The present solution relates generally to Electronic Article Surveillance (“EAS”) detection systems. More particularly, the present solution relates to systems and methods for increasing alarm confidence in EAS detection systems.
EAS detection systems generally comprise a tag reader for transmitting interrogation signals into an EAS detection zone (or interrogation zone) and for receiving response signals transmitted from RFID tags in response to the interrogation signals. The EAS detection system issues an alarm when a response signal is received from one or more RFID tags. The alarm indicates the presence of an RFID tag in the interrogation zone. The alarm can then be the basis for initiating one or more appropriate responses depending upon the nature of the facility. Typically, the interrogation zone is in the vicinity of an exit from a facility such as a retail store, and the RFID tags can be attached to articles such as items of merchandise or inventory.
In some cases, display equipment is placed within the read area of the tag reader. Articles with active RFID tags coupled thereto are disposed on the display equipment. These active RFID tags are read by the tag reader even though they are not in the interrogation zone and/or leaving the facility. As such, false alarms are issued by the EAS detection system.
One conventional solution for solving the false alarming issue of EAS detection systems involves using a list of all articles located near exits of the facility. The EAS detections systems will not issue an alarm when RFID tags coupled to the listed articles are read thereby. However, this solution has two problems. First, these articles can be easily stolen since a person can carry the same through the interrogation zone without any alarm issuance by the EAS detection system. Second, when customers shop and move non-listed articles into proximity of the EAS detection system, false alarms are issued by the EAS detection system.
Another solution for solving the false alarming issue of EAS detection systems involves placing articles further away from the tag readers. The downside to this solution is that retailers loose valuable space at the most visible part of the retail stores (i.e., the entrances).
The present disclosure generally concerns systems and methods for operating an EAS detection system. The methods comprise: detecting an active security tag in an EAS detection zone; determining whether the active security tag is coupled to an object identified in a list; and performing operations when a determination is made that the active security tag is coupled to an object identified in the list. The operations include: accessing sensor data generated by at least one sensor device (e.g., a motion sensor and/or camera) disposed on or near display equipment associated with the object identified in the list; processing the sensor data to determine whether a person was within a defined distance range of the active security tag during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of the active security tag during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.
In some scenarios, the list is generated during off hours. For example, the EAS detection system performs operations to read security tags during the off hours and generate/update the list such that it includes identifiers for objects to which the read security tags are coupled. An alarm is issued by the EAS detection system when a determination is made that the active security tag is not coupled to an object identified in the list.
When a determination is made that a person was within the defined distance range of the active security tag during the period of time, the sensor data is used to classify the person as a customer or employee. A conclusion is made that a false alarm scenario exists when the person is classified as an employee. In contrast, a conclusion may be made that a real alarm scenario exists when the person is classified as a customer. However, a conclusion is made that a false alarm scenario exists when (a) the person is classified as a customer and (b) image analysis indicates that the customer is not an individual present in the EAS detection zone at the time of the detecting, that no individual was present in the EAS detection zone at the time of the detecting, and/or that the object to which the active security tag is coupled is not the same as the object present in the EAS detection zone at the time of the detecting.
In those or other scenarios, the sensor data is used to determine if an inanimate object was within a defined distance range of the active security tag during a period of time immediately preceding the detecting. A conclusion is made that a false alarm scenario exists when a determination is made that an inanimate object other than an order-fulfilling robot was within the defined distance range of the active security tag during the period of time.
The present solution will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures.
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The present solution may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the present solution is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present solution should be or are in any single embodiment of the present solution. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present solution. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the present solution may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the present solution can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the present solution.
Reference throughout this specification to “one embodiment”, “an embodiment”, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present solution. Thus, the phrases “in one embodiment”, “in an embodiment”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used in this document, the singular form “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to”.
