EP0933741A2 - A bar code reader and a security tag disabling device in combination - Google Patents

A bar code reader and a security tag disabling device in combination Download PDF

Info

Publication number
EP0933741A2
EP0933741A2 EP99300773A EP99300773A EP0933741A2 EP 0933741 A2 EP0933741 A2 EP 0933741A2 EP 99300773 A EP99300773 A EP 99300773A EP 99300773 A EP99300773 A EP 99300773A EP 0933741 A2 EP0933741 A2 EP 0933741A2
Authority
EP
European Patent Office
Prior art keywords
security tag
code
security
bar code
code reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99300773A
Other languages
German (de)
French (fr)
Other versions
EP0933741A3 (en
Inventor
Harry Clark
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KTP Ltd
Original Assignee
KTP Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KTP Ltd filed Critical KTP Ltd
Publication of EP0933741A2 publication Critical patent/EP0933741A2/en
Publication of EP0933741A3 publication Critical patent/EP0933741A3/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/242Tag deactivation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2465Aspects related to the EAS system, e.g. system components other than tags
    • G08B13/248EAS system combined with another detection technology, e.g. dual EAS and video or other presence detection system

Definitions

  • the present invention relates to a security system and more specifically to a security system having particular, but not exclusive application in the retail industry. More specifically the present invention relates to a security system comprising a bar code reader and a security tag disabling device in combination.
  • a security system comprising a bar code reader and a security tag disabling device in combination.
  • Bar code reading systems are widely used throughout the retail industry. Items for sale are marked with a bar code which typically contains a code identifying the product itself and its price. At the sales check-out the bar code is read by a bar code reader and the information contained therein is processed. Bar code reading systems greatly increase efficiency within a retail outlet by speeding up each customer's progress through the sales check-out, reducing transaction errors and providing information to facilitate stock control.
  • Security tag systems are also widely used throughout the retail industry. Each item for sale, or more usually the high loss items, carries a security tag which can be detected by stand alone tag detectors placed across the store exit points. When an item is validly purchased the security tag is either disabled or removed from the purchase item at the point of sale. If it is not an alarm device is triggered as the tag is carried past the tag detectors.
  • the "soft tag” comprises a tuned circuit that resonates when passed through an electromagnetic field, thus facilitating detection.
  • the principle difference between the two is that the "soft tag” is effectively destroyed by subjecting it to a high voltage RF pulse using a tag disabling device positioned at the point of sale, whereas the "hard tag” is removed from the purchase item at the point of sale to be used again on another item.
  • the hard tag is only removable from the purchase item using specialist equipment. This acts as a further deterrent to theft in that if the item is stolen with the hard tag still in place its subsequent removal without the specialist equipment usually results in the destruction or mutilation of the product.
  • a further problem which can arise is that the security tag is not actually disabled or removed by the check-out operator. When this occurs the customer will attempt to exit the store with a legitimately purchased product still bearing a live tag and the store/customer conflict which may ensue as a result is inevitably embarrassing to both parties.
  • a system comprising a code reader and a security tag disabling device in combination, characterised in that the system further comprises a controller which is adapted to interface with code data processing means and which operates to enable the security tag disabling device when a code is read by the code reader which is associated with a security tag and to output data read by the code reader to the data processing means when the security tag has been disabled by the security tag disabling device.
  • the code takes the form of a bar code and the code reader that of a bar code reader.
  • the bar code itself may contain information signifying the presence of a security tag on the item with which it is used.
  • the system may comprise a look-up chart of bar codes and the presence or absence of a security tag may be input to the look-up table against each bar code, as required. In this way the presence of a tag can be verified by checking the bar code read by the bar code reader against the bar code stored in the look-up table.
  • the look-up chart may be periodically updated from time to time to take account of changes in security tag practice.
  • the system is preferably able to differentiate between different types.
  • the security tag is comprised of a tuned circuit
  • different types of tag may have different Q factor and the system differentiates between them by measuring the Q factor.
  • the so-called "soft-tag” which has a low Q factor
  • the so-called “hard tag” which has a high Q factor.
  • the Q factor of a security tag is conveniently measured by passing it through an electromagnetic field associated with the security tag de-activation device and measuring the amplitude at which it resonates.
  • Each security tag is verified as being appropriate to the item with which it is associated by checking the bar code of that item either directly or in the look-up table.
  • the security tag disabling device may operate to disable it by emitting a high voltage R.F. pulse. Where the security tag cannot be disabled in this way, the security tag disabling device may operate to disable it mechanically. This will typically be the case for security tags which are required to be re-used repeatedly.
  • the code data processing means typically takes the form of a cash register and a store controller.
  • the system of the present invention is not restricted to use in retail environments. It may also be employed in stock control applications. In these no money changes hands when a stock item is taken but some form of code data processing means is still required to log the stock items taken and those still remaining in store.
  • a purchase item is taken to a sales check-out where it is presented to the code reader and to the security tag disabling device.
  • the code reader and the security tag disabling device may be separate from each other, the security tag disabling device is conveniently incorporated with the code reader.
  • the code on the purchase item is read by the code reader and the code data is held over in the controller. Once the controller has the purchase item code, the controller will determine whether or not the product is tagged. This information is obtained either directly from the bar code itself or by checking the bar code against a look-up table held in memory. If the product is determined to be one carrying a security tag which must be disabled the controller will enable the security tag disabling device. Once the security tag is successfully disabled the controller outputs the bar code data to the cash register and the purchase of that purchase item is completed. For convenience this may be indicated to the check-out operator and the customer by audible and/or visual indicator means. If, however, during the operation described above the controller determines via the security tag disabling device that the security tag has not been disabled a warning is given by audible and/or visual indicator means., and the bar code is held over by the controller until appropriate action has been taken.
