Self-detaching anti-theft device with power removal station
10497238 ยท 2019-12-03
Assignee
Inventors
- Jose Casanova (Coral Springs, FL, US)
- Sergio M. Perez (Lake Worth, FL, US)
- John J. Clark (Boynton Beach, FL, US)
- Randy J. Zirk (Delray Beach, FL, US)
Cpc classification
E05B73/0017
FIXED CONSTRUCTIONS
International classification
Abstract
Systems and methods for operating a security tag. The methods involve: establishing an electrical connection between the security tag and an external Power Removal Station (PRS); performing operations by the security tag to authenticate a detach command sent from the external PRS; allowing power to be supplied from the external PRS to an electro-mechanical component of the security tag when the detach command is authenticated; and actuating the electro-mechanical component so that a pin of the security tag transitions from an engaged position to an unengaged position without any human assistance or mechanical assistance by a device external to the security tag.
Claims
1. A method for detaching a security tag from an article, comprising: establishing a direct electrical connection between first power connectors of a power removal station of a retail store system and second power connectors of the security tag; verifying, by a retail store system, that the article has been successfully purchased; and in response to a verification that the article has been successfully purchased, automatically initiating a security tag detaching process that involves supplying power from the power removal station to the security tag via the first and second power connectors; and causing a selective creation of a closed circuit between the power removal station and an electro-mechanical component of the security tag, whereby the electro-mechanical component receives the power and is actuated so that a pin of the security tag transitions from a fully engaged position to a fully unengaged position without any human assistance or mechanical assistance by a device external to the security tag.
2. The method according to claim 1, wherein the power removal station is integrated with or coupled to a Mobile Point Of Sale (MPOPS) device.
3. The method according to claim 1, wherein the power removal station has a fixed location in a retail store.
4. The method according to claim 1, wherein the closed circuit is selectively created when a detach command sent from the power removal station is authenticated by the security tag.
5. The method according to claim 1, further comprising communicating a purchase token from the retail store system to the security tag for later use to assist in determining why a failure occurred in relation to the security tag's detachment from the article.
6. The method according to claim 1, further comprising communicating a purchase token from the retail store system to the security tag for later use to determine whether a decently found security tag was removed from a purchased item or stolen item.
7. The method according to claim 1, further comprising receiving a detach command at the power removal station.
8. The method according to claim 7, further comprising performing operations by the power removal station to authenticate the detach command.
9. The method according to claim 8, wherein the power is supplied from the power removal station to the security tag when the detach command is authenticated.
10. A retail store system, comprising: a power removal station comprising first power connectors to establish a direct electrical connection with second power connectors of a security tag coupled to an article, and configured to supply power to the security tag via the first and second power connectors, and cause a selective creation of a closed circuit between the power removal station and an electro-mechanical component of the security tag, whereby the electro-mechanical component receives the power and is actuated so that a pin of the security tag transitions from a fully engaged position to a fully unengaged position without any human assistance or mechanical assistance by a device external to the security tag.
11. The retail store system according to claim 10, wherein the power removal station is integrated with or coupled to a Mobile Point Of Sale (MPOPS) device.
12. The retail store system according to claim 10, wherein the power removal station has a fixed location in a retail store.
13. The retail store system according to claim 10, wherein the closed circuit is selectively created when a detach command sent from the power removal station is authenticated by the security tag.
14. The retail store system according to claim 10, further comprising a communications device configured to communicate a purchase token to the security tag for later use to assist in determining why a failure occurred in relation to the security tag's detachment from the article.
15. The retail store system according to claim 10, further comprising a communications device configured to communicate a purchase token to the security tag for later use to determine whether a decently found security tag was removed from a purchased item or stolen item.
16. The retail store system according to claim 10, wherein the power removal station is further configured to receive a detach command from an external device.
17. The retail store system according to claim 16, wherein the power removal station is further configured to authenticate the detach command.
18. The retail store system according to claim 17, wherein the power is supplied from the power removal station to the security tag when the detach command is authenticated.
Description
DESCRIPTION OF THE DRAWINGS
(1) Embodiments will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures, and in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
DETAILED DESCRIPTION OF THE INVENTION
(13) It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
(14) The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
(15) Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
(16) Furthermore, the described features, advantages and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
(17) Reference throughout this specification to one embodiment, an embodiment, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present invention. Thus, the phrases in one embodiment, in an embodiment, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
(18) As used in this document, the singular form a, an, and the include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term comprising means including, but not limited to.
(19) The present disclosure concerns a self-detaching solution for security tags. The self-detaching solution allows a customer to select a desired item and make a secure payment of the desired item (e.g., using PayPal or other cloud based online service). Once a purchase transaction has been verified by a retail store system, a wireless command signal is sent from the retail store system to a PRS for the security tag. In response to the wireless command signal, power is supplied from the PRS to the security tag such that a mechanical component (e.g., a solenoid, stepper motor or miniature actuator) thereof can be actuated. This actuation allows a removal of the security tag from the purchased item by the customer. For example, actuation of the mechanical component causes a captive pin to be released, whereby the security tag can be removed from the item. The captive pin is fixedly coupled to the security tag's housing such that there is no potential loss or theft thereof by the customer, or need to use two hands to couple/decouple the security tag from an item. This captive pin arrangement also ensures that the security tag is safe with no sharp object exposed to customers during their shopping experience or store personnel during their routine maintenance.
(20) Notably, the self-detaching solution is compatible with existing Acousto-Magnetic (AM) detection systems and RFID enabled inventory tracking systems. In some scenarios, an EAS Non-Deactivatable Label (NDL) is disposed within the security tag. NDL's are well known in the art, and therefore will not be described herein. Any known or to be known NDL can be used herein without limitation. In some scenarios, the NDL is used to alert the customer and/or store personnel that the security tag is still attached to the article subsequent to deactivation thereof. This alert can occur prior to the customer's exiting of the store facility.
(21) Also, a store associate and/or dedicated detacher unit is not required or needed for removing the security tag from the item. Dedicated detacher units are problematic for self-detaching applications. As such, a PRS is employed to facilitate the decoupling of security tags from articles, instead of dedicated detacher units. The PRS is generally configured to supply power to the security tag so that the mechanical component can be actuated subsequent to a successful purchase transaction. In some scenarios, the PRS also provides a signal including information (e.g., a known identifier of the PRS) that is authenticated or validated by the security tag prior to allowing the power to be supplied to the mechanical component. For example, a switch (disposed in the security tag) is closed when the information is authenticated or validated by the security tag. Closure of the switch provides a closed circuit between the mechanical component and the PRS power supply. The present invention is not limited to the particulars of this example. The PRS may be a fixed or mobile device. In the mobile scenarios, the PRS may be integrated with or coupled to a Mobile Point Of Sale (MPOS) device.
(22) Exemplary Systems for Customer Detachment of Security Tags
(23) The present disclosure generally relates to systems and methods for operating a security tag of an EAS system. The methods involve: receiving a request to detach a security tag from an article; generating a signal including a command for actuating a detachment mechanism of a security tag; communicating the signal to a PRS for causing power to be supplied to the security tag; and supplying power to the security tag so as to cause actuation of a detachment mechanism contained therein. The detachment mechanism can include, but is not limited to, an electro-mechanical detachment mechanism. Operations of the electro-mechanical detachment mechanism will be described in detail below. The mechanical detachment portion of the electro-mechanical detachment mechanism may include, but is not limited to, a pin.
(24) Referring now to
(25) As shown in
(26) During store hours, a customer 140 may desire to purchase the article 102. The customer 140 can purchase the article 102 without using a traditional fixed POS station (e.g., a checkout counter). Instead, the purchase transaction can be achieved using MCD 104 and/or PD 190. MCD 104 (e.g., a mobile phone or tablet computer) can be in the possession of the customer 140 or store associate 142 at the time of the purchase transaction. Notably, MCD 104 has a retail transaction application installed thereon that is configured to facilitate the purchase of article 102 and the management/control of PD 190 operations for an attachment/detachment of the security tag 132 to/from article 102. The retail transaction application can be a pre-installed application, an add-on application or a plug-in application.
(27) In order to initiate a purchase transaction, the retail transaction application is launched via a user-software interaction. The retail transaction application facilitates the exchange of data between the article 102, security tag 132, customer 140, store associate 142, and/or Retail Transaction System (RTS) 118. For example, after the retail transaction application is launched, a user 140, 142 is prompted to start a retail transaction process for purchasing the article 102. The retail transaction process can be started simply by performing a user software interaction, such as depressing a key on a keypad of the MCD 104 or touching a button on a touch screen display of the MCD 104.
(28) Subsequently, the user 140, 142 may manually input into the retail transaction application article information. Alternatively or additionally, the user 140, 142 places the MCD 104 in proximity of article 102. As a result of this placement, the MCD 104 and/or PD 190 obtains article information from the article 102. The article information includes any information that is useful for purchasing the article 102, such as an article identifier and an article purchase price. In some scenarios, the article information may even include an identifier of the security tag 132 attached thereto. The article information can be communicated from the article 102 to the MCD 104 and/or PD 190 via a Short Range Communication (SRC), such as a barcode communication 122 or an NFC 120. In the barcode scenario, article 102 has a barcode 128 attached to an exposed surface thereof. In the NFC scenarios, article 102 may comprise an NFC enabled device 126. If the PD 190 obtains the article information, then it forwards it to MCD 104 via a wireless SRC, such as a Bluetooth communication.
(29) Thereafter, payment information is input into the retail transaction application of MCD 104 by the user 140, 142. Upon obtaining the payment information, the MCD 104 automatically performs operations for establishing a retail transaction session with the RTS 118. The retail transaction session can involve: communicating the article information and payment information from MCD 104 to the RTS 118 via an RF communication 124 and public network 106 (e.g., the Internet); completing a purchase transaction by the RTS 118; and communicating a response message from the RTS 118 to MCD 104 indicating that the article 102 has been successfully or unsuccessfully purchased. The purchase transaction can involve using an authorized payment system, such as a bank Automatic Clearing House (ACH) payment system, a credit/debit card authorization system, or a third party system (e.g., PayPal, SolidTrust Pay or ApplePay).
(30) The purchase transaction can be completed by the RTS 118 using the article information and payment information. In this regard, such information may be received by a computing device 108 of the RTS 118 and forwarded thereby to a sub-system of a private network 110 (e.g., an Intranet). For example, the article information and purchase information can also be forwarded to and processed by a purchase sub-system 112 to complete a purchase transaction. When the purchase transaction is completed, a message is generated and sent to the MCD 104 indicating whether the article 102 has been successfully or unsuccessfully purchased.
(31) If the article 102 has been successfully purchased, then a security tag detaching process can be started automatically by the RTS 118, the MCD 104 and/or the PRS 194. Alternatively, the user 140, 142 can start the security tag detaching process by performing a user-software interaction using the MCD 104 and/or the PRS 194. In all three scenarios, the article information can optionally be forwarded to and processed by a lock release sub-system 114 to retrieve a detachment key, a detachment code and/or a purchase token that is useful for detaching the security tag 132 from the article 102. The detachment key/code and/or purchase token is(are) then sent from the RTS 118 to the PRS 194 such that the PRS 194 can perform or cause the same to perform tag detachment operations. The tag detachment operations are generally configured to cause the security tag 132 to actuate a detaching mechanism (not shown in
(32) Referring now to
(33) The hardware architecture of
(34) The security tag 132 also comprises an antenna 202 and an NFC enabled device 136 for allowing data to be exchanged with the external device via NFC technology. The antenna 202 is configured to receive NFC signals from the external device and transmit NFC signals generated by the NFC enabled device 136. The NFC enabled device 136 comprises an NFC transceiver 204. NFC transceivers are well known in the art, and therefore will not be described herein. However, it should be understood that the NFC transceiver 204 processes received NFC signals to extract information therein. This information can include, but is not limited to, a request for certain information (e.g., a unique identifier 210), and/or a message including information specifying a detachment key or code 212 for detaching the security tag 132 from an article. The NFC transceiver 204 may pass the extracted information to the controller 206.
(35) If the extracted information includes a request for certain information, then the controller 206 may perform operations to retrieve a unique identifier 210 and/or article information 214 from memory 208. The article information 214 can include a unique identifier of an article and/or a purchase price of the article. The retrieved information is then sent from the security tag 132 to a requesting external device (e.g., PD 190 of
(36) In contrast, if the extracted information includes information specifying a one-time-only use key and/or instructions for programming the security tag 132 to actuate a detachment mechanism 250 of an electro-mechanical lock mechanism 216, then the controller 206 may perform operations to simply actuate the detachment mechanism 250 using the one-time-only key. Alternatively or additionally, the controller 206 can: parse the information from a received message; retrieve a detachment key/code 212 from memory 208; and compare the parsed information to the detachment key/code to determine if a match exists therebetween. If a match exists, then the controller 206 generates and sends a command to the electro-mechanical lock mechanism 216 for actuating the detachment mechanism 250. An auditory or visual indication can be output by the security tag 132 when the detachment mechanism 250 is actuated. If a match does not exist, then the controller 206 may generate a response message indicating that detachment key/code specified in the extracted information does not match the detachment key/code 212 stored in memory 208. The response message may then be sent from the security tag 132 to a requesting external device (e.g., PD 190 of
(37) In some scenarios, the connections between components 204, 206, 208, 216, 260 are unsecure connections or secure connections. The phrase unsecure connection, as used herein, refers to a connection in which cryptography and/or tamper-proof measures are not employed. The phrase secure connection, as used herein, refers to a connection in which cryptography and/or tamper-proof measures are employed. Such tamper-proof measures include enclosing the physical electrical link between two components in a tamper-proof enclosure.
