Inventory control
First Claim
1. A method of controlling inventory of items stored at a location using at least one identification tag reader and a surveillance system including a plurality of cameras, the method comprising:
- using the identification tag reader to detect an identification tag;
determining risk associated with the identification tag based on whether the identification tag has previously been removed from the location and whether the identification tag is being returned to the location; and
determining, based on risk associated with the identification tag, whether to select the camera to view the area around the identification tag.
9 Assignments
0 Petitions
Accused Products
Abstract
A method, article of manufacture, and apparatus for inventory control of items in a location are disclosed. In an embodiment, this comprises a surveillance system comprising a plurality of cameras and at least one display, at least one identification tag, at least one identification tag reader configured to read the identification tag and placed to cover at least a portion of the location, and a computer configured to process information including the identification tag read by the reader. In response to the information, the computer controls a video camera to display an image showing an area around the identification tag. This may be based on a determination of heightened risk, such as when the identification tag is associated with a receipt and is brought back to the location after being removed from the location.
-
Citations
19 Claims
-
1. A method of controlling inventory of items stored at a location using at least one identification tag reader and a surveillance system including a plurality of cameras, the method comprising:
-
using the identification tag reader to detect an identification tag;
determining risk associated with the identification tag based on whether the identification tag has previously been removed from the location and whether the identification tag is being returned to the location; and
determining, based on risk associated with the identification tag, whether to select the camera to view the area around the identification tag. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for controlling inventory of items stored at a location using at least one identification tag reader and a surveillance system including a plurality of cameras and at least one display, the computer program product comprising a computer usable medium having machine readable code embodied therein for:
-
using the identification tag reader to detect an identification tag;
determining risk associated with the identification tag based on whether the identification tag has previously been removed from the location and whether the identification tag is being returned to the location; and
determining, based on risk associated with the identification tag, whether to select the camera to view the area around the identification tag. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system for inventory control of items stored at a location, comprising:
-
a surveillance system comprising a plurality of cameras and at least one display;
at least one identification tag;
at least one identification tag reader configured to read the identification tag and configured to cover at least a portion of the location, wherein the portion includes non-access points to the location; and
a computer configured to process information including the identification tag read by the reader and in response to the information, select one of the plurality of video cameras to display an image showing an area around the identification tag. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification