Methods and Apparatus for Detecting and Identifying Improper Antitheft Device Deactivation
First Claim
1. A retail checkout terminal, comprising:
- a security tag deactivation device for deactivating a security tag affixed to a product presented for entry into a transaction;
a deactivation detector for detecting a deactivation of the security tag; and
a processor for receiving a deactivation detection indication from the deactivation detector that a security tag has been deactivated and evaluating the deactivation detection indication in light of information associated with the product to determine if deactivation of a security tag is to be expected for a transaction involving the product.
6 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques for retail product transaction processing and security tag deactivation analysis. Upon detection of a security tag deactivation associated with entry of product information into a retail transaction, product information for the product is analyzed to determine whether the security tag deactivation is legitimate or possibly illegitimate. Upon identification of a deactivation as possibly illegitimate, an alert is issued to a retailer employee to investigate the transaction. The product information may be updated according to an entry made by the retailer employee identifying the deactivation as legitimate or illegitimate. Product information for a product may include a deactivation count for a product, with a deactivation being identified as possibly illegitimate if the deactivation count does not meet a predefined threshold, the deactivation count being incremented if a deactivation identified as unexpected is determined to be legitimate.
-
Citations
20 Claims
-
1. A retail checkout terminal, comprising:
-
a security tag deactivation device for deactivating a security tag affixed to a product presented for entry into a transaction; a deactivation detector for detecting a deactivation of the security tag; and a processor for receiving a deactivation detection indication from the deactivation detector that a security tag has been deactivated and evaluating the deactivation detection indication in light of information associated with the product to determine if deactivation of a security tag is to be expected for a transaction involving the product. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of transaction processing and security tag deactivation analysis, comprising the steps of:
-
receiving an indication of a security tag deactivation in association with presentation of information for a product for entry into a transaction; and analyzing product information for the product to determine whether or not the security tag deactivation is unexpected. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification