Systems and methods for data reading and EAS tag sensing and deactivating at retail checkout
First Claim
1. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
- sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, acknowledging the data read from the ID tag substantially without delay; and
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, delaying acknowledgment of the data read from the data reader.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods of operation of a data reader and security tag deactivation system whereby a data reader such as a barcode scanner is equipped with EAS deactivation coils or modules disposed in the vicinity of the read volume or generally proximate thereto and the system is operable to permit reading of the ID tag (such as the barcode label) on an item, and upon a successful read, the deactivation unit is operable to (1) sense the presence of an EAS tag; (2) if presence of an EAS tag is sensed, energize the deactivation coil/module to deactivate the EAS tag; and (3) sense if the EAS tag is deactivated. If the EAS tag is sensed to have been deactivated, the system signals as such and a next item may be scanned. If the EAS tag is sensed to have not been deactivated, the system proceeds to alternate operational steps to handle the exception. In another function, the system is operable to urge the operator to return the item to the read volume to enhance EAS tag deactivation, one method being by delaying a good read acknowledgment until the system determines that the EAS tag which may have been previously detected has subsequently been deactivated.
-
Citations
55 Claims
-
1. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, acknowledging the data read from the ID tag substantially without delay; and
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, delaying acknowledgment of the data read from the data reader. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
-
selecting one of a plurality of predetermined security levels including a low level and a high level;
sensing to detect the presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, asserting a deactivation signal for a first predetermined deactivation time period; and
if the selected security level is the low level, and the presence of an electronic security tag was not detected, acknowledging the data read from the ID tag substantially without delay. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A combined security tag unit and data reader system comprising:
-
a housing;
a data reader enclosed in the housing and defining a read volume adjacent the housing for reading an ID tag placed within the read volume;
a security tag unit enclosed in the housing and arranged for sensing presence of an electronic security tag proximate to the read volume of the data reader, the security tag unit including deactivation unit arranged for deactivating an electronic security tag located proximate to the read volume of the data reader; and
control means for arming the deactivation unit only after a successful read of the ID tag, and only for a limited time period after the successful read of the ID tag, thereby avoiding deactivation of an electronic security tags on or in items that have not been read. - View Dependent Claims (20, 21, 22)
-
-
23. A method of controlling a system having an data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader; - reading data from an ID tag within the read volume of the data reader;
asserting a deactivation signal to arm a deactivation unit of the security tag controller for a predetermined deactivation time period; and
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing the deactivation unit to attempt to deactivate the detected electronic security tag. - View Dependent Claims (24, 25, 26, 27, 28, 29)
- reading data from an ID tag within the read volume of the data reader;
-
30. A method of controlling a system having an data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of
(a) sensing to detect presence of an electronic security tag proximate to the read volume of the data reader; -
(b) reading data from an ID tag within the read volume of the data reader;
(c) asserting a deactivation signal to arm a deactivation unit for a predetermined deactivation time period;
(d) if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, attempting to deactivate the detected electronic security tag;
(e) if the electronic security tag is not deactivated during the deactivation time period, generating an indication of an exception condition;
(f) waiting up to a predetermined override time limit for input of a manual override; and
(g) responsive to receiving a manual override input prior to expiration of the override time limit, asserting the deactivation signal to arm the deactivation unit to deactivate the detected electronic security tag. - View Dependent Claims (31, 32, 33)
-
-
35. A combined security tag unit and data reader system comprising:
-
a housing including a scan window;
a data reader enclosed in the housing and defining a read volume adjacent the housing and visible to the reader through the scan window for reading an ID tag placed within the read volume;
a security tag unit enclosed in the housing and arranged for sensing to detect the presence of an EAS tag proximate to the read volume of the data reader;
the security tag unit including deactivation unit arranged for deactivating an EAS tag located proximate to the read volume of the data reader; and
means for indicating a successful read of the ID tag, wherein the indicating means is arranged to a indicate a successful read of the ID tag only after successful read of the ID tag and successful deactivation of the security tag, thereby avoiding multiple indications of the read of the same ID tag. - View Dependent Claims (34, 36, 37, 38, 39)
-
-
40. A method of operating a system comprised of a security tag deactivation unit and a data reader, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to a read volume of the data reader;
reading data from an ID tag;
if the presence of a security tag proximate to the read volume of the data reader is detected, activating the deactivation unit in an attempt to deactivate the detected electronic security tag;
repeating said sensing step to confirm deactivation of the detected electronic security tag; and
if the presence of an electronic security tag is not detected, implying that the deactivation succeeded, and generating an output signal indicating completed reading of the ID tag data. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A method of operation in a combined security tag deactivation unit and data reader, the method comprising the steps of:
-
sensing to detect the presence of an EAS tag proximate to the read volume of the ID label reader;
reading data from an ID tag;
if the presence of an EAS tag proximate to the read volume of the ID tagreader is still detected, firing the deactivation unit in an attempt to deactivate the detected EAS tag; and
repeating said sensing step to confirm deactivation of the detected EAS tag.
-
-
50. A method of operation in an electronic article security (EAS) controller comprising the steps of:
-
monitoring an arm control having an armed state and an unarmed state;
while the arm control is armed, sensing to detect presence of an electronic security tag; and
if the presence of an electronic security tag is detected while the arm control is in the armed state, attempting to deactivate the electronic article security tag. - View Dependent Claims (51, 52, 53)
-
-
54. A method of operating and controlling a system having a data reader defining a read volume and an associated security tag controller, for reading an ID tag and deactivating electronic security tag on an item, the method comprising the steps of:
-
sensing whether of an electronic security tag is present proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if an ID tag is read within a predetermined time window subsequent to said sensing the electronic security tag being present, urging the operator to return the item to the read volume. - View Dependent Claims (55)
-
Specification