  • the controller determines that the product is not intended to have a security tag fitted, but one is detected the further processing of the transaction can be dealt with according to a set of pre-defined rules. For example, the operator may be warned and further processing of the transaction may be halted until the discrepancy has been resolved.
  • the system may be operated to allow the security tag to be disabled, but a record of the transaction may be made in a transaction log. This has the benefit of avoiding hold-ups at the check out, whilst allowing for multiple discrepancies associated with a particular check-out or check-out operator to be identified from the transaction log.
  • controller Since in many stores bar code readers and security tag disabling devices are already in use the controller is intended to interface with the very minimum of changes to the retail system. No changes to store application software are expected to be needed, only small cabling changes to connect the reader, disabling device and cash register up to the controller.
  • the controller is able to support the major interface types and protocols used between bar code readers and cash register systems.
  • the four main types being RS232, Parallel, OCIA, (Optically coupled interface adapter) and RS485. Due to this flexibility the controller is not limited to a particular article identification system such as bar code scanning, but limited merely by any future interface changes.
  • the security tag system the controller is not limited to any particular type of tagging system.
  • the controller has the ability to carry out interface and protocol conversion should this be found useful for a customer to, say, allow a scanner with RS232 communications to be used in conjunction with a cash register supporting only RS485. This feature would apply when a selected type of reader cannot support a cash register interface type or even a certain feature required to suit the store environment.
  • a cash register 1 which is connected via a suitable interface to a system according to the present invention.
  • the system comprises a controller device 2 to which is connected a flat bed bar code reader 3 and a security tag disabling device 5 in the form of an RF de-activation coil which for explanatory purposes is shown encircling the bar code reader.
  • the RF de-activation coil is connected to power supply unit 4.
  • Both the bar code reader 3 and the security tag disabling device 5 are of conventional design.
  • the controller 2 comprises a key switch 6 and two push switches 11 which enable the controller 2 to be operated by the check-out operator or supervisor as necessary.
  • the controller 2 is connected to a server unit 9 via a network 7.
  • the server unit 9 and associated network 7 perform two roles. One is to manage the operation of a number of controllers, each connected to a respective branch of the network 7. The other is to provide report printing and transaction data.
  • the server can operate in two ways. It can be the source of all the security tagging information and can interact with the controllers in a real time environment or alternatively it can hold data or tagging information which is down loaded to each controller at the beginning of each day. With this mode of operation delays in transactions are kept to a minimum as the controllers only have to advise the server of the results of a transaction, and this can be performed at leisure.
  • the controller 2 operates so as to ensure that when an article carrying a bar code is placed in front of the bar code reader 3 the bar code is read. Once read the bar code is held over in the controller 2.
  • the system is able to check whether the article should carry a security tag from information contained within the bar code or by checking the bar code against a look-up table stored in memory.
  • the system is also able to detect the presence of a security tag within the field of the R.F. deactivation coil where the security tag is of the type which comprises a tuned circuit because the tuned circuit resonates at a set frequency which is then detected. Having established that a security tag is present which requires to be disabled the power supply 4 is operated to send an R.F.
  • the system is able to check whether the security tag has been successfully disabled by re-checking to see whether the tuned circuit still resonates at the set frequency.
  • the controller 2 determines that the security tag has been disabled it transfers the bar code data held over to the cash register 1 and the transaction is completed.
  • the security tag is a "rogue" tag which is not disabled by the R.F. pulse or a tag is detected when there should be none, this is determined by the controller 2 which is then able to continue processing the transaction according to a predefined set of rules. These rules may require that the transaction is halted until action is taken by the operator or others to correct the situation. Alternatively, the system may allow the transaction to be completed but with a note of the apparent discrepancy being made in a transaction log.
  • the controller 2 may give visual and/or audible warnings of "rogue" tags in the detection field of the security tag disabling device.
  • the visual warnings are only indicated by coloured lights for more user friendly environments, and where far more detailed information is required, a remote control option 8 is available.
  • the remote control unit 8 overrides the switches on the controller 2 and takes operator control directly. This is a smaller unit, and the intention is to install this within easy reach of the operator and locate the controller and all of its associated wiring away from view.
  • the remote unit features controlling switches and an audio output, and also has a much more sophisticated display.
  • the system is also able to advise the operator of the presence of non-detectable security tags which must be mechanically removed from the item. The presence of these is indicated in the bar code for that item or in the look-up table and a visual or audible warning of their presence is given to the operator.
  • the system of the present invention has been described with reference to security tags of the type which are detected and disabled electronically, e.g., by using an R.F. signal, but is not limited thereto.
  • the system may also be used tags which are detected and disabled using mechanical means.
  • the system can be used with tags which have to be removed from the item or mechanically broken using a dedicated mechanical device.
  • controller and remote control unit are both re-programmable. This can be achieved by one of two means, either through the communication port which connects to the bar code scanner, or by transferring the programs from the server to a controller via the network. In both cases both controller and remote unit programs can be updated.
  • Such a system allows updates to be carried out by either a service engineer or by means of a supplied computer disc which the store supervisor would install in the server.

Abstract

A system comprising a code reader (3) and a security tag disabling device (5) in combination. The system further comprises a controller (2) which is adapted to interface with code data processing means (1) and which operates to ensure that the security tag disabling device (5) is not enabled to disable a security tag unless a code is read by the code reader (3) which is associated with a security tag and to ensure that data read by the code reader (3) is not output to the code data processing means (1) if the security tag is not disabled by the security tag disabling device (5).

Description

  • The present invention relates to a security system and more specifically to a security system having particular, but not exclusive application in the retail industry. More specifically the present invention relates to a security system comprising a bar code reader and a security tag disabling device in combination. This specification refers throughout to "bar codes" and "bar code readers". However, it will be understood by the skilled reader that other forms of article identification may be used and that the reader used will be appropriate to this.
  • Bar code reading systems are widely used throughout the retail industry. Items for sale are marked with a bar code which typically contains a code identifying the product itself and its price. At the sales check-out the bar code is read by a bar code reader and the information contained therein is processed. Bar code reading systems greatly increase efficiency within a retail outlet by speeding up each customer's progress through the sales check-out, reducing transaction errors and providing information to facilitate stock control.
  • Security tag systems are also widely used throughout the retail industry. Each item for sale, or more usually the high loss items, carries a security tag which can be detected by stand alone tag detectors placed across the store exit points. When an item is validly purchased the security tag is either disabled or removed from the purchase item at the point of sale. If it is not an alarm device is triggered as the tag is carried past the tag detectors.
  • Basically, there are two types of security tag, these being the "soft tag" and the "hard tag". Both comprise a tuned circuit that resonates when passed through an electromagnetic field, thus facilitating detection. The principle difference between the two is that the "soft tag" is effectively destroyed by subjecting it to a high voltage RF pulse using a tag disabling device positioned at the point of sale, whereas the "hard tag" is removed from the purchase item at the point of sale to be used again on another item. Usually the hard tag is only removable from the purchase item using specialist equipment. This acts as a further deterrent to theft in that if the item is stolen with the hard tag still in place its subsequent removal without the specialist equipment usually results in the destruction or mutilation of the product.
  • Although both bar code reading systems and security tag systems are well known and widely used they have, hitherto, always been operated totally independently of one another. In certain circumstances this can mean that the effectiveness of both systems may not be total. A problem commonly experienced by retailers now is that of so-called "sweethearting". In this the check-out operator favours an associate purporting to be a genuine customer by passing certain items, usually expensive ones, through the point of sale without allowing them to be read by the bar code reader. All the security tags are, of course, removed or disabled at the point of sale and the associate is then able to leave the store with all the items, having only paid for a few of them.
  • A further problem which can arise is that the security tag is not actually disabled or removed by the check-out operator. When this occurs the customer will attempt to exit the store with a legitimately purchased product still bearing a live tag and the store/customer conflict which may ensue as a result is inevitably embarrassing to both parties.
  • It is an object ofthe present invention to provide a system comprising a bar code reader and a security tag disabling device in combination which operates to obviate or at least substantially mitigate the problems referred to hereinabove which are encountered with independently operated bar code reading systems and security tag systems.
  • According to the present invention there is provided a system comprising a code reader and a security tag disabling device in combination, characterised in that the system further comprises a controller which is adapted to interface with code data processing means and which operates to enable the security tag disabling device when a code is read by the code reader which is associated with a security tag and to output data read by the code reader to the data processing means when the security tag has been disabled by the security tag disabling device.
  • Conveniently, the code takes the form of a bar code and the code reader that of a bar code reader. The bar code itself may contain information signifying the presence of a security tag on the item with which it is used. Alternatively, the system may comprise a look-up chart of bar codes and the presence or absence of a security tag may be input to the look-up table against each bar code, as required. In this way the presence of a tag can be verified by checking the bar code read by the bar code reader against the bar code stored in the look-up table. The look-up chart may be periodically updated from time to time to take account of changes in security tag practice.
  • It is known to use different types of security tags for different types of item and the system is preferably able to differentiate between different types. Where the security tag is comprised of a tuned circuit different types of tag may have different Q factor and the system differentiates between them by measuring the Q factor. Typically, there are two types of tag, the so-called "soft-tag" which has a low Q factor and the so-called "hard tag" which has a high Q factor. The Q factor of a security tag is conveniently measured by passing it through an electromagnetic field associated with the security tag de-activation device and measuring the amplitude at which it resonates.
  • Each security tag is verified as being appropriate to the item with which it is associated by checking the bar code of that item either directly or in the look-up table.
  • Where the security tag is comprised of a tuned circuit the security tag disabling device may operate to disable it by emitting a high voltage R.F. pulse. Where the security tag cannot be disabled in this way, the security tag disabling device may operate to disable it mechanically. This will typically be the case for security tags which are required to be re-used repeatedly.
  • When the system according to the present invention is used in a retail environment the code data processing means typically takes the form of a cash register and a store controller. However, the system of the present invention is not restricted to use in retail environments. It may also be employed in stock control applications. In these no money changes hands when a stock item is taken but some form of code data processing means is still required to log the stock items taken and those still remaining in store.
  • In use, in a retail environment a purchase item is taken to a sales check-out where it is presented to the code reader and to the security tag disabling device. Although the code reader and the security tag disabling device may be separate from each other, the security tag disabling device is conveniently incorporated with the code reader.
  • The code on the purchase item is read by the code reader and the code data is held over in the controller. Once the controller has the purchase item code, the controller will determine whether or not the product is tagged. This information is obtained either directly from the bar code itself or by checking the bar code against a look-up table held in memory. If the product is determined to be one carrying a security tag which must be disabled the controller will enable the security tag disabling device. Once the security tag is successfully disabled the controller outputs the bar code data to the cash register and the purchase of that purchase item is completed. For convenience this may be indicated to the check-out operator and the customer by audible and/or visual indicator means. If, however, during the operation described above the controller determines via the security tag disabling device that the security tag has not been disabled a warning is given by audible and/or visual indicator means., and the bar code is held over by the controller until appropriate action has been taken.
  • If the controller determines that the product is not intended to have a security tag fitted, but one is detected the further processing of the transaction can be dealt with according to a set of pre-defined rules. For example, the operator may be warned and further processing of the transaction may be halted until the discrepancy has been resolved. Alternatively, the system may be operated to allow the security tag to be disabled, but a record of the transaction may be made in a transaction log. This has the benefit of avoiding hold-ups at the check out, whilst allowing for multiple discrepancies associated with a particular check-out or check-out operator to be identified from the transaction log.
  • With the system according to the present invention it should not be possible for an item to be sold without its security tag being disabled. Nor should it be possible for any person to illegally or inadvertently disable a security tag without this being detected by the controller
  • Since in many stores bar code readers and security tag disabling devices are already in use the controller is intended to interface with the very minimum of changes to the retail system. No changes to store application software are expected to be needed, only small cabling changes to connect the reader, disabling device and cash register up to the controller.
  • Conveniently, the controller is able to support the major interface types and protocols used between bar code readers and cash register systems. Currently the four main types being RS232, Parallel, OCIA, (Optically coupled interface adapter) and RS485. Due to this flexibility the controller is not limited to a particular article identification system such as bar code scanning, but limited merely by any future interface changes. Similarly regarding the security tag system the controller is not limited to any particular type of tagging system.
  • Conveniently, the controller has the ability to carry out interface and protocol conversion should this be found useful for a customer to, say, allow a scanner with RS232 communications to be used in conjunction with a cash register supporting only RS485. This feature would apply when a selected type of reader cannot support a cash register interface type or even a certain feature required to suit the store environment.
  • An embodiment of the present invention will now be described, by way of example, with reference to the accompanying drawing which shows a general schematic view of a cash register connected to a system in accordance with the present invention;
  • Referring to the drawing there is shown a cash register 1 which is connected via a suitable interface to a system according to the present invention. The system comprises a controller device 2 to which is connected a flat bed bar code reader 3 and a security tag disabling device 5 in the form of an RF de-activation coil which for explanatory purposes is shown encircling the bar code reader. The RF de-activation coil is connected to power supply unit 4. Both the bar code reader 3 and the security tag disabling device 5 are of conventional design. The controller 2 comprises a key switch 6 and two push switches 11 which enable the controller 2 to be operated by the check-out operator or supervisor as necessary.
  • The controller 2 is connected to a server unit 9 via a network 7. The server unit 9 and associated network 7 perform two roles. One is to manage the operation of a number of controllers, each connected to a respective branch of the network 7. The other is to provide report printing and transaction data. As regards controlling management the server can operate in two ways. It can be the source of all the security tagging information and can interact with the controllers in a real time environment or alternatively it can hold data or tagging information which is down loaded to each controller at the beginning of each day. With this mode of operation delays in transactions are kept to a minimum as the controllers only have to advise the server of the results of a transaction, and this can be performed at leisure.
  • In use, the controller 2 operates so as to ensure that when an article carrying a bar code is placed in front of the bar code reader 3 the bar code is read. Once read the bar code is held over in the controller 2. The system is able to check whether the article should carry a security tag from information contained within the bar code or by checking the bar code against a look-up table stored in memory. The system is also able to detect the presence of a security tag within the field of the R.F. deactivation coil where the security tag is of the type which comprises a tuned circuit because the tuned circuit resonates at a set frequency which is then detected. Having established that a security tag is present which requires to be disabled the power supply 4 is operated to send an R.F. pulse of sufficient strength and duration through the coil 5 as to "blow" the security tag. The system is able to check whether the security tag has been successfully disabled by re-checking to see whether the tuned circuit still resonates at the set frequency. When the controller 2 determines that the security tag has been disabled it transfers the bar code data held over to the cash register 1 and the transaction is completed.
  • If the security tag is a "rogue" tag which is not disabled by the R.F. pulse or a tag is detected when there should be none, this is determined by the controller 2 which is then able to continue processing the transaction according to a predefined set of rules. These rules may require that the transaction is halted until action is taken by the operator or others to correct the situation. Alternatively, the system may allow the transaction to be completed but with a note of the apparent discrepancy being made in a transaction log.
  • The controller 2 may give visual and/or audible warnings of "rogue" tags in the detection field of the security tag disabling device. However, the visual warnings are only indicated by coloured lights for more user friendly environments, and where far more detailed information is required, a remote control option 8 is available. The remote control unit 8 overrides the switches on the controller 2 and takes operator control directly. This is a smaller unit, and the intention is to install this within easy reach of the operator and locate the controller and all of its associated wiring away from view. The remote unit features controlling switches and an audio output, and also has a much more sophisticated display.
  • The system is also able to advise the operator of the presence of non-detectable security tags which must be mechanically removed from the item. The presence of these is indicated in the bar code for that item or in the look-up table and a visual or audible warning of their presence is given to the operator.
  • The system of the present invention has been described with reference to security tags of the type which are detected and disabled electronically, e.g., by using an R.F. signal, but is not limited thereto. The system may also be used tags which are detected and disabled using mechanical means. In this regard, the system can be used with tags which have to be removed from the item or mechanically broken using a dedicated mechanical device.
  • The other main feature of the system is its total flexibility. The intention is that the controller and remote control unit are both re-programmable. This can be achieved by one of two means, either through the communication port which connects to the bar code scanner, or by transferring the programs from the server to a controller via the network. In both cases both controller and remote unit programs can be updated. Such a system allows updates to be carried out by either a service engineer or by means of a supplied computer disc which the store supervisor would install in the server.

Claims (14)

  1. A system comprising a code reader and a security tag disabling device in combination, characterised in that the system further comprises a controller which is adapted to interface with code data processing means and which operates to enable the security tag disabling device when a code is read by the code reader which is associated with a security tag and to output data read by the code reader to the data processing means when the security tag has been disabled by the security tag disabling device.
  2. A system according to Claim 1, characterised in that the code takes the form of a bar code and the code reader that of a bar code reader.
  3. A system according to Claim 1 or 2, characterised in that code contains information signifying the presence of a security tag on the item with which it is used.
  4. A system according to Claim 1 or 2, characterised in that a look-up table is provided in memory which indicates for each code the presence or absence of a security tag.
  5. A system according to any preceding Claim, characterised in that the system further comprises means for detecting the presence of a security tag.
  6. A system according to Claim 5, characterised in that the security tag detecting means is able to detect the resonant frequency of a tuned circuit.
  7. A system according to Claim 5 or 6, characterised in that the security tag detecting means is able to differentiate between different types of security tag.
  8. A system according to Claim 6 and 7, characterised in that the security tag detecting means is able to determine the Q factor of a tuned circuit.
  9. A system according to any preceeding Claim, characterised in that the security tag disabling means operates electronically to disable security tags.
  10. A system according to Claim 9, characterised in that the security tag generates an R.F. pulse to disable security tags.
  11. A system according to any of Claims 1 to 9, characterised in that the security tag disabling means operates mechanically to disable security tags.
  12. A system according to any preceding Claim, wherein, the controller is able to support the major interface types and protocols used between bar code readers and cash register systems.
  13. A system according to Claim 12, wherein the protocol used is one of RS232, Parallel, OCIA, (Optically coupled interface adapter) and RS485.
  14. A system according to Claim 12 or 13, wherein the controller is able to carry out interface and protocol conversion.
EP99300773A 1998-02-03 1999-02-02 A bar code reader and a security tag disabling device in combination Withdrawn EP0933741A3 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9802166 1998-02-03
GBGB9802166.0A GB9802166D0 (en) 1998-02-03 1998-02-03 A bar code reader and a secutiy tag disabling device in combination

Publications (2)

Publication Number Publication Date
EP0933741A2 true EP0933741A2 (en) 1999-08-04
EP0933741A3 EP0933741A3 (en) 1999-12-08

Family

ID=10826286

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99300773A Withdrawn EP0933741A3 (en) 1998-02-03 1999-02-02 A bar code reader and a security tag disabling device in combination

Country Status (2)

Country Link
EP (1) EP0933741A3 (en)
GB (1) GB9802166D0 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2799292A1 (en) * 1999-10-01 2001-04-06 Dynamic Shopping Sa Product identification and validation device includes label reader, memory, and label marker changing label status after reading
EP1335336A2 (en) * 2002-02-01 2003-08-13 Ncr International Inc. Checkout device
NL1023226C2 (en) * 2003-04-18 2004-10-19 Johan Dijkstra Security system for shop, particularly for selling clothes, comprises label fixable to product saleable by shop, which can be removed and deactivated
WO2011126697A1 (en) * 2010-04-08 2011-10-13 Checkpoint Systems, Inc. Auto -accreting database for eas-rf applications
CN102509139A (en) * 2011-11-25 2012-06-20 杭州中瑞思创科技股份有限公司 Commodity protection method and system with internal theft prevention function

