G08B13/246

THEFT PREVENTION FOR RETURNED MERCHANDISE

Consistent with disclosed embodiments, systems, methods, and computer readable media for electronic security systems for preventing theft of returned goods may be provided. Embodiments may include an electronic article surveillance (EAS) gate in an establishment and at least one receiver configured to receive transmissions from wirelessly transmitting tags. Embodiments may also include at least one processor configured to receive, from a mobile communications device associated with a previous purchaser, a notification of intent to return a previously purchased product to the establishment; identify a unique tag ID of a specific wirelessly transmitting tag associated with the previously purchased product; update a data structure to indicate that the previously purchased product was returned to the establishment; and enable an ability to initiate an alarm when the at least one receiver receives a transmission from the specific tag associated with the previously purchased product in proximity to the EAS gate.

INFORMATION PROCESSING DEVICE, PROGRAM, AND INFORMATION PROCESSING SYSTEM

An information processing device includes a first receiving unit configured to receive, from a terminal device that performs settlement of a commodity, an individual article code capable of identifying the commodity in an individual article unit, a storage control unit configured to store the individual article code in a storing unit, a second receiving unit configured to receive, from a gate device provided in a predetermined position of a store, the individual article code of the commodity obtained by the gate device reading a wireless tag attached to the commodity, a collating unit configured to collate the individual article code received by the second receiving unit with each of individual article codes stored in the storing unit, and an informing unit configured to inform if, as a result of the collation, a coinciding individual article code is absent in the storing unit.

Validating radio frequency identification (RFID) tag alarm events
11423751 · 2022-08-23 · ·

In an Electronic Article Surveillance (EAS), a radio frequency identification (RFID) subsystem of an EAS system, can detect a presence of an RFID tag in an RFID interrogation zone associated with a boundary of a controlled area. The EAS system can first determine that the RFID tag is not authorized to leave the controlled area across the boundary. A radar subsystem of the EAS system can second determine, within a first window of time around the first detecting, whether an object in motion is associated with the boundary. The EAS system can alarm based upon both determining that the RFID tag is not authorized to leave the controlled area and determining that the object in motion is associated with the boundary.

System for monitoring and controlling shopping cart usage

A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.

SYSTEM FOR MONITORING AND CONTROLLING SHOPPING CART USAGE
20220119027 · 2022-04-21 ·

A system for monitoring and controlling shopping cart usage comprises a wheel assembly that attaches to a shopping cart. In some embodiments the wheel assembly includes a wheel, a brake that can be activated to inhibit rotation of the wheel, a controller that controls the brake, a VLF receiver, and an RF transceiver. The RF transceiver may, for example, operate in a 2.4 GHz frequency band. In some implementations, the RF transceiver may be used to detect entry of the shopping cart into a checkout area of the store, and the VLF receiver may be used to detect that the shopping cart is exiting the store. The controller may activate the brake if the shopping cart attempts to exit the store without first passing through a checkout area.

Motorized cart retriever for monitoring cart status

A motorized cart retriever, which may be a cart pusher or a cart puller, can apply a force to a nest of human-propelled, wheeled carts to facilitate retrieval of the carts. The cart retriever can include a transceiver configured to wirelessly receive cart status information from cart transmitters of the wheeled carts and wirelessly report event data to a control unit. The cart status information may include an identification of the cart transmitter, a location of the cart, a lock or unlock status of a cart wheel, a misuse condition, etc. The event data can include the cart status information, a number of wheeled carts being retrieved, etc. The cart wheel may include a brake. The transceiver may communicate a message to the cart wheel to keep the brake unactuated during retrieval. The control unit may analyze the event data to detect traffic patterns of the carts.

SMART ALARM MANAGEMENT
20220114871 · 2022-04-14 ·

A security alarm management system and method includes a reader device, a person counter, and an alarm. The reader device reads security tags within a range of the reader. The person counter detects people passing through a point of entry. The person counter can determine a direction of travel of people passing through the point of entry. A white-list includes entries or product identifiers that will not trigger an alarm. The alarm is triggered if conditions associated with the reader device, person counter, and white-list are met.

Unified security device

Systems and methods for operating a Unified Security Device (“USD”). The methods comprise: receiving an Electronic Article Surveillance (“EAS”) interrogation signal with an antenna of the USD; processing the EAS interrogation signal using a processor unit of the USD; using the processor unit to generate an EAS response signal that emulates a response signal produced by an Acousto-Magnetic (AM) type of EAS security tag, in response to the EAS interrogation signal; and communicating the EAS response signal from the USD.

Radio-frequency-identification-based checkout process

A method includes scanning, by a checkout station, a plurality of items and determining, by the checkout station, a total price for the plurality of items. Each item of the plurality of items is coupled to a radio frequency identification (RFID) tag that identifies that item. The method also includes detecting, by an RFID scanner of a centralized payment station, one or more of the RFID tags of the plurality of items moving within a threshold distance of the centralized payment station and retrieving, by a hardware processor of the centralized payment station and based on the detected one or more RFID tags, the total price. The method further includes processing, by the hardware processor, a payment in satisfaction of the total price.

METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS
20210295057 · 2021-09-23 ·

A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.