This document relates generally to security tag detection. More particularly, this document relates to systems and methods for validating the presence of a security tag using a rolling code security scheme for tag detection.
Electronic Article Surveillance (“EAS”) systems are often used by retail stores in order to minimize loss due to theft. One common way to minimize retail theft is to attach a security tag to an article such that an unauthorized removal of the article can be detected. In some scenarios, a visual or audible alarm is generated based on such detection. For example, a security tag with an EAS element (e.g., an acousto-magnetic element) can be attached to an article offered for sale by a retail store. An EAS exciter signal is transmitted at the entrance and/or exit of the retail store. The EAS exciter signal causes the EAS element of the security tag to produce a detectable response if an attempt is made to remove the article without first detaching the security tag therefrom. The security tag must be detached from the article upon purchase thereof in order to prevent the visual or audible alarm from being generated.
One type of EAS security tag can include a tag body which engages a tack. The tack usually includes a tack head and a sharpened pin extending from the tack head. In use, the pin is inserted through the article to be protected. The shank or lower part of the pin is then locked within a cooperating aperture formed through the housing of the tag body. In some scenarios, the tag body may contain a Radio Frequency Identification (“RFID”) element or label. The RFID element can be interrogated by an RFID reader to obtain RFID data therefrom.
The EAS security tag may be removed or detached from the article using a detaching unit. Examples of such detaching units are disclosed in U.S. Pat. No. 5,426,419 (“the '419 patent”), U.S. Pat. No. 5,528,914 (“the '914 patent”), U.S. Pat. No. 5,535,606 (“the '606 patent”), U.S. Pat. No. 5,942,978 (“the '978 patent”) and U.S. Pat. No. 5,955,951 (“the '951 patent”). The detaching units disclosed in the listed patents are designed to operate upon a two-part hard EAS security tag. Such an EAS security tag comprises a pin and a molded plastic enclosure housing EAS marker elements. During operation, the pin is inserted through an article to be protected (e.g., a piece of clothing) and into an aperture formed through at least one sidewall of the molded plastic enclosure. The pin is securely coupled to the molded plastic enclosure via a clamp disposed therein. The pin is released by a detaching unit via a probe. The probe is normally retracted within the detaching unit. Upon actuation, the probe is caused to travel out of the detaching unit and into the enclosure of the EAS security tag so as to release the pin from the clamp or disengage the clamp from the pin. Once the pin is released from the clamp, the EAS security tag can be removed from the article.
The present document concerns implementing systems and methods for detecting the presence of a security tag. The methods involve performing operations by a master pedestal of an EAS system to determine a first Tx/Rx scheme to be used during a first iteration of an EAS tag detection process. The first Tx/Rx scheme specifies during which time windows of a plurality of time windows a pedestal is to only transmit, only receive, or both transmit and receive. Accordingly, this determination is based on: (A) a first total number of time windows randomly selected from a plurality of total number of time windows in which an EAS exciter signal should be transmitted from at least one pedestal; and (B) first time windows randomly selected from the plurality of time windows in which the EAS exciter signal can be sent during the EAS tag detection process. Next, information specifying the first Tx/Rx scheme is communicated from the master pedestal to at least one slave pedestal of the EAS system. This communication can be achieved using a wired or wireless communications link. Thereafter, the master and slave pedestals perform transmit and receive operations in accordance with the first Tx/Rx scheme.
The master and/or slave pedestals make a determination that a responding device is not an EAS security tag when a response signal is received by at least one of the master pedestal and the slave pedestal during a time window in which the EAS exciter signal was not transmitted. In contrast, the master and/or slave pedestals make a determination that the responding device is an EAS security tag when a response signal is received by at least one of the master pedestal and the slave pedestal exclusively during time windows in which the EAS exciter signal was transmitted. An alarm may then be issued indicating that the presence of an EAS security tag has been detected.
In some scenarios, the first total number of time windows is different than a second total number of time windows on which a second Tx/Rx scheme was based. The first time windows may also be different than second time windows randomly selected from the plurality of time windows for purposes of determining the second Tx/Rx scheme. The second Tx/Rx scheme is used by the master pedestal during a second iteration of the EAS tag detection process.
In those or other scenarios, the master pedestal randomly selects the first Tx/Rx scheme from a pre-defined set of Tx/Rx schemes. Alternatively, the master pedestal randomly selects the total number of time windows and the first time windows using a first chaotic, random or pseudo-random algorithm. The first chaotic, random or pseudo-random algorithm may be different than a second chaotic, random or pseudo-random algorithm employed by another master pedestal. A seed value for the first chaotic, random or pseudo-random algorithm is a unique fixed value associated with the master pedestal or a variable value determined by the master pedestal during operations thereof. In effect, the master pedestal can randomly select a different Tx/Rx scheme for a plurality of iterations of the EAS tag detection process.
Embodiments will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures, and in which:
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
Reference throughout this specification to “one embodiment”, “an embodiment”, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present invention. Thus, the phrases “in one embodiment”, “in an embodiment”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used in this document, the singular form “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to”.
Novel Electronic Article Surveillance (“EAS”) tag detection systems will now be described with respect to
Referring now to
In this regard, EAS security tags 108 are securely coupled to articles (e.g., clothing, toys, and other merchandise) offered for sale by the retail store. At the exits of the retail store, detection equipment 114 sounds an alarm or otherwise alerts store employees when it senses an active EAS security tag 108 in proximity thereto. Such an alarm or alert provide notification to store employees of an attempt to remove an article from the retail store without proper authorization.
In some scenarios, the detection equipment 114 comprises antenna pedestals 112, 116. The antenna pedestals 112, 116 are configured to create a surveillance zone at the exit or checkout lane of the retail store by transmitting an EAS exciter signal. The EAS exciter signal causes an active EAS security tag 108 to produce a detectable response if an attempt is made to remove the article from the retail store. For example, the EAS security tag 108 can cause perturbations in the EAS exciter signal.
The antenna pedestals 112, 116 may also be configured to act as RFID readers. In these scenarios, the antenna pedestals 112, 116 transmit an RFID interrogation signal for purposes of obtaining RFID data from the active EAS security tag 108. The RFID data can include, but is not limited to, a unique identifier for the active EAS security tag 108. In other scenarios, these RFID functions are provided by devices separate and apart from the antenna pedestals.
The EAS security tag 108 can be deactivated and detached from the article using a detaching unit 106. Typically, the EAS security tag 108 is removed or detached from the articles by store employees when the corresponding article has been purchased or has been otherwise authorized for removal from the retail store. The detaching unit 106 is located at a checkout counter 110 of the retail store and communicatively coupled to a POS terminal 102 via a wired link 104. In general, the POS terminal 102 facilitates the purchase of articles from the retail store.
Detaching units and POS terminals are well known in the art, and therefore will not be described herein. The POS terminal 102 can include any known or to be known POS terminal with or without any modifications thereto. However, the detaching unit 106 includes any known or to be known detaching unit selected in accordance with a particular application.
In some cases, the detaching unit 106 is configured to operate as an RFID reader. As such, the detaching unit 106 may transmit an RFID interrogation signal for purposes of obtaining RFID data from an EAS security tag 108. Upon receipt of the unique identifier, the detaching unit 106 communicates the unique identifier to the POS terminal 102. At the POS terminal 102, a determination is made as to whether the unique identifier is a valid unique identifier for an EAS security tag of the retail store. If it is determined that the unique identifier is a valid unique identifier for an EAS security tag of the retail store, then the POS terminal 102 notifies the detaching unit 106 that the unique identifier has been validated, and therefore the EAS security tag 108 can be removed from the article.
The detection equipment 114 of
The detection equipment 114 will be positioned at a location adjacent to an entry/exit 204 of a secured facility (e.g., a retail store). The detection equipment 114 uses specially designed EAS marker tags (“security tags”) 108 which are applied to store merchandise or other items which are stored within a secured facility. The EAS security tags 108 can be deactivated or removed by authorized personnel at the secure facility. For example, in a retail environment, the EAS security tags 108 could be removed by store employees. When an active EAS security tag 108 is detected by the detection equipment 114 in an idealized representation of an EAS detection zone 308 near the entry/exit, the detection equipment 114 will detect the presence of such security tag and will sound an alarm or generate some other suitable EAS response, as described above. Accordingly, the detection equipment 114 is arranged for detecting and preventing the unauthorized removal of articles or products from controlled areas.
As noted above in relation to
Base 206 of master pedestal 112 has a Tx/Rx scheme controller 118 disposed therein, or alternatively coupled thereto via a wired or wireless communications link. In the later configuration, the Tx/Rx scheme controller 118 may be located within a separate chassis at a location nearby to the master pedestal. For example, the Tx/Rx scheme controller 118 can be located in a ceiling just above or adjacent to the master pedestal 112. Base 206 is also communicatively coupled to base 208 via a wired or wireless communications link such that information specifying Tx/Rx schemes can be communicated from the master pedestal 112 to the slave pedestal 116 during operations thereof.
The Tx/Rx scheme controller 118 comprises hardware and/or software configured to: (a) implement a previously randomly selected Tx/Rx scheme that is unique to the master pedestal 112 (such as at a manufacture's facility or during an installation process); and/or (b) randomly select a Tx/Rx scheme from a plurality of Tx/Rx schemes to be employed by the master/slave pedestals 112, 116 during any given iteration of an EAS tag detection process. In the later scenario (b), the Tx/Rx scheme controller 118 randomly selects (1) the total number of timeslots or time windows in which an EAS exciter signal should be transmitted from a pedestal and (2) the particular timeslots or time windows in which the EAS exciter signal is to be transmitted from the pedestal.
For example, a master/slave pedestal system implements a time multiplexed transmit/receive technique. The time multiplexed transmit/receive technique uses ten time windows during each iteration of a EAS tag detection process. The Tx/Rx scheme controller 118 randomly selects: five as the total number of time windows in which an EAS exciter signal should be sent during an iteration of a tag detection process; and time windows 2, 3, 4, 5 and 10 as the particular time windows in which the EAS exciter signal should be transmitted. Information specifying the Tx/Rx scheme is then communicated from the Tx/Rx scheme controller 118 of the master pedestal 112 to the slave pedestal 116 so that the slave pedestal 116 also operates in accordance with the Tx/Rx scheme during an intended iteration of an EAS tag detection process. According to this Tx/Rx scheme, the pedestal 112 and/or pedestal 116 is only supposed to receive a response signal during time windows 2, 3, 4, 5, and 10. If pedestal 112 and/or pedestal 116 still receive(s) a response signal when an exciter signal is not transmitted therefrom during time windows 1 and 6-9, then the device from which the response signal was received is determined to be exclusive of an EAS security tag. In contrast, if the pedestal 112 and/or pedestal 116 do not receive a response signal when an exciter signal is not transmitted therefrom during time windows 1 and 6-9, then the device from which the response signal was received is deemed to be an EAS security tag. At this time, an alarm may be issued. The present invention is not limited to the particulars of this example. For example, the total number of time windows in which an EAS exciter signal should be sent can be the same or different for a plurality of iterations of the EAS tag detection process. Also, the particular time windows in which the EAS exciter signal should be sent can be the same or different for a plurality of iterations of the EAS tag detection process.
The random selections made by Tx/Rx scheme controller 118 are facilitated using a chaotic number algorithm, a random number algorithm or a pseudo-random number algorithm. Chaotic/random/pseudo-random algorithms are well known in the art, and therefore will not be described herein. Any known or to be known chaotic/random/pseudo-random algorithm can be used herein without limitation. The algorithm employed by the master pedestal 112 may be the same as or different than the chaotic/random/pseudo-random algorithm employed by another master pedestal (not shown). The seed value for the algorithm is a unique fixed value associated with the respective master pedestal or a variable value determined by the master pedestal during operations thereof.
