RFID theft prevention system
First Claim
1. A method, comprising:
- transmitting an interrogation signal from a Radio-Frequency Identification (RFID) reader;
receiving a response signal from an RFID tag;
determining if a product associated with the RFID tag is RFID secured based on the response signal;
determining a direction of movement of the RFID tag in relation to an access point of a store based on the response signal;
when the RFID tag is determined to be exiting the access point of the store, determining if the product is authorized to exit the store by;
consulting a product transaction database to determine whether the product has been validly purchased;
if the product is validly purchased, identifying the product as authorized to exit the store;
if the product is not validly purchased, consulting an inventory tracking database to determine whether the product has ever been in a supply chain of the store,if the product has not been in a supply chain of the store, identifying the product as authorized to exit the store,if the product has been in the supply chain of the store, identifying the product as not authorized to exit the store, andwhen the product is not authorized to exit the store, providing an alarm to indicate the product is not authorized to exit the store.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, apparatuses and methods for deterring product theft and preventing the fraudulent return or exchange of products. Products are associated with a Radio-Frequency Identification (RFID) tag. Tag readers located at store access points can detect the presence of the RFID tag and can be used to help determine a direction of travel of the RFID tag. When a product is determined to be leaving the store, the transaction history of the product can be accessed, as well as the supply chain history of the product, to confirm the product has been validly purchased and therefore authorized for removal from the store. When a product is determined to be entering a store, the supply chain history and transaction history of the product can be consulted to determine if the product can be validly exchanged or returned.
38 Citations
21 Claims
-
1. A method, comprising:
-
transmitting an interrogation signal from a Radio-Frequency Identification (RFID) reader; receiving a response signal from an RFID tag; determining if a product associated with the RFID tag is RFID secured based on the response signal; determining a direction of movement of the RFID tag in relation to an access point of a store based on the response signal; when the RFID tag is determined to be exiting the access point of the store, determining if the product is authorized to exit the store by; consulting a product transaction database to determine whether the product has been validly purchased; if the product is validly purchased, identifying the product as authorized to exit the store; if the product is not validly purchased, consulting an inventory tracking database to determine whether the product has ever been in a supply chain of the store, if the product has not been in a supply chain of the store, identifying the product as authorized to exit the store, if the product has been in the supply chain of the store, identifying the product as not authorized to exit the store, and when the product is not authorized to exit the store, providing an alarm to indicate the product is not authorized to exit the store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
combining a product with a Radio-Frequency Identification (RFID) tag; storing a record indicating that the product is RFID secured in a first database; conducting a transaction involving the product; storing a record of the transaction in a second database; determining when the product is exiting a store; consulting the first database to determine if the product is indicated to be RFID secured; consulting the second database to determine if the product was validly purchased; consulting a third database to determine if the product has ever been in a supply chain of the store; and providing an alarm signal when it is determined the product was not validly purchased and was in a supply chain of the store. - View Dependent Claims (18)
-
-
19. A theft prevention system, comprising:
-
a plurality of Radio-Frequency Identification (RFID) readers to transmit a plurality of RFID interrogation signals in an area covering a portion of an access point of a store and to receive one or more signals from an RFID tag associated with a product in response to the one or more transmitted RFID interrogation signals, the plurality of RFID readers being placed at both sides of the access point; an RFID tag administration database to maintain records indicating which products offered for sale by the store are associated with RFID tags; a product transaction status database to maintain a transaction history of products offered for sale by the store; an inventory tracking database to maintain a supply chain history of products offered for sale by the store; a system server to receive the one or more response signals from the one or more tag readers and to determine a direction of movement of the RFID tag in relation to the access point of the store; and an alarm signaling system to provide an alarm when the system server determines the product is exiting the store and is not authorized to exit the store and when the product is being returned and the system server determines the product is not authorized for return, wherein the system server determines the product is not authorized to exit the store when the RFID tag administration database indicates the product is RFID secured, the product transaction status database indicates the product was not validly purchased and the inventory tracking database indicates the product has been in a supply chain of the store. - View Dependent Claims (20, 21)
-
Specification