Security system for inventory
First Claim
Patent Images
1. A system for enabling item purchase directly from a protected area, comprising:
- at least one radio-frequency identification (“
RFID”
) security sensor positioned to protect the area, for monitoring presence of each of at least one items expected to be contained within the area, wherein each of the at least one items has a transmission mechanism coupled thereto or integrated therewithin, the transmission mechanism comprising an RFID security tag sending signals that are detectable by the at least one RFID security sensor while the item remains within proximity of at least one of the at least one RFID security sensors;
a computer comprising a processor; and
instructions configured to execute, using the processor, to implement functions comprising;
responsive to detecting, by at least one of the RFID security sensors, a removal of any of the at least one items from the protected area, performing a purchase verification process comprising;
obtaining a unique identifier of the removed item by interrogating the RFID security tag coupled to or integrated within the removed item;
identifying a person who removed the item;
starting a first timer to monitor a first time interval during which the removed item remains outside the protected area;
upon expiration of the first timer without receiving a notification that a purchase has been completed for the removed item during the first time interval, issuing a first warning to the person who removed the item, and starting a second timer to monitor a second time interval during which the removed item remains outside the protected area;
upon expiration of the second timer without receiving the notification that the purchase has been completed for the removed item during the second time interval, issuing a security alert for the removed item; and
upon receiving the notification, at the protected area, that the person removing the item completes the purchase of the removed item, recording an indication that the removed item was purchased, wherein;
the purchase of the removed item is initiated upon a scan of the RFID tag of the removed item by the person;
the notification is generated upon detecting a completion of the purchase of the removed item; and
the security alert indicates that the removed item was stolen.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system for inventory automatically detects removal of inventory items from an area or areas protected with security sensors. A person removing the item then scans an identifying code of the item, such as its bar code or radio-frequency identification (“RFID”) tag, with a device such as a portable shopping assistant device; if the item is not scanned in an appropriate manner, such as within a particular a time period, then theft of the item may be suspected. Information for completing a purchase transaction can be sent from the portable shopping assistant device. In this manner, items can be purchased directly from the protected areas.
-
Citations
14 Claims
-
1. A system for enabling item purchase directly from a protected area, comprising:
-
at least one radio-frequency identification (“
RFID”
) security sensor positioned to protect the area, for monitoring presence of each of at least one items expected to be contained within the area, wherein each of the at least one items has a transmission mechanism coupled thereto or integrated therewithin, the transmission mechanism comprising an RFID security tag sending signals that are detectable by the at least one RFID security sensor while the item remains within proximity of at least one of the at least one RFID security sensors;a computer comprising a processor; and instructions configured to execute, using the processor, to implement functions comprising; responsive to detecting, by at least one of the RFID security sensors, a removal of any of the at least one items from the protected area, performing a purchase verification process comprising; obtaining a unique identifier of the removed item by interrogating the RFID security tag coupled to or integrated within the removed item; identifying a person who removed the item; starting a first timer to monitor a first time interval during which the removed item remains outside the protected area; upon expiration of the first timer without receiving a notification that a purchase has been completed for the removed item during the first time interval, issuing a first warning to the person who removed the item, and starting a second timer to monitor a second time interval during which the removed item remains outside the protected area; upon expiration of the second timer without receiving the notification that the purchase has been completed for the removed item during the second time interval, issuing a security alert for the removed item; and upon receiving the notification, at the protected area, that the person removing the item completes the purchase of the removed item, recording an indication that the removed item was purchased, wherein; the purchase of the removed item is initiated upon a scan of the RFID tag of the removed item by the person; the notification is generated upon detecting a completion of the purchase of the removed item; and the security alert indicates that the removed item was stolen. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for enabling item purchase directly from a protected area,
the computer program product embodied on one or more non-propagation computer-usable storage media and comprising computer-usable program code for: -
monitoring, by at least one radio-frequency identification (“
RFID”
) security sensor positioned to protect the area, presence of each of at least one items expected to be contained within the area, wherein each of the at least one items has a transmission mechanism coupled thereto or integrated therewithin, the transmission mechanism comprising an RFID security tag sending signals that are detectable by the at least one RFID security sensor while the item remains within proximity of at least one of the at least one RFID security sensors;responsive to detecting, by at least one of the RFID security sensors, a removal of any of the at least one items from the protected area, performing a purchase verification process comprising; obtaining a unique identifier of the removed item by interrogating the RFID security tag coupled to or integrated within the removed item; identifying a person who removed the item; staffing a first timer to monitor a first time interval during which the removed item remains outside the protected area; upon expiration of the first timer without receiving a notification that a purchase has been completed for the removed item during the first time interval, issuing a first warning to the person who removed the item, and staffing a second timer to monitor a second time interval during which the removed item remains outside the protected area; upon expiration of the second timer without receiving the notification that the purchase has been completed for the removed item during the second time interval, issuing a security alert for the removed item; and upon receiving the notification, at the protected area, that the person removing the item completes the purchase of the removed item, recording an indication that the removed item was purchased, wherein; the purchase of the removed item is initiated upon a scan of the RFID tag of the removed item by the person; the notification is generated upon detecting a completion of the purchase of the removed item; and the security alert indicates that the removed item was stolen. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification