Claims
- 1. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader; reading data from an ID tag located within the read volume of the data reader; if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, acknowledging the data read from the ID tag substantially without delay; and if the presence of an electronic security tag is detected proximate to the read volume of the data reader, delaying acknowledgment of the data read from the data reader.
- 2. A method of controlling a system having an data reader according to claim 1 wherein said reading data from the ID tag comprises optical scanning.
- 3. A method of controlling a system having an data reader according to claim 1 wherein the step of acknowledging the data read comprises generating an audible signal.
- 4. A method of controlling a system having an data reader according to claim 1 wherein the step of acknowledging the data read comprises generating a visual signal.
- 5. A method of controlling a system having an data reader according to claim 1 wherein the step of acknowledging the data read comprises generating an electronic acknowledgment signal for use by a host.
- 6. A method of controlling a system having an data reader according to claim 5 wherein the electronic acknowledgment signal is transmitted to the host via a communications link.
- 7. A method of controlling a system having an data reader according to claim 5 wherein the electronic acknowledgment signal is transmitted to the host via a wireless communications link.
- 8. A method of controlling a system having an data reader according to claim 1 and further comprising, if, after said reading data from the data, the presence of an electronic security tag is detected, arming the security tag controller to deactivate the electronic security tag.
- 9. A method of controlling a system having an data reader according to claim 5 and further comprising:
repeating said sensing to detect the presence of an electronic security tag proximate to the read volume of the data reader; and if the presence of an electronic security tag is not detected, acknowledging the data read from the ID tag.
- 10. A method according to claim 9 wherein said acknowledging the data read includes activating an audible signal.
- 11. A method according to claim 1 wherein the step of delaying acknowledgment of the data read comprises the steps of (1) attempting to deactivate the electronic security tag detected, (2) attempting to re-sense the electronic security tag, (3) permitting acknowledgment if the electronic security tag is not re-sensed at step (2).
- 12. A method according to claim 11 wherein the step of delaying acknowledgment of the data read further comprises the step of (4) if the electronic security tag is not re-sensed at step (3), repeating steps (1)-(3) for a given number of attempts or a for given time period.
- 13. A method according to claim 11 wherein the step of delaying acknowledgment of the data read further comprises the step of (4) if the electronic security tag is not re-sensed at step (3), repeating steps (1)-(3) for a given time period.
- 14. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
selecting one of a plurality of predetermined security levels including a low level and a high level; sensing to detect the presence of an electronic security tag proximate to the read volume of the data reader; reading data from an ID tag located within the read volume of the data reader; if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, asserting a deactivation signal for a first predetermined deactivation time period; and if the selected security level is the low level, and the presence of an electronic security tag was not detected, acknowledging the data read from the ID tag substantially without delay.
- 15. A method according to claim 14 and further comprising: if the selected security level is the high level, delaying acknowledgement of the data read from the ID tag.
- 16. A method according to claim 14 and further comprising:
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, setting a pre-read flag true for a predetermined pre-read time period; and if the pre-read flag is true after said reading data step is completed, asserting the deactivation signal for a second predetermined deactivation time period different than the first deactivation time period.
- 17. A method according to claim 14 and further comprising: if the first predetermined deactivation time period has elapsed, disarming the security tag controller.
- 18. A method according to claim 17 and further comprising: if the first predetermined deactivation time period has not elapsed, attempting to deactivate the security tag.
- 19. A combined security tag unit and data reader system comprising:
a housing; a data reader enclosed in the housing and defining a read volume adjacent the housing for reading an ID tag placed within the read volume; a security tag unit enclosed in the housing and arranged for sensing presence of an electronic security tag proximate to the read volume of the data reader, the security tag unit including deactivation unit arranged for deactivating an electronic security tag located proximate to the read volume of the data reader; and control means for arming the deactivation unit only after a successful read of the ID tag, and only for a limited time period after the successful read of the ID tag, thereby avoiding deactivation of an electronic security tags on or in items that have not been read.
- 20. A combined system according to claim 19 wherein the control means arms the deactivation unit only after detecting presence of an electronic security tag proximate to the read volume and a successful read of an ID tag within a predetermined time window subsequent to said detecting the presence of the electronic security tag.
- 21. A combined system according to claim 19 wherein the control means arms the deactivation unit only after detecting presence of an electronic security tag proximate to the read volume and a successful read of an ID tag.