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987004282A1 (en) * 1986-01-03 1987-07-16 Advanced Systems Research Pty. Ltd. Inventory control system
WO1990005968A1 (en) * 1988-11-14 1990-05-31 Checkpoint Systems, Inc. Method and apparatus for integrated data capture and electronic article surveillance
US5151684A (en) * 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5418354A (en) * 1993-08-20 1995-05-23 Halling; Leonard W. Self service cart system
GB2286275A (en) * 1994-01-11 1995-08-09 Robert Benjamin Franks Retail goods check-out apparatus
US5594228A (en) * 1988-08-25 1997-01-14 Symbol Technologies, Inc. Self-checkout, point-of-transaction system including deactivatable electro-optically coded surveillance tags

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987004282A1 (en) * 1986-01-03 1987-07-16 Advanced Systems Research Pty. Ltd. Inventory control system
US5594228A (en) * 1988-08-25 1997-01-14 Symbol Technologies, Inc. Self-checkout, point-of-transaction system including deactivatable electro-optically coded surveillance tags
WO1990005968A1 (en) * 1988-11-14 1990-05-31 Checkpoint Systems, Inc. Method and apparatus for integrated data capture and electronic article surveillance
US5151684A (en) * 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5418354A (en) * 1993-08-20 1995-05-23 Halling; Leonard W. Self service cart system
GB2286275A (en) * 1994-01-11 1995-08-09 Robert Benjamin Franks Retail goods check-out apparatus

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2799292A1 (en) * 1999-10-01 2001-04-06 Dynamic Shopping Sa Product identification and validation device includes label reader, memory, and label marker changing label status after reading
WO2001025981A1 (en) * 1999-10-01 2001-04-12 Dynamic Shopping Sa System for identifying and validating data, in particular loyalty points for promoting sales outlets
EP1335336A2 (en) * 2002-02-01 2003-08-13 Ncr International Inc. Checkout device
EP1335336A3 (en) * 2002-02-01 2006-05-10 Ncr International Inc. Checkout device
NL1023226C2 (en) * 2003-04-18 2004-10-19 Johan Dijkstra Security system for shop, particularly for selling clothes, comprises label fixable to product saleable by shop, which can be removed and deactivated
WO2011126697A1 (en) * 2010-04-08 2011-10-13 Checkpoint Systems, Inc. Auto -accreting database for eas-rf applications
US8537007B2 (en) 2010-04-08 2013-09-17 Checkpoint Systems, Inc. Autoaccreting database for EAS-RF applications
CN102509139A (en) * 2011-11-25 2012-06-20 杭州中瑞思创科技股份有限公司 Commodity protection method and system with internal theft prevention function

Also Published As

Publication number Publication date
GB9802166D0 (en) 1998-04-01
EP0933741A3 (en) 1999-12-08

Similar Documents

Publication Publication Date Title
EP0724241B1 (en) Check-out system
US5151684A (en) Electronic inventory label and security apparatus
AU2003231038B2 (en) System and method for managing assets using a portable combined electronic article surveillance system and barcode scanner
CA2597286C (en) Alarm investigation using rfid
EP1849145B1 (en) Techniques to reduce false alarms, invalid security deactivation, and internal theft
EP2122595B1 (en) Method for monitoring, tracking and theft protecting of objects to be secured
US9547966B2 (en) Uncoupling device and method
EP0407506A1 (en) Method and apparatus for integrated data capture and electronic article surveillance.
MX2007006209A (en) System and method for integrating point of sale and electronic article surveillance data.
JP2011081619A (en) Sales data processing terminal and program
US20150187193A1 (en) Commodity information input apparatus, exit detection apparatus, and system including the same
US7337962B2 (en) Method to detect false purchases with a consumer service device
JP4328154B2 (en) Article management system using RFID tag
JP5358409B2 (en) Self-checkout terminal device, self-checkout system, detector activation state notification method, and commodity transaction restriction method
EP0933741A2 (en) A bar code reader and a security tag disabling device in combination
KR20080003356A (en) Trade item sales data processing device
US8210439B2 (en) Merchandise security tag for an article of merchandise
JP2017117298A (en) Commodity reading device and program for controlling the same
JP2008519351A (en) Logging of known lost product data
JP7221722B2 (en) Goods information reader and program
JP2008299404A (en) Wireless tag commodity management system
IL282896A (en) A flexible point of sale and antitheft system
JPH08161638A (en) Sales price check system
JP2006072712A (en) Store
JPH0927082A (en) Article read system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): DE FR GB NL

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

17P Request for examination filed

Effective date: 20000602

AKX Designation fees paid

Free format text: DE FR GB NL

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Withdrawal date: 20001011