Shielded pedestal with see-thru capability
10580273 ยท 2020-03-03
Assignee
Inventors
Cpc classification
G08B13/248
PHYSICS
G06K7/10366
PHYSICS
H04N7/181
ELECTRICITY
G08B13/2402
PHYSICS
G08B13/2474
PHYSICS
H04N23/90
ELECTRICITY
International classification
G06K15/00
PHYSICS
G06K7/10
PHYSICS
Abstract
Systems and methods for operating a pedestal of an Electronic Article Surveillance (EAS) system. The methods comprise: performing tag detection operations by a circuit of a first pedestal to detect an active security tag located in an EAS detection zone of the EAS system; and performing open-look operations by the circuit of the first pedestal simultaneously with the tag detection operations, where the open-look operations cause a portion of the first pedestal that is formed of an opaque material (1) to appear at least partially transparent or (2) to appear as if the portion has at least one aperture formed therethrough.
Claims
1. A method for operating a pedestal of an Electronic Article Surveillance (EAS) system, comprising: performing tag detection operations by a circuit of a first pedestal to detect an active security tag located in an EAS detection zone of the EAS system; and performing open-look operations by the circuit of the first pedestal simultaneously with the tag detection operations, where the open-look operations cause a portion of the first pedestal that is formed of an opaque material (1) to appear at least partially transparent or (2) to appear as if the portion has at least one aperture formed therethrough.
2. The method according to claim 1, wherein the first pedestal comprises a shielding layer to prevent detection of an active security tag in a pedestal back-field.
3. The method according to claim 2, wherein the shielding layer has geometric dimensions greater than an antenna of the first pedestal.
4. The method according to claim 1, wherein the tag detection operations further comprise attenuating an interrogation signal transmitted from the first pedestal or a second pedestal prior to the interrogation signal reaching a pedestal back-field area.
5. The method according to claim 1, wherein the tag detection operations further comprise attenuating a response signal generated by an active security tag located in a pedestal back-field area.
6. The method according to claim 1, wherein the open-look operations involve capturing at least one image or video by a camera coupled to a first side of the first pedestal.
7. The method according to claim 6, wherein the open-look operations involve displaying the at least one image or video on a display device coupled to a second side opposed from the first side of the first pedestal.
8. The method according to claim 7, wherein the display devices comprise a single display screen or an array of display screens.
9. The method according to claim 8, wherein a shielding layer of the first pedestal resides between the camera and the display device, the shielding layer configured to reduce a total number of detections of active security tags in a pedestal back-field area.
10. The method according to claim 9, wherein at least one antenna of the first pedestal also resides between the camera and the display device.
11. An Electronic Article Surveillance (EAS) pedestal, comprising: a processor; and a non-transitory computer-readable storage medium comprising programming instructions that are configured to cause the processor to implement a method for operating the EAS pedestal, wherein the programming instructions comprise instructions to: perform tag detection operations to detect an active security tag located in an EAS detection zone of the EAS pedestal; and perform open-look operations simultaneously with the tag detection operations, where the open-look operations cause a portion of the EAS pedestal that is formed of an opaque material (1) to appear at least partially transparent or (2) to appear as if the portion has at least one aperture formed therethrough.
12. The EAS pedestal according to claim 11, wherein the EAS pedestal comprises a shielding layer to prevent detection of an active security tag in a pedestal back-field.
13. The EAS pedestal according to claim 12, wherein the shielding layer has geometric dimensions greater than an antenna of the EAS pedestal.
14. The EAS pedestal according to claim 11, wherein the tag detection operations further comprise attenuating an interrogation signal transmitted from the EAS pedestal or another EAS pedestal prior to the interrogation signal reaching a pedestal back-field area.
15. The EAS pedestal according to claim 11, wherein the tag detection operations further comprise attenuating a response signal generated by an active security tag located in a pedestal back-field area.
16. The EAS pedestal according to claim 11, wherein the open-look operations involve capturing at least one image or video by a camera coupled to a first side of the EAS pedestal.
17. The EAS pedestal according to claim 16, wherein the open-look operations involve displaying the at least one image or video on a display device coupled to a second side opposed from the first side of the EAS pedestal.
18. The EAS pedestal according to claim 17, wherein the display device comprises a single display screen or an array of display screens.
19. The EAS pedestal according to claim 18, wherein at least one antenna of the EAS pedestal also resides between the camera and the display device.
20. The EAS pedestal according to claim 17, wherein a shielding layer of the EAS pedestal resides between the camera and the display device, the shielding layer configured to reduce a total number of detections of active security tags in a pedestal back-field area.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The present solution will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
DETAILED DESCRIPTION
(13) It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
(14) The present solution may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the present solution is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
(15) Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present solution should be or are in any single embodiment of the present solution. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present solution. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
(16) Furthermore, the described features, advantages and characteristics of the present solution may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the present solution can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the present solution.
(17) Reference throughout this specification to one embodiment, an embodiment, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present solution. Thus, the phrases in one embodiment, in an embodiment, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
(18) As used in this document, the singular form a, an, and the include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term comprising means including, but not limited to.
(19) The present solution generally provides implementing systems and methods for providing backfield reduction in EAS systems while allowing full visibility to the area behind the EAS pedestal(s). The present solution is achieved by displaying images of the area behind a pedestals on at least one display screen coupled to the front of the pedestals. The images are captured by one or more cameras coupled to the back of the pedestal. Using small low profile cameras mounted on the rear of the pedestal and mounting a display or array of displays visible from the front side of the pedestal, images can be displayed on the front side of the pedestal presenting the illusion that the pedestal is see thru. In reality, the pedestal is opaque due to a shielding material mounted behind the pedestal antenna(s). The shielding material minimizes or eliminated detection of active security tags in pedestal back-field areas. The present solution will be discussed in more detail below.
(20) Referring now to
(21) The EAS detection system 100 will be positioned at a location adjacent to an entry/exit 104 of a secured facility (e.g., a retail store). The EAS detection system 100 uses specially designed EAS marker tags (security tags) which are applied to store merchandise or other items which are stored within a secured facility. Security tags are well known in the art, and therefore will not be described herein in detail. Any known or to be known security tag can be used herein without limitation. The security tags can be deactivated or removed by authorized personnel at the secure facility. For example, in a retail environment, the security tags could be removed by store employees.
(22) When an active security tag 112 is detected by the EAS detection system 100 in an idealized representation of an EAS detection zone (or interrogation zone) 150 near the entry/exit, the EAS detection system will detect the presence of such security tag and will sound an alarm or generate some other suitable EAS response. Accordingly, the EAS detection system 100 is arranged for detecting and preventing the unauthorized removal of articles or products from controlled areas.
(23) The EAS detection system 100 includes a pair of pedestals 102a, 102b, which are located a known distance apart (e.g., at opposing sides of an entry/exit 104). The pedestals 102a, 102b are typically stabilized and supported by a base 106a, 106b. The pedestals 102a, 102b will each generally include one or more antennas that are suitable for aiding in the detection of the special EAS security tags, as described herein. For example, pedestal 102a can include at least one antenna 302 suitable for transmitting or producing an electromagnetic exciter signal field (or interrogation signal) and receiving response signals generated by active security tags in the EAS detection zone 150. In some scenarios, the same antenna can be used for both receive and transmit functions. Similarly, pedestal 102b can include at least one antenna 402 suitable for transmitting or producing an electromagnetic exciter signal field (or interrogation signal) and receiving response signals generated by security tags in the EAS detection zone 150. The antennas provided in pedestals 102a, 102b can be conventional conductive wire coil or loop designs as are commonly used in AM type EAS pedestals. These antennas will sometimes be referred to herein as exciter coils. In some scenarios, a single antenna can be used in each pedestal. The single antenna is selectively coupled to the EAS receiver. The EAS transmitter is operated in a time multiplexed manner. However, it can be advantageous to include two antennas (or exciter coils) in each pedestal as shown in
(24) The antennas located in the pedestals 102a, 102b are electrically coupled to a system controller 110. The system controller 110 controls the operation of the EAS detection system 100 to perform EAS functions as described herein. The system controller 110 can be located within a base 106a, 106b of one of the pedestals 102a, 102b or can be located within a separate chassis at a location nearby to the pedestals. For example, the system controller 110 can be located in a ceiling just above or adjacent to the pedestals 102a, 102b.
(25) As noted above, the EAS detection system comprises an AM type EAS detection system. As such, each antenna is used to generate an Electro-Magnetic (EM) field which serves as a security tag exciter signal. The security tag exciter signal (or interrogation signal) causes a mechanical oscillation of a strip (e.g., a strip formed of a magnetostrictive or ferromagnetic amorphous metal) contained in a security tag within an EAS detection zone 150. As a result of the stimulus signal, the security tag will resonate and mechanically vibrate due to the effects of magnetostriction. This vibration will continue for a brief time after the stimulus signal (or interrogation signal) is terminated. The vibration of the strip causes variations in its magnetic field, which can induce an AC signal in the receiver antenna. This induced signal is used to indicate a presence of the strip within the EAS detection zone (or interrogation zone) 150. As noted above, the same antenna contained in a pedestal 102a, 102b can serve as both the transmit antenna and the receive antenna. Accordingly, the antennas in each of the pedestals 102a, 102b can be used in several different modes to detect a security tag exciter signal. These modes will be described below in further detail.
