Reliable tag deactivation
First Claim
1. A method of deactivating a security tag, comprising:
- a) placing the security tag a first distance from a deactivation apparatus;
b) estimating the first distance between the tag and the deactivation apparatus by determining a coupling coefficient between the tag and the deactivation apparatus;
c) determining whether the tag is sufficiently close to the deactivation apparatus to ensure delivery of a deactivation pulse of sufficiently high power to deactivate the tag by determining whether the coupling coefficient between the tag and the deactivation apparatus exceeds a predetermined threshold value;
d) transmitting the deactivation pulse when the tag is sufficiently close;
e) determining whether a deactivation confirmation indication has occurred; and
f) when the deactivation confirmation indication has been determined not to have occurred, placing the security tag a second distance closer to the deactivation apparatus than the first distance.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for reliable deactivation of a security (EAS) tag, and an apparatus for accomplishing the same. The method generally includes placing a security tag a first distance from a deactivation apparatus; determining whether a deactivation confirmation signal has occurred; and when it is determined that the deactivation confirmation signal did not occur, placing the security tag closer to the deactivation apparatus. The deactivation apparatus generally includes a pad configured to transmit a deactivation pulse having a power sufficient to deactivate the security tag when it is within a deactivation field; a tag reader configured to detect a signal transmission from an active tag when it is in a read field of the deactivation apparatus; a confirmation indicator configured to indicate that the pad has sent the deactivation pulse; and logic configured to determine when an active tag is in the deactivation field or the read field, and communicate to the confirmation indicator that the pad has sent the deactivation pulse.
17 Citations
34 Claims
-
1. A method of deactivating a security tag, comprising:
-
a) placing the security tag a first distance from a deactivation apparatus; b) estimating the first distance between the tag and the deactivation apparatus by determining a coupling coefficient between the tag and the deactivation apparatus; c) determining whether the tag is sufficiently close to the deactivation apparatus to ensure delivery of a deactivation pulse of sufficiently high power to deactivate the tag by determining whether the coupling coefficient between the tag and the deactivation apparatus exceeds a predetermined threshold value; d) transmitting the deactivation pulse when the tag is sufficiently close; e) determining whether a deactivation confirmation indication has occurred; and f) when the deactivation confirmation indication has been determined not to have occurred, placing the security tag a second distance closer to the deactivation apparatus than the first distance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 29, 30, 31, 32)
-
-
16. A security tag deactivation apparatus, comprising:
-
a) a pad configured to transmit a deactivation pulse having a power sufficient to deactivate a security tag when the security tag is within a deactivation field of the deactivation apparatus; b) a tag reader configured to (1) determine a coupling coefficient between the tag and the pad, and (2) detect a signal transmission from a non-deactivated tag when the non-deactivated tag is within a predetermined read field of the deactivation apparatus, the read field having a greater volume than the deactivation field; c) a confirmation indicator configured to indicate that the pad has sent the deactivation pulse; and d) logic configured to (1) estimate a distance between the tag and the pad using the coupling coefficient, (2) determine when the non-deactivated tag is within the deactivation field by determining whether the coupling coefficient between the non-deactivated tag and the pad exceeds a predetermined threshold value, and (3) communicate to the confirmation indicator that the pad has sent the deactivation pulse. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 33, 34)
-
Specification