Systems and methods for data reading and EAS tag sensing and deactivating at retail checkout
First Claim
1. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
- sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, acknowledging the data read from the ID tag substantially without delay; and
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, delaying acknowledgment of the data read from the data reader.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods of operation of a data reader and security tag deactivation system whereby a data reader such as a barcode scanner is equipped with EAS deactivation coils or modules disposed in the vicinity of the read volume or generally proximate thereto and the system is operable to permit reading of the ID tag (such as the barcode label) on an item, and upon a successful read, the deactivation unit is operable to (1) sense the presence of an EAS tag; (2) if presence of an EAS tag is sensed, energize the deactivation coil/module to deactivate the EAS tag; and (3) sense if the EAS tag is deactivated. If the EAS tag is sensed to have been deactivated, the system signals as such and a next item may be scanned. If the EAS tag is sensed to have not been deactivated, the system proceeds to alternate operational steps to handle the exception. In another function, the system is operable to urge the operator to return the item to the read volume to enhance EAS tag deactivation, one method being by delaying a good read acknowledgment until the system determines that the EAS tag which may have been previously detected has subsequently been deactivated.
112 Citations
63 Claims
-
1. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, acknowledging the data read from the ID tag substantially without delay; and
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, delaying acknowledgment of the data read from the data reader. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17)
-
-
16. A method of controlling a system having a data reader defining a read volume and an associated security tag controller, the method comprising the steps of:
-
selecting one of a plurality of predetermined security levels including a low level and a high level;
sensing to detect the presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag is not detected proximate to the read volume of the data reader, asserting a deactivation signal for a first predetermined deactivation time period; and
if the selected security level is the low level, and the presence of an electronic security tag was not detected, acknowledging the data read from the ID tag substantially without delay. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A combined security tag unit and data reader system comprising:
-
a housing;
a data reader enclosed in the housing and defining a read volume adjacent the housing for reading an ID tag placed within the read volume;
a security tag unit enclosed in the housing and arranged for sensing presence of an electronic security tag proximate to the read volume of the data reader prior to or simultaneous with the data reader reading the ID tag, the security tag unit including deactivation unit arranged for deactivating an electronic security tag located proximate to the read volume of the data reader; and
control means for arming the deactivation unit only after a successful read of the ID tag, and only for a limited time period after the successful read of the ID tag, thereby avoiding deactivation of an electronic security tag on or in items that have not been read. - View Dependent Claims (24, 25, 26)
-
-
27. A method of controlling a system having a data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader; -
simultaneous with or after said step of sensing, reading data from an ID tag within the read volume of the data reader;
asserting a deactivation signal to arm a deactivation unit of the security tag controller for a predetermined deactivation time period; and
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing the deactivation unit to attempt to deactivate the detected electronic security tag. - View Dependent Claims (28)
-
-
29. A method of controlling a system having a data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag within the read volume of the data reader;
asserting a deactivation signal to arm a deactivation unit of the security tag controller for a predetermined deactivation time period;
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing the deactivation unit to attempt to deactivate the detected electronic security tag;
sensing to detect the presence of an electronic security tag proximate to the read volume of the data reader; and
if the presence of an electronic security tag is detected, repeating said firing step; and
repeating said sensing and firing steps until the electronic security tag is no longer detected or the deactivation signal is no longer asserted.
-
-
30. A method of controlling a system having a data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag within the read volume of the data reader;
asserting a deactivation signal to arm a deactivation unit of the security tag controller for a predetermined deactivation time period;
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing the deactivation unit to attempt to deactivate the detected electronic security tag; and
if the presence of an electronic security tag proximate to the read volume of the data reader is not detected, generating an indication of a successful data read of the ID tag.
-
-
31. A method of controlling a system having a data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag within the read volume of the data reader;
asserting a deactivation signal to arm a deactivation unit of the security tag controller for a predetermined deactivation time period;
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing the deactivation unit to attempt to deactivate the detected electronic security tag; and
generating an indication of a successful data read of the ID tag only after the security tag has been deactivated.
-
-
32. A method of controlling a system having a data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to the read volume of the data reader;
reading data from an ID tag within the read volume of the data reader;
asserting a deactivation signal to arm a deactivation unit of the security tag controller for a predetermined deactivation time period;
if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, firing the deactivation unit to attempt to deactivate the detected electronic security tag; and
if the presence of an electronic security tag proximate to the read volume of the data reader is detected, and the security tag is not deactivated during the deactivation time period, generating an indication of an exception condition. - View Dependent Claims (33, 34)
-
-
35. A method of controlling a system having a data reader defining a read volume and an associated security tag controller having a deactivation unit, the method comprising the steps of
(a) sensing to detect presence of an electronic security tag proximate to the read volume of the data reader; -
(b) reading data from an ID tag within the read volume of the data reader;
c) asserting a deactivation signal to arm a deactivation unit for a predetermined deactivation time period;
(d) if the presence of an electronic security tag is detected proximate to the read volume of the data reader, and the deactivation signal is asserted, attempting to deactivate the detected electronic security tag;
e) if the electronic security tag is not deactivated during the deactivation time period, generating an indication of an exception condition;
f) waiting up to a predetermined override time limit for input of a manual override; and
g) responsive to receiving a manual override input prior to expiration of the override time limit, asserting the deactivation signal to arm the deactivation unit to deactivate the detected electronic security tag. - View Dependent Claims (36, 37, 38, 39)
-
-
40. A combined security tag unit and data reader system comprising:
-
a housing including a scan window;
a data reader enclosed in the housing and defining a read volume adjacent the housing and visible to the reader through the scan window for reading an ID tag placed within the read volume;
a security tag unit enclosed in the housing and arranged for sensing to detect the presence of an EAS tag proximate to the read volume of the data reader;
the security tag unit including deactivation unit arranged for deactivating an EAS tag located proximate to the read volume of the data reader; and
means for indicating a successful read of the ID tag, wherein the indicating means is arranged to indicate a successful read of the ID tag only after both successful read of the ID tag and successful deactivation of the security tag have occurred, thereby avoiding multiple indications of the read of the same ID tag. - View Dependent Claims (41, 42, 43)
-
-
44. A combined security tag deactivation unit and data reader comprising:
-
a housing including a scan window;
a data reader enclosed in the housing and defining a read volume adjacent the housing and visible to the reader through the scan window for reading an ID tag placed within the read volume;
a security tag unit enclosed in the housing and arranged for sensing to detect the presence of an EAS tag proximate to the read volume of the data reader;
the security tag unit including deactivation unit arranged for deactivating an EAS tag located proximate to the read volume of the data reader; and
means for indicating a successful read of the ID tag, wherein the indicating means is arranged to indicate a successful read of the ID tag only after both successful read of the ID tag and successful deactivation of the security tag have occurred, thereby avoiding multiple indications of the read of the same ID tag, wherein the indicating means includes means for confirming successful deactivation of the security tag by repeating said sensing to detect the presence of an activated electronic security tag proximate to the read volume of the data reader, thereby implementing a sense-detect-sense methodology.
-
-
45. A method of operating a system comprised of a security tag deactivation unit and a data reader, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to a read volume of the data reader;
reading data from an ID tag;
if the presence of a security tag proximate to the read volume of the data reader is detected, activating the deactivation unit in an attempt to deactivate the detected electronic security tag;
repeating said sensing step to confirm deactivation of the detected electronic security tag; and
if the presence of an electronic security tag is not detected, implying that the deactivation succeeded, and generating an output signal indicating completed reading of the ID tag data. - View Dependent Claims (46, 47, 48, 49)
-
-
50. A method of operating a system comprised of a security tag deactivation unit and a data reader, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to a read volume of the data reader;
reading data from an ID tag;
if the presence of a security tag proximate to the read volume of the data reader is detected, activating the deactivation unit in an attempt to deactivate the detected electronic security tag;
repeating said sensing step to confirm deactivation of the detected electronic security tag; and
if the presence of an electronic security tag is not detected, implying that the deactivation succeeded, and generating an output signal indicating completed reading of the ID tag data, and further comprising, after the second sensing step, if the presence of an electronic security tag is detected, implying that the deactivation attempt failed, repeating said firing and sensing cycle without generating an indication of completion of the reading step.
-
-
51. A method of operating a system comprised of a security tag deactivation unit and a data reader, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to a read volume of the data reader;
reading data from an ID tag;
if the presence of a security tag proximate to the read volume of the data reader is detected, activating the deactivation unit in an attempt to deactivate the detected electronic security tag;
repeating said sensing step to confirm deactivation of the detected electronic security tag; and
if the presence of an electronic security tag is not detected, implying that the deactivation succeeded, and generating an output signal indicating completed reading of the ID tag data, and further comprising retrying to deactivate the detected electronic security tag before generating an indication of completion of the reading step.
-
-
52. A method of operating a system comprised of a security tag deactivation unit and a data reader, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to a read volume of the data reader;
reading data from an ID tag;
if the presence of a security tag proximate to the read volume of the data reader is detected, activating the deactivation unit in an attempt to deactivate the detected electronic security tag;
repeating said sensing step to confirm deactivation of the detected electronic security tag; and
if the presence of an electronic security tag is not detected, implying that the deactivation succeeded, and generating an output signal indicating completed reading of the ID tag data;
repeating said step of firing the deactivation unit in an attempt to deactivate the detected electronic security tag; and
repeating said sensing step to confirm deactivation of the detected electronic security tag, and further comprising limiting repeating of said firing and sensing steps to a predetermined time period and then, if the presence of an electronic security tag is still detected, generating a security exception indicating that an electronic security tag is detected and is not deactivated.