The pedestals 112, 116 will each generally include one or more antennas that are suitable for aiding in the detection of EAS security tags, as described herein. In some scenarios, the master pedestal includes an antenna suitable for transmitting or producing an electromagnetic exciter signal field in the detection zone. The EAS transmitter is operated in a time multiplex manner using a plurality of N timestamps or windows, where N is an integer (e.g., 10). The slave pedestal includes an antenna suitable for receiving response signals generated by security tags in the detection zone. The antennas provided in the pedestals can be conventional conductive wire coil or loop designs as are commonly used in AM type EAS pedestals.
In other scenarios, the master pedestal 112 includes at least one antenna 302a suitable for transmitting or producing an electromagnetic exciter signal field and receiving response signals generated by EAS security tags 108 in the detection zone 308. In some scenarios, the same antenna can be used for both receive and transmit functions. Similarly, the slave pedestal 116 can include at least one antenna 302b suitable for transmitting or producing an electromagnetic exciter signal field and receiving response signals generated by security tags in the detection zone 308. The antennas provided in the pedestals 112, 116 can be conventional conductive wire coil or loop designs as are commonly used in AM type EAS pedestals. These antennas will sometimes be referred to herein as exciter coils. In some scenarios, a single antenna can be used in each pedestal. The single antenna is selectively coupled to the EAS receiver. The EAS transmitter is operated in a time multiplexed manner as described herein. However, it can be advantageous to include two antennas (or exciter coils) in each pedestal as shown in
As noted above, the detection equipment 114 comprises an AM type EAS detection system. As such, each antenna is used to generate an Electro-Magnetic (“EM”) field which serves as a security tag exciter signal. The security tag exciter signal causes a mechanical oscillation of a strip (e.g., a strip formed of a magnetostrictive or ferromagnetic amorphous metal) contained in an EAS security tag within a detection zone 308. As a result of the stimulus signal, the EAS security tag 108 will resonate and mechanically vibrate due to the effects of magnetostriction. This vibration will continue for a brief time after the stimulus signal is terminated. The vibration of the strip causes variations in its magnetic field, which can induce an AC signal in the receiver antenna. This induced signal is used to indicate a presence of the strip within the detection zone 308. As noted above, the same antenna contained in a pedestal 112, 116 can serve as both the transmit antenna and the receive antenna. Accordingly, the antennas in each of the pedestals 112, 116 can be used in several different modes to detect a security tag exciter signal. These modes will be described below in further detail.
Referring now to
The antenna field pattern 400 shown in
The overlapping antenna field patterns 400, 500 in
Referring now to
Notably, in some scenarios, the novel EAS detection process involves a rolling code validation scheme in which the Tx/Rx scheme implemented by the master/slave pedestals changes during each iteration of an EAS tag detection process in accordance with a chaotic/random/pseudo-random algorithm employed by a Tx/Rx scheme controller (e.g., controller 118 of
As shown in
Referring now to
In some scenarios, a pre-defined set of Tx/Rx schemes unique to the master pedestal are employed. Accordingly, the master pedestal randomly selects one of the Tx/Rx schemes of the pre-defined set to use during the first iteration of the EAS tag detection process. The Tx/Rx schemes of the pre-defined set have (A) different total numbers of time windows in which an EAS exciter signal should be transmitted from a pedestal and (b) at least one different time window in which the EAS exciter signal is to be transmitted from the pedestal.
In other scenarios, a pre-defined set of Tx/Rx schemes is not employed. As such, the master pedestal randomly selects: (1) the total number of time windows in which an EAS exciter signal should be transmitted from a pedestal; and (2) the particular time windows of a plurality of time windows in which the EAS exciter signal is to be transmitted from the pedestal. The master pedestal then generates the Tx/Rx scheme based on the selection results (1) and (2). Random selections (1) and (2) can be made in accordance with the same or different chaotic/random/pseudo-random algorithm. The same or different seed value for the chaotic/random/pseudo-random algorithm(s) can also be used to make selections (1) and (2). The seed value(s) can be pre-stored in the master pedestal or dynamically generated by the master pedestal during operation thereof.
Upon completing step 904, step 906 is performed in which information specifying the first Tx/Rx scheme is communicated from the master pedestal to at least one slave pedestal (e.g., pedestal 116 of
If a response signal was not received during the time windows in which the exciter signal was not sent from the master pedestal and/or slave pedestal [910:NO], then it is determined that the responding device is an EAS security tag, as shown by step 912. In this case, an alarm is issued in step 914. Thereafter, step 918 is performed which will be described below.
