Various example embodiments relate generally to retail theft detection and deterrent and merchandise protection devices and methods.
Security devices may be attached to individual products in order to deter or prevent theft from retail establishments. In some cases, the security devices include tags or other such components that can be wirelessly detected by gate devices at entrances and exits to a retail space. When the security device passes through or proximate to the gate device, an alarm may be generated. The alarm may, in some instances, be an audible alarm that is emitted locally by the security device affixed to the protected product and/or emitted by sounders associated with the gate devices. To avoid sounding the alarms when a product is properly purchased, the security device may be removed or deactivated by store personnel. For example, a key may be provided at the point of sale terminal which facilitates removal of the security device. Alternatively, the security device may be deactivated by store personnel using a deactivation device that, in some instances, sends a signal to the security device to inhibit the device's ability to trigger an alarm when the corresponding products are purchased. However, due to store error or theft, a product may occasionally leave a retail establishment or store without the security device being removed or deactivated.
Some example embodiments may provide a non-deactivated tag monitor that is configured to issue alerts when a non-deactivated security tag is detected in a monitoring zone located outside a retail space. In some cases, the non-deactivated tag monitor may be configured to provide trend analysis for theft deterrent and detection measures.
In one example embodiment, a non-deactivated tag monitor may include processing circuitry configured to receive alerting criteria. The alerting criteria may include a first set of identification information associated with at least one tag, the at least one tag having an activated and deactivated state, where transitioning from the activated and deactivated state occurs at a point of sale prior to exiting the retail space. The tag may be configured to be monitored in a first monitoring zone associated with a retail space. The processing circuitry may be further configured to: receive a second set of identification information associated with a non-deactivated tag detected by at least one tag reader positioned in a second monitoring zone, the second monitoring zone being established outside the retail space; and compare the second set of identification information to the alerting criteria.
According to another example embodiment, a method of monitoring a non-deactivated tag is provided. The method may include receiving alerting criteria. The alerting criteria may include a first set of identification information associated with at least one tag, the at least one tag having an activated and deactivated state, where transitioning from the activated and deactivated state occurs at a point of sale prior to exiting the retail space. The tag may be configured to be monitored in a first monitoring zone associated with a retail space. The method may further include: receiving a second set of identification information associated with a non-deactivated tag detected by at least one tag reader positioned in a second monitoring zone, the second monitoring zone being established outside the retail space; comparing the second set of identification information to the alerting criteria; and, initiating an alerting response in response to the comparison of the set of identification information to the alerting criteria.
According to another example embodiment, a system for monitoring tags is provided. The system may include a plurality of tag readers associated with a second monitoring zone, and a non-deactivated tag monitor. The non-deactivated tag monitor may include processing circuitry configured to receive alerting criteria. The alerting criteria may include a first set of identification information associated with at least one tag. The at least one tag may have an activated and deactivated state, where transitioning from the activated and deactivated state occurs at a point of sale prior to exiting the retail space. The tag may be configured to be monitored in a first monitoring zone associated with a retail space. The process circuitry may be further configured to: receive a second set of identification information associated with a non-deactivated tag detected by at least one tag reader positioned in a second monitoring zone, the second monitoring zone being established outside the retail space; compare the second set of identification information to the alerting criteria; and initiate an alerting response in response to the comparison of the set of identification information to the alerting criteria.
Having thus described some example embodiments in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Some example embodiments now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all example embodiments are shown. Indeed, the examples described and pictured herein should not be construed as being limiting as to the scope, applicability or configuration of the present disclosure. Rather, these example embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout. Furthermore, as used herein, the term “or” is to be interpreted as a logical operator that results in true whenever one or more of its operands are true. As used herein, operable coupling should be understood to relate to direct or indirect connection that, in either case, enables functional interconnection of components that are operably coupled to each other.
