Security method for a self-service checkout system with RFID capability
First Claim
1. A security method comprising the steps of:
- a) obtaining cart identification information from a radio frequency identification label attached to a cart, obtaining of cart information being performed by a security computer at a security station;
b) obtaining a first set of item identification information from a self-service computer transaction record using the cart identification information as an index to the transaction record;
c) obtaining a second set of item identification information from a group of radio frequency identification labels attached to members of a second group of items in the cart, each of one or more members of the group bearing its own radio frequency identification label, the radio frequency identification label attached to an item providing information identifying that item, obtaining of the second set of item identification information being performed by the security computer; and
d) comparing the first set of item identification information in the transaction record to the second set of item identification information to determine whether the second set of item identification information equals the first set of item identification information.
6 Assignments
0 Petitions
Accused Products
Abstract
A security method for a self-service checkout system with radio frequency identification (RFID) capability. The security method includes the steps of obtaining cart identification information from an RFID label attached to a cart by a security computer at a security station, obtaining first item identification information from a self-service computer transaction record using the cart identification information, obtaining second item identification information from a group of RFID labels attached to a group of items in the cart by the security computer, and comparing the first item identification information in the transaction record to the second item identification information to determine whether the second item identification information equals the first item identification information.
19 Citations
11 Claims
-
1. A security method comprising the steps of:
-
a) obtaining cart identification information from a radio frequency identification label attached to a cart, obtaining of cart information being performed by a security computer at a security station; b) obtaining a first set of item identification information from a self-service computer transaction record using the cart identification information as an index to the transaction record; c) obtaining a second set of item identification information from a group of radio frequency identification labels attached to members of a second group of items in the cart, each of one or more members of the group bearing its own radio frequency identification label, the radio frequency identification label attached to an item providing information identifying that item, obtaining of the second set of item identification information being performed by the security computer; and d) comparing the first set of item identification information in the transaction record to the second set of item identification information to determine whether the second set of item identification information equals the first set of item identification information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A security method comprising the steps of:
-
a) obtaining cart identification information from a radio frequency identification label attached to a cart using a self-service checkout computer; b) obtaining a first set of item identification information from a first group of radio frequency identification labels attached to members of a first group of items in the cart, obtaining of the first set of item identification information being performed by the self-service checkout computer; c) storing the cart identification information and the first set of item identification information in a transaction record using the self-service checkout computer; d) obtaining the cart identification information from the radio frequency identification label attached to the cart obtaining of the cart information being performed by a security computer at a security station; e) obtaining the first set of item identification information from the transaction record using the cart identification information; f) obtaining second item identification information from a second group of radio frequency identification labels attached to a second group of items in the cart obtaining of the second set of item identification information being performed by the security computer; and g) comparing the first item identification information in the transaction record to the second item identification information to determine whether the second item identification information equals the first item identification information. - View Dependent Claims (7)
-
-
8. A security system comprising:
-
a radio frequency identification label reader at a security station; and a security computer at a security station for obtaining cart identification information from a radio frequency identification label attached to a cart, for obtaining a first set of item identification information from a self-service computer transaction record using the cart identification information, for obtaining a second set of item identification information from a group of radio frequency identification labels attached to a group of items in the cart, and for comparing the first set of item identification information in the transaction record to the second set of item identification information to determine whether the second item identification information equals the first item identification information. - View Dependent Claims (9, 10, 11)
-
Specification