The present disclosure relates generally to inventory systems. More particularly, the present disclosure relates to implementing systems and methods for automated capture and recovery of tag and tack (e.g., during or as part of a tag detachment process).
Electronic Article Surveillance (“EAS”) systems are often used by retail stores in order to minimize loss due to theft. One common way to minimize retail theft is to attach a security tag to an article such that an unauthorized removal of the article can be detected. In some scenarios, a visual or audible alarm is generated based on such detection. For example, a security tag with an EAS element (e.g., an acousto-magnetic element) can be attached to an article offered for sale by a retail store. An EAS interrogation signal is transmitted at the entrance and/or exit of the retail store. The EAS interrogation signal causes the EAS element of the security tag to produce a detectable response if an attempt is made to remove the article without first detaching the security tag therefrom. The security tag must be detached from the article upon purchase thereof in order to prevent the visual or audible alarm from being generated.
One type of EAS security tag can include a tag body which engages a tack. The tack usually includes a tack head and a sharpened pin extending from the tack head. In use, the pin is inserted through the article to be protected. The shank or lower part of the pin is then locked within a cooperating aperture formed through the housing of the tag body. In some scenarios, the tag body may contain a Radio Frequency Identification (“RFID”) element or label. The RFID element can be interrogated by an RFID reader to obtain RFID data therefrom.
The EAS security tag may be removed or detached from the article using a detaching unit. Examples of such detaching units are disclosed in U.S. Pat. No. 5,426,419 (“the '419 patent), U.S. Pat. No. 5,528,914 (“the '914 patent”), U.S. Pat. No. 5,535,606 (“the '606 patent”), U.S. Pat. No. 5,942,978 (“the '978 patent”) and U.S. Pat. No. 5,955,951 (“the '951 patent”). The detaching units disclosed in the listed patents are designed to operate upon a two-part hard EAS security tag. Such an EAS security tag comprises a pin and a molded plastic enclosure housing EAS marker elements. During operation, the pin is inserted through an article to be protected (e.g., a piece of clothing) and into an aperture formed through at least one sidewall of the molded plastic enclosure. The pin is securely coupled to the molded plastic enclosure via a clamp disposed therein. The pin is released by a detaching unit via a probe. The probe is normally retracted within the detaching unit. Upon actuation, the probe is caused to travel out of the detaching unit and into the enclosure of the EAS security tag so as to release the pin from the clamp or disengage the clamp from the pin. Once the pin is released from the clamp, the EAS security tag can be removed from the article.
The present disclosure concerns implementing systems and methods for operating a tag detacher. The methods comprise: receiving a tag body of a security device in a nest of the tag detacher; actuating a detachment mechanism of the tag detacher so as to cause a release of a tack assembly from a securement mechanism located within the tag body of the security device; allowing the tag body to travel out of a nest by at least rotating a portion of the nest so that the nest transitions between a home position and a pivoted position; and returning the nest to the home position when the tag body no longer resides in the nest.
In some scenarios, the methods also comprise determining, by the tag detacher, whether the tag body is properly placed in the nest, prior to an actuation of the detachment mechanism. The tag detacher outputs a prompt for adjusting the tag body's position within the nest, when a determination is made that the tag body is not properly placed in the nest. A latch mechanism is actuated to secure the tag body to the tag detacher, when a determination is made that the tag body is properly placed in the nest.
In those or other scenarios, the tag detacher performs operations to determine whether there are any obstructions preventing access to the tack assembly, prior to an actuation of the detachment mechanism. The tag detacher may output a prompt for causing an individual to check for obstructions preventing access to the tack assembly, when a determination is made that there is an obstruction preventing access to the tack assembly.
In those or other scenarios, the tag detacher performs operations to move a shield in proximity to the tack assembly, prior to an actuation of the detachment mechanism. The shield may be used to clamp an article to the tag detacher. The shield may be moved out of proximity of the tack assembly, after the actuation of the detachment mechanism.
In those or other scenarios, the tag detacher performs capturing operations to capture the tack assembly. The capturing operations comprise actuating a mechanical device to grasp the tack assembly, generating a magnetic field so as to cause the tack assembly to move in a direction away from the tag body, or operating a vacuum to cause the tack assembly to move in a direction away from the tag body. The captured tack assembly may be moved over a storage container and released so that the tack assembly travels into the storage container.
The present solution will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures.
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The present solution may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the present solution is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present solution should be or are in any single embodiment of the present solution. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present solution. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the present solution may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the present solution can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the present solution.
Reference throughout this specification to “one embodiment”, “an embodiment”, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present solution. Thus, the phrases “in one embodiment”, “in an embodiment”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used in this document, the singular form “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to”.
Mobile shopping apps, shopping websites and self-checkout solutions are becoming more prevalent in retail stores. Presently, there is no way for a retail store to provide a customer with a frictionless tack and tag body removal, i.e., meaning that a sales associate or customer does not have to manually remove from an article either the tack or tag body.
Today, the two separate parts (i.e., the tack and the tag body) that make up the security device have to be manually removed from retail articles by the sales associate. This takes time (sometimes longer and more difficult than expected) and can be exacerbated by many factors. For example, if the person performing the removal of the security device from an article is not thoroughly trained, then the timing of the security device removal is relatively long possibly because the article is difficult to work with and/or a sufficient grip on the small tack head is hard to achieve. Other difficulties and problems arise from the sales associate using the article to pull out the tack head from the tag body, thus causing damage to the article (e.g., fabric). As a result of this damage, the article may be rendered non-saleable and a loss in inventory is caused. Once the tack and tag body are removed from the article, the sales associate is supposed to manually place the removed parts into a container—a bucket, a bin or a box. In some cases, the removed parts are not properly placed in the container and/or misplaced.
The present solution provides a way to overcome the drawbacks of the conventional solution by providing an automatic capture and recovery of the tack and tag body during or after a tag detachment process. The automated security device capture and recovery solution is based on the idea that an automated mechanical, electro-mechanical, magnetic and/or vacuum system would perform the actions of removing the tack from an article, placing the removed tack in a first container for storage, and placing the tag body in a second container for storage. This automated removal of the security device streamlines the security device detachment process by eliminating the variance of human involvement, frees up sales associates for other customer facing opportunities, removes frustration over having to perform an often difficult and problematic task of removing the tags, decreases lost inventory cost, decreases check-out que time, increases cleanliness and inventory control, and increases safety. The automated security device capture and recovery solution can be implemented in a Point of Sale (“POS”) device (mobile or fixed) and/or a kiosk as part of a check-out system (e.g., a cashier-staffed checkout system and/or a self-checkout system).
Once the article is purchased at a POS or kiosk, the security device must be removed so as to not cause an alarm to be issued by a security device (e.g., an EAS and/or RFID system) when the article is leaving the store. The automated system only requires an individual (e.g., the sales associate or customer) to place the security device in a nest of a detacher for tag removal. The detacher can include, but is not limited to, a mechanical detacher having a part number DM1000 which is available from Sensormatic by Johnson Controls. Once the security device properly resides in the detacher's nest, the operator is prompted (e.g., via a display, or other audio and/or visual indicators) to check that there are no obstructions blocking a removal of the tack or tag body. In response to a user-software interaction that there are no such obstructions, a shield is lowered (automatically or manually) so as to simultaneously (1) clamp the article to the tag detacher (e.g., by clamping or otherwise trapping the article between the shield and a housing of the tag detacher), and (2) energize the detacher for tack release. The shield has a hole formed therethrough that allows a head of the tack to be exposed when the security device is resting in the detacher's nest. This allows accessibility for the tack's automatic removal from the tag body. The tack is removed thru an automated mechanical, electro-mechanical, magnetic and/or vacuum system. The tack is captured by the automated system, and deposited into a specific container for storage.
The capturing/depositing of the tack may be achieved using an electro-magnet that is attached to a movable arm positioned over the detacher. When the tack is released from the tag body, the electro-magnet is turned on whereby magnetic attraction pulls the tack in an upwards direction away from the tag body. Consequently, the tag travels out of the tag body, through the article, and/or to a magnetic surface of the electro-magnet. The movable arm then moves the tack into proximity of a container. Once the tack is in proximity to the container, the electro-magnet is turned off so that the tack is released from the magnetic surface and deposited in the container. A door is opened so that a hole formed through the support structure is no longer obstructed or blocked, whereby the tag body falls into a storage container as a result of the gravitational force being applied to the tag body. The tag and tack storage containers may be part of a recirculation program, and may have specific size, construction and designed for return shipping. Once the cycle of tack/tag body removal is complete, the system resets for a next article/sensor removal session. The shield can now be lifted so that the article can be removed from the system.
Illustrative Systems
Referring now to
The tag detacher 190 is configured to facilitate the detachment of the security tag 132 from the article 102 in accordance with the conventional techniques (e.g., probe or magnet based techniques). In this regard, the tag detacher 190 employs wireless Short Range Communication (“SRC”) technologies to facilitate the purchase of the article 102 and/or the detachment of the security tag 132 from the article 102. The wireless SRC technologies can include, but are not limited to, Near Field Communication (“NFC”) technology, InfRared (“IR”) technology, Wireless Fidelity (“Wi-Fi”) technology, Radio Frequency Identification (“RFID”) technology, and/or ZigBee technology. The tag detacher 190 may also employ barcode technology, electronic card reader technology, and Wireless Sensor Network (“WSN”) communications technology.
As shown in
During store hours, an individual 140 may desire to purchase the article 102. The individual 140 can purchase the article 102 without using a traditional fixed POS station (e.g., a checkout counter). Instead, the purchase transaction can be achieved using MCD 104. MCD 104 (e.g., a mobile phone or tablet computer) can be in the possession of the individual 140 or store associate 142 at the time of the purchase transaction. Notably, MCD 104 has a retail transaction application installed thereon that is configured to facilitate the purchase of article 102 and the management/control of the tag detacher operations for an attachment/detachment of the security tag 132 to/from article 102. The retail transaction application can be a pre-installed application, an add-on application or a plug-in application. Retail transaction applications are well known in the art, and therefore will not be described in detail herein. Any known or to be known retail transaction application can be used herein without limitation.
In order to initiate a purchase transaction, the retail transaction application is launched via a user-software interaction. The retail transaction application facilitates the exchange of data between the article 102, security tag 132, individual 140, store associate 142, and/or Retail Transaction System (“RTS”) 118. For example, after the retail transaction application is launched, a user 140, 142 is prompted to start a retail transaction process for purchasing the article 102. The retail transaction process can be started simply by performing a user software interaction, such as depressing a key on a keypad of the MCD 104 or touching a button on a touch screen display of the MCD 104.
Subsequently, the user 140, 142 may manually input into the retail transaction application article information. Alternatively or additionally, the user 140, 142 places the MCD 104 in proximity of article 102. As a result of this placement, the MCD 104 and/or tag detacher 190 obtains article information from the article 102. The article information includes any information that is useful for purchasing the article 102, such as an article identifier and an article purchase price. In some scenarios, the article information may even include an identifier of the security tag 132 attached thereto. The article information can be communicated from the article 102 to the MCD 104 and/or tag detacher 190 via a short range communication, such as a barcode communication 122 or an NFC 120. In the barcode scenario, article 102 has a barcode 128 attached to an exposed surface thereof. In the NFC scenarios, article 102 may comprise an NFC enabled device 126. If the tag detacher 190 obtains the article information, then the tag detacher 190 forwards the article information to MCD 104 via a wireless SRC, such as a Bluetooth communication.
Thereafter, payment information is input into the retail transaction application of MCD 104 by the user 140, 142. Upon obtaining the payment information, the MCD 104 automatically performs operations for establishing a retail transaction session with the RTS 118. The retail transaction session can involve: communicating the article information and payment information from MCD 104 to the RTS 118 via an RF communication 124 and public network 106 (e.g., the Internet); completing a purchase transaction by the RTS 118; and communicating a response message from the RTS 118 to MCD 104 indicating that the article 102 has been successfully or unsuccessfully purchased. The purchase transaction can involve using an authorized payment system, such as a bank Automatic Clearing House (“ACH”) payment system, a credit/debit card authorization system, or a third party system (e.g., PayPal®, SolidTrust Pay® or Google Wallet®).
The purchase transaction can be completed by the RTS 118 using the article information and payment information. In this regard, such information may be received by a computing device 108 of the RTS 118 and forwarded thereby to a sub-system of a private network 100 (e.g., an Intranet). For example, the article information and purchase information can also be forwarded to and processed by a purchase sub-system 112 to complete a purchase transaction. When the purchase transaction is completed, a message is generated and sent to the MCD 104 indicating whether the article 102 has been successfully or unsuccessfully purchased.