The present solution provides EAS detection systems with an improved false alarm performance. The improvement in false alarming of the EAS detection systems is at least facilitated by the implementation of a novel method for increasing alarm confidence. The method involves: detecting an active security tag in an EAS detection zone; determining whether the active security tag is coupled to an object identified in a list; and performing operations when a determination is made that the active security tag is coupled to an object identified in the list. The operations include: accessing sensor data generated by at least one sensor device (e.g., a motion sensor and/or camera) disposed on or near display equipment associated with the object identified in the list; processing the sensor data to determine whether a person was within a defined distance range of the active security tag during a period of time immediately preceding the detecting; concluding that a false alarm scenario exists when the sensor data indicates that a person was not within the defined distance range of the active security tag during the period of time; and suppressing alarm issuance by the EAS detection system in response to the false alarm scenario conclusion.
In some scenarios, the list is generated during off hours. For example, the EAS detection system performs operations to read security tags during the off hours and generate/update the list such that it includes identifiers for objects to which the read security tags are coupled. An alarm is issued by the EAS detection system when a determination is made that the active security tag is not coupled to an object identified in the list.
When a determination is made that a person was within the defined distance range of the active security tag during the period of time, the sensor data is used to classify the person as a customer or employee. A conclusion is made that a false alarm scenario exists when the person is classified as an employee. In contrast, a conclusion may be made that a real alarm scenario exists when the person is classified as a customer. However, a conclusion is made that a false alarm scenario exists when (a) the person is classified as a customer and (b) image analysis indicates that the customer is not an individual present in the EAS detection zone at the time of the detecting, that no individual was present in the EAS detection zone at the time of the detecting, and/or that the object to which the active security tag is coupled is not the same as the object present in the EAS detection zone at the time of the detecting.
In those or other scenarios, the sensor data is used to determine if an inanimate object was within a defined distance range of the active security tag during a period of time immediately preceding the detecting. A conclusion is made that a false alarm scenario exists when a determination is made that an inanimate object other than an order-fulfilling robot was within the defined distance range of the active security tag during the period of time.
Illustrative System Architecture
Referring now to
An EAS detection system 114 is provided to detect and mitigate theft of the objects 102 from the RSF 150. The EAS detection system 114 is described herein in terms of an RFID based EAS detection system. Other types of EAS detection systems, including systems that use AM type tags and AM EAS detection systems, can additionally be employed herein. The EAS detection system 114 comprises one or more monitoring systems 116. The monitoring system(s) 116 will be described in detail below. Still, it should be understood that the monitoring system(s) 116 is(are) configured to detect active security tags 104 within EAS detection zone(s) (e.g., near exits of RSF 150) and issue alarms when such detections are made.
Notably, system 100 is configured to identify when these alarms are false alarms. Alarm issuance is suppressed when a false alarm has been identified. Various technologies are used to identify false alarms. Such technologies include, but are not limited to, camera(s) 106, tag reader(s) 110, and/or sensor(s) 112. Cameras and tag readers are well known in the art, and therefore will not be described herein. Any known camera and/or tag reader can be used herein without limitation. For example, camera(s) 106 can include, but is(are) not limited to, a monocular camera, a stereo camera, a depth camera, and/or an Infrared (“IW”) camera. The sensor(s) 112 can include, but are not limited to, motion sensor(s) (e.g., vibration sensors and/or Passive Infrared (“PIR”) sensors). These devices 106, 110, 112 are placed on or adjacent to the display equipment 108 such that images/videos of activity in the vicinity of the display equipment can be captured, security tags disposed on the display equipment can be read, and/or motion of the display equipment can be detected. Time stamps are stored along with image/video data, tag read data and/or motion sensor data in a data store 120, 128. This information is used to identify false alarms by the EAS detection system 114, server 118 and/or computing device 124.
For example, when the monitoring system 116 detects an active security tag in the EAS detection zone, data generated by devices 106, 110 and/or 112 is analyzed to determine if a person was in proximity (e.g., within 1-2 feet) of the active security tag during a period of time (e.g., N minutes or hours) immediately preceding the active security tag's detection by the monitoring system 116. If not, then the alarm is considered a false alarm and issuance thereof is suppressed. In contrast if a person was in proximity of the security tag during the prescribed period of time, image analysis is performed to classify the person as a customer or employee. The person is classified as an employee when (s)he is wearing a uniform, otherwise the person is classified as a customer. The alarm is considered a false alarm when the person is classified as an employee and is considered a real alarm when the person is classified as a customer. Other ways the data generated by devices 106, 110, 112 is used to identify false alarms will become evident as the discussion progresses.