As used herein, the terms “component,” “module,” and the like are intended to include a computer-related entity, such as but not limited to hardware, firmware, or a combination of hardware and software. For example, a component or module may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, and/or a computer. By way of example, both an application running on a computing device and/or the computing device can be a component or module. One or more components or modules can reside within a process and/or thread of execution and a component/module may be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component/module interacting with another component/module in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal. Each respective component/module may perform one or more functions that will be described in greater detail herein. However, it should be appreciated that although this example is described in terms of separate modules corresponding to various functions performed, some examples may not necessarily utilize modular architectures for employment of the respective different functions. Thus, for example, code may be shared between different modules, or the processing circuitry itself may be configured to perform all of the functions described as being associated with the components/modules described herein, Furthermore, in the context of this disclosure, the term “module” should not be understood as a nonce word to identify any generic means for performing functionalities of the respective modules. Instead, the tern “module” should be understood to be a modular component that is specifically configured in, or can be operably coupled to, the processing circuitry to modify the behavior and/or capability of the processing circuitry based on the hardware and/or software that is added to or otherwise operably coupled to the processing circuitry to configure the processing circuitry accordingly.
Theft deterrent devices or other such trackable devices or tags are often affixed to products in a retail space (e.g., a retail store) in order to deter theft and thereby reduce losses incurred by retailers. An example of such a tag is an RFID tag. If products are outfitted with a tag, the movement of the products may be detected or tracked. Alternatively or additionally, inventory counting can be performed in an automated or semi-automated way by leveraging the tags affixed to the products. Tags may be used to ensure that the products are not removed from the retail space without proper point of sale processing. However, according to some example embodiments, a tag may not be physically deactivated (e.g., damaged in such a way that it is no longer readable), but rather virtually deactivated (e.g., in a database) where the tag is still readable but has been logged in a database as having been properly purchased. As used herein, the term “deactivated” refers to virtual deactivation, where a product was properly purchased and the tag associated with the product has been logged as being purchased in a database for the retailer that is selling the product. Accordingly, a tag located outside of the tag's home retail space that has not been properly purchased (and not logged as such in a database) is defined as a non-deactivated tag. Further, during a point of sale transaction, data associated with the product and tag in a database may be modified or logged to indicate that the product had been purchased, and thus, upon leaving the retail space, a security gate that still detects the presence of the tag affixed to the product would not trigger an alarm because the product was properly purchased and deactivated, as indicated by the associated data in the database. Additionally, if the product is stolen from a retail space, the trackable device associated with the product is still capable of being read, for example, by a reader outside of the tag's home retail space such as, for example, a reader incorporated into a security gate at another retailer. Regardless of the reason the tag may have left the retail space, because it is still capable of being read and tracked, these tags may still be used to locate or detect the product, if for example, the devices entered a monitoring zone located away from the original retail space (e.g., outside or inside another retail space).
A product having an affixed tag may be referred to as a tagged product. As described, a tagged product may have an RFID tag affixed to it that, in some instances, for example, may be sewn into a product that is a garment, and therefore the tag may travel with garment throughout the garment's useable life, while still being capable of being read by, for example, RFID readers at various retail spaces. In other words, the tag may still be readable after the tag leaves the retail space where the product associated with the tag could have been properly purchased or stolen from (i.e., the product's and tag's “home” retail space). According to various example embodiments, these non-deactivated tags may be read by monitoring systems of foreign or non-home retail spaces (i.e., foreign monitoring systems). Accordingly, some example embodiments may enable the detection of a non-deactivated tag when it enters a monitoring zone that is located outside of and away from the tag's home retail space. As such, when the non-deactivated tags are detected by a monitoring system, example embodiments may include providing an alert to 1) specified store personnel of the retail space from which alerting criteria was received, 2) specified store personnel of an additional retail space which is located close to the monitoring zone in which the tag was detected, 3) local law enforcement, or 4) loss prevention and/or the like. Even further, the information associated with the non-deactivated tags may be aggregated and analyzed so that trends can be detected. This trend analysis may be reported to participating retail spaces and used to recommend theft detection and deterrent actions to those participating retail spaces.
As shown in
As shown in
Further, the combination of a plurality of zones may result in a large overall area that can be monitored. The resulting large overall area may allow for monitoring on a local level (e.g., mall), regional level (e.g., city, cities, or state), or national level states or country), depending on what and how many zones are combined. For example, the zones 120, 122, 124, 126, 128, 130, and 132 shown in
Retail spaces interested in participating in the detection of non-deactivated tags outside the home retail space may subscribe to receive alerts once a pre-determined tag is detected, and/or trends and recommended actions associated with the non-deactivated tags. Not all retail spaces in a pre-determined area or monitoring zone have to subscribe in order to facilitate the detection of non-deactivated tags outside a retail space. For example, as shown in
Further, as shown in
As shown in
The non-deactivated tag monitor 340 may be a computer, server, or other terminal that may host software and/or hardware configurable to 1) transform the position or presence data associated with the detected non-deactivated tags 112, and the products to which they are attached, into monitoring data so that an alerting function may be triggered either at the non-deactivated tag monitor 340 or system controller 350 and/or 2) aggregate and analyze data associated with the information of tags received from a retail space and tags detected by a tag reader, and the products to which they are attached.
In some embodiments, the processing circuitry 410 may be embodied as a chip or chip set. In other words, the processing circuitry 410 may comprise one or more physical packages (e.g., chips) including materials, components, and/or wires on a structural assembly (e.g., a baseboard). The structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon. The processing circuitry 410 may therefore, in some cases, be configured to implement an embodiment of the present invention on a single chip or as a single “system on a chip.” As such, in some cases, a chip or chipset may constitute means for performing one or more operations for providing the functionalities described herein.
In an example embodiment, the processing circuitry 410 may include one or more instances of a processor 412 and memory 414 that may be in communication with or otherwise control a device interface 420. As such, the processing circuitry 410 may be embodied as a circuit chip (e.g., an integrated circuit chip) configured (e.g., with hardware, software, or a combination of hardware and software) to perform operations described herein.
The device interface 420 may include one or more interface mechanisms for enabling communication with other devices. These devices may include, but are not limited to, a computing system 430 associated with a retail space, tag reader 110, and system controller 350. In some cases, the device interface 420 may be any means such as a device or circuitry embodied in either hardware, or a combination of hardware and software that is configured to receive and/or transmit data from/to devices or components in communication with the processing circuitry 410 via internal and/or external communication mechanisms. Accordingly, for example, the device interface 420 may further include wireless communication equipment (e.g., one or more antennas) for at least communicating with tag readers 110, computing systems 430 associated with retail spaces, and/or a system controller 350. The device interface 420 may therefore include one or more antenna arrays that may be configured or configurable to receive and/or transmit properly formatted signals associated with the tag readers 110, computing systems 430 associated with retail spaces, and/or system controller 350. The device interface 420 may further include radio circuitry configured to encode and/or decode, modulate and/or demodulate, or otherwise process wireless signals received by or to be transmitted by the antenna array(s).
The processor 412 may be embodied in a number of different ways. For example, the processor 412 may be embodied as various processing means such as one or more of a microprocessor or other processing element, a coprocessor, a controller or various other computing or processing devices including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), or the like. In an example embodiment, the processor 412 may be configured to execute instructions stored in the memory 414 or otherwise accessible to the processor 412. As such, whether configured by hardware or by a combination of hardware and software, the processor 412 may represent an entity (e.g., physically embodied in circuitry—in the form of processing circuitry 410) capable of performing operations according to embodiments of the present invention while configured accordingly. Thus, for example, when the processor 412 is embodied as an ASIC, FPGA or the like, the processor 412 may be specifically configured hardware for conducting the operations described herein. Alternatively, as another example, when the processor 412 is embodied as an executor of software instructions, the instructions may specifically configure the processor 412 to perform the operations described herein in reference to execution of an example embodiment.
