Security System for Inventory
First Claim
1. A security system for inventory, comprising:
- at least one security sensor positioned to protect an area by detecting presence of each of at least one items contained within the area, wherein each of the at least one items sends has a transmission mechanism coupled thereto or integrated therewithin, the transmission mechanism capable of sending signals that are detectable by the at least one security sensor while the item remains within proximity of at least one of the at least one security sensors; and
a processing circuit configured to process removal of any of the at least one items, responsive to failing to detect the presence thereof within the area, comprising;
identifying the removed item and a person removing it; and
awaiting a signal that the person removing the item completes a removal transaction within a designated time period, and if not, treating the removal as a potential theft.
2 Assignments
0 Petitions
Accused Products
Abstract
A security system for inventory automatically detects removal of inventory items from an area or areas protected with security sensors. A person removing the item then scans an identifying code of the item, such as its bar code or radio-frequency identification (“RFID”) tag, with a device such as a portable shopping assistant device; if the item is not scanned in an appropriate manner, such as within a particular a time period, then theft of the item may be suspected. Information for completing a purchase transaction can be sent from the portable shopping assistant device. In this manner, items can be purchased directly from the protected areas.
-
Citations
20 Claims
-
1. A security system for inventory, comprising:
-
at least one security sensor positioned to protect an area by detecting presence of each of at least one items contained within the area, wherein each of the at least one items sends has a transmission mechanism coupled thereto or integrated therewithin, the transmission mechanism capable of sending signals that are detectable by the at least one security sensor while the item remains within proximity of at least one of the at least one security sensors; and a processing circuit configured to process removal of any of the at least one items, responsive to failing to detect the presence thereof within the area, comprising; identifying the removed item and a person removing it; and awaiting a signal that the person removing the item completes a removal transaction within a designated time period, and if not, treating the removal as a potential theft. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of enabling item purchase directly from a protected area, the method comprising steps of:
-
monitoring, by at least one security sensor positioned to protect the area, presence of each of at least one items expected to be contained within the area, wherein each of the at least one items sends has a transmission mechanism coupled thereto or integrated therewithin, the transmission mechanism capable of sending signals that are detectable by the at least one security sensor while the item remains within proximity of at least one of the at least one security sensors; and responsive to detecting, by at least one of the security sensors, a removal of any of the at least one items, identifying the removed item and awaiting a signal that a person removing the item completes a purchase of the item within a designated time period following the removal, and if not, treating the removal as a potential theft. - View Dependent Claims (17, 18, 19)
-
-
20. A computer program product comprising at least one computer useable media, the media embodying computer-usable program code for enabling item ownership transfer directly from a protected area, the computer program product comprising:
-
computer-usable program code for receiving notification that a security sensor disposed to protect an area from theft has detected removal of an item from the area, wherein the security sensor is adapted to receive communication signals from the item while the item remains within proximity of the security sensor and the item is adapted for iteratively transmitting the communication signals; computer-usable program code for notifying a remover of the item that the item should be purchased to avoid signalling a security system of the removal; and computer-usable program code for receiving notification, within a designated time period, that the remover of the item requests to purchase the item, and responsive to receiving the notification, for invoking a purchase transaction, or for signalling the security system of the removal otherwise.
-
Specification