-
-
53. A method of operating a system comprised of a security tag deactivation unit and a data reader, the method comprising the steps of:
-
sensing to detect presence of an electronic security tag proximate to a read volume of the data reader;
reading data from an ID tag;
if the presence of a security tag proximate to the read volume of the data reader is detected, activating the deactivation unit in an attempt to deactivate the detected electronic security tag;
repeating said sensing step to confirm deactivation of the detected electronic security tag; and
if the presence of an electronic security tag is not detected, implying that the deactivation succeeded, and generating an output signal indicating completed reading of the ID tag data;
repeating said step of firing the deactivation unit in an attempt to deactivate the detected electronic security tag; and
repeating said sensing step to confirm deactivation of the detected electronic security tag, and further comprising limiting the said sensing and retrying cycle to a predetermined number of such cycles and then, if the presence of an electronic security tag is still detected, generating a security exception indicating that an electronic security tag is detected and is not deactivated.
-
-
54. A method of operation in a combined security tag deactivation unit and data reader, the method comprising the steps of:
-
sensing to detect the presence of an EAS tag proximate to the read volume of the ID tag reader;
reading data from an ID tag;
if the presence of an EAS tag proximate to the read volume of the ID tag reader is still detected, firing the deactivation unit in an attempt to deactivate the detected EAS tag; and
repeating said sensing step to confirm deactivation of the detected EAS tag.
-
-
55. A method of operation in an electronic article security (EAS) controller comprising the steps of:
-
monitoring an arm control having an armed state and an unarmed state;
while the arm control is armed, sensing to detect presence of an electronic security tag; and
if the presence of an electronic security tag is detected while the arm control is in the armed state, attempting to deactivate the electronic security tag. - View Dependent Claims (56, 57)
-
-
58. A method of operation in an electronic article security (EAS) controller comprising the steps of:
-
monitoring an arm control having an armed state and an unarmed state;
while the arm control is armed, sensing to detect presence of an electronic security tag; and
if the presence of an electronic security tag is detected while the arm control is in the armed state, attempting to deactivate the electronic security tag;
repeating said sensing step to detect presence of an electronic security tag and repeating said attempting to deactivate the electronic security tag, up to a predetermined maximum number of retries, and further comprising generating a hard tag indication if the number of retries to deactivate the electronic security tag reaches the maximum number of retries.
-
-
59. A method of operating and controlling a system having a data reader defining a read volume and an associated security tag controller, for reading an ID tag and deactivating electronic security tag on an item, the method comprising the steps of:
-
sensing whether an electronic security tag is present proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if an ID tag is read within a predetermined time window subsequent to said sensing the electronic security tag being present, urging the operator to return the item to the read volume. - View Dependent Claims (60)
-
-
61. A method of controlling a system having a both a data reader defining a read volume and an security tag deactivator, the method comprising the steps of:
-
sensing to detect presence of a security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag has been detected, providing the deactivator with additional time to deactivate the security tag by delaying acknowledgment of the data read from the data reader;
if a security tag has been detected and data from an ID tag has been read, attempting to deactivate the security tag.
-
-
62. A method of controlling a system having a both a data reader defining a read volume and an security tag deactivator, the method comprising the steps of:
-
sensing to detect presence of a security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag has been detected, providing the deactivator with additional time to deactivate the security tag by delaying acknowledgment of the data read from the data reader;
if a security tag has been detected and data from an ID tag has been read, attempting to deactivate the security tag;
after attempting to deactivate the security tag, attempting to re-sense the security tag and if the security tag is not re-sensed, acknowledging the data read.
-
-
63. A method of controlling a system having a both a data reader defining a read volume and an security tag deactivator, the method comprising the steps of:
-
sensing to detect presence of a security tag proximate to the read volume of the data reader;
reading data from an ID tag located within the read volume of the data reader;
if the presence of an electronic security tag has been detected, providing the deactivator with additional time to deactivate the security tag by delaying acknowledgment of the data read from the data reader;
if a security tag has been detected and data from an ID tag has been read, attempting to deactivate the security tag;
after attempting to deactivate the security tag, attempting to re-sense the security tag and if the security tag is re- sensed, (a) continuing to delay acknowledgment of the data read and (b) re-attempting to deactivate the security tag.
-
Specification