In some examples, the processor 412 (or the processing circuitry 410) may be embodied as, include or otherwise control the operation of the non-deactivated tag monitor 340 based on inputs received by the processing circuitry 410. As such, in some embodiments, the processor 412 (or the processing circuitry 410) may be said to cause each of the operations described in connection with the non-deactivated tag monitor 340 in relation to operation of the non-deactivated tag monitor 340 relative to undertaking the corresponding functionalities associated therewith responsive to execution of instructions or algorithms configuring the processor 412 (or processing circuitry 410) accordingly. In particular, the processor 412 (or processing circuitry 410) may be configured to enable the non-deactivated tag monitor 340 to communicate with the tag readers 110 and/or the computing systems 430 associated with retail spaces to provide information to the system controller 350 that enables the system controller 350 to perform other functions based on the detection of a non-deactivated tag 112 or other information received from the non-deactivated tag monitor 340 that is determinable from the communications with the non-deactivated tag monitor 340.
In an exemplary embodiment, the memory 414 may include one or more non-transitory memory devices such as, for example, volatile and/or non-volatile memory that may be either fixed or removable. The memory 414 may be configured to store information, data, applications, instructions, or the like for enabling the processing circuitry 410 to carry out various functions in accordance with exemplary embodiments of the present invention. For example, the memory 414 may be configured to buffer input data for processing by the processor 412. Additionally or alternatively, the memory 414 may be configured to store instructions for execution by the processor 412. As yet another alternative or additional capability, the memory 414 may include one or more databases that may store a variety of data sets or tables useful for operation of the non-deactivated tag monitor 340. Among the contents of the memory 414, applications or instruction sets may be stored for execution by the processor 412 in order to carry out the functionality associated with each respective application or instruction set. In some cases, the applications/instruction sets may include instructions for carrying out some or all of the operations described in reference to the algorithms or flow charts described herein. In particular, the memory 414 may store executable instructions that enable the computational power of the processing circuitry 410 to be employed to improve the functioning of the non-deactivated tag monitor 340 relative to the functions described herein.
In an example embodiment, the non-deactivated tag monitor 340 may include an aggregator and analysis module 490. The non-deactivated tag monitor 340 may utilize the aggregator and analysis module 490 to aggregate and analyze tag information received from the computing system 430 associated with a retail space or tag reader 110, as further described herein.
As shown in
The alerting criteria may include identification information associated with at least one tag configured to be monitored inside the retail space. As described above, the tag may have an activated and deactivated state, and the tag may be capable of transitioning from the activated state to the deactivated state at a point of sale prior to exiting the retail space. For example, when a tag has an activated state, the tag may be capable of being monitored, tracked, counted, and/or the like inside a retail space. In order to transition the tag to a deactivated state, a database may be modified and a purchase may be logged to transition the tag to being deactivated when the corresponding products are purchased. However, if the tag leaves a retail space without having the tag deactivated, the tag may remain readable and activated. Thus, the tag is still capable of being monitored outside of the home retail space by other monitoring equipment (i.e., the non-deactivated tag monitor 340).
In some cases, the information associated with at least one tag received from the computing system 510 or 520 associated with a retail space may be indicative of a triggering event 530. A triggering event 530 may include store event data. For example, store event data may include events that occur within the retail space such as product purchases, triggered security alarms, or updated inventory counts. Even further, a triggering event 530 may include the detection of a non-deactivated tag, possibly, outside of a retail space (e.g. detecting a non-deactivated tag in a non-home retail space).
Additionally, the identification information associated with at least one tag received from the computing system 510 or 520 associated with a retail space may be associated with a specific tag 540. The identification information associated with a specific tag 540 may include product name or model, brand, description (e.g., size, color, material), care instructions, product category or categories summer dress, children clothing, men's shoes), and/or the like. The specific tag 540 may also be associated with a product the computing system associated with a retail space has identified as lost or stolen. The specific tag 5.40 may also be associated with a list of specific tags associated with products that are on a watch list (e.g., list of priority lost/stolen products). Combinations of the above-described alerting criteria may also be received from a retail space. Even further, the alerting criteria may be received and updated in real time, daily, or any other time period as may be determined by the system controller 350, non-deactivated tag monitor 340, or the computing system 510 or 520 associated with the retail space.
The alerting function may be initiated when the non-deactivated tag monitor 340 compares the alerting criteria to the identification information associated with at least one tag detected by a tag reader 110. When an alert is issued, the location of the tag 112 and the movement of the tag 112 may be monitored while the tag 112 remains within a monitored area. However, in sonic cases, the alert may simply record the detection of a tag 112 in a corresponding one of the zones.