Components 106, 110, 112, 114, 118, 120, 124, 128 of system 100 communicate with each other via a public network 122 (e.g., the Internet) and/or a private network 126 (e.g., an Intranet). Servers, computing devices, public networks and private networks are well known in the art, and therefore will not be described in detail herein. Any known or to be known server, computing device, public network and/or private network can be used herein without limitation.
Referring now to
When an active security tag 104 is detected by the monitoring system 116 in an idealized representation of an EAS detection zone (or interrogation zone) 350 near the entry/exit, the monitoring system 116 detects the presence of such security tag and issues an alarm. Accordingly, the monitoring system 116 is arranged for detecting and preventing the unauthorized removal of articles or products from controlled areas.
The monitoring system 116 includes a pair of pedestals 202a, 202b, which are located a known distance apart (e.g., at opposing sides of an entry/exit 204). The pedestals 202a, 202b are typically stabilized and supported by a base 206a, 206b. The pedestals 202a, 202b will each generally include one or more antennas that are suitable for aiding in the detection of the special EAS security tags, as described herein. For example, pedestal 202a can include at least one antenna 220a suitable for transmitting or producing an RF exciter signal (or interrogation signal) and receiving response signals generated by active security tags in the EAS detection zone 350. In some scenarios, the same antenna can be used for both receive and transmit functions. Similarly, pedestal 202b can include at least one antenna 220b suitable for transmitting or producing an RF exciter signal (or interrogation signal) and receiving response signals generated by security tags in the EAS detection zone 350.
In some scenarios, a single antenna can be used in each pedestal. The single antenna is selectively coupled to the EAS receiver. The EAS transmitter is operated in a time multiplexed manner. However, it can be advantageous to include two antennas in each pedestal as shown in
The antennas located in the pedestals 202a, 202b are electrically coupled to a system controller 210. The system controller 210 controls the operation of the monitoring system 116 to perform EAS functions as described herein. The system controller 210 can be located within a base 206a, 206b of one of the pedestals 202a, 202b or can be located within a separate chassis at a location nearby to the pedestals. For example, the system controller 210 can be located in a ceiling just above or adjacent to the pedestals 202a, 202b.
As noted above, the EAS detection system comprises an RFID type EAS detection system. As such, each antenna is used to generate an RFID signal which serves as an interrogation signal. The interrogation signal causes the security tag 104 to generate and transmit an RFID response signal. The RFID response signal includes a unique identifier of the security tag 104 and/or object to which it is coupled. The RFID response signal is used to indicate a presence of the security tag within the EAS detection zone (or interrogation zone) 350. As noted above, the same antenna contained in a pedestal 202a, 202b can serve as both the transmit antenna and the receive antenna.
A camera 108a, 108b may be coupled to one or more of the pedestals 202a, 202b. Additionally or alternatively, a camera can be located in the ceiling just above the pedestals 202a, 202b and/or mounted on a wall adjacent to the pedestals 202a, 202b. The camera(s) 108a, 108b is(are) arranged such that their Field Of View (“FOV”) cover(s) the EAS detection zone 350. The camera(s) 108a, 108b is(are) provided to capture images/videos of the EAS detection zone when an active security tag 104 is detected therein. These images/videos are used to identify when an alarm issued by the monitoring system 116 is a false alarm. False alarms can occur when active security tags are carried passed the pedestals 202a, 202b within the RSF 150 and/or when active security tags are disposed on display equipment located within the read range of the monitoring system 116 as discussed below in relation to
Referring now to
The antenna field pattern 400 shown in
The overlapping antenna field patterns 400, 500 in
Area A between pedestals 202a, 202b defines at least a portion of the EAS detection zone 350 in which active security tags 104 should cause the monitoring system 116 to generate an alarm response. Security tags in area A are stimulated by energy associated with an exciter signal within the lobes 404, 504 and will produce a response which can be detected at each antenna. The response produced by a security tag in area A is detected within the lobes of each antenna and processed in the system controller 210. This response signal is referred to herein as a “security tag signal” or an “RFID response signal”.