If the article 102 has been successfully purchased, then a security tag detaching process can be started automatically by the RTS 118 or by the MCD 104. Alternatively, the user 140, 142 can start the security tag detaching process by performing a user-software interaction using the MCD 104. In all three scenarios, the article information can optionally be forwarded to and processed by a lock release sub-system 114 to retrieve a detachment key or a detachment code that is useful for detaching the security tag 132 from the article 102. The detachment key or code is then sent from the RTS 118 to the MCD 104 such that the MCD 104 can perform or cause the tag detacher 190 to perform tag detachment operations. The tag detachment operations are generally configured to cause the security tag 132 to actuate a detaching mechanism (not shown in
Referring now to
As shown in
Tack assembly 204 has a tack head 210 and an elongate tack body 208 extending down and away from the tack head. The tack body 208 is sized and shaped for insertion into opening 206 and removal from opening 206. A plurality of grooves 214 is formed along a length of the tack body 208 for engagement with a securement mechanism 406 disposed within the housing 310. When the grooves are engaged by the securement mechanism 406, the security tag 132 is secured to the article 102. Thereafter, unauthorized removal of the article 102 from a controlled area (e.g., RSF 150 of
Such detection occurs when the security tag 132 is present within a surveillance zone (or interrogation zone) established by the monitoring system 134. The surveillance zone (or interrogation zone) is usually established at an access point for the controlled area (e.g., adjacent to a retail store entrance and/or exit). If the article 102 enters the surveillance zone (or interrogation zone) with the security tag 132, then an alarm may be triggered to indicate possible unauthorized removal thereof from the controlled area. In contrast, if the article 102 is authorized for removal from the controlled area, then the security tag 132 thereof can be deactivated and/or detached therefrom using a detachment mechanism (e.g., a probe 302 or a magnet (not shown)) of the tag detacher 190. Consequently, the article 102 can be carried through the surveillance zone (or interrogation zone) without being detected by the monitoring system 134 and/or without triggering the alarm.
The probe 302 is sized and shaped to at least be partially slidingly inserted into and removed from an insert space 308 formed in the housing 310. When inserted into insert space 308, the probe 302 travels through an arcuate channel 502 so as to be guided towards the securement mechanism 406. In this regard, the probe 302 has a generally arcuate shape matching that of the arcuate channel 502. Upon engagement with the securement mechanism 406, the probe 302 releases the tack body 208 therefrom. Next, the tack body 208 can be removed from the housing, so as to decouple the security tag 132 from the article 102.
An illustration of the securement mechanism 406 is provided in
Each of the jaws 704, 706 extends outwardly of the plane of the clamp body 702 and then inwardly toward the other jaw. The jaws 704, 706 terminate in facing edges 714, 716. These edges extend from a common edge 718 of the clamp body 702 inwardly toward each other, then curve outwardly away from each other to define an aperture 720 (typically, circular or elliptical) for receiving the tack body 208. The edges 714, 716 then continue in aligned fashion and end in an elongated, lateral slot 722 in the clamp body 702. The lateral slot lies inward of a further clamp body edge 724 which opposes the clamp body edge 718.
A further laterally extending elongated spring sleeve 726 is attached by a joint area 728 to the side 730 of the edge 724 bordering the mounting part 708. The sleeve 726 extends along the length of the edge 724 and is also out of the plane of the clamp body 702.
For mounting and supporting the spring clamp 702, the lower housing member 306 of the security tag 132 includes a circular mount 602. The spring clamp 406 is mounted, via aperture 712 of the mounting part 708, on the circular mount 602. In this way, the mounting part 708 can be rotated about the circular mount 602. The spring clamp 702 is thus able to pivot about the mounting part 708.
When an end of the tack assembly 204 is introduced in the downward direction through the opening 206 in the upper housing member 304, the tack body 208 is directed to aperture 720 of the securement mechanism 706. This causes the jaws 704, 706 to spread open and allow the tack body 208 to pass there through.
When the downward movement of the tack assembly 204 is stopped, the jaws 704, 706 retract and clutch the tack body 208. In this position, the jaws 704, 706 prevent upward movement of the tack assembly 204. As such, the security tag 132 becomes securely coupled to the article 102.