The alerting function may include alerting 1) specified store personnel of the computing system associated with the retail space from which alerting criteria was received, 2) specified store personnel of an additional computing system associated with the retail space which is located close to the monitoring zone in which the tag was detected, 3) local law enforcement, or 4) loss prevention and/or the like. The alerting function may further include alerting the aggregator and analysis module 490 so that the information associated with the tag 112 may be aggregated and analyzed, as described below.
The non-deactivated tag monitor 340 may also be configured to aggregate and analyze the information associated with non-deactivated tags received from the computing system 510 or 520 associated with a retail space or detected by the tag reader 110. The aggregation and analysis of information associated with non-deactivated tags received from the computing system of a retail space may result in the non-deactivated tag monitor 340 detecting trends in the information, reporting the trends to a retail space, and recommending actions to detect and deter theft.
For example, the non-deactivated tag monitor 340 may be capable of determining what products are frequently reported lost or stolen or what products have recently been reported as lost or stolen. Further, the non-deactivated tag monitor 340 may be capable of determining how often store alarms are triggered, the days and times in which alarms are triggered, and what area or zone of the store triggers the alarm. Even further, the non-deactivated tag monitor 340 may be capable of determining whether the weather or specific holidays affect the frequency of triggered alarms or the reporting lost or stolen items.
Additionally, the movement of non-deactivated tags outside of a retail space or spaces, along with information associated with the non-deactivated tag such as product type, may be analyzed to detect patterns of behavior for organized crime groups. Combinations of the above-described ways of aggregating and analyzing the information may also be employed. The above trend analysis may result in the non-deactivated tag monitor recommending actions to participating retail spaces. These recommended actions may include adding more store personnel during high theft times or at high theft locations, additional security protection for high-theft items, or additional tracking of high theft items while in the retail space.
As shown in
As further shown in
The system controller 350 may be configured to execute the operations described above for the non-deactivated tag monitor 340. In an example embodiment, the system controller 350 and/or non-deactivated tag monitor 340 may therefore be configured to receive information from a tag reader 110 or the computing system 430 associated with a retail space, and make decisions on issuing alerts or aggregating and analyzing data as described above. When the non-deactivated tag monitor 340 is not implemented at the system controller 350, the non-deactivated tag monitor 340 may receive information from the tag readers 110 and computing systems 430 associated with retail spaces and may process the information remotely and act accordingly based on the information. When the non-deactivated tag monitor 340 and the system controller 350 split functions, the non-deactivated tag monitor 340 and system controller 350 may communicate cooperatively to execute example embodiments.
From a technical perspective, the non-deactivated tag monitor embodied either separately or at the system controller 350 described above, may be used to support some or all of the operations described above. As such, the platforms described in
As an example,
Accordingly, blocks of the flowchart support combinations of means for performing the specified functions and combinations of operations for performing the specified functions. It will also be understood that one or more blocks of the flowchart, and combinations of blocks in the flowchart, can be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer instructions.
In this regard,
In some embodiments, the features described above may be augmented or modified, or additional features may he added. These augmentations, modifications and additions may be optional and may he provided in any combination. Thus, although some example modifications, augmentations and additions are listed below, it should be appreciated that any of the modifications, augmentations and additions could be implemented individually or in combination with one or more, or even all of the other modifications, augmentations and additions that are listed. Example embodiments described herein may enhance security in direct and indirect ways, therefore effectiveness and overall cost to a retailer using instances of security devices to protect products may be reduced.
Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to he limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Moreover, although the foregoing descriptions and the associated drawings describe exemplary embodiments in the context of certain exemplary combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the scope of the appended claims. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of the appended claims. In cases Where advantages, benefits or solutions to problems are described herein, it should be appreciated that such advantages, benefits and/or solutions may be applicable to some example embodiments, but not necessarily all example embodiments. Thus, any advantages, benefits or solutions described herein should not be thought of as being critical, required or essential to all embodiments or to that which is claimed herein. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.