In contrast, if a response signal was received during at least one time window in which the exciter signal was not sent from the master pedestal and/or slave pedestal [910:YES], then it is determined that the responding device is not an EAS security tag, as shown by step 916. In this case, an alarm would not be issued. Accordingly, method 900 continues with step 918.
Step 918 involves returning to step 904 so that a second Tx/Rx scheme is selected by the master pedestal for use during a second iteration of the EAS detection process. The second Tx/Rx scheme is different than the first Tx/Rx scheme. For example, the second Tx/Rx scheme: has a different total number of time windows in which an EAS exciter signal should be sent as compared to that of the first Tx/Rx scheme; and/or has a different set of time windows in which the EAS exciter signal is to be sent. Subsequent to completing step 918, step 920 is performed where method 900 ends or other processing is performed.
Referring now to
Process 1000 begins with step 1002 and continues with a decision step 1104. If a pre-defined set of Tx/Rx schemes are employed [1004:YES], then step 1006 is performed. In step 1006, the master pedestal performs operations to randomly select one of the Tx/Rx schemes from the pre-defined set of Tx/Rx schemes. The Tx/Rx schemes of the pre-defined set have (A) different total numbers of time windows in which an EAS exciter signal should be transmitted from a pedestal and (b) at least one different time window in which the EAS exciter signal is to be transmitted from the pedestal. Subsequent to completing step 1006, step 1014 is performed where method 1000 ends or other processing is performed.
If a pre-defined set of Tx/Rx schemes is not employed [1004:NO], then step 1008 is performed where the master pedestal randomly selects the total number of time windows in which an EAS exciter signal should be transmitted from a pedestal. In a next step 1010, the master pedestal randomly selects the particular time windows of a plurality of time windows in which the EAS exciter signal is to be transmitted from the pedestal. The random selections of steps 1008 and 1010 can be made in accordance with the same or different chaotic/random/pseudo-random algorithm. The same or different seed value for the chaotic/random/pseudo-random algorithm(s) can also be used to make selections (1) and (2). The seed value(s) can be pre-stored in the master pedestal or dynamically generated by the master pedestal during operation thereof. The master pedestal then generates the Tx/Rx scheme based on the results of operations performed in previous steps 1008 and 1010, as shown by step 1012. Subsequent to completing step 1012, step 1014 is performed where method 1000 ends or other processing is performed.
All of the apparatus, methods, and algorithms disclosed and claimed herein can be made and executed without undue experimentation in light of the present disclosure. While the invention has been described in terms of preferred embodiments, it will be apparent to those having ordinary skill in the art that variations may be applied to the apparatus, methods and sequence of steps of the method without departing from the concept, spirit and scope of the invention. More specifically, it will be apparent that certain components may be added to, combined with, or substituted for the components described herein while the same or similar results would be achieved. All such similar substitutes and modifications apparent to those having ordinary skill in the art are deemed to be within the spirit, scope and concept of the invention as defined.
The features and functions disclosed above, as well as alternatives, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements may be made by those skilled in the art, each of which is also intended to be encompassed by the disclosed embodiments.
Number | Name | Date | Kind |
---|---|---|---|
5426419 | Nguyen et al. | Jun 1995 | A |
5528914 | Nguyen et al. | Jun 1996 | A |
5535606 | Nguyen et al. | Jul 1996 | A |
5942978 | Shafer | Aug 1999 | A |
5955951 | Wischerop et al. | Sep 1999 | A |
7672260 | Wood, Jr. | Mar 2010 | B2 |
8134452 | Tuttle | Mar 2012 | B2 |
20060022800 | Krishna | Feb 2006 | A1 |
20080012710 | Sadr | Jan 2008 | A1 |
20080180222 | Hollister | Jul 2008 | A1 |
20090303014 | Brommer | Dec 2009 | A1 |
20120280796 | Gravelle | Nov 2012 | A1 |
20130234831 | Sabesan | Sep 2013 | A1 |