In order to release the tack body 208 from the jaws 704-706, the probe 302 is introduced into the insert space 308 formed in the housing 310 of the security tag 132. Rotation of the probe 302 causes it to be moved in and guided by the arcuate channel 502 until the end 312 abuts portion 732 of the securement mechanism 406. Continued rotational movement of the probe 302 causes force to be applied to portion 732 of the securement mechanism 406. This force, in turn, causes the clamp body 702 to rotate about the support area 708. The jaw 704 is thus enabled to spread away from jaw 706 due to the force of the tack body 208, which is being held stationary by jaw 706. As a result, aperture 720 expands, releasing the tack body 208 from the clutch of the jaws. The tack assembly 204 can now be moved in the upward direction past the jaws, via an upward force on the tack head 210.
During rotation of the clamp body 702, the spring sleeve 726 at the joint area 728 is compressed. After the tack assembly 204 is separated from the housing 310, the probe 302 is rotated in the reverse direction. This reverse rotation disengages the probe 302 from the securement mechanism 406. Consequently, the spring sleeve 726 rotates in an opposite direction so as to be brought back to its original position. Thereafter, the probe 302 is guided out of the arcuate channel 502 and is removed from insert space 312 formed in the housing 310.
As evident from the above discussion, the probe 302 is provided to deflect the securement mechanism 406 so as to allow the tack assembly 204 to be removed from the housing 310. The probe 302 is part of the external tag detacher 190. When the tack assembly 204 is removed from the housing 310, the security tag 132 can be decoupled from an article 102 (e.g., a piece of clothing).
Referring now to
The tack body 810 is securely coupled to the telescoping tack head 802. This secure coupling can be achieved using any known coupling means, such as an adhesive, mating threads or chemical bond. The tack body 810 resides within the telescoping tack head 802 when the concentric parts 804, 806, 808 are fully slid out of each other as shown in
In contrast, a portion 816 of the tack body 810 extends through an aperture 814 formed in the tack head 802 when the concentric parts 804, 806, 808 are slid into each other as a result of a user's depression thereof. This portion 816 of the tack body 810 comprises one or more notches 818 formed thereon. The notch(es) 818 provide specific areas on the tack body 810 that can be engaged by a securement mechanism (e.g., securement mechanism 406 of FIG. 4) of a tag body. This portion 816 of the tack body 810 can be released from the tag body via an arcuate probe or other external tool as discussed above.
When released, the entire tack assembly 800 transitions from its engaged position shown in
In some cases, the springs are selected so that the tack assembly 800 pops up and away from the tag body when the tack is released from the tag body. A magnet may be used here to capture the tack assembly 800 while in flight via its magnetic attraction with the tack 810 or other metal component of the tack assembly 800. The captured tack assembly 800 can then be placed in a collection bin for later reuse.
Referring now to
Referring now to
As shown in
The detaching unit 1004 is configured to detach a security tag (e.g., security tag 132 of
The one or more sensors 1014 are provided to facilitate the detachment of a security tag from the article. The sensor(s) 1014 can include, but is(are) not limited to, a camera, a thermal imaging sensor, an infrared sensor, a proximity sensor, a switch, a pressure sensor, and/or a beam break sensor. During operations, the sensor(s) generate(s) sensor data that is useful to (1) determine whether the security tag is properly placed in the nest 1010, (2) confirm that the security tag has been latched or otherwise coupled to the tag detacher, (3) determine whether an object is obstructing or otherwise blocking free and/or clear access to a tack head (e.g., tack head 210 of
The sensor data may be used as feedback information for a machine learning algorithm/function of the tag detacher 1000. For example, the feedback information is used to train and/or optimize a machine learned model (e.g., a detection model for detecting or predicting when security tag is properly placed in the nest 1010, an object is obstructing or otherwise blocking free and/or clear access to a tack head, and/or the article has been removed from the tag detacher 1000) based on ongoing data gathering and analysis (e.g., for detecting when a user should be prompted for certain information, detecting when a detaching processing should be initiated, when a shield 1100 should be lowered or raised, when the detaching unit should be energized and/or de-energized, etc.)). The present solution is not limited in this regard.
The capturing unit 1008 is provided to facilitate the capturing of a tack assembly (e.g., tack assembly 204 of
In some scenarios, the capturing unit 1008 has a static or fixed position, as well as a gripper, magnet and/or vacuum chamber with a central axis 1022 that is aligned with a central axis of an aperture 1108 formed in a shield 1100 and/or a central axis of a tack assembly coupled to a tag body disposed in the nest 1010. In other scenarios, at least a portion of the capturing unit 1008 with the gripper, magnet and/or vacuum chamber is transitionable between a retracted position in which it resides in proximity to or in the tag detacher housing 1002 (i.e., the central axis 1022 is not aligned with the central axis of aperture 1108 and/or the central axis of the tack assembly) and an extended position in which it is extended out and away from the tag detacher housing 1002 (i.e., the central axis 1022 is aligned with the central axis of an aperture 1108 and/or the central axis of a tack assembly). According, the capturing unit 1008 may be configured to be at least partially moved in and out of the tag detacher housing 1002. This movement of the capturing unit 1008 can be facilitated by a track, a linkage, a motor, and/or gears.