Notably, a security tag in areas B or C will also be excited by the antennas 202a, 202b. The RFID response signal produced by a security tag in these areas B and C will also be received at one or both antennas, and therefore will cause false alarming by the monitoring system 116.
As noted above in relation to
The area covered by the camera can include at least area A. Notably, the cameras are not shown in
The camera(s) are controlled and provided power from the RFID reader or system controller 210. 1-wire technology may be employed to provide data, power and RF. In some scenarios, the camera(s) use less than 1mW continuous and the data rate of the metadata is low enough to be supported by 1-wire technology. So, one or more cameras may be added to a 1-wire bus of system 100 for easy integration with an RFID reader.
The cameras provide the RFID reader or system controller 210 with real-time contextual information about the presence of people/packages/objects, the location of the same, and a direction of travel of the same. In the case that a person is detected by a camera, the camera can also provide real-time contextual information about (1) whether or not an item is in the EAS detection zone at the same time a person is in the EAS detection zone, (2) whether or not the person is carrying any items, (3) the type of person in the EAS detection zone (e.g., customer or employee), and/or (4) the types of the items detected in the EAS detection zone. The real-time contextual information is then used by the system controller 210, monitoring system 116, server 118, and/or computing device 124 to identify false alarm scenarios.
It should be noted that the two pedestals 202a, 202b can be activated at the same time or in a multiplexed manner. In the multiplexed scenarios, the pedestals 202a, 202b are activated in an alternating manner. For example, at a first time, pedestal 202a is activated and pedestal 202b is deactivated. At a second time, pedestal 202a is deactivated and pedestal 202b is activated.
Referring now to
The instructions (i.e., computer software) can include an EAS detection module 720 to facilitate EAS detection and perform methods for issuing alarms, identifying false alarms, and/or suppressing alarm issuance for false alarms, as described herein. The instructions can also include a camera module 750 to (a) cause images/videos to be captured by at least one camera coupled to or disposed in proximity to a pedestal, (b) cause the images/videos to be communicated from the camera to the system controller 210, (c) cause metadata to be communicated from the camera to the system controller 210, (d) receive data from external sensor devices, tag readers and other cameras disposed in proximity to display equipment located in a read range of the monitoring system(s) 116, (e) process images, videos, metadata, sensor data, and/or tag read data to determine whether or not a false alarm scenario exists, and/or (e) provide indications of false alarm scenarios to the processor 716 for use in controlling antenna's 202a, 202b. These instructions can also reside, completely or at least partially, within the processor 716 during execution thereof.
The system also includes at least one EAS transceiver 708, including transmitter circuitry 710 and receiver circuitry 712. The transmitter and receiver circuitry are electrically coupled to antenna 202a and the antenna 202b. A suitable multiplexing arrangement can be provided to facilitate both receive and transmit operation using a single antenna (e.g., antenna 202a or 202b). Transmit operations can occur concurrently at antennas 202a, 202b after which receive operations can occur concurrently at each antenna to listen for security tags which have been excited. Alternatively, transmit operations can be selectively controlled as described herein so that only one antenna is active at a time for transmitting interrogation signals. The antennas 202a, 202b can include an upper and lower antenna similar to those shown and described with respect to
Additional components of the system controller 210 can include a communication interface 724 configured to facilitate wired and/or wireless communications from the system controller 210 to a remotely located EAS system server 118 or computing device 124. The system controller can also include a real-time clock 725 which is used for timing purposes, and an alarm 726 (e.g., an audible alarm, a visual alarm, or both) which can be activated when an active EAS security tag is detected thereby (e.g., in zone 350 of
Those skilled in the art will appreciate that the system controller architecture illustrated in
Referring now to
Referring now to
A vibration sensor 1123 is also coupled to the display equipment 1081. The vibration sensor 1123 detects when the display equipment 1081 and/or objects 1021, 1022 disposed thereon are touched by a person 910, 912. Sensor data generated by the sensor 1123 is stored in a datastore 120, 128 and/or 718 along with timestamps for later use in identifying false alarms.