- 22. A combined system according to claim 19 wherein the control means arms the deactivation unit only after detecting the presence of an electronic security tag proximate to the read volume and a successful read of an ID tag within a predetermined time window prior to said detecting the presence of the electronic security tag.
- 23. A method of controlling a system having an data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader; reading data from an ID tag within the read volume of the data reader; asserting a deactivation signal to arm a deactivation unit of the security tag controller for a predetermined deactivation time period; and if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing the deactivation unit to attempt to deactivate the detected electronic security tag.
- 24. A method according to claim 23 and further comprising:
sensing to detect the presence of an electronic security tag proximate to the read volume of the data reader; and if the presence of an electronic security tag is detected, repeating said firing step; and repeating said sensing and firing steps until the electronic security tag is no longer detected or the deactivation signal is no longer asserted.
- 25. A method according to claim 23 and further comprising:
if the presence of an electronic security tag proximate to the read volume of the data reader is not detected, generating an indication of a successful data read of the ID tag.
- 26. A method according to claim 23 and further comprising:
if and when the security tag has been deactivated, generating an indication of a successful data read of the ID tag.
- 27. A method according to claim 23 and further comprising:
if the presence of an electronic security tag proximate to the read volume of the data reader is detected, and the security tag is not deactivated during the deactivation time period, generating an indication of an exception condition.
- 28. A method according to claim 27 wherein said generating step comprises activating an audible signal to alert a person to the exception condition.
- 29. A method according to claim 27 wherein said generating step comprises activating a visual signal to alert an operator to the exception condition.
- 30. A method of controlling a system having an data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of
(a) sensing to detect presence of an electronic security tag proximate to the read volume of the data reader; (b) reading data from an ID tag within the read volume of the data reader; (c) asserting a deactivation signal to arm a deactivation unit for a predetermined deactivation time period; (d) if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, attempting to deactivate the detected electronic security tag; (e) if the electronic security tag is not deactivated during the deactivation time period, generating an indication of an exception condition; (f) waiting up to a predetermined override time limit for input of a manual override; and (g) responsive to receiving a manual override input prior to expiration of the override time limit, asserting the deactivation signal to arm the deactivation unit to deactivate the detected electronic security tag.
- 31. A method according to claim 30 and further comprising:
(h) reading current data from an ID tag within the read volume of the data reader; (i) comparing the current data read from the ID tag to initial data previously read from the ID tag in step (b); (j) if the current data is not equal to the initial data, generating a signal to alert an operator.
- 32. A method according to claim 31 wherein the signal to alert an operator comprises at least one of a visual signal, an audible signal or an electronic signal.
- 33. A method according to claim 30 and further comprising:
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing a deactivation unit to attempt to deactivate the detected electronic security tag.
- 34. A method according to claim 35 and further comprising:
sensing to detect the presence of an electronic security tag proximate to the read volume of the data reader; and if the presence of an electronic security tag is detected, repeating said firing step and repeating said sensing and firing loop until the electronic security tag is no longer detected or the deactivation signal is no longer asserted.
- 35. A combined security tag unit and data reader system comprising:
a housing including a scan window; a data reader enclosed in the housing and defining a read volume adjacent the housing and visible to the reader through the scan window for reading an ID tag placed within the read volume; a security tag unit enclosed in the housing and arranged for sensing to detect the presence of an EAS tag proximate to the read volume of the data reader; the security tag unit including deactivation unit arranged for deactivating an EAS tag located proximate to the read volume of the data reader; and means for indicating a successful read of the ID tag, wherein the indicating means is arranged to a indicate a successful read of the ID tag only after successful read of the ID tag and successful deactivation of the security tag, thereby avoiding multiple indications of the read of the same ID tag.
- 36. A combined security tag deactivation unit and data reader according to claim 35 wherein the indicating means includes means for confirming successful deactivation of the security tag by repeating said sensing to detect the presence of an activated electronic security tag proximate to the read volume of the data reader, thereby implementing an sense-detect-sense methodology.
- 37. A combined security tag deactivation unit and data reader according to claim 35 wherein the indicating means sends a message to a host terminal to indicate a completed read of the ID tag, the message comprising data read from the ID tag.
- 38. A combined security tag deactivation unit and data reader according to claim 35 wherein the indicating means triggers an audible signal to indicate a completed read of the ID tag.
- 39. A combined security tag deactivation unit and data reader according to claim 35 wherein the indicating means triggers a visual signal to indicate a completed read of the ID tag.
- 40. A method of operating a system comprised of a security tag deactivation unit and a data reader, the method comprising the steps of:
sensing to detect presence of an electronic security tag proximate to a read volume of the data reader; reading data from an ID tag; if the presence of a security tag proximate to the read volume of the data reader is detected, activating the deactivation unit in an attempt to deactivate the detected electronic security tag; repeating said sensing step to confirm deactivation of the detected electronic security tag; and if the presence of an electronic security tag is not detected, implying that the deactivation succeeded, and generating an output signal indicating completed reading of the ID tag data.
- 41. A method according to claim 40 wherein said generating an output signal comprises transmitting the ID tag data to a host unit.
- 42. A method according to claim 40 wherein said generating an output signal comprises generating an audible signal.
- 43. A method according to claim 40 wherein said generating an output signal comprises generating a visual signal.
- 44. A method according to claim 40 and further comprising, after the second sensing step, if the presence of an electronic security tag is detected, implying that the deactivation attempt failed, repeating the said firing and sensing cycle without generating an indication of completion of the reading step.
- 45. A method according to claim 40 and further comprising retrying to deactivate the detected electronic security tag before generating an indication of completion of the reading step.
- 46. A method according to claim 40 and further comprising:
repeating said step of firing the deactivation unit in an attempt to deactivate the detected electronic security tag; and repeating said sensing step to confirm deactivation of the detected electronic security tag.
- 47. A method according to claim 46 and further comprising limiting the said sensing and retrying cycle to a predetermined time period and then, if the presence of an electronic security tag is still detected, generating a security exception indicating that an electronic security tag is detected and is not deactivated.
- 48. A method according to claim 46 and further comprising limiting the said sensing and retrying cycle to a predetermined number of such cycles and then, if the presence of an electronic security tag is still detected, generating a security exception indicating that an electronic security tag is detected and is not deactivated.
- 49. A method of operation in a combined security tag deactivation unit and data reader, the method comprising the steps of:
sensing to detect the presence of an EAS tag proximate to the read volume of the ID label reader; reading data from an ID tag; if the presence of an EAS tag proximate to the read volume of the ID tagreader is still detected, firing the deactivation unit in an attempt to deactivate the detected EAS tag; and repeating said sensing step to confirm deactivation of the detected EAS tag.
- 50. A method of operation in an electronic article security (EAS) controller comprising the steps of:
monitoring an arm control having an armed state and an unarmed state; while the arm control is armed, sensing to detect presence of an electronic security tag; and if the presence of an electronic security tag is detected while the arm control is in the armed state, attempting to deactivate the electronic article security tag.
- 51. A method according to claim 50 and further comprising communicating status information for use by a data reader, said status information including an indication of ready to deactivate and an indication of detection of an electronic article security tag.
- 52. A method according to claim 50 and further comprising repeating said sensing step to detect presence of an electronic security tag and repeating said attempting to deactivate the electronic article security tag, up to a predetermined maximum number of retries.
- 53. A method according to claim 52 and further comprising generating a hard tag indication if the number of retries to deactivate the electronic article security tag reaches the maximum number of retries.
- 54. A method of operating and controlling a system having a data reader defining a read volume and an associated security tag controller, for reading an ID tag and deactivating electronic security tag on an item, the method comprising the steps of:
sensing whether of an electronic security tag is present proximate to the read volume of the data reader; reading data from an ID tag located within the read volume of the data reader; if an ID tag is read within a predetermined time window subsequent to said sensing the electronic security tag being present, urging the operator to return the item to the read volume.
- 55. A method according to claim 54 wherein the step of urging the operator to return the item to the read volume comprises delaying acknowledgment of the data read from the data reader.
Parent Case Info
[0001] This application claims priority to provisional application Serial No. 60/353,139 filed Feb. 1, 2002 and to provisional application Serial No. ______ filed Jan. 28, 2003 under attorney docket 51306/816:2 entitled SYSTEMS AND METHODS FOR OPTICAL READING AND EAS TAG SENSING AND DEACTIVATING AT RETAIL CHECKOUT.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60353139 |
Feb 2002 |
US |
|
60443421 |
Jan 2003 |
US |