(38) Notably, the memory 208 may be a volatile memory and/or a non-volatile memory. For example, the memory 208 can include, but is not limited to, a Random Access Memory (RAM), a Dynamic Random Access Memory (DRAM), a Static Random Access Memory (SRAM), a Read-Only Memory (ROM) and a flash memory. The memory 208 may also comprise unsecure memory and/or secure memory. The phrase unsecure memory, as used herein, refers to memory configured to store data in a plain text form. The phrase secure memory, as used herein, refers to memory configured to store data in an encrypted form and/or memory having or being disposed in a secure or tamper-proof enclosure.
(39) The electro-mechanical lock mechanism 216 is operable to actuate the detachment mechanism 250. The detachment mechanism 250 can include a lock configured to move between a lock state and an unlock state. Such a lock can include, but is not limited to, a pin. The electro-mechanical lock mechanism 216 is shown as being indirectly coupled to NFC transceiver 204 via controller 206. The invention is not limited in this regard. The electro-mechanical lock mechanism 216 can additionally or alternatively be directly coupled to the NFC transceiver 204. One or more of the components 204, 206 can cause the lock of the detachment mechanism 250 to be transitioned between states in accordance with information received from an external device (e.g., PRS 194 of
(40) The NFC enabled device 136 can be incorporated into a device which also houses the electro-mechanical lock mechanism 216, or can be a separate device which is in direct or indirect communication with the electro-mechanical lock mechanism 216. Notably, the NFC enabled device 136 is not coupled to an internal power source. Instead, an external power source is provided by the PRS 194 of
(41) Exemplary Security Tag Architectures
(42) Exemplary architectures for a security tag 300 will now be described in detail in relation to
(43) As shown in
(44) The security tag has an insert space 302 sized and shaped for receiving at least a portion of an article (e.g., article 102 of
(45) The security tag 300 is securely coupled to the article by transitioning a pin 304 from an unengaged state shown in
(46) A mechanical mechanism 312 retains the pin 304 in its engaged state. The mechanical mechanism 312 comprises a post that is movable in two opposing directions shown by arrows 314, 316. When the post 312 is in its engaged state shown in
(47) An electric solenoid 316 is provided to facilitate selective movement of the post 312 in both directions 314 and 316. Notably, the electric solenoid 316 and mechanical mechanism 312 comprises an electro-mechanical lock mechanism (e.g., electro-mechanical lock mechanism 216 of
(48) Referring now to
(49) PRS 700 is generally configured to supply power to the security tag (e.g., security tag 132 of
(50) The tag detachment operations are generally configured to cause the security tag to actuate a detaching mechanism (e.g., solenoid 316 of
(51) Exemplary Methods for Operating a Security Tag
(52) Referring now to
(53) Sometime thereafter, a decision step 1006 is performed to determine if a purchase transaction has been successfully performed. If the purchase transaction was not successful [1006:NO], then method 1000 repeats step 1006. In contrast, if the purchase transaction was successful [1006:YES], then step 1008 is performed where a security tag detaching process is automatically begun by an MCD (e.g., MCD 104 of
(54) If the detach command is not authenticated [1016:NO], then optional step 1018 is performed where the MCD, PD, RTS, PRS and/or user is(are) notified that the detach command was not authenticated by the security tag. Subsequently, method 1000 returns to step 1010.
(55) If step 1009 is completed and/or the detach command is authenticated [1016:YES], then a detachment mechanism (e.g., electric solenoid 316 of
(56) Referring now to
(57) After step 1102, method 1100 continues with step 1104 where a customer (e.g., customer 140 of
(58) In next step 1106, the customer performs user-software interactions with the MCD and/or PD so as to cause a retail transaction application installed on the MCD to be executed. The customer then uses the MCD and/or PD to scan each article for tendering, as shown by step 1108. The scanning can be achieved using a barcode scanner, an RFID scanner, an NFC tag scanner, or any other short-range communication means of the MCD and/or PD. Alternatively or additionally, the customer may enter voice commands in order to confirm each article (s)he desires to purchase.
(59) Once the articles have been scanned, payment information is input into the retail transaction application of the MCD, as shown by step 1110. The payment information can include, but is not limited to, a customer loyalty code, payment card information, and/or payment account information. The payment information can be input manually using an input device of MCD or PD, via an electronic card reader (e.g., a magnetic strip card reader) of MCD or PD, and/or via a barcode reader of the MCD or PD.
(60) After the payment information has been input into the retail transaction application, a decision step 1112 is performed to determine if a purchase transaction has been completed. The purchase transaction can be completed using a web-based payment service (e.g., using PayPal, ApplePay or other cloud based online service). The determination of step 1112 is made by the web-based payment service system based on information received from the MCD and/or an RTS (e.g., RTS 118 of
(61) In step 1114, the web-based payment service system generates and sends a purchase token to the MCD. The purchase token may also be communicated from the web-based payment service system and/or MCD to each security tag attached to a purchased item. The purchase token stored in a memory device of a security tag can be used later to (1) assist in determining why a failure occurred in relation to the security tag's detachment from the article and/or (2) whether a recently found security tag was removed from a purchased item or a stolen item. The manner in which (1) and (2) are resolved will be discussed below in detail.
(62) Upon completing step 1114, the MCD communicates the purchase token and unique identifiers of each purchased product from the MCD to a server (e.g., server 108 of
(63) As shown in
(64) After reception of the wireless signal in step 1128, the PRS authenticates the detach command as shown by step 1130. If the detach command is not authenticated [1132:NO], then optional step 1134 is performed where the MCD, PD, RTS and/or user is(are) notified that the detach command was not authenticated by the PRS. Subsequently, method 1100 returns to step 1126. If the detach command is authenticated [1132:YES], then the PRS supplies power to the security tag for activating a detachment mechanism (e.g., electric solenoid 316 of
(65) Next, a decision step 1138 is performed to determine if the pin was actually released. If the pin was actually released [1138:YES], then method 1100 continues with step 1140. In step 1140, the security tag is removed from the article that has been successfully purchased. The removed security tag may be placed in a collection bin for later use or other location in the retail store facility (e.g., a dressing room), as shown by step 1142. Subsequently, method 1100 continues with a decision step 1144 of
(66) If the security tag was placed in the collection bin [1144:YES], then step 1146 is performed where method 1100 ends or other processing is performed. In contrast, if the security tag was not placed in the collection bin [1144:NO], then steps 1148-1150 are performed. These steps involve: finding the security tag (e.g., in a dressing room); and wirelessly communicating with the security tag to obtain the purchase token and/or article information therefrom. The purchase token and/or article information is then used to determine whether the security tag was attached to a purchased article. If the security tag was attached to a purchased item [1152:YES], then step 1154 is performed where method 1100 ends or other processing is performed. If the security tag was not attached to a purchased item [1152:NO], then steps 1156-1158 are performed. These steps involve: using the article information to identify the article to which the security tag was attached; optionally performing actions to report a stolen article; and optionally taking remedial measures. Subsequently, step 1160 is performed where method 1100 ends or other processing is performed.
(67) In contrast, if the pin was not released [1138:NO], then method 1100 continues with steps 1162-1170 of
(68) All of the apparatus, methods, and algorithms disclosed and claimed herein can be made and executed without undue experimentation in light of the present disclosure. While the invention has been described in terms of preferred embodiments, it will be apparent to those having ordinary skill in the art that variations may be applied to the apparatus, methods and sequence of steps of the method without departing from the concept, spirit and scope of the invention. More specifically, it will be apparent that certain components may be added to, combined with, or substituted for the components described herein while the same or similar results would be achieved. All such similar substitutes and modifications apparent to those having ordinary skill in the art are deemed to be within the spirit, scope and concept of the invention as defined.
(69) The features and functions disclosed above, as well as alternatives, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements may be made by those skilled in the art, each of which is also intended to be encompassed by the disclosed embodiments.