A support structure 1012 may be provided with the tag detacher 1000. The support structure 1012 structurally supports an article while the security tag is being detached therefrom. The support structure 1012 has a generally planar profile, and is mechanically coupled to the housing 1002 via couplers (e.g., screws, bolts, brackets, etc.) so as to protrude out and away from the housing 1002. The support structure 1012 can be formed of any suitable material, such as metal or plastic.
A shield 1100 is provided to facilitate retention of the article and security tag in a given position relative to the detaching unit 1004 during a tag detaching process. Accordingly, the shield 1100 is transitionable from an unengaged position shown in
The internal components of the tag detacher 1000 will now be described in relation to
The tag detacher 1000 also comprises a depositing mechanism 1410 for depositing a tag body and/or a tack assembly in storage container(s) 1412. With regard to the tag body, the depositing mechanism 1410 can include, but is not limited to, an electro-mechanical system (e.g., a motor, gears, and/or a linkage) configured to rotate or pivot the nest 1010 relative to the tag detacher housing 1002 so that at least the tag body is allowed to fall, slide or be ejected into a storage container 1412, and/or an electro-mechanical system configured to rotate or swivel the detaching unit 1004 relative to the housing 1002 so that a bottom wall of the nest 1020 is moved away whereby at least the tag body is allowed to fall, slide or be ejected into a storage container 1412. With regard to a tack assembly which is not integrated with or coupled to the tag body, the depositing mechanism 1410 can include, but is not limited to, an electromechanical system configured to retract the capturing unit 1108 into the housing 1002 and cause the release of the tack assembly from the capturing unit 1108.
The storage container(s) 1412 comprise(s) any structure which is suitable for storing tag bodies and/or tacks. Such structures include, but are not limited to, bins, boxes, buckets and/or baskets. The storage container(s) 1412 can be formed of various materials, such as metal, plastic and card board. The tag bodies and tacks can be stored in the same or different storage container. As such, two or more storage containers 1412 can be provided with the tag detacher 1000. Each storage container 1416 is sized and shaped to fit within a container space provided inside the tag detacher 1000. The container space can be provided on at least a portion of a shelf.
Referring now to
Computing device 1402 may include more or less components than those shown in
Some or all components of the computing device 1402 can be implemented as hardware, software and/or a combination of hardware and software. The hardware includes, but is not limited to, one or more electronic circuits. The electronic circuits can include, but are not limited to, passive components (e.g., resistors and capacitors) and/or active components (e.g., amplifiers and/or microprocessors). The passive and/or active components can be adapted to, arranged to and/or programmed to perform one or more of the methodologies, procedures, or functions described herein.
As shown in
At least some of the hardware entities 1434 perform actions involving access to and use of memory 1432, which can be a Radom Access Memory (“RAM”), a disk driver and/or a Compact Disc Read Only Memory (“CD-ROM”). Hardware entities 1434 can include a disk drive unit 1436 comprising a computer-readable storage medium 1438 on which is stored one or more sets of instructions 1460 (e.g., software code) configured to implement one or more of the methodologies, procedures, or functions described herein. The instructions 1460 can also reside, completely or at least partially, within the memory 1432 and/or within the CPU 1426 during execution thereof by the computing device 1402. The memory 1432 and the CPU 1426 also can constitute machine-readable media. The term “machine-readable media”, as used here, refers to a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions 1460. The term “machine-readable media”, as used here, also refers to any medium that is capable of storing, encoding or carrying a set of instructions 1460 for execution by the computing device 1402 and that cause the computing device 1402 to perform any one or more of the methodologies of the present disclosure.
In some scenarios, the hardware entities 1434 include an electronic circuit (e.g., a processor) programmed for facilitating tag detachment from articles. In this regard, it should be understood that the electronic circuit can access and run an application 1442 and/or a machine learning application 1444 installed on the computing device 1402.
