light or other indicator associated with the piece of infrastructure to signify that there is a need to move the piece of infrastructure or associated merchandise to reduce the risk of false alarms.
RFID guard devices can come in different sensitivity grades; for example, an “A” may be high sensitivity, and if such an RFID guard device is detected in the detection zone 14, the risk of an overread is relatively low. “B” types may have relatively low sensitivity, and, if detected in the detection zone 14, indicate that the possibility of an overread is significant, in which case a different response may be initiated by the controller 18 compared to the response that would be initiated if an “A” type of RFID guard device was detected. To prevent issues, the trigger threshold for the components of the EAS system 10, 10′ configured to detect the RFID guard devices can be increased.
In an alternative format, an RFID guard device may have more than one identity associated it. An RFID device, at its most basic, includes an RFID chip coupled to an antenna. To provide an RFID guard device with multiple identities, a plurality of different RFID chips may be coupled to a common antenna, with each RFID chip having a different sensitivity (e.g., one “A” type of RFID chip having a high sensitivity, one “B” type of RFID chip having a lower sensitivity, and one “C” type of RFID chip having an even lower sensitivity). By determining which chip or chips is/are being detected in the detection zone 14, the system controller 18 can determine the risk of false alarms and take various actions based on the sensitivity or sensitivities of the detected chip or chips.
It will be understood that the embodiments described above are illustrative of some of the applications of the principles of the present subject matter. Numerous modifications may be made by those skilled in the art without departing from the spirit and scope of the claimed subject matter, including those combinations of features that are individually disclosed or claimed herein. For these reasons, the scope hereof is not limited to the above description but is as set forth in the following claims, and it is understood that claims may be directed to the features hereof, including as combinations of features that are individually disclosed or claimed herein.
The present application claims the benefit of U.S. Provisional Patent Application No. 62/970,933 filed Feb. 6, 2020, which is incorporated herein by reference in its entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2021/016836 | 2/5/2021 | WO |
Number | Date | Country | |
---|---|---|---|
62970933 | Feb 2020 | US |