Using radio frequency identification to detect and/or prevent theft and shoplifting
First Claim
1. A method of detecting potential theft, comprising steps of:
- programmatically comparing data stored in a radio frequency identification (“
RFID”
) tag on merchandise to data written on a sales receipt; and
concluding that a potential theft is detected if the comparing step finds that the data stored in the RFID on the merchandise does not match the data written on the sales receipt.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer'"'"'s receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
35 Citations
40 Claims
-
1. A method of detecting potential theft, comprising steps of:
-
programmatically comparing data stored in a radio frequency identification (“
RFID”
) tag on merchandise to data written on a sales receipt; and
concluding that a potential theft is detected if the comparing step finds that the data stored in the RFID on the merchandise does not match the data written on the sales receipt. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of preparing information usable in theft detection using radio frequency identification (“
- RFID”
) technology on a transaction receipt, comprising steps of;
reading, for each of one or more items presented for purchase, identifying information previously stored in an RFID tag affixed thereto;
computing a first checksum over selected portions of the identifying information that has been read for each item; and
storing the first checksum in an RFID tag affixed to a transaction receipt corresponding to the purchase. - View Dependent Claims (8, 9)
- RFID”
-
10. A method of detecting potential theft using radio frequency identification (“
- RFID”
) technology on a transaction receipt, comprising steps of;
reading, for each of one or more items possessed by a shopper, identifying information previously stored in an RFID tag affixed thereto;
reading, from a transaction receipt possessed by the shopper, a first checksum previously computed over selected portions of identifying information read from an RFID tag affixed to each of one or more items presented by the shopper for purchase;
computing a second checksum over selected portions of the identifying information that has been read for each item possessed by the shopper; and
concluding that some of the possessed items were not paid for if the first checksum is not identical to the second checksum. - View Dependent Claims (11, 12, 13)
- RFID”
-
14. A method of detecting potential theft, comprising steps of:
-
computing a checksum over identifying information for each of one or more presented items, wherein the identifying information is read from a radio frequency identification (“
RFID”
) tag affixed to each of the presented items;
storing the computed checksum in an RFID tag affixed to a receipt associated with the presented items;
subsequently presenting one or more items and the receipt;
determining whether the subsequently-presented items are associated with the receipt, further comprising the steps of;
computing a new checksum over corresponding identifying information for each of the one or more subsequently-presented items, wherein the identifying information for each of the subsequently-presented items is read from an RFID tag affixed thereto; and
concluding that the subsequently-presented items are not associated with the receipt, if the checksum is not equal to the new checksum; and
charging a fee for carrying out one or more of the computing, storing, and determining steps.
-
-
15. A system for detecting potential theft, comprising:
-
means for programmatically comparing data stored in a radio frequency identification (“
RFID”
) tag on merchandise to data written on a sales receipt; and
means for concluding that a potential theft is detected if the means for comparing finds that the data stored in the RFID on the merchandise does not match the data written on the sales receipt. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A system for preparing information usable in theft detection using radio frequency identification (“
- RFID”
) technology on a transaction receipt, comprising;
means for reading, for each of one or more items presented for purchase, identifying information previously stored in an RFID tag affixed thereto;
means for computing a first checksum over selected portions of the identifying information that has been read for each item; and
means for storing the first checksum in an RFID tag affixed to a transaction receipt corresponding to the purchase. - View Dependent Claims (22, 23)
- RFID”
-
24. A system for detecting potential theft using radio frequency identification (“
- RFID”
) technology on a transaction receipt, comprising;
means for reading, for each of one or more items possessed by a shopper, identifying information previously stored in an RFID tag affixed thereto;
means for reading, from a transaction receipt possessed by the shopper, a first checksum previously computed over selected portions of identifying information read from an RFID tag affixed to each of one or more items presented by the shopper for purchase;
means for computing a second checksum over selected portions of the identifying information that has been read for each item possessed by the shopper; and
means for concluding that some of the possessed items were not paid for if the first checksum is not identical to the second checksum. - View Dependent Claims (25, 26, 27)
- RFID”
-
28. A computer program product for detecting potential theft, the computer program product embodied on one or more computer-readable media and comprising:
-
computer-readable program code means for programmatically comparing data stored in a radio frequency identification (“
RFID”
) tag on merchandise to data written on a sales receipt; and
computer-readable program code means for concluding that a potential theft is detected if the computer-readable program code means for comparing finds that the data stored in the RFID on the merchandise does not match the data written on the sales receipt. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. A computer program product for preparing information usable in theft detection using radio frequency identification (“
- RFID”
) technology on a transaction receipt, the computer program product embodied on one or more computer-readable media and comprising;
computer-readable program code means for reading, for each of one or more items presented for purchase, identifying information previously stored in an RFID tag affixed thereto;
computer-readable program code means for computing a first checksum over selected portions of the identifying information that has been read for each item; and
computer-readable program code means for storing the first checksum in an RFID tag affixed to a transaction receipt corresponding to the purchase. - View Dependent Claims (35, 36)
- RFID”
-
37. A computer program product for detecting potential theft using radio frequency identification (“
- RFID”
) technology on a transaction receipt, the computer program product embodied on one or more computer-readable media and comprising;
computer-readable program code means for reading, for each of one or more items possessed by a shopper, identifying information previously stored in an RFID tag affixed thereto;
computer-readable program code means for reading, from a transaction receipt possessed by the shopper, a first checksum previously computed over selected portions of identifying information read from an RFID tag affixed to each of one or more items presented by the shopper for purchase;
computer-readable program code means for computing a second checksum over selected portions of the identifying information that has been read for each item possessed by the shopper; and
computer-readable program code means for concluding that some of the possessed items were not paid for if the first checksum is not identical to the second checksum. - View Dependent Claims (38, 39, 40)
- RFID”
Specification