The application 1442 receives and processes sensor data (e.g., images) generated by sensor(s) (e.g., sensor(s) 1014 of
The machine learning application 1444 implements Artificial Intelligence (“AI”) that provides the computing device 1402 with the ability to automatically learn and improve data analytics from experience without being explicitly programmed. The machine learning application 1444 employs one or more machine learning algorithms that learn various information from accessed data (e.g., via pattern recognition and prediction making using one or more machine learned models which are pre-trained and/or re-trained/optimized based on ongoing data gathering and analysis). Machine learning algorithms are well known in the art, and therefore will not be described herein in detail. Any known or to be known machine learning algorithm can be used herein without limitation. For example, in some scenarios, the machine learning application 1444 employs a supervised learning algorithm, an unsupervised learning algorithm, and/or a semi-supervised learning algorithm. The learning algorithm(s) is(are) used to model inventory decisions based on data analysis (e.g., captured images, article identifiers (e.g., UPCs), POS transaction information, and other information).
For example, the learning algorithm(s) is(are) configured to generate recommendations to actuate a shield, recommendations to energize the detaching unit 1004, and/or predictions about whether a tag detachment process will be successful. The present solution is not limited to the particulars of this example.
The machine learning algorithms and models may be trained offline with all products in a facility (e.g., facility 150 of
The software applications 1442 is generally operative to: obtain article level information and/or other information (e.g., from security tags 132 of
Referring now to
As shown in
In 1508, the tag detacher performs operations to obtain a unique identifier (e.g., an EPC) from the security device (e.g., security tag 132 of
In contrast, if the security device is coupled to the purchased article, then 1516-1518 are performed. 1516-1518 involve: outputting a prompt from the tag detacher for placing the security device in a nest (e.g., nest 1010 of
In 1520, the tag detacher performs operations to determine whether the tag body is properly placed in the nest. These operations can include, but are not limited to, obtaining sensor data generated by at least one sensor (e.g., sensor(s) 1014 of
If the tag body is not properly placed in the nest [1522:NO], then 1524 is performed where the tag detacher outputs a prompt (e.g., via display 1006 of
If the tag body is properly placed in the nest [1522:YES], then 1526 is performed where the tag body is secured to the tag detacher. The tag body can be secured to the tag detacher using a latch mechanism (e.g., latch mechanism 1018 of
Upon completing 1526, 1528 may optionally be performed. In 1528, the tag detacher determines whether there are any obstructions preventing clear or free access to the tack assembly (e.g., tack assembly 204 of
If there is not any obstruction [1530:NO], then method 1500 continues with 1544 of
In 1536, a shield mover (e.g., shield mover 1102 of
Next, the tag detacher is energized in 1540 for tack release. In 1542, the tag detacher performs operations to release the tack assembly from a securement mechanism (e.g., securement mechanism 406 of
In some scenarios, the tack assembly may be integrated with the tag body. However, in other scenarios, the tack assembly is a separate part from the tag body and is not coupled to the tag body. In the latter case, method 1500 can involve operations of 1544-1546. 1544-1546 involve: moving a capturing unit (e.g., capturing unit 1108 of
In 1548, the shield mover is once again actuated for raising or otherwise moving the shield away from the item (i.e., from its engaged position to its unengaged position). Subsequently, method 1500 may continue with 1550-1552 or 1554. 1550-1552 involve: optionally outputting a prompt from the tag detacher to remove the article therefrom; and/or optionally wait, detect by the tag detacher when the article has been removed, and/or receive by the tag detacher a user input indicating that the article has been removed. An illustration showing the article being removed from the tag detacher is provided in
1554 involves releasing the tag body from the detacher. This release is achieved by retracting the latch mechanism (e.g., latch mechanism 1018 of
Next in 1556, the nest is returned to its home position. An illustration showing the nest being returned to its home position is provided in
Although the present solution has been illustrated and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification and the annexed drawings. In addition, while a particular feature of the present solution may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Thus, the breadth and scope of the present solution should not be limited by any of the above described embodiments. Rather, the scope of the present solution should be defined in accordance with the following claims and their equivalents.
The present application claims priority to U.S. Provisional Patent Application Ser. No. 62/791,688 which was filed on Jan. 11, 2019. The content of this U.S. Provisional Patent Application is incorporated herein in its entirety.
Number | Date | Country | |
---|---|---|---|
62791688 | Jan 2019 | US |