(26) Referring now to
(27) The antenna field pattern 300 shown in
(28) The overlapping antenna field patterns 300, 400 in
(29) Referring again to
(30) Each camera 108a, 108b is shown as being located in the middle of the vertically elongate pedestals. The presents solution is not limited in this regard. The camera can be located at any location on the respective pedestal in accordance with a given application. For example, the camera is located at the top center of the pedestal. Additionally, more than one camera can be provided with each pedestal. The total number of cameras on each pedestal is selected in accordance with a given application.
(31) At least one display device 114a, 114b is advantageously mounted on the front of each pedestal 102a or 102b. Display devices are well known in the art, and therefore will not be described herein. Any known or to be known display device (e.g., TV, smart screen, and/or computer based display screen) can be used herein without limitation. Still, it should be understood that each display device 114a, 114b is generally configured to display images capture by the camera 108a, 108b. The images provide representations of the area behind the respective pedestal. This area is inclusive of the backfield areas B or C shown in
(32) Each display device 114a, 114b is shown as being located in the middle of the vertically elongate pedestals. The presents solution is not limited in this regard. The display device can be located at any location on the respective pedestal in accordance with a given application. For example, the display device is located at the top center of the pedestal. Additionally, more than one display device can be provided with each pedestal. The total number of display devices on each pedestal is selected in accordance with a given application.
(33) Referring now to
(34) Referring now to
(35) As shown in
(36) Referring now to
(37) The antenna(s) 302a can include, but is not limited to, air core coils, ferrite core antenna(s), iron core antenna(s), and/or patch antenna(s). The antenna(s) 302 can additionally or alternative be designed to detect magnets. For example, a magnet sensing apparatus is provided inside an antenna coil. The present solution is not limited to the particulars of this example.
(38) The present solution is not limited to this configuration of
(39)
(40) The present solution is not limited to the configurations shown in
(41) Referring now to
(42) The system also includes at least one EAS transceiver 1108, including transmitter circuitry 1110 and receiver circuitry 1112. The transmitter and receiver circuitry are electrically coupled to antenna 302a and the antenna 302b. A suitable multiplexing arrangement can be provided to facilitate both receive and transmit operation using a single antenna (e.g. antenna 302a or 302b). Transmit operations can occur concurrently at antennas 302a, 302b after which receive operations can occur concurrently at each antenna to listen for marker tags which have been excited. Alternatively, transmit operations can be selectively controlled as described herein so that only one antenna is active at a time for transmitting security tag exciter signals for purposes of executing the various algorithms described herein. The antennas 302a, 302b can include an upper and lower antenna similar to those shown and described with respect to
(43) Additional components of the system controller 110 can include a communication interface 1124 configured to facilitate wired and/or wireless communications from the system controller 110 to a remotely located EAS system server. The system controller can also include a real-time clock 1125 which is used for timing purposes, and an alarm 1126 (e.g. an audible alarm, a visual alarm, or both) which can be activated when an active EAS security tag is detected within the EAS detection zone 108. A power supply 1128 provides necessary electrical power to the various components of the system controller 110. The electrical connections from the power supply to the various system components are omitted in
(44) Those skilled in the art will appreciate that the system controller architecture illustrated in
(45) Referring now to
(46) Tag detection operations of EAS systems and EAS pedestals are well known in the art, and therefore are not described in detail herein. Any known or to be known tag detection operations can be employed herein without limitation. For example, in some scenarios, the tag detection operations 1206-1214 involve: performing operations by a system controller (e.g., system controller 110 of
(47) The open-look operations 1216-1218 involve: capturing at least one image or video of an area of a facility at least partially surrounding the first pedestal; and displaying the at least one image or video on a display screen coupled to a portion of the first pedestal which is formed of an opaque material such that the opaque portion appears at least partially transparent and/or such that the opaque portion appears as if it has at least one aperture formed therethrough.
(48) Upon completing the tag detection operations 1206-1214 and the open-look operations 1216-1218, method 1200 continues with 1218. In 1218, method 1200 ends or other processing is performed. The other processing can include, but is not limited to, returning to 1204 so that the process is repeated.
(49) Although the present solution has been illustrated and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification and the annexed drawings. In addition, while a particular feature of the present solution may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Thus, the breadth and scope of the present solution should not be limited by any of the above described embodiments. Rather, the scope of the present solution should be defined in accordance with the following claims and their equivalents.