The person can include a customer 910 or an employee 912. The sensor data generated by sensors 1121, 1122, 1123 is not sufficient for classifying the person as a customer or an employee. However, the person can be classified based on results of an analysis of the image/video data generated by cameras 1061, 1062. The person's classification can also assist in identifying false alarm scenarios as described below.
A tag reader 1101 may further be disposed on or adjacent to the display equipment 108. The tag reader 1101 has a read range that includes the first and second monitored zones 906, 908. The tag reader 1101 reads active security tags in the first and second monitored zones 906, 908 on a continuous basis, a periodic basis at pre-defined intervals, or in response to trigger events (e.g., N seconds or minutes after an image capture by camera 1061 or 1062). Tag read data generated by tag reader 1101 is then stored in the data store 120, 128 and/or 718 along with timestamps for later use in identifying false alarms as described below.
A white list of objects can be manually created by a person (e.g., an employee operator) or specified by a planogram. Alternatively, the white list of objects is generated based on the tag read data generated by monitoring system 116 and/or tag reader 1101 during off or non-business hours. The white list provides a way to determine when an alarm caused by a white listed object is a false alarm. An illustration of an illustrative white list stored as a table 1000 in a data store is provided in
Another aspect of the present solution is to allow the system 100 to auto-configure itself so as to minimize time spent setting it up. Calibration or registration marks can be added to the zones to be monitored. A mobile device (e.g., a smart phone or tablet) can be provided that allows easy marking of monitored zones. If enough tag readers are placed in an area that allows a tag's location to be determined within a relatively small zone, then security tags can be associated with relatively small monitored zones which helps to increase the confidence of a false alarm identification.
Illustrative Methods for Operating An EAS Detection System
Referring now to
If the security tag is not coupled to a white listed object [1110:N0], then 1112 is performed where an alarm may be issued by the EAS detection system. The alarm is issued if the system (e.g., system 100 of
If the security tag is coupled to the white listed object [1110:YES], then 1114 is performed where the display equipment (e.g., display equipment 108 of
If so [1118:YES], then 1122 is performed where tag read data is access for at least one tag reader (e.g., tag reader 110 of
If not [1124:N0], then method 1100 continues with 1128 of
If so [1132:YES], then 1136 is performed where image analysis is performed to classify the inanimate object as an order-fulfilling robot, a restocking robot, merchandise or other object (e.g., a shopping cart). If the inanimate object is classified as an order-fulfilling robot [1138:YES], then 1140 is performed where the EAS detection system issues an alarm. Otherwise [1138:N0], 1142 is performed where a false alarm scenario conclusion is made, EAS detection alarming is suppressed, and/or method 1100 continues with 1144 of
Referring now to
If the person is classified as an employee [1148:N0], then 1150 is performed where a false alarm scenario conclusion is made, EAS detection alarming is suppressed, and/or method 1100 continues with 1164. In 1164, method 1100 ends or other processing is performed (e.g., return to 1106).
If the person is classified as a customer [1148:YES], then 1152 is performed where second image/video data is accessed for a camera (e.g., camera 108a and/or 108b of
If so [1154:YES], then a decision is made as to whether the person in the second image/video is the customer seen in the first image/video. If not [1156:N0], then method 1100 continues with 1160 which will be discussed below.
If so [1156:YES], then a decision is made as to whether the object in the second image/video is of the same type as the white listed object. If not [1158:N0], then method 1100 continues with 1160 where a false alarm scenario conclusion is made, EAS detection alarming is suppressed, and/or method 1100 continues with 1164. In 1164, method 1100 ends or other processing is performed (e.g., return to 1106).
If so [1158:YES], then 1162 is performed where an alarm is issued by the EAS detection system. Subsequently, 1164 is performed where method 1100 ends or other processing is performed (e.g., return to 1106).
Although the present solution has been illustrated and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification and the annexed drawings. In addition, while a particular feature of the present solution may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Thus, the breadth and scope of the present solution should not be limited by any of the above described embodiments. Rather, the scope of the present solution should be defined in accordance with the